network control

Results 201 - 225 of 258Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : 
virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler, adc, application delivery controller, infrastructure, consolidation, networking, networking resources
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 18, 2012
This paper outlines the compelling benefits of consolidating networking services, and details why competing efforts pursued by F5 technology come up short for critical ADC consolidation projects.
Tags : 
virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler, adc, application delivery controller, infrastructure, consolidation, networking, networking resources
    
Citrix Systems
Published By: BMC     Published Date: Jan 09, 2012
The complexity of cloud computing warrants a unique approach to planning. See how BMC can help!
Tags : 
cloud computing, bmc, planning, initiative, computing, transition, budget, silos, virtualized, servers, network devices, storage, hardware, infrastructure, control
    
BMC
Published By: Citrix Systems     Published Date: Sep 08, 2011
Get flexible app delivery capacity in your datacenter that easily scales as demand grows. Free "Pay-As-You-Grow" guide from Citrix shows you how.
Tags : 
citrix, pay-as-you-grow, network elasticity, netscaler, new applications, delivery capacity, licensing, elasticity, load balancer, application delivery, data center infrastructure, ssl, adc, application delivery controller
    
Citrix Systems
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security
    
Fortinet, Inc.
Published By: Blue Coat Systems     Published Date: Jul 05, 2011
The wide-area network optimization controller market is maturing rapidly, but remains dynamic, with a high level of innovation from vendors. Organizations looking to acquire WOC capabilities should identify their specific needs and conduct real-life trials before committing to any purchase.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, magic quadrant, optimization controllers
    
Blue Coat Systems
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper looks at the technology required to stop cyber-bullying and the steps school administrators can take to ensure students are protected. Learn the facts about cyber-bullying today!
Tags : 
watchguard xcs, cyber-bullying, digital epidemic, online harassment, network security appliance, content control, intelligent monitoring, digital playground monitor
    
WatchGuard Technologies
Published By: WatchGuard Technologies     Published Date: Apr 20, 2011
This white paper examines five steps to better security that today's retail businesses can't afford to ignore on their networks - from application control to data loss prevention - to ensure business continuity and PCI DSS compliance.
Tags : 
watchguard xcs, security for retailers, zeus botnet, web security, web content filtering, https inspection, data loss prevention, targeted attacks, web applications, pci dss 2.0, spear phishing, application control, drive-by download, malicious activity, network security solutions, business continuity
    
WatchGuard Technologies
Published By: Black Box Corporation     Published Date: Feb 22, 2011
This white paper explains the basics of NAC and simplifies the many confusing NAC options available in the marketplace.
Tags : 
lack box, black box network black box network, security, black box security, network security, access control, network access control, nac
    
Black Box Corporation
Published By: Sunesys     Published Date: Nov 14, 2010
Sunesys dark fiber takes out the middleman in your network solutions and puts you in control. A private fiber optic network allows you to pursue solutions that are flexible, secure, and reliable - all with fixed-cost pricing. Read our white paper to learn more.
Tags : 
fiber optic, fiber optics, fiber optic network, dark fiber, sunesys, connectivity, wan, fiber optic cable, bandwidth
    
Sunesys
Published By: HP     Published Date: Jul 22, 2010
As cyber threats across the globe continue to increase in number and sophistication, security and networking personnel must not only work harder but also smarter to stay ahead of malicious attacks.
Tags : 
network security, dns, botnet command and control (cnc), malware; phishing, hp tippingpoint, tippingpoint digital vaccine, tippingpoint n-platform ips, tippingpoint security management, ips platform, access switches, reputation database, security management system
    
HP
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 22, 2010
In this Solution Profile, we will concentrate on the importance of optimizing data protection for evolving virtual networks, and on working with a trusted partner. Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility. However, virtualization also requires that companies adapt their traditional backup and data protection practices to suit the rapidly changing virtualization infrastructure.
Tags : 
emc, vmware, taneja, virtual environments, virtualization, backup, data protection
    
EMC Backup & Recovery Solutions
Published By: MatchPoint     Published Date: Oct 20, 2009
Executives use MatchPoint because they want to transition from the workforce into business ownership. MatchPoint Network offers it's complimentary services of providing expert guidance through the process of finding the right franchise business for you. Owning their own business allows executives to make their own choices and stay in control of their own future.
Tags : 
matchpoint, business franchise, roi, investment, franchise, small business, consulting
    
MatchPoint
Published By: Aventail     Published Date: Aug 21, 2009
Network Access Control (NAC) solutions has arrived, with the support of some of the largest vendors in the IT/networking world, its own consortium, the excitement of users at organizations of all types and sizes, real available solutions, and significant revenue generated. Learn more in this white paper.
Tags : 
vpn, ssl, nac, network access control, access control, remote access, remote access security, aventail, ssl vpn
    
Aventail
Published By: Aventail     Published Date: Aug 21, 2009
NAC is a multifaceted framework to thoroughly control who and what gets access to network resources, and help keep malware from entering the enterprise. Today, there are huge challenges to implementing as-yet immature NAC solutions on an enterprise-wide basis, including convoluted integration requirements, inadequate inspection capabilities, and weak policy management.
Tags : 
vpn, access control, security management, ssl, network access control, nac, policy management, security policies, malware, intrusion prevention, ssl, secure socket layer, vpn, virtual private network, vpns, virtual private networks, aventail
    
Aventail
Published By: ClearNova     Published Date: Aug 21, 2009
In the 1990s, client/server was the predominant architecture used to build business applications. The applications had rich functionality, were responsive, and satisfied users' needs. Client/server worked in a time where the only networks were the ones owned and controlled by the enterprise and the only user base was internal.
Tags : 
internet apps, web applications, web application, web application development, j2ee, open source, ajax, web architecture, clearnova, clear nova
    
ClearNova
Published By: Mirage Networks     Published Date: Aug 21, 2009
This industry report gives you the information you need to make decisions about how to secure your network by controlling access and by preventing endpoint infections and policy violations.
Tags : 
network security, nac, network access control, access control, endpoint security, end-point security, intrusion prevention, policy based, policy-based, mirage, mirage networks
    
Mirage Networks
Published By: Okiok     Published Date: Aug 21, 2009
Global Trust is a comprehensive Permission Management Infrastructure that centrally controls and manages user access Permissions to Web-based resources, servlets, Beans or any external application. Download this white paper and learn how the Global Trust solution enforces your policy consistently across your e-business and associates according to the planned security model (delegation, user's type, roles, policies, etc).
Tags : 
password management, access control, network access control, nac, permissions management, security management, okiok
    
Okiok
Published By: Pointsec     Published Date: Aug 21, 2009
This paper will help security officers and staff of large organizations seeking to protect sensitive data on mobile computing devices.
Tags : 
wireless security, network security, laptop security, mobile computing, secure mobile, data protection, access control, vulnerability management, pointsec
    
Pointsec
Published By: Sanbolic     Published Date: Aug 21, 2009
Enterprise data requirements grow at 50 - 100 percent a year, creating a constant storage infrastructure management challenge. As new storage is brought into the environment, it is typically added within inflexible single server-silos.
Tags : 
storage, storage area network, storage area networks, san, sans, ip san, ip networks, ip storage, storage infrastructure, cost control, data growth, flexible storage, sanbolic
    
Sanbolic
Published By: TopLayer     Published Date: Aug 21, 2009
Enterprises without a sound intrusion prevention strategy across the three threat dimensions - undesired access, malicious content, and rate-based attacks - open the door to unacceptable risks and costs, especially from hybrid attacks.
Tags : 
intrusion prevention, network security, ips, access control, hacker, top layer, toplayer, 3-d multi-layered, multi-tiered, multi tiered
    
TopLayer
Published By: Trusted Network Tech     Published Date: Aug 21, 2009
Authentication technologies such as tokens and smart cards help meet the challenges of protecting sensitive data and securing application access. This white paper presents four cases in which an identity-based solution provides a compelling, low-cost alternative or complement to strong authentication technologies.
Tags : 
network management, network security, access control, nac, network access control, identity management, security management, authentication, smart card, token, trusted network tech
    
Trusted Network Tech
Published By: Astaro     Published Date: Aug 10, 2009
Previously, the network at the City of Lake Wales didn't possess any firewalls, intrusion protection or web filtering solutions. As a result the network, which is spread out to multiple locations (including law enforcement), was left wide open to security breaches and caused system performance problems as users unwittingly picked up spyware and malware.
Tags : 
astaro, security, gateway, cisco pix, web filtering, intrusion protection, firewall, firewalls, network, spyware, malware, astaro, integrated security solution, surfcontrol, pix, cisco, firewall, internet security, devine lake wales, failover
    
Astaro
Published By: Visible Technologies     Published Date: Jul 24, 2009
The impact of the social conversations has dramatically increased. More than 133 million blogs have been indexed since 2002. Twitter has doubled in size this year alone to roughly 30 million users, who create 1,500 new "Tweets" every second. Facebook's 35-year-old-plus demographic grew to 12 million users in the first quarter of 2009. But that's only part of the story. The results from search engines are even more important. 2,300 searches are performed every second of every day.
Tags : 
social networking, digital age, reputation, social networking, visible technologies, facebook, twitter, youtube, blog, blogs, wiki, communication, control conversations, reputation management, web 2.0, media channels, collaboration, collaborative, alerts, saas
    
Visible Technologies
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp
    
NetCom Info
Start   Previous    1 2 3 4 5 6 7 8 9 10 11    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: