Networking White Papers

Results 76 - 100 of 3198Sort Results By: Published Date | Title | Company Name
By: Polycom     Published Date: Jan 06, 2015

This document will outline five easy steps to create awareness, increase utilization and expedite adoption of video collaboration across your organization. You’ve recently added video to your communications environment. Now the real challenge begins –getting your company to actually use the solution. What is the best way to launch and promote video collaboration internally? Which departments or groups should you be targeting? What are the keys to maximizing usage levels? What are the major concerns surrounding video, and how do you overcome them?

Tags : train, video, network, telecommuting, mobility, on-demand webinar, polycom, collaboration
    
By: LogMeIn     Published Date: Jan 06, 2015

This White Paper provides information on how to avoid technology frustrations that sap productivity.

Tags : online meetings, business online meetings, how to improve online meetings, online conferences, network performance, quality of service, remote access, remote network management
    
By: LogMeIn     Published Date: Jan 06, 2015

This paper confirms a changing mix in how Businesses demand web conferencing solutions that are built for modern employees, and a new, more agile and connected workforce.

Tags : death of the web conference, demands on web conferencing solutions, conferencing tools, modern conferencing tools, network performance management, remote network management, wireless communications, customer interaction service
    
By: Polycom     Published Date: Dec 22, 2014

The Gartner "MarketScope for Group Video Systems" evaluates seven group video system vendors based on six customer-focused criteria such as customer experience, market responsiveness and track record, and offering strategy. Download the report today. Read Gartner’s guidance for IT leaders who want to start or expand the use of video collaboration within their organizations and find out why Polycom was rated “Strong Positive”, the highest possible rating.

Tags : gartner, marketscope, polycom, video systems, networking
    
By: Polycom     Published Date: Dec 18, 2014

In Forrester’s 24-criteria evaluation of videoconferencing infrastructure and cloud services vendors, we identified the 10 most significant OEMs — Acano, AGT, Avaya, Blue Jeans Network, Cisco Systems, Lifesize, Pexip, Polycom, Videxio, and Vidyo — in the category and researched, analyzed, and scored them. This report details our findings about how well each vendor fulfills our criteria and where they stand in relation to each other to help technology managers select the right videoconferencing infrastructure or service for their environment.

Tags : forrester, vmr, cloud-computing, scalability, interoperability, networking, it management, enterprise applications
    
By: Tableau Software     Published Date: Dec 12, 2014

A new generation of business intelligence emerges as the expectation for user-friendly analytics and the expertise to ask and answer questions with data continues to grow. The wave of innovation is far from over. This paper highlights the top trends in business intelligence for 2015.

Tags : tableau, business intelligence, business management, data management, analytics, top trends, data governance, data journalism
    
By: Oracle     Published Date: Dec 11, 2014

There are so many social options for businesses these days it can be overwhelming. This guide gives you some helpful tips on choosing what communities – from online forums and content hosting sites to brand communities and Q&A sites – are right for your business goals. How do you plan for participation? How do you ensure the highest value is delivered. And do you need a designated community manager? Find out.

Tags : oracle, eloqua, creative kickstarter, q&a, monitoring, networking, it management, knowledge management
    
By: Oracle     Published Date: Dec 11, 2014

"Hopeful messaging is wasted messaging. Clear targeting means more than just Who. It also demands a knowledge of How, When, and What. Read this quick guide on what you can do to ensure your web pages and white papers, social posts, and search optimization are primed and ready for any “road to discovery” your audience takes. Get a clearer picture of who is involved in the buying process. Download the “Modern Marketing Essentials How-To Guide: Targeting”

Tags : oracle, marketing cloud, targetting, persona-driven communication, segmentation, database transformation, networking, software development
    
By: Oracle     Published Date: Dec 11, 2014

It used to take just a slidedeck and some brochures to “enable” the sales team. Not anymore. With modern marketing technology, you now can arm sales with ESP-like insights on their prospects’ online activities in regards to your products and services. This guide reveals the insights and ammunition Modern Marketing offers around determining buyer readiness and the most effective ways to engage each, individually. Read it now.

Tags : oracle, eloqua, sales enablement, high-quality leads, productive marketing, networking, it management, knowledge management
    
By: Cisco     Published Date: Nov 17, 2014

Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.

Tags : spyware, rootkits, hacking, cisco, advanced threat protection, networking, security, enterprise applications
    
By: Cisco     Published Date: Nov 17, 2014

Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile

Tags : malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking
    
By: Cisco     Published Date: Nov 17, 2014

Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.

Tags : endpoint proliferation, ids, ips, externalization, cisco, networking, security, software development
    
By: Cisco     Published Date: Nov 17, 2014

The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.

Tags : cloud-computing, malware, cisco, malware infection, amp, networking, security, it management
    
By: Aerohive     Published Date: Oct 23, 2014

Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive®, we’ve always done it this way.

Tags : wireless networks, controller-less networks, the new mobility, network infrastructures, infrastructure, internetworking hardware, network architecture, network management
    
By: Aerohive     Published Date: Oct 23, 2014

Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.

Tags : creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture, network management, network performance, 802.11
    
By: VCE     Published Date: Oct 16, 2014

Learn how a true Cconverged Iinfrastructure will enable your organize to achieve rapid, cost-effective private cloud deployments and see the six benefits that this will provide for your business.

Tags : vce, converged infrastructure, networking, it management
    
By: Aerohive     Published Date: Oct 15, 2014

A paper on enabling cloud networking to lower IT costs & boost IT productivity.

Tags : benefits of cloud networking, advantages of cloud networking, networking, wireless, data management, data center
    
By: Aerohive     Published Date: Oct 15, 2014

This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.

Tags : prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware, network architecture, network management, network performance
    
By: Aerohive     Published Date: Oct 15, 2014

This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.

Tags : mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems, mobile workers, wireless infrastructure, cloud computing
    
By: Aerohive     Published Date: Oct 15, 2014

This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.

Tags : which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems, mobile workers, cloud computing, virtualization
    
By: Aerohive     Published Date: Oct 14, 2014

This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.

Tags : aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security, gigabit networking, network management, network performance
    
By: Aerohive     Published Date: Oct 14, 2014

A paper on how to make the shopping experience personal, relevant and profitable.

Tags : mobile shpping, mobile retail, retail technology, shopping experience, improving the retail experience, online shopping experience, cloud computing
    
By: Damballa     Published Date: Oct 03, 2014

Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty

Tags : damballa, frost and sullivan, network based threats, detection, advanced threats, bot intention, networking, security
    
By: Damballa     Published Date: Oct 03, 2014

The Need for Certainty and Automation in Network Security – Damballa Failsafe with HP TippingPoint: ESG believes this may be the most effective means for reducing risk and combatting advanced malware attacks. This paper reviews how Damballa and HP’s joint solution can limit the possibility of additional infections, potential and actual damage caused by infections, and the possibility of data exfiltration: • Damballa Failsafe provides rapid detection with certainty so you can automate response based on confidence in True Positives • HPTipping Point can automatically take action against devices presented by Failsafe’s case of evidence

Tags : damballa, esg lab, hp tippingpoint, arcsight, network security, failsafe, reducing risk, malware attacks
    
By: Oracle     Published Date: Sep 30, 2014

As a business with a content marketing strategy, it’s crucial to understand your target audience and the types of content they want to consume. Whether you’ve been creating content for years or are just getting started, it’s important to take a step back and think about where your content will be most effective, and how that plays a role in your brand development or sales pipeline. Download the B2B Personas Guide from Oracle to help determine the right audience for your content.

Tags : personas, b2b, content, marketing, strategy, networking
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
256 Documents
Cloud Computing
1016 Documents
Colocation and Web Hosting
250 Documents
Content Management
317 Documents
Convergence
264 Documents
Data Center
1143 Documents
Data Center Design and Management
631 Documents
Data Management
1879 Documents
Distributed Computing
192 Documents
Enterprise Applications
1854 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
292 Documents
Grid Computing
174 Documents
Infrastructure
907 Documents
Internetworking Hardware
233 Documents
Interoperability
216 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2305 Documents
Knowledge Management
910 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
246 Documents
Monitoring
314 Documents
Network Architecture
465 Documents
Network Management
689 Documents
Network Performance
439 Documents
Network Performance Management
423 Documents
Network Provisioning
220 Documents
Network Security
536 Documents
OLAP
142 Documents
Optical Networking
151 Documents
Power and Cooling
259 Documents
Quality Of Service
184 Documents
Remote Access
302 Documents
Remote Network Management
255 Documents
Server Hardware
267 Documents
Servers
500 Documents
Small Business Networks
284 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
198 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
219 Documents
Wide Area Networks
238 Documents
Wireless
446 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.