Networking White Papers

Results 1 - 25 of 3790Sort Results By: Published Date | Title | Company Name
By: NetShelter - CyrusOne     Published Date: Oct 12, 2011

This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.

Tags : cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: Intel Corp.     Published Date: Aug 08, 2012

This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.

Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
By: Gomez IT     Published Date: Apr 12, 2011

Almost 700 businesses in North America and Europe were independently surveyed to understand whether they are already experiencing the impact of poor application performance in their cloud application deployments, and how this is affecting their cloud strategies going forward.

Tags : cloud application, compuware, sla, survey report, cloud performance, cloud deployment, apm, application performance management
    
By: AMD     Published Date: Jul 20, 2012

Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.

Tags : virtualization, it support, it management, data managemtn, cloud computing, cloud network, virtual server performance, data migration
    
By: ForeScout     Published Date: Aug 14, 2012

The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.

Tags : pad, mine, enabling, secure, personal, mobile, device, use
    
By: Quest     Published Date: Jul 07, 2012

When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.

Tags : applications, data, delivers, protection, disaster, security, recovery, backup
    
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses critical best practices including approaches for both policy and technology.

Tags : sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
By: LifeSize, a division of Logitech     Published Date: Aug 19, 2011

Incorporating video collaboration as a standard business practice can result in tighter employee and business partner relationships, increased productivity, faster decision-making and many more lucrative bene?ts.

Tags : lifesize, best practices, video collaboration, standard business practice, productivity, video conferencing technology, virtualization, communications objectives
    
By: Dell Cloud Marketplace     Published Date: Jan 07, 2015

CIOs and other senior IT leaders have a growing responsibility to ensure that the right steps for cost savings and optimization are understood and applied. This report focuses on the clear and practical steps you can take to optimize cloud spend and get the most value for your dollar.

Tags : dell, iaas, cloud computing, cloud services, cloud budget, cloud spending, it budget, backup and recovery
    
By: Cleversafe     Published Date: Dec 07, 2012

Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs

Tags : shutterfly, images, growing, reliability, performance, storage, dispersal, networking
    
By: Corvisa LLC     Published Date: Feb 13, 2015

Are any of these dynamics driving you to the cloud?

Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics, cloud communications
    
By: Workday     Published Date: Aug 26, 2014

In this whitepaper, two cloud application pioneers discuss the 10 critical requirements of cloud application.

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, application integration, virtualization
    
By: Workday     Published Date: May 06, 2015

This white paper outlines 10 critical requirements of cloud computing to help organisations distinguish the difference between real and fake cloud applications.

Tags : the cloud, cloud providers, cloud computing, modern saas, real and fake cloud applications, cloud providers, mobile computing, application integration
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: CDW     Published Date: Feb 27, 2015

The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: Cyveillance     Published Date: Apr 10, 2015

In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.

Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
By: Mimecast     Published Date: May 20, 2009

Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.

Tags : mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara
    
By: CDW Vmware     Published Date: Aug 02, 2012

In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.

Tags : modernize, desktop, data, application, access, device, seamlessly, integrate
    
By: CDW     Published Date: Dec 23, 2014

Learn the 10 reasons why the server you choose matters and how to take advantage of a decade’s worth of technology advances in order to keep up with today’s most successful businesses.

Tags : cdw, data, windows, server, infrastructure, technology, operations, compatibility
    
By: Riverbed     Published Date: Apr 03, 2014

Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.

Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
By: Identity Engines     Published Date: Mar 24, 2008

For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.

Tags : radius, servers, idengines, id engines, identity engines, vpn, access control, auditing
    
By: Aerohive     Published Date: Aug 03, 2015

This paper looks at how this mentality requires IT operations to architect an access network specifically with "mobile first" in mind.

Tags : mobility, mobility technology, wireless. connectivity, network, mobility first, it operations, network architecture, network management
    
By: Xero     Published Date: Feb 18, 2014

You're mobile and streamlined -- or trying to be both those things -- while you provide salient financial advice to your clients, who are mostly small businesses like you. As your job is moving from traditional accounting work to involve a lot of business growth and marketing.

Tags : online accounting, marketing, small business, smb, finances, cloud, cloud computing, small business networks
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
271 Documents
Cloud Computing
1201 Documents
Colocation and Web Hosting
258 Documents
Content Management
339 Documents
Convergence
298 Documents
Data Center
1185 Documents
Data Center Design and Management
746 Documents
Data Management
2023 Documents
Distributed Computing
198 Documents
Enterprise Applications
1948 Documents
Ethernet Networking
193 Documents
Fibre Channel
152 Documents
Gigabit Networking
164 Documents
Governance
207 Documents
Green Computing
297 Documents
Grid Computing
174 Documents
Infrastructure
1043 Documents
Internetworking Hardware
251 Documents
Interoperability
225 Documents
IP Networks
337 Documents
IP Telephony
312 Documents
IT Management
2623 Documents
Knowledge Management
1025 Documents
Load Balancing
180 Documents
Local Area Networking
232 Documents
Migration
292 Documents
Monitoring
334 Documents
Network Architecture
576 Documents
Network Management
818 Documents
Network Performance
529 Documents
Network Performance Management
499 Documents
Network Provisioning
226 Documents
Network Security
571 Documents
OLAP
143 Documents
Optical Networking
153 Documents
Power and Cooling
269 Documents
Quality Of Service
201 Documents
Remote Access
310 Documents
Remote Network Management
262 Documents
Server Hardware
289 Documents
Servers
537 Documents
Small Business Networks
296 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
201 Documents
Traffic Management
196 Documents
Tunneling
151 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
241 Documents
Wireless
502 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.