next generation

Results 251 - 275 of 740Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: May 22, 2014
Una Red Privada Virtual (VPN, Virtual Private Network) ofrece el mejor retorno sobre la inversión en el aseguramiento de las comunicaciones. Sin embargo, la falta de confiabilidad de enlaces de VPN es riesgosa para las comunicaciones críticas dentro de las organizaciones. Constantemente las redes disponibles suelen confiar en varios proveedores de servicio de Internet para garantizar siempre la conectividad y aumentar el ancho de banda. La aVPN (Augmented VPN) agrega todos los enlaces de proveedores de servicios de internet para obtener un único túnel de alta capacidad. La aVPN proporciona una manera simple y económica de crear conexiones rápidas, seguras y de alta capacidad entre sitios y garantizar la conectividad a Internet sin interrupciones. Con un diseño de uso fácil, la implementación no requiere un equipo especial, software o acuerdos igualitarios de proveedores de servicio de Internet
Tags : 
vpn, red privada virtual, firewall de próxima generación, mpls, bgp, vpn de alta disponibilidad, conmutación de capa multiprotocolo, seguridad, gestión de ti, next generation firewall, networking, security
    
McAfee
Published By: McAfee     Published Date: Jun 04, 2014
El paradigma de la seguridad de red actualmente está cambiando hacia una nueva realidad a medida que los métodos avanzados de hacking son más frecuentes y difíciles de detectar. Un ejemplo de este método son las técnicas de evasión avanzadas (AETs, Advanced Evasion Techniques). Aunque se han documentado ampliamente las evasiones en los últimos quince años, los proveedores de seguridad han ignorado sistemáticamente su importancia. Algunos proveedores incluso han minimizado la importancia de la amenaza presentada cómo evasiones como siendo puramente teórica. Sin embargo este debate no logra percibir el problema principal: el riesgo de los sistemas de seguridad de red comprometidos por AETs continúa creciendo a medida que más y más los ciberdelincuentes aprovechan activamente esta vulnerabilidad. La respuesta es combinar la inspección basada en flujos con la normalización de datos en múltiples capas de protocolo.
Tags : 
firewall de próxima generación, sistemas de prevención de intrusiones, firewall, seguridad contextual, detección de evasión avanzada, técnicas de evasión avanzadas, aet, ngfw, ngips, ips de próxima generación, next generation firewall, next generation ips, seguridad, gestión de ti, security, it management
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
À medida que a tecnologia de firewall de próxima geração (NGFW, next-generation firewall) se populariza, é necessário analisar as funções e os recursos avançados que separam os “líderes” dos “atrasados”. Nos termos mais básicos, o consenso sobre a definição do NGFW incluiria as seguintes capacidades: recursos de firewall padrão como conversão de endereços de rede e inspeção com monitoramento de estado, prevenção de intrusões integrada, reconhecimento de aplicativos e algum nível de inteligência e integração com bancos de dados de vulnerabilidades e reputações.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas avançadas de evasão, segurança, gerenciamento de ti, next generation firewall, ngfw
    
McAfee
Published By: McAfee     Published Date: Aug 15, 2014
Este livro apresenta uma visão geral da segurança de rede e explica como os criminosos virtuais podem usar métodos ocultos e atualmente indetectáveis para invadir sistemas de rede protegidos. As técnicas de evasão avançadas (AETs, Advanced Evasion Techniques) conseguem passar pelas soluções de segurança de rede comuns atuais. Elas podem transportar ataques ou explorações, passando pelos dispositivos de segurança de rede e firewalls, firewalls de próxima geração, sistemas de detecção e prevenção de intrusões e até mesmo roteadores que executam inspeção aprofundada de pacotes. Neste livro, você aprenderá tudo sobre as AETs, além de obter informações e dicas para ajudar a proteger sua empresa. Se você trabalha no governo, na área militar, no setor financeiro, industrial, comércio eletrônico ou outros setores com infraestrutura crítica, leia este livro para conhecer o inimigo e saber como se proteger melhor contra as evasões avançadas.
Tags : 
firewall de próxima geração, sistemas de prevenção de intrusões, firewall, segurança contextual, detecção de evasão avançada, técnicas de evasão avançadas, segurança, gerenciamento de ti, next generation firewall, ngfw
    
McAfee
Published By: McAfee     Published Date: Aug 21, 2014
Uma rede privada virtual (VPN, Virtual Private Network) proporciona o melhor retorno do investimento em proteção de comunicações. Porém, a falta de confiabilidade nos links da VPN é um fator de risco para comunicações críticas dentro das organizações. As redes constantemente disponíveis dependem de diversos provedores de serviços de Internet para garantir conectividade permanente e maior largura de banda. A aVPN (Augmented VPN) agrega todos os links dos provedores de serviços de Internet para disponibilizar um único túnel de alta capacidade. A aVPN é um modo simples e econômico de criar conexões rápidas, seguras e de alta capacidade entre sites, bem como garantir uma conectividade sem interrupções. Ela foi desenvolvida pensando na facilidade de uso e sua implementação não exige equipamentos/softwares especiais ou contratos de troca de tráfego com provedores de serviços de Internet.
Tags : 
vpn, rede privada virtual, firewall de próxima geração, mpls, bgp, vpn de alta disponibilidade, segurança, gerenciamento de ti, next generation firewall, ngfw, avpn, augmented vpn, security
    
McAfee
Published By: Frontrange     Published Date: Mar 13, 2013
Data is now accessed via physical and virtual desktops, laptops and mobile devices. IT organizations struggle to control and manage this widening pool of devices. View this Computerworld Survey to better understand the solutions to these challenges.
Tags : 
it service management, itsm, service desk, service catalog, service management software, mobile service management, cloud itsm, service manager, help desk software, hybrid it service management, heat help desk, client management, network discovery software, software audit, pc hardware inventory software, hardware software inventory, hardware inventory, pc hardware inventory, audit service level agreement, network inventory
    
Frontrange
Published By: The Starr Conspiracy     Published Date: Jun 23, 2017
Stop us if you’ve heard this one before: The learning management system is dead. The LMS is mentioned in learning the same way that people talk about applicant tracking systems in recruiting and performance evaluation solutions in talent management. They’re the technologies people love to hate. The solutions people want to love? Many times, these are the so-called “next-generation solutions.”
Tags : 
    
The Starr Conspiracy
Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
Published By: Infoblox     Published Date: Jun 18, 2015
Download this white paper and find out how you can turn your biggest vulnerability into a key layer of your network security defense.
Tags : 
infoblox, network security, dns based attacks, next generation firewalls, malware attacks, dns servers, dns infrastructure, internal attacks, external attacks
    
Infoblox
Published By: NetApp     Published Date: Sep 19, 2017
This SolidFire definitive guide provides an overview on storage Quality of Service and its importance in the Next-Generation Data Center.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire, service
    
NetApp
Published By: NetApp     Published Date: Sep 19, 2017
SaaS vendors are using next-generation data center principles to revolutionize the way cloud-based software applications are delivered by applying a software-defined everything (SDx) strategy. This paper examines five key principles of the modern data center design that are accelerating business growth.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: NetApp     Published Date: Sep 19, 2017
Evaluate the four key design choices you need to consider when choosing your all-flash storage architecture. This report compares the design choices made by NetApp SolidFire and Pure Storage so you're better equipped to decide which product is best for your next-generation data center.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, solidfire vs purestorage
    
NetApp
Published By: NetApp     Published Date: Sep 19, 2017
Software offerings are a core differentiator for businesses looking to attract new customers, maintain existing customers, and fend off competitors. Read this paper to learn the benefits of consuming infrastructure through code as you transition to the next-generation data center.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, code, infrastructure, investment
    
NetApp
Published By: NetApp     Published Date: Sep 21, 2017
This report provides insight into how 250 global IT professionals are currently using storage automation, the challenges they face, and their aspirations in next generation data center technology.
Tags : 
netapp, database performance, flash storage, data management, cost challenges, automation
    
NetApp
Published By: NetApp     Published Date: Sep 25, 2017
Evaluate the four key design choices you need to consider when choosing your all-flash storage architecture. This report compares the design choices made by NetApp SolidFire and EMC XtremIO so you're better equipped to decide which product is best for your next-generation data center.
Tags : 
    
NetApp
Published By: NetApp     Published Date: Mar 06, 2018
This Hyper Converged Infrastructure solution brief describes the key benefits of NetApp's next generation HCI solution including enterprise scale, efficient storage architecture, trustworthy data services, and IT operations transformation.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Mitel     Published Date: Jun 29, 2016
Join us on this webinar for practical steps toward designing your customer experience for today’s mobile consumer.
Tags : 
mitel, mobile, customer experience, customer engagement, mobile consumer, business technology
    
Mitel
Published By: Rosetta Stone     Published Date: Nov 02, 2017
In October 2013, Getting Smart partnered with Rosetta Stone to release a report called “The Next Generation of World Language Learning.” The goal of the report was to create a vision for world language learning that acknowledged its role in global competency and to frame the vision inside broader shifts to personalized learning and blended instruction. Pointing to the potential of educational technology, we advocated for accessible, high-quality world language instruction for all students—from elementary through high school.
Tags : 
    
Rosetta Stone
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Forcepoint     Published Date: Mar 08, 2018
Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. Download this whitepaper to find out how Forcepoint NGFW delivers industry leading connectivity and availability.
Tags : 
server, vpn, network, internet, technology, forcepoint
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 08, 2018
Organizations need to be proactive in managing their network. IT teams need to ensure that it’s available as their organization changes. In our latest e-book, “Securing Hybrid Networks for Dummies,” discover how to structure, manage, and sustain complex hybrid network infrastructures with next generation firewalls. Read the e-book now.
Tags : 
networks, operations, business, exchange, hardware, software, forcepoint
    
Forcepoint
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. The MP7000 is loaded with features that take scanning performance and simplicity to the next level, enabling faster-than-ever checkout in cashier-manned and self-checkout lanes, improving cashier productivity, POS throughput and the shopper experience. A smart investment, the MP7000 offers an unmatched industry-best total cost of ownership (TCO) by delivering maximum uptime and minimum power consumption in an easy-to-service design with fewer parts and components. And with Zebra's complimentary powerful management applications, you can remotely manage all of your MP7000s, no matter where they are located.
Tags : 
scanner, customer, productivity, mp7000, tco, total cost of ownership
    
Zebra ABM
Published By: Zebra ABM     Published Date: Dec 14, 2017
Meet the demands of your highest-volume POS lanes with Zebra MP7000 next generation multi-plane 1D/2D imager. To learn more about Zebra's MP7000, go to: https://goo.gl/693u8o.
Tags : 
webinar, video, multi, plane, scanner, zebra, technologies, mp7000, next generation
    
Zebra ABM
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 02, 2018
The demand for databases is on the rise as organizations build next-generation business applications. NoSQL offers enterprise architecture (EA) pros new choices to store, process, and access new data formats, deliver extreme web-scale, and lower data management costs. Forrester’s 26-criteria evaluation of 15 big data NoSQL solutions will help EA pros understand the choices available and recommend the best for their organization. This report details our findings about how each vendor fulfills our criteria and where they stand in relation to each other to help EA.
Tags : 
nosql, market, industries, strategy, presence, vendor
    
AstuteIT_ABM_EMEA
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept