network control

Results 126 - 150 of 258Sort Results By: Published Date | Title | Company Name
Published By: Infoblox     Published Date: Sep 09, 2014
With trends like virtualization and BYOD making networks more complex, the need for accurate and dynamic IP address management (IPAM) is growing. Learn how to implement an IPAM solution that centralizes information to create highly efficient teams.
Tags : 
infoblox_dns_dhcp_ipam, infoblox_ddi, infoblox_dns, infoblox_ipam, infoblox_dhcp, infoblox_ip_address_management, dhs_dhcp_ipam, dns
    
Infoblox
Published By: HP     Published Date: Aug 26, 2014
Make sense of modern storage technologies and architectures and how they might impact your business. HP helps you understand unstructured data, block and object storage, storage system architectures, and storage networking options. Discover how the right mix or technologies such as virtualization, file sharing, and deduplication can help control storage costs, protect your data from loss or corruption, and provide reliable access to critical business information for every authorized user. See how.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution
    
HP
Published By: HP     Published Date: Aug 25, 2014
HP ConvergedSystem 700x with Microsoft Hyper-V is an ideal example of the market transition toward integrated computing platforms. Built on HP’s ConvergedSystem 700x converged infrastructure platform, HP ConvergedSystem 700x with Microsoft Hyper-V is a flexible preconfigured solution designed for small to large enterprise and service provider deployments. The solution is built on HP ProLiant or HP BladeSystem servers, HP 3PAR SAN storage, and HP 5900-Series or HP Flex10 networking. The entire stack is managed through HP Insight Control for System Center, which integrates physical and virtual server management through HP Insight with Microsoft System Center 2012 for unified management and orchestration Read this whitepaper to learn more about ESG’s analysis of the costs and benefits—and ultimate economic value—associated with deploying and managing HP ConvergedSystem 700x with Microsoft Hyper-V, versus a comparable conventional data center infrastructure comprised of discrete, non-integ
Tags : 
converged system, economic, enterprise, computing, platforms, deployment, vsphere, application
    
HP
Published By: Riverbed     Published Date: Aug 22, 2014
Businesses are rapidly adopting virtualization, cloud infrastructure, and SaaS applications broadly across the enterprise to minimize costs and enable seamless collaboration and communication. This is significantly straining the traditional network paradigm. IT organizations globally are faced with the challenge to transform network architectures to deliver the right performance and reliability cost-effectively while retaining control.
Tags : 
business performance, hybrid networks, virtualization, cloud infrastructure, saas, collaboration, communication
    
Riverbed
Published By: Riverbed     Published Date: Aug 22, 2014
Accelerate Application Performance while Enhancing Control and Visibility.
Tags : 
high-performance, hybrid, networking, accelerate, application, enhancing control, visibility
    
Riverbed
Published By: Riverbed     Published Date: Aug 19, 2014
Accelerate Application Performance while Enhancing Control and Visibility.
Tags : 
acceleration, application performance, hybrid, networking, control, visibility
    
Riverbed
Published By: Riverbed     Published Date: Aug 19, 2014
Over the past nine years, WAN optimization has transformed from a point-product that solved isolated problems into a strategic cornerstone for application delivery. New acceleration capabilities boost user productivity and satisfaction while reducing time to market. WAN optimization can now be more flexibly integrated into environments to accelerate diverse traffic types, and it includes functionality such as inbound QoS, network performance visibility, and application-intelligent control.
Tags : 
wan optimization, benefit, flexibility, network performance, user productivity
    
Riverbed
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: McAfee     Published Date: Aug 14, 2014
Network availability and survivability in the face of an attack requires specific tools and processes. Are you using RBAC, hierarchical policy management and individual domain control? Find out which eight features you must deploy now.
Tags : 
network security, network management, firewall management, enterprise firewall, ngfw, next generation firewall, firewall automation
    
McAfee
Published By: Oracle     Published Date: Apr 28, 2014
Your logistics network is continuously changing and is more complex than ever before. The need to control costs, meet sustainability goals and satisfy internal and external customer demands requires new thinking.
Tags : 
oracle, supply chain management, reduce costs, global trade practices, value chain execution
    
Oracle
Published By: ForeScout     Published Date: Apr 18, 2014
Download your copy of the new eBook entitled “Definitive Guide™ to Next-generation Network Access Control.” This 84-page resource provides security practitioners with key capabilities, implementation considerations, use cases and operational advice for network access control (NAC) and details on how modern NAC platforms can be applied by IT organizations to achieve continuous monitoring and mitigation.
Tags : 
forescout, next generation network access control, implementation considerations, it organizations, security resources, nac platforms
    
ForeScout
Published By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : 
next-generation firewall, byod, social media, applications, it trends
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : 
next-generation firewall, byod, social media, applications, it trends
    
Cisco
Published By: Cisco     Published Date: Apr 03, 2014
This report identifies new trends and requirements of the next-generation firewall which you must demand in order to address the business challenges of comprehensive network visibility, control and maximized security.
Tags : 
next-generation firewall, byod, social media, applications, it trends
    
Cisco
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc
    
Globalscape
Published By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : 
forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Published By: ForeScout     Published Date: Feb 18, 2014
Find out how companies with hundreds to thousands of devices and distributed networks are managing security risks, enabling BYOD adoption, and supporting IT-GRC framework specifications. Download the Frost & Sullivan: Continuous Compliance and Next Generation NAC report. Click to download the report.
Tags : 
forescout, frost & sullivan, network access control, nac, deployment, interoperability, guest management, endpoint compliance
    
ForeScout
Published By: ForeScout     Published Date: Feb 18, 2014
Read the new Enterprise Strategy Report (ESG) analyst report. ESG projects that as NAC transforms into EVAS (Endpoint Visibility, Access & Security) it will become even more of a mainstream IT technology.
Tags : 
forescout, network access control, nac, enterprise strategy report, esg, endpoint visibility, access, security
    
ForeScout
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network
    
F5 Networks Inc
Published By: Cisco     Published Date: Jan 16, 2014
Comprehensive network visibility and control increases business efficiency and enables business growth while maximizing security.
Tags : 
cisco, next-generation firewall, byod, bring your own devise
    
Cisco
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media
    
CA Technologies
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.
Tags : 
network world, data center, firewall, load balancer, scalability, data center management, dos protection, security
    
F5 Networks Inc
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: