network environment

Results 126 - 150 of 237Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment
    
Cisco
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation, organizational data, customize reports, cuztomize dashboards, data fields, scriptlogic, quest software, itil, service levels, proactive event management
    
Dell Software
Published By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling, tidal, tidal software
    
Tidal Software
Published By: OpenText     Published Date: Nov 08, 2013
Leverage infrastructure investments and reduce costs with a unified, IP-based OpenText RightFax system that fully integrates with your Cisco network environment.
Tags : 
voip, phone systems, voice over internet protocol, voice over ip
    
OpenText
Published By: Delta Risk     Published Date: Jun 07, 2016
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : 
cloud networking, wan, network services, application performance, technology
    
Riverbed DE
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Published By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : 
ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi
    
IBM
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi
    
Secure Computing
Published By: Dell Storage     Published Date: Jan 16, 2009
Storage area networks (SAN) deliver consolidated storage and advanced storage management features. One advanced SAN configuration involves booting servers directly from the SAN, eliminating all locally attached storage, and improving server operations. Several server boot options are available. To select the right boot option for your environment, you should weigh the benefits and drawbacks of each.
Tags : 
dell, san, storage area networks, consolidated storage, storage management, san configuration, server operations
    
Dell Storage
Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid
    
Dell Storage
Published By: ScriptLogic     Published Date: Nov 14, 2011
Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.
Tags : 
scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
    
ScriptLogic
Published By: IBM Corp     Published Date: Jun 20, 2011
IBM brings together the widest choice of compatible chassis, blade servers, storage and networking solutions to help you build an open and flexible IT environment.
Tags : 
ibm, express seller, ibm blade center hs22, virtualization, infrastructure, power consumption, flexibility, servers, storage, networking, solutions, x-architecture, innovative
    
IBM Corp
Published By: IBM     Published Date: Jul 09, 2012
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : 
ibm, technology, software, customer, smb group research, storage
    
IBM
Published By: McAfee     Published Date: May 22, 2014
FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.
Tags : 
security, software, network security, evasion technique, aet testing environment, cyberattacks, evader
    
McAfee
Published By: SafeNet     Published Date: Jan 14, 2014
SafeNet CN high speed network data encryption devices are purpose built hardware appliances that secure data transmitted across Layer 2 networks. The CN series platforms provide highly secure, full line rate transparent encryption for data moving across both dark Fibre and metro, or wide area Ethernet networks in point-point, hub & spoke, or any meshed environment.
Tags : 
wan optimization, wan, encryption, network data security, wan acceleration, safenet
    
SafeNet
Published By: Plantronics     Published Date: Oct 18, 2013
Wireless technology surrounds us — in the workplace, at home, and many places in between. Mobile phones, WiFi networks, wireless computer accessories, and cordless phones all use radio transmissions for wireless communication. Even devices not used for communication, such as microwave ovens and lighting systems, emit radio frequency energy that can impact wireless devices. In this crowded radio environment, two technologies have emerged as the standard for wireless voice communication in UC and enterprise applications.
Tags : 
plantronics, audio device technology, wireless technology, digital telecommunications, wireless headset success, influence deployment, analogue modulation, business conversations, dect, dect architecture, wireless technologies, bluetooth headsets, interference avoidance, roaming range, radio spectrum, channel sharing, density effects, wideband operation
    
Plantronics
Published By: New Relic     Published Date: Mar 17, 2015
Application performance management (APM) focuses on monitoring, maintaining, and optimizing the performance and health of business applications across development, test, datacenter, and network environments. As mission-critical enterprise application environments become more complex because of the increased use of cloud, big data, and mobility, APM is becoming a top priority for IT teams that need to quickly and cost effectively track end-to-end application performance, identify and remediate the root cause of performance problems, and maintain service levels required by end users and business stakeholders. SaaS-delivered APM solutions offer rapid time to value for IT organizations that need to implement APM quickly with minimal disruption to the business.
Tags : 
apm, application performance management, big data, application performance, mobility, data center, data management
    
New Relic
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology
    
CDW-Trend Micro
Published By: Equinix     Published Date: Mar 26, 2015
A leading U.S.-based financial services firm was faced with the growing challenge of providing consistent application performance to a vast employee base and nationwide network of partners. The company turned to Equinix to help redesign its network, both to improve performance and prepare for a move to a cloud-enabled environment. Equinix worked with the firm to deploy bi-coastal Equinix Performance Hubs, extension nodes of the company’s existing network placed in strategically located Equinix International Business Exchange (IBX) data centers. A Performance Hub moves services closer to end users and provides direct access to networks and cloud providers. By deploying Performance Hubs, the customer created a high-performance services platform for its business. The result was a dramatic decrease in network latency, improvements in application performance and an enhanced user experience.
Tags : 
financial services, cloud-enabled environment, cloud providers, network latency, application performance, enhanced user experience
    
Equinix
Published By: CrowdStrike     Published Date: May 21, 2019
Stories from the front lines of Incident Response in 2018 and insights that matter for 2019 Threat actors are continuously adopting new means to achieve their objectives. Drawn from real-life client engagements, the annual CrowdStrike Cyber Intrusion Services Casebook 2018 provides valuable insights into ever-evolving attacker tactics, techniques and procedures (TTPs). The CrowdStrike Cyber Intrusion Services Casebook, 2018 provides expert, real-world analysis and practical guidance that can further your organization’s progress toward that goal. It also describes the strategies the CrowdStrike Services team used to quickly investigate, identify and effectively remove dangerous threats from victims’ networks. Download the Cyber Intrusion Casebook to learn: • The emerging trends observed in attack behaviors, including the tactics threat actors use to gain entry and maintain a foothold in targeted environments • Key takeaways — based on the CrowdStrike Services team’s extensive experience
Tags : 
    
CrowdStrike
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing, data breach, breach
    
Rapid7
Published By: HP     Published Date: Jun 25, 2010
Network teams are faced with a race to build out data center network capacity and to effectively provision connectivity at an increasing speed.
Tags : 
networking dynamics, intelligent server access, matrix operating environment, investment protection, predictable performance, 3com, pragmatic deployment, flexfabric evolution path, networking as a service, converged infrastructure
    
HP
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security, trust zones, new access layer, high value targets, inspection offload, virtual ips, security management, threat coverage, ips platfrom, r&d servers, virtualized data centers, denial of service (dos), intrusion prevention system
    
HP
Published By: HP     Published Date: Dec 04, 2012
Many enterprises are unable to create business innovation because of aging networking environments.
Tags : 
enterprises, power of sdn, networking, virtual application, power
    
HP
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: