Networking White Papers

Results 1 - 25 of 3694Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 31, 2015

Market trends and vendor evaluation criteria.

Tags : security, data, event management, infrastructure, network management, application integration, business intelligence, productivity
    
By: Tenable Network Security     Published Date: Jul 23, 2015

Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.

Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot, log analysis, network security, security management
    
By: BitSight Technologies     Published Date: Jul 23, 2015

Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.

Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy, security requirements, compliance, data security standards
    
By: Tenable Network Security     Published Date: Jul 23, 2015

This paper talks about IT security challenges within the healthcare industry.

Tags : compliance, healthcare organizations, mobility, medical technology, security management, cybersecurity, it security, network security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.

Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.

Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy, cloud, networking, security
    
By: XO Communications     Published Date: Jul 22, 2015

Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.

Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking, security, it management, wireless
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro

Tags : security threats, trend micro, security solutions, mobile devices, network, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro

Tags : networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro

Tags : trend micro, targeted attacks, security solutions, technology, networking, security, it management
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro

Tags : mobile security, apps, cyber criminals, cyber security, trend micro, mobile devices, networking, security
    
By: CDW-Trend Micro     Published Date: Jul 17, 2015

A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro

Tags : security solution, cyber attack, mobile devices, business security, user protection, networking, security, it management
    
By: Carpathia     Published Date: Jul 17, 2015

Download this Healthcare Informatics e-book for a closer look into cloud computing and some of the strategic considerations involved in moving forward to internet-based technologies as an integrated health system.

Tags : carpathia, cloud computing, cloud services, healthcare it, cloud, collaboration, health it, blade servers
    
By: VMware, Inc.     Published Date: Jul 15, 2015

This infographic discusses the benefits of this hybrid cloud service.

Tags : hybrid cloud, hybrid cloud solutions, infrastructure support, virtualization, cloud computing, best practices, data protection, compliance requirements
    
By: VMware, Inc.     Published Date: Jul 15, 2015

This paper talks about hybrids, how they connect to multiple clouds and the steps towards cloud implementation.

Tags : cloud computing, hybrid cloud solutions, cloud adoption, multiple clouds, automation, cloud architecture, cloud-based models, performance management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.

Tags : nist requirements, dod requirements, mobile device management, federal affairs, government, networking, security, it management
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.

Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet, byod, networking, security
    
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015

Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.

Tags : mobile device management, education, educators, students, app management, smartphone, tablet, classroom
    
By: VMware, Inc.     Published Date: Jul 09, 2015

This paper talks about the benefits and chance that come with cloud computing in a federal agency level.

Tags : cloud computing, cloud solutions, cloud collaboration, opdivs, hhs, health and human services, hybrid cloud platform, cloud models
    
By: VMware, Inc.     Published Date: Jul 09, 2015

Transform the government IT Environment.

Tags : government, cloud, infrastructure, management, applications, analytical applications, productivity, cloud computing
    
By: VMware, Inc.     Published Date: Jul 09, 2015

Cloud for Disaster Recovery

Tags : cloud, environment, consistency, flexible, disaster, recovery, infrastructure, disaster recovery
    
By: IBM     Published Date: Jul 09, 2015

This webinar talks about actionable insights through sentiment analysis of app ratings and reviews, as well as continuous and frictionless quality feedback loop from testers, beta users to end users in both pre-production and production.

Tags : application control, application management, quality feedback, sentiment analysis, user experience, mobility, mobile, enterprise applications
    
By: IBM     Published Date: Jul 08, 2015

This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive.

Tags : application integration, life cycle, software deployment, automation, itil, software integration, devops approach, infrastructure
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
271 Documents
Cloud Computing
1188 Documents
Colocation and Web Hosting
258 Documents
Content Management
339 Documents
Convergence
283 Documents
Data Center
1173 Documents
Data Center Design and Management
734 Documents
Data Management
2002 Documents
Distributed Computing
197 Documents
Enterprise Applications
1939 Documents
Ethernet Networking
193 Documents
Fibre Channel
152 Documents
Gigabit Networking
164 Documents
Governance
207 Documents
Green Computing
297 Documents
Grid Computing
174 Documents
Infrastructure
1023 Documents
Internetworking Hardware
251 Documents
Interoperability
225 Documents
IP Networks
337 Documents
IP Telephony
310 Documents
IT Management
2577 Documents
Knowledge Management
1016 Documents
Load Balancing
180 Documents
Local Area Networking
232 Documents
Migration
291 Documents
Monitoring
333 Documents
Network Architecture
569 Documents
Network Management
802 Documents
Network Performance
521 Documents
Network Performance Management
488 Documents
Network Provisioning
226 Documents
Network Security
570 Documents
OLAP
143 Documents
Optical Networking
153 Documents
Power and Cooling
269 Documents
Quality Of Service
201 Documents
Remote Access
309 Documents
Remote Network Management
262 Documents
Server Hardware
289 Documents
Servers
535 Documents
Small Business Networks
295 Documents
TCP/IP Protocol
178 Documents
Test And Measurement
201 Documents
Traffic Management
196 Documents
Tunneling
151 Documents
Utility Computing
163 Documents
VPN
220 Documents
Wide Area Networks
241 Documents
Wireless
501 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.