Networking White Papers

Results 1 - 25 of 2827Sort Results By: Published Date | Title | Company Name
By: CliQr     Published Date: Sep 17, 2014

Join Gigaom Research and our sponsor CliQr for “How to Make Hybrid Cloud Real for the Enterprise” a free analyst webinar on Wednesday, September 17, 2014 at 10 a.m. PT. In this webinar, an expert panel will examine the key ingredients needed to build, manage, control an enterprise-class hybrid cloud.

Tags : cliqr, hybrid cloud, cloud computing, cloud management, application integration, lifecycle management, storage management, best practices
    
By: Cisco     Published Date: Sep 15, 2014

Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: CA Technologies     Published Date: Sep 11, 2014

This paper is a high-level outline of how application release operations will change in response to the cloud, and it defines the key ingredients needed to help ensure that your enterprise’s release operations for production applications don’t get left behind.

Tags : cloud, application release, enterprise release operations, application testing, application integration, application performance management, product lifecycle management, software testing
    
By: CA Technologies     Published Date: Sep 11, 2014

This paper provides a number of capabilities your organization should look for in a Service Virtualization solution, enabling your extended teams to get high quality applications to market faster, with lower cost and risk

Tags : service virtualization solution, application testing, getting applications to market, speeding up application delivery time, application integration, application performance management, enterprise software, performance testing
    
By: CA Technologies     Published Date: Sep 11, 2014

This paper provides new methods to transform IT into a power node in the corporate network.

Tags : devops, service virtualization, business software, software development, application integration, application performance management, server virtualization, cloud computing
    
By: CA Technologies     Published Date: Sep 11, 2014

An executive brief on release automation and how it is meeting marketing demands for delivery of innovative, new application services.

Tags : release automation, application testing, speeding up application delivery, application integration, application performance management, enterprise software, product lifecycle management, server virtualization
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.

Tags : consolidation, servers, remote, storage, isolated islands, efficiency, security, networking
    
By: Riverbed     Published Date: Sep 05, 2014

The explosion in mobility and the increasing number of ways to connect with the corporate network has created an IT environment that is increasingly difficult to manage, and that leads to inconsistent user experience. Mobile WAN optimization can help overcome many of the challenges of running a distributed environment by improving the performance of critical enterprise applications, which lowers the cost of effectively supporting mobile workers and eliminates the need for many organizations to pursue expensive strategies and upgrades.

Tags : mobile, wan optimization, cut costs, it environment, user experience, networking, wireless, data center
    
By: Riverbed     Published Date: Sep 05, 2014

The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.

Tags : convergence, branch office, tco, transforming, operational overhead, it practices, networking, it management
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach is costly and places data at risk. However, a new branch converged infrastructure architecture allows IT to consolidate in the branch office to minimize the IT footprint needed to run branch applications-all the while centralizing remote servers and data in the data center.

Tags : branch, infrastructure, lower costs, consolidation, servers, data center, it footprint, networking
    
By: Brocade Communications Systems     Published Date: Sep 05, 2014

The arrival of virtualization, cloud computing, and mobility has strained data center networks—and IT staff—like never before. This Market Spotlight explains how data center network fabrics provide a foundation for automated provisioning, configuration, and management of network-based services in a new era of IT agility.

Tags : network automation, virtualization, cloud computing, agility, network-based, services, networking
    
By: Brocade Communications Systems     Published Date: Sep 05, 2014

Deploying the right Ethernet fabric is key for any organization, but selecting one can be daunting. Fortunately, the Lippis guide “Top 6 Recommendations for Selecting an Ethernet Fabric” provides insight and deployment tips based on the results of a recent study.

Tags : ethernet, fabric, deployment tips, recommendations, selecting, ethernet networking
    
By: CradlePoint     Published Date: Sep 04, 2014

In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.

Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
By: McAfee     Published Date: Sep 04, 2014

Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.

Tags : arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs siem, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.

Tags : siem, sans, endpoint, red, correlación, integración, seguridad, security
    
By: McAfee     Published Date: Sep 04, 2014

El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.

Tags : siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.

Tags : ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas, security, network security
    
By: NaviSite     Published Date: Sep 02, 2014

This whitepaper explores the reasons behind changing traditional desktop computing strategies, why cloud-hosted virtual desktops are a compelling solution for many businesses and how to leverage cliud-hosted desktops for windows 7 migrations, mobile and departmental workers, and disaster recovery scenarios.

Tags : virtual desktops, cloud hosted virtual desktops, navisite, remote access, cloud computing, mobile device management
    
By: NaviSite     Published Date: Sep 02, 2014

This whitepaper explores the hybrid cloud, the traditional approaches to cloud computing and why companies are not opting for 100% cloud architecture or 100% physical architecture.

Tags : the hybrid cloud, cloud versus physical architecture, mobile computing, mobile workers, cloud computing, data center design and management, virtualization, infrastructure
    
By: NaviSite     Published Date: Sep 02, 2014

This whitepaper is structured for business leaders evaluating enterprise cloud services, and uses real-world customer experiences to examine the business impact of the Cloud.

Tags : the full value of the cloud, the business impact of the cloud, cloud adoption, navisite, mobile computing, mobile data systems, mobile workers, cloud computing
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: NaviSite     Published Date: Sep 02, 2014

This white paper will deliver data that provides valuable information based on real compute scenarios to assist buyers of cloud services in understanding how their workloads might perform and what costs are associated with those environments across multiple cloud computing platforms BEFORE they invest in the selection of a cloud computing provider.

Tags : choosing a cloud provider, how to choose a cloud vendor, navisite, wireless, enterprise applications, cloud computing, infrastructure, mobile device management
    
By: Workday     Published Date: Aug 28, 2014

This webinar focuses on helping you make the move to the cloud apps.

Tags : webinar on the cloud, cloud apps, moving to cloud apps, customisation of the cloud, mobile computing, mobile data systems, application integration, application performance management
    
By: Workday     Published Date: Aug 27, 2014

This paper provides a clear insight into the real SaaS manifesto

Tags : saas manifesto, in the cloud, saas security, saas definition, networking, knowledge management, enterprise applications, storage
    
By: Neustar     Published Date: Aug 27, 2014

The chorus starts every year before the first carol is sung: “Load test before the holidays! If you don’t, you’ll be sorry!” Good advice, but wouldn’t it be nice to get some concrete tips? In the spirit of giving, Neustar’s engineers have identified 3 best practices.

Tags : load testing, cloud-based platform, business practice, distributed computing, network performance, best practices
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
242 Documents
Cloud Computing
874 Documents
Colocation and Web Hosting
230 Documents
Content Management
299 Documents
Convergence
255 Documents
Data Center
1005 Documents
Data Center Design and Management
561 Documents
Data Management
1543 Documents
Distributed Computing
172 Documents
Enterprise Applications
1465 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
278 Documents
Grid Computing
167 Documents
Infrastructure
830 Documents
Internetworking Hardware
210 Documents
Interoperability
206 Documents
IP Networks
329 Documents
IP Telephony
305 Documents
IT Management
1701 Documents
Knowledge Management
652 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
225 Documents
Monitoring
300 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
390 Documents
Network Performance Management
384 Documents
Network Provisioning
211 Documents
Network Security
516 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
239 Documents
Quality Of Service
172 Documents
Remote Access
280 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
484 Documents
Small Business Networks
269 Documents
TCP/IP Protocol
173 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
369 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.