Networking White Papers

Results 1 - 25 of 2836Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Sep 16, 2014

IBM’s new PowerLinux servers appeal to Linux buyers? Linux buyers are driven by the price advantages that Linux offers as compared with other operating environments (Linux is free open source code) Windows and Unix are chargeable licensed code). Linux buyers, therefore, look first and foremost at the total cost of acquisition of Linux based servers. Linux buyers also want rapid time to value (fast deployment); they often use decentralized procurement processes; they want their Linux servers to be simple to use and manage."

Tags : power-based systems, big data, linux, fast deployment, open source infrastructure, data management, server hardware, application performance management
    
By: Centrify Corporation     Published Date: Sep 16, 2014

The major trends challenging IT organizations today are the increasing dissimilarities and hybridization of platforms inside and outside the organization. And the rush to deploy SaaS applications and the explosion in smart phone and tablet devices that users are bringing to work for personal productivity. This fractured identity environment results in significant management challenges for IT, and frustration and lower productivity for users forced to remember multiple usernames and passwords. Unified identity architecture ensures your on-premise Active Directory infrastructure can be securely leveraged to quickly bring servers (UNIX, Linux, and Windows), applications (on-premise, SaaS, and mobile) and endpoints (Mac and Mobile devices) into line with security best practice and compliance. This paper will cover the practical path of unified identity management across multiple platforms including data center, cloud, and mobile.

Tags : data center, cloud and mobile, saas applications, smart phone and tablet devices, directory infrastructure, path to unified identity, password management, mobile data systems
    
By: Centrify Corporation     Published Date: Sep 16, 2014

IT professionals are grappling with not one, but three revolutions at the same time. • First, cloud computing provides easy and dynamic access to information technology. • Next, the ecosystem of cloud-based SaaS applications has exploded thanks to cloud computing. • Finally, this SaaS ecosystem has helped power an even bigger boom of consumer-friendly mobile devices and apps that access SaaS. This Essential Guide examines the opportunities and challenges of empowering, yet controlling, user access to SaaS applications. Specifically, identity management as a service promises to simplify secure access, and management of SaaS applications while reducing password sprawl. This guide will also review how mobile computing has added to the complexity of managing access to both corporate data and SaaS, and additionally help evaluate the options available on the market.

Tags : saas, cloud computing, consumer-friendly, mobile devices, access to saas, password sprawl, password management, customer interaction service
    
By: Cisco     Published Date: Sep 15, 2014

Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.

Tags : email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
By: CA Technologies     Published Date: Sep 11, 2014

This paper is a high-level outline of how application release operations will change in response to the cloud, and it defines the key ingredients needed to help ensure that your enterprise’s release operations for production applications don’t get left behind.

Tags : cloud, application release, enterprise release operations, application testing, application integration, application performance management, product lifecycle management, software testing
    
By: CA Technologies     Published Date: Sep 11, 2014

This paper provides a number of capabilities your organization should look for in a Service Virtualization solution, enabling your extended teams to get high quality applications to market faster, with lower cost and risk

Tags : service virtualization solution, application testing, getting applications to market, speeding up application delivery time, application integration, application performance management, enterprise software, performance testing
    
By: CA Technologies     Published Date: Sep 11, 2014

This paper provides new methods to transform IT into a power node in the corporate network.

Tags : devops, service virtualization, business software, software development, application integration, application performance management, server virtualization, cloud computing
    
By: CA Technologies     Published Date: Sep 11, 2014

An executive brief on release automation and how it is meeting marketing demands for delivery of innovative, new application services.

Tags : release automation, application testing, speeding up application delivery, application integration, application performance management, enterprise software, product lifecycle management, server virtualization
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach could place data at risk. A new kind of storage architecture allows IT to consolidate remote servers and data in the data center by decoupling storage from its server over any distance—even thousands of miles—and still get the same performance as if the storage remained local to the branch. Organizations can now consolidate remote infrastructure to increase security and ef?ciency, without adversely impacting end-user performance in branch of?ces.

Tags : consolidation, servers, remote, storage, isolated islands, efficiency, security, networking
    
By: Riverbed     Published Date: Sep 05, 2014

The explosion in mobility and the increasing number of ways to connect with the corporate network has created an IT environment that is increasingly difficult to manage, and that leads to inconsistent user experience. Mobile WAN optimization can help overcome many of the challenges of running a distributed environment by improving the performance of critical enterprise applications, which lowers the cost of effectively supporting mobile workers and eliminates the need for many organizations to pursue expensive strategies and upgrades.

Tags : mobile, wan optimization, cut costs, it environment, user experience, networking, wireless, data center
    
By: Riverbed     Published Date: Sep 05, 2014

The branch office has long been a critical dilemma for the IT organization. Branch offices for many organizations are a critical point of productivity and revenue generation, yet the branch has always come with a tremendous amount of operational overhead and risk. Worse yet, challenges are often exacerbated because the branch office too often looks like a carryover of outdated IT practices.

Tags : convergence, branch office, tco, transforming, operational overhead, it practices, networking, it management
    
By: Riverbed     Published Date: Sep 05, 2014

Many organizations have invested in server consolidation, particularly in their data centers. In remote offices, though, servers and storage exist as isolated islands of infrastructure that require management through separate operational processes and procedures. This approach is costly and places data at risk. However, a new branch converged infrastructure architecture allows IT to consolidate in the branch office to minimize the IT footprint needed to run branch applications-all the while centralizing remote servers and data in the data center.

Tags : branch, infrastructure, lower costs, consolidation, servers, data center, it footprint, networking
    
By: Brocade Communications Systems     Published Date: Sep 05, 2014

The arrival of virtualization, cloud computing, and mobility has strained data center networks—and IT staff—like never before. This Market Spotlight explains how data center network fabrics provide a foundation for automated provisioning, configuration, and management of network-based services in a new era of IT agility.

Tags : network automation, virtualization, cloud computing, agility, network-based, services, networking
    
By: Brocade Communications Systems     Published Date: Sep 05, 2014

Deploying the right Ethernet fabric is key for any organization, but selecting one can be daunting. Fortunately, the Lippis guide “Top 6 Recommendations for Selecting an Ethernet Fabric” provides insight and deployment tips based on the results of a recent study.

Tags : ethernet, fabric, deployment tips, recommendations, selecting, ethernet networking
    
By: CradlePoint     Published Date: Sep 04, 2014

In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.

Tags : cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts
    
By: McAfee     Published Date: Sep 04, 2014

Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.

Tags : arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs siem, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

SANS Institute analizó cómo se puede evitar los ataques de red utilizando una plataforma de SIEM que combina datos históricos con datos en tiempo real de fuentes de red y políticas de seguridad para obtener informes mejores y más precisos.

Tags : siem, sans, endpoint, red, correlación, integración, seguridad, security
    
By: McAfee     Published Date: Sep 04, 2014

El equipo de análisis de SANS Insitute examinó el software McAfee ESM, con enfoque específicamente en las aplicaciones de SIEM y observó un “sistema de SIEM fácil de usar capaz de ejecutar un análisis de eventos amplio y profundo, además de ofrecer una evaluación rápida”.

Tags : siem, almacenamiento de datos, análisis de datos, ataques, análisis forense, seguridad, security, network security
    
By: McAfee     Published Date: Sep 04, 2014

El tipo más amenazante de ataque cibernético es invisible. El riesgo para las empresas es real según lo evidenciado por los recientes ataques de alto nivel. Las organizaciones necesitan controles de seguridad por capas que funcionen en conjunto para detectar la presencia y las acciones de hackers y malwares furtivos.

Tags : ataques furtivos, malware, sistema de prevención de intrusiones, siem, controle de seguridad en capas, security, network security
    
By: IBM     Published Date: Sep 02, 2014

In this short e-book, learn the top ten ways that IBM Platform Computing customers are using technologies like IBM Platform LSF and IBM Platform Symphony to help obtain results faster, share resources more efficiently, and improve the overall cost-effectiveness of their global IT infrastructure.

Tags : ibm, cloud computing, infrastructure, roi, it spending, it costs, it budget, distributed computing
    
By: IBM     Published Date: Sep 02, 2014

A web seminar explaining how IBM Platform Computing technologies can simplify the user experience for HPC cluster users and administrators.

Tags : ibm, storage, clusters, clustering, grid computing, user experience, monitoring, network performance
    
By: IBM     Published Date: Sep 02, 2014

With tougher regulations and continuing market volatility, financial firms are moving to active risk management with a focus on counterparty risk. Join IBM Algorithmics and IBM Platform Computing to gain insights on this trend and on technologies for enabling active "real-time" risk management.

Tags : ibm, risk management, data management, grid computing, grid management, business analytics
    
By: IBM     Published Date: Sep 02, 2014

IBM Platform Computing Cloud Service lets users economically add computing capacity by accessing ready-to-use clusters in the cloud-delivering high performance that compares favorably to cloud offerings from other providers. Tests show that the IBM service delivers the best (or ties for the best) absolute performance in all test categories. Learn More.

Tags : ibm, cloud computing, network performance, platform computing, grid computing, clustering
    
By: IBM     Published Date: Sep 02, 2014

This brief webcast will cover the new and enhanced capabilities of Elastic Storage 4.1, including native encryption and secure erase, flash-accelerated performance, network performance monitoring, global data sharing, NFS data migration and more.

Tags : migration, monitoring, network performance, network performance management, storage management, encryption
    
By: IBM     Published Date: Sep 02, 2014

Learn how to manage storage growth, cost and complexity, while increasing storage performance and data availability with IBM Software Defined Storage solutions including the IBM General parallel File System (GPFS).

Tags : ibm, storage, gpfs, storage management, network performance, backup and recovery
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
165 Documents
Bandwidth Management
243 Documents
Cloud Computing
877 Documents
Colocation and Web Hosting
230 Documents
Content Management
299 Documents
Convergence
255 Documents
Data Center
1005 Documents
Data Center Design and Management
560 Documents
Data Management
1544 Documents
Distributed Computing
173 Documents
Enterprise Applications
1466 Documents
Ethernet Networking
180 Documents
Fibre Channel
143 Documents
Gigabit Networking
152 Documents
Governance
202 Documents
Green Computing
278 Documents
Grid Computing
170 Documents
Infrastructure
830 Documents
Internetworking Hardware
210 Documents
Interoperability
206 Documents
IP Networks
329 Documents
IP Telephony
305 Documents
IT Management
1702 Documents
Knowledge Management
652 Documents
Load Balancing
170 Documents
Local Area Networking
224 Documents
Migration
226 Documents
Monitoring
302 Documents
Network Architecture
420 Documents
Network Management
646 Documents
Network Performance
394 Documents
Network Performance Management
385 Documents
Network Provisioning
211 Documents
Network Security
516 Documents
OLAP
133 Documents
Optical Networking
142 Documents
Power and Cooling
239 Documents
Quality Of Service
172 Documents
Remote Access
280 Documents
Remote Network Management
236 Documents
Server Hardware
260 Documents
Servers
484 Documents
Small Business Networks
269 Documents
TCP/IP Protocol
173 Documents
Test And Measurement
185 Documents
Traffic Management
185 Documents
Tunneling
141 Documents
Utility Computing
155 Documents
VPN
211 Documents
Wide Area Networks
228 Documents
Wireless
369 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.