Networking White Papers

Results 1 - 25 of 3338Sort Results By: Published Date | Title | Company Name
By: NetShelter - CyrusOne     Published Date: Oct 12, 2011

This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.

Tags : cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability
    
By: Intel Corp.     Published Date: Aug 08, 2012

This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.

Tags : assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance
    
By: Gomez IT     Published Date: Apr 12, 2011

Almost 700 businesses in North America and Europe were independently surveyed to understand whether they are already experiencing the impact of poor application performance in their cloud application deployments, and how this is affecting their cloud strategies going forward.

Tags : cloud application, compuware, sla, survey report, cloud performance, cloud deployment, apm, application performance management
    
By: AMD     Published Date: Jul 20, 2012

Business agility be defined as a company's ability to respond to changes in business conditions quickly enough to benefit from them.

Tags : virtualization, it support, it management, data managemtn, cloud computing, cloud network, virtual server performance, data migration
    
By: ForeScout     Published Date: Aug 14, 2012

The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.

Tags : pad, mine, enabling, secure, personal, mobile, device, use
    
By: Quest     Published Date: Jul 07, 2012

When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.

Tags : applications, data, delivers, protection, disaster, security, recovery, backup
    
By: PC Mall     Published Date: Dec 07, 2011

This white paper discusses critical best practices including approaches for both policy and technology.

Tags : sonicwall, mobile security, mobile phone security, mobile device security, mobile device management, mobile antivirus, data loss prevention, malware
    
By: LifeSize, a division of Logitech     Published Date: Aug 19, 2011

Incorporating video collaboration as a standard business practice can result in tighter employee and business partner relationships, increased productivity, faster decision-making and many more lucrative bene?ts.

Tags : lifesize, best practices, video collaboration, standard business practice, productivity, video conferencing technology, virtualization, communications objectives
    
By: Dell Cloud Marketplace     Published Date: Jan 07, 2015

CIOs and other senior IT leaders have a growing responsibility to ensure that the right steps for cost savings and optimization are understood and applied. This report focuses on the clear and practical steps you can take to optimize cloud spend and get the most value for your dollar.

Tags : dell, iaas, cloud computing, cloud services, cloud budget, cloud spending, it budget, backup and recovery
    
By: Cleversafe     Published Date: Dec 07, 2012

Shutterfly and Cleversafe Partner for Big Data Performance, Availability and Reliability to Meet Growing Customer Needs

Tags : shutterfly, images, growing, reliability, performance, storage, dispersal, networking
    
By: Corvisa LLC     Published Date: Feb 13, 2015

Are any of these dynamics driving you to the cloud?

Tags : cloud monitoring, cloud metrics, business analytics, performance monitoring, data, cloud data, metrics, cloud communications
    
By: Workday     Published Date: Aug 26, 2014

In this whitepaper, two cloud application pioneers discuss the 10 critical requirements of cloud application.

Tags : the cloud, cloud providers, cloud computing, modern saas, mobile computing, application integration, virtualization
    
By: Citrix     Published Date: Jul 25, 2014

This paper presents 10 key points to consider as you develop your enterprise mobility strategy, encompassing security, user experience, IT operations and BYOD.

Tags : citrix, enteprise mobility, mobile workers, byod, remote access, end point security, mobile security, mobile application management
    
By: CDW     Published Date: Feb 27, 2015

The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: Cyveillance     Published Date: Apr 10, 2015

In today’s security landscape, more vendors than ever are offering what is purported to be “threat intelligence.” Although security experts often have different definitions for this term, one thing many of them can agree on is that an intelligence-led approach to security – that is, putting threat intelligence to real-world use – is critical to protecting organizations. If the goal of an intelligence-led security strategy is to help organizations be more proactive in finding and preparing for threats to physical and digital assets, it’s crucial to define and understand exactly what threat intelligence means, and separate fact from fiction. In this whitepaper, we dispel some common myths about threat intelligence.

Tags : myths, cyber, threat, intelligence, fact, fiction, big data, cloud
    
By: Mimecast     Published Date: May 20, 2009

Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.

Tags : mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara
    
By: CDW Vmware     Published Date: Aug 02, 2012

In today's competitive business landscape, users' needs are continuously changing. Employees want access to their data and applications anytime, anywhere, from any device. The journey to seamlessly integrate data and applications across all devices begins with desktop modernization.

Tags : modernize, desktop, data, application, access, device, seamlessly, integrate
    
By: CDW     Published Date: Dec 23, 2014

Learn the 10 reasons why the server you choose matters and how to take advantage of a decade’s worth of technology advances in order to keep up with today’s most successful businesses.

Tags : cdw, data, windows, server, infrastructure, technology, operations, compatibility
    
By: Riverbed     Published Date: Apr 03, 2014

Learn how Riverbed® Cascade® gives you actionable information for network analysis and optimization, application performance management, acceleration of IT consolidation projects, and security compliance.

Tags : riverbed, applications, apm, compliance, security compliance, network infrastructure, networking, wan optimization
    
By: Identity Engines     Published Date: Mar 24, 2008

For over a decade now, RADIUS servers have been a mainstay of dial-up and VPN access control. The rather inconspicuous RADIUS server, perhaps better known as that beige, general-purpose PC collecting dust in the corner of your data center, has proved sufficient for performing basic duties like validating passwords and granting network access.

Tags : radius, servers, idengines, id engines, identity engines, vpn, access control, auditing
    
By: Xero     Published Date: Feb 18, 2014

You're mobile and streamlined -- or trying to be both those things -- while you provide salient financial advice to your clients, who are mostly small businesses like you. As your job is moving from traditional accounting work to involve a lot of business growth and marketing.

Tags : online accounting, marketing, small business, smb, finances, cloud, cloud computing, small business networks
    
By: Idera     Published Date: Oct 18, 2012

Download this paper to learn how implementing basic performance enhancements can provide tremendous improvements to the operation and performance of SharePoint within the enterprise.

Tags : sql, servers, database traffic, data connectivity, microsoft sharepoint, data management, data center
    
By: Plantronics     Published Date: Mar 09, 2015

This whitepaper gives you the key 10 steps will provide you with a framework for planning, deploying and enhancing the audio element of your communications strategies.

Tags : voice tools, communications tools, communications strategies, unified communications, uc devices, communication platform, test and measurement, wireless communications
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.

Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
266 Documents
Cloud Computing
1047 Documents
Colocation and Web Hosting
252 Documents
Content Management
320 Documents
Convergence
266 Documents
Data Center
1144 Documents
Data Center Design and Management
651 Documents
Data Management
1912 Documents
Distributed Computing
195 Documents
Enterprise Applications
1867 Documents
Ethernet Networking
190 Documents
Fibre Channel
154 Documents
Gigabit Networking
162 Documents
Governance
206 Documents
Green Computing
296 Documents
Grid Computing
174 Documents
Infrastructure
927 Documents
Internetworking Hardware
240 Documents
Interoperability
219 Documents
IP Networks
336 Documents
IP Telephony
313 Documents
IT Management
2368 Documents
Knowledge Management
946 Documents
Load Balancing
177 Documents
Local Area Networking
233 Documents
Migration
256 Documents
Monitoring
319 Documents
Network Architecture
484 Documents
Network Management
704 Documents
Network Performance
460 Documents
Network Performance Management
435 Documents
Network Provisioning
220 Documents
Network Security
544 Documents
OLAP
142 Documents
Optical Networking
152 Documents
Power and Cooling
266 Documents
Quality Of Service
194 Documents
Remote Access
306 Documents
Remote Network Management
259 Documents
Server Hardware
270 Documents
Servers
508 Documents
Small Business Networks
289 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
199 Documents
Traffic Management
194 Documents
Tunneling
150 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
240 Documents
Wireless
456 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.