Networking White Papers

Results 76 - 100 of 2799Sort Results By: Published Date | Title | Company Name
By: Delphix     Published Date: Jun 27, 2014

Data is increasingly critical to driving business. This IDC Whitepaper outlines how CIOs can understand what the "total cost of data" is across their entire organization and how Delphix can assist them in managing the data that drives the business forward.

Tags : idc, report, business gains, idc, cios, total cost of data, organization, manage data
    
By: Delphix     Published Date: Jun 27, 2014

Companies too often overlook the business gains a better archiving strategy can deliver, from enabling access to and preservation of critical data to more easily complying with regulations. Download this white paper to learn how Delphix can be an intregal part of ensuring your archiving strategy actually enables your business.

Tags : regulation, legal hold and delivery, integral, archiving strategy, networking, it management, data management
    
By: Delphix     Published Date: Jun 27, 2014

Making your IT organization more elastic and efficient is hard. Doing it while staying in compliance with regulations is even harder. Download this white paper to learn how your IT organization can accelerate business, introduce new services, and reach new markets, all while staying in compliance.

Tags : mitigation, time to value, regulations, organization, new markets, compliance, networking, it management
    
By: Delphix     Published Date: Jun 27, 2014

IT has to do it all: react quickly to market needs, introduce new services, capitalize on mobile, and comply with regulatory requirements, all without raising costs and complexity. Delphix has the platform to enable IT teams to navigate their business past the risks, saving money and time.

Tags : rationalization, modernization, capitalize on mobile, networking, it management, data management
    
By: Delphix     Published Date: Jun 27, 2014

Packaged application development teams frequently operate with limited testing environments due to time and labor constraints. By virtualizing the entire application stack, packaged application development teams can deliver business results faster, at higher quality, and with lower risk.

Tags : on-demand, application development, virtualizing, packaged, faster, networking, it management, data management
    
By: VSS Monitoring     Published Date: Jun 17, 2014

Read this Solution Guide to learn how to optimize monitoring & security for 40G & 100G networks While network owners are migrating to 40G & 100G infrastructures, most tools available today cannot ingest high-speed traffic. They lack both the physical interfaces and processing power to do so.

Tags : vss monitoring, bandwidth, network, infrastructure, 40g, 100g, interface, networking
    
By: Global Knowledge     Published Date: May 29, 2014

In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing to pass the latest version of the CCNA Routing and Switching exam.

Tags : global knowledge, ccna, routing and switching, exam, networking
    
By: SilverSky     Published Date: May 22, 2014

Who are the current leaders in the business email market? The Radicati Group, a technology market research firm, said SilverSky offers “one of the most secure Cloud Business Email services available in the market today.” When run on IBM SoftLayer, it’s also the most reliable. Read the full report.

Tags : silversky, ibm, email, email services, email service providers, cloud, cloud business email, cloud business email services
    
By: SilverSky     Published Date: May 22, 2014

Are you looking to enhance security and regulatory compliance around email, without having to add staff? SilverSky offers a game-changing Email Data Loss Prevention (DLP) solution, run on IBM SoftLayer, which can help. Read this paper to learn more and for helpful tips on preventing data loss.

Tags : silversky, ibm, email, email services, email service providers, email protection, email security, email data loss prevention
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: BMC Software     Published Date: May 19, 2014

Today’s mature cloud-based ITSM solutions can give you the flexibility and agility you need—without sacrificing security, stability or performance. In this THINKstrategies, Inc. white paper, you’ll learn why businesses are moving to cloud-based ITSM and the advantages they’ve achieved. Explore how this innovative approach to IT management might be right for your organization.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

Your people and business can do amazing things when technology runs at its best. The new ITSM experience helps organizations achieve greatness in today’s mobile, social and user-centric reality. Discover a better way for users to access service and support anywhere, anytime. Explore enhanced productivity for IT staff, and seamless integration across IT operation management systems. Download now.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: BMC Software     Published Date: May 19, 2014

With software as a service (SaaS) you are integrating an external service, hosted by an external party, with your internal systems. The SaaS integration is a matter of connecting the clouds and well-articulated interfaces defining the data that is traveling back and forth. With the right integration strategy SaaS integration can be simple, straightforward, and easy. Moreover, it can position your IT organization to effectively leverage SaaS and migrate from one SaaS solution to another to avoid vendor lock-in. Read this information white paper to understand the things to consider when developing your integration strategy.

Tags : saas, cloud, itsm, integrating itsm, itsm integration, saas integration, networking, it management
    
By: BMC Software     Published Date: May 19, 2014

What happens when you take best practices for IT service management (ITSM), add technology to support those practices, and then throw social media into the mix? BMC explores how best-in-class organizations are leveraging these to drive user satisfaction and organizational success. Download the white paper now.

Tags : it service management, service desk, help desk, saas help desk, cloud help desk, networking, it management
    
By: BMC Software     Published Date: May 19, 2014

IT as a Service (ITaaS) will transform future IT operations and service delivery. In the interim, Hybrid IT offers a rational, gradual approach in which some services move to SaaS while others remain on-premise. This white paper provides a strategy to move part or all of your ITSM suite to the cloud as a stepping stone to ITaaS.

Tags : bmc, itsm solutions, changing business, cloud, cios, software, it organizations, saas
    
By: SilverSky     Published Date: May 09, 2014

This paper discusses how to cost-effectively turn the tables and ultimately win the battle for securing the network. It discusses different options and the methodology for making critical decisions about how to tackle your network security challenges.

Tags : silversky, outsource, network security, the cloud, value proposition, network security solutions, security options, security challenges
    
By: SilverSky     Published Date: May 09, 2014

This white paper explores the problems with traditional network setups and ways to address these issues in a budget friendly manner.

Tags : silversky, fortune 500, business security, network security, it management, security products, security systems, log data
    
By: IBM     Published Date: Apr 22, 2014

This ebook presents an overview of the B2B integraiton landscape: its challenges, its opportunities, and the approaches that leading organizations follow in developing a robust and scalable EDI solution. It also summarizes the IBM B2B Cloud Services offering, with real-world examples of how companies are leveraging the IBM Cloud to excel amid escalation global complexity, demand volatility and new customer requirements.

Tags : ibm, b2b, b2b cloud integration, cloud, optimization, value chain, edi solution, ibm cloud
    
By: Code 42     Published Date: Apr 08, 2014

Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Adding complexity is the mounting list of government regulations to which enterprises must comply. Read how endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

A new research survey reveals several important—and potentially alarming—trends on endpoint backup. As more and more users create essential data on their desktops and laptops—and often store at least a copy of that data on those devices—it’s increasingly clear that endpoint backup must be a fundamental part of the IT department’s mandate when it comes to ensuring availability of critical data.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Code 42     Published Date: Apr 08, 2014

While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.

Tags : code 42 software, enterprise sync, share flexibility, share app, cloud strategies, shareplan, networking, security
    
By: Global Knowledge     Published Date: Apr 08, 2014

Microsoft SQL Server 2014 has some great new features that will allow you to develop higher performing, more scalable next-generation applications using the hybrid cloud. Microsoft is building on the established foundation of SQL Server 2008 and 2012. Using similar architecture and management tools, customers will be able to smoothly upgrade their systems and skills based on the need for the new features and according to their own schedule.

Tags : microsoft exchange, project management, service management, cloud computing
    
By: Global Knowledge     Published Date: Apr 08, 2014

AWS has introduced Auto Scaling so that you can take advantage of cloud computing without having to incur the costs of adding more personnel or building your own software. You can use Auto Scaling to scale for high availability, to meet increasing system demand, or to control costs by eliminating unneeded capacity. You can also use Auto Scaling to quickly deploy software for massive systems, using testable, scriptable processes to minimize risk and cost of deployment.

Tags : global knowledge, amazon auto scaling, cloud computing, security, best practices, productivity, project management
    
By: Windstream     Published Date: Apr 03, 2014

Misconceptions about unified communications (UC) may lead IT to dismiss it. Find out how UC can solve productivity woes for your mobile workforce.

Tags : windstream, convergence, mobility, unified communications, mobile enterprise, remote access, remote network management, mobile computing
    
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
243 Documents
Cloud Computing
856 Documents
Colocation and Web Hosting
229 Documents
Content Management
299 Documents
Convergence
255 Documents
Data Center
998 Documents
Data Center Design and Management
560 Documents
Data Management
1514 Documents
Distributed Computing
173 Documents
Enterprise Applications
1452 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
281 Documents
Grid Computing
167 Documents
Infrastructure
831 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
330 Documents
IP Telephony
306 Documents
IT Management
1687 Documents
Knowledge Management
649 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
647 Documents
Network Performance
390 Documents
Network Performance Management
384 Documents
Network Provisioning
211 Documents
Network Security
511 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
242 Documents
Quality Of Service
171 Documents
Remote Access
279 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
488 Documents
Small Business Networks
270 Documents
TCP/IP Protocol
174 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
363 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.