Networking White Papers

Results 1 - 25 of 2781Sort Results By: Published Date | Title | Company Name
By: HP     Published Date: Aug 21, 2014

This video from Enterprise Strategy Group discusses findings of research they did with HP customers on how backup, recovery, and archiving solutions from HP, including the HP StoreOnce Backup product family, have helped them save time and money.

Tags : roi, archiving, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk
    
By: Intel     Published Date: Aug 19, 2014

Purpose-built for use with the dynamic computing resources available from Amazon Web Services ™ the Intel Lustre* solution provides the fast, massively scalable storage software needed to accelerate performance, even on complex workloads. Download now to learn more.

Tags : intel, cloud, cloud computing, data center, virtualization, infrastructure, storage virtualization, server virtualization
    
By: Intel     Published Date: Aug 19, 2014

Around the world and across all industries, high-performance computing is being used to solve today’s most important and demanding problems. More than ever, storage solutions that deliver high sustained throughput are vital for powering HPC and Big Data workloads.

Tags : intel, data center, big data, hadoop, cloud, lustre, hpc, infrastructure
    
By: Global Knowledge     Published Date: Aug 19, 2014

The process of subnetting is both a mathematical process and a network design process. Mathematics drives how subnets are calculated, identified, and assigned. The network design and requirements of the organization drive how many subnets are needed and how many hosts an individual subnet needs to support.

Tags : subnetting, broadcast domains, network design process, ip networks, ip telephony, wireless infrastructure
    
By: Global Knowledge     Published Date: Aug 19, 2014

This white paper explains how you can obtain the skills for troubleshooting Cisco networks, which requires mastery of several basic steps and much practice before applying the skills effectively in a production environment. This document does not contain any troubleshooting cases or examples because that is not how troubleshooting skills are learned.

Tags : troubleshooting techniques, network baseline, network diagrams, network maintenance, network management, network performance, network performance management
    
By: Plex Systems     Published Date: Aug 15, 2014

There’s a disconnect in the way most software companies, even cloud-based SaaS companies, license their systems. And it is all about the concept of "seats" or use licenses. Learn how the Plex Manufacturing Cloud licensing model paves the way for your success with unlimited seats.

Tags : cloud, software, cloud manufacturing, saas, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The right ERP systems contains ease-of-use and value for manufacturers by providing consistent design and security features, reduced burden of manual data entry and simpfiled communications with other systems, partners and devices.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

The Plex Manufacturing Cloud is providing a revolutionary approach to ERP upgrades by using a continuous update process that is unique to cloud-only software. Remove the need to do manually ERP uprgrades that are disruptive to an orgranization and can cost millions of dollars.

Tags : erp, cloud software, manufacturing, revolutionary approach, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There are a number of benefits beyond total cost of ownership to deploy cloud ERP, including increased flexibility, deployment, busines continuity and usability. Plex was in the Cloud before Cloud was cool - helping manufacturers run their business from the shop floor to the top floor.

Tags : erp, cloud, cloud erp, manufacturers, flexibility, total cost, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

If your current ERP isn't doing the job for you now, its not likely going to do so in the future. If you are a manufacturer that is not running your operations on a modern , technology-enabled, fully functional ERP solution, you are probably feeling the pain of inefficiencies and you are not optimizing your business.

Tags : erp systems, security, manufacturing, communications. data entry, networking
    
By: Plex Systems     Published Date: Aug 15, 2014

There has been no shortage of high profile recalls over the past several years. Suppliers are being required to provide more robust quality management systems, provide better real-time visablity into manufacturing data, and may even be held accountable for additional charge-back and warranty claims. Take a next generation approach to quality management.

Tags : networking
    
By: Box     Published Date: Aug 15, 2014

This report explains how a new generation of secure, enterprise cloud services creates the opportunity to mitigate many of these security challenges by centralizing documents onto a single cloud platform.

Tags : security in the cloud, box, mobility, secure enterprise cloud services, centralisation of documents, network security, application security, web service security
    
By: McAfee     Published Date: Aug 15, 2014

À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas avançadas de evasão (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti
    
By: McAfee     Published Date: Aug 15, 2014

Atualmente, o paradigma de segurança de rede está mudando rumo a uma nova realidade, pois os métodos avançados dos hackers estão cada vez mais predominantes e difíceis de detectar. Um exemplo desses métodos são as técnicas de evasão avançadas (AET, Advanced Evasion Technique). Embora tenham sido documentadas inúmeras evasões nos últimos 15 anos, os fornecedores de segurança ignoraram sistematicamente sua importância.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, aet, ngfw
    
By: McAfee     Published Date: Aug 15, 2014

As redes são projetadas para facilitar o fluxo de comunicação e não para dificultá-lo. Infelizmente, os pacotes de dados podem ser manipulados para parecerem normais, embora contenham uma exploração.

Tags : firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, aet, ngfw
    
By: Box     Published Date: Aug 15, 2014

This paper breaks down the main features of the Box mobile app

Tags : box, mobile content experience, sales mobility, presentation software, work on the go, application security, mobile computing, mobile data systems
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper reports on how Box addresses all 5 of the critical security capabilities in their platform.

Tags : box, securing content, content security in the cloud, device management, application security, mobile computing, mobile data systems, mobile workers
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, application integration, application performance management
    
By: Box     Published Date: Aug 15, 2014

This paper looks at how bring-your-own policies and consumerisation of IT are transforming the way professionals and enterprises purchase, distribute and consume mobile software. Which revenue models should you use and what platforms should you target.

Tags : business and productivity, byod policies, mobile software, mobile computing, mobile data systems, mobile workers, productivity, cloud computing
    
By: McAfee     Published Date: Aug 14, 2014

Downtime is not acceptable. Make sure you have these eight features in your enterprise network security architecture to assure high availability, even in times of crisis.

Tags : network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
By: McAfee     Published Date: Aug 14, 2014

When done right, a next generation firewall with plug-and-play capabilities can typically be up and running within a few minutes. Find out how you can quickly deploy hundreds of firewalls remotely with the latest NGFW.

Tags : plug-and-play firewall, firewall deployment, easy firewall deployment, ngfw, next generation firewall, firewall roll-out, firewall replacement, firewall upgrade
    
By: McAfee     Published Date: Aug 14, 2014

What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.

Tags : next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw, security, network security
    
By: McAfee     Published Date: Aug 14, 2014

Evaluating next generation firewalls? See what SANS says about the management features and advanced security capabilities of the McAfee NGFW.

Tags : sans, ngfw, next generation firewall, firewall product review, mcafee next generation firewall, security, network security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
848 Documents
Colocation and Web Hosting
229 Documents
Content Management
299 Documents
Convergence
255 Documents
Data Center
994 Documents
Data Center Design and Management
558 Documents
Data Management
1504 Documents
Distributed Computing
172 Documents
Enterprise Applications
1448 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
281 Documents
Grid Computing
167 Documents
Infrastructure
831 Documents
Internetworking Hardware
211 Documents
Interoperability
206 Documents
IP Networks
330 Documents
IP Telephony
306 Documents
IT Management
1681 Documents
Knowledge Management
649 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
224 Documents
Monitoring
304 Documents
Network Architecture
419 Documents
Network Management
646 Documents
Network Performance
380 Documents
Network Performance Management
380 Documents
Network Provisioning
211 Documents
Network Security
512 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
242 Documents
Quality Of Service
171 Documents
Remote Access
279 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
488 Documents
Small Business Networks
270 Documents
TCP/IP Protocol
175 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
216 Documents
Wide Area Networks
225 Documents
Wireless
362 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.