tolly

Results 1 - 23 of 23Sort Results By: Published Date | Title | Company Name
Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions
Published By: IBM     Published Date: Oct 26, 2017
Web applications are often the most vulnerable part of a company’s infrastructure and yet are typically given direct paths to the internet, thus leaving these vulnerabilities exposed. IBM commissioned Tolly to evaluate IBM Security Access Manager for its Web protection effectiveness and performance as well as its identity federation, risk management and mobile one-time password capabilities. Tolly found that IBM Security Access Manager provided effective, high-performance threat protection while conveniently providing identity federation features and flexible risk-based access options.
Tags : 
access manager, identity federation, risk management, authentication capabilities, threat protection
    
IBM
Published By: Citrix Systems     Published Date: Jul 28, 2015
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates several Citrix NetScaler ADC models vs. that of comparable products.
Tags : 
    
Citrix Systems
Published By: Symantec     Published Date: Nov 14, 2012
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. Trend Micro Deep Security (DS) 8. Read to learn how well Symantec did against others.
Tags : 
symantec, symantec endpoint protection 12.1, vmware, tolly report, security, enterprise applications, business technology
    
Symantec
Published By: Infoblox     Published Date: Jun 18, 2015
Download this detailed technical analysis to learn how to avoid manual tasks and processes.
Tags : 
infoblox, cloud network, vmware, vrealize, tolly group, flexible deployment architecture, scale up, scale out, cloud network automation
    
Infoblox
Published By: Avaya     Published Date: Mar 04, 2016
Discover the value of right-sizing IP telephony The Tolly Group crunched the numbers on Avaya IP Office Platform, Cisco Systems Business Edition and ShoreTel Unified Communications Platform to evaluate the Total Cost of Ownership (TCO) for midsized businesses with each solution. See what they found in this report >
Tags : 
communication, reporting, network management
    
Avaya
Published By: Symantec     Published Date: Jan 31, 2013
Tolly evaluated the antivirus effectiveness within VMware vSphere 5 virtual environments for both agentless and agent-based solutions. Download the report to find out which systems were most protected.
Tags : 
virtualization, vmware, test, antivirus, security, protection
    
Symantec
Published By: Symantec     Published Date: Jan 31, 2013
Tolly benchmarked the performance of four top endpoint security vendors within VMware vSphere 5 virtual environments. Read the report to discover which solutions were the fastest.
Tags : 
virtualization, vmware, test, antivirus, security, protection
    
Symantec
Published By: ForeScout     Published Date: Feb 18, 2014
Commissioned by ForeScout and conducted by The Tolly Group, one of the world’s leading independent product testing labs, the competitive analysis covers 34 criteria points across key functional categories: deployment, interoperability, guest management, endpoint compliance, enforcement, remediation and scalability. Before spending considerable time and resources to perform your POC, download this in-depth, 24-page report.
Tags : 
forescout, counteract, network access control, nac, deployment, interoperability, guest management, endpoint compliance, enforcement, remediation & scalability, networking, it management, knowledge management, enterprise applications, analytical applications, business technology, virtualization, cloud computing, infrastructure
    
ForeScout
Published By: Citrix Systems     Published Date: Nov 10, 2014
Measurable performance is a key factor when selecting an Application Delivery Controller(ADC) solution for modern data centers. In this report, Tolly evaluates the performance of several Citrix NetScaler ADC models vs. that of comparable products. Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 23, 2015
Learn how NetScaler fared and provided up to 480% the performance of F5.
Tags : 
citrix, netscaler, data centers, networks, tolly, networking, storage, data management, business technology, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 10, 2016
True, measurable performance is a key factor when selecting an Application Delivery Controller (ADC) solution for modern data centers, but with so many different functions available in an ADC, it is important to understand the actual performance in real-world scenarios.
Tags : 
    
Citrix Systems
Published By: Avaya     Published Date: Mar 10, 2016
Total Cost of Ownership vs. Cisco Systems & ShoreTel Unified Communications Platform
Tags : 
communication, reporting, network management, telecommunications, best practices
    
Avaya
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, encryption, business scanning, content control, patch management, change management, test environment
    
Lumension
Published By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : 
lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products, vulnerability management, layered defenses, e-security, targeted phishing, organized attacks, apt attacks, computer security, infrastructure, whitelisting solutions, application control, encryption, business scanning
    
Lumension
Published By: Lumension     Published Date: Aug 29, 2014
Server systems are, by definition, more important than individual endpoints. They must provide services to hundred, or even thousands, of endpoints and, naturally, must be secure. Traditional anti-virus (AV) solutions can provide protection for servers. However, constantly running AV processes, along with potentially frequent signature updates, can consume resources that could otherwise be used to provide application services to users. Read this evaluation by Tolly, commissioned by Lumension, as the dive into the impact on server resources of the alternative application control solution compared with traditional AV solutions from Microsoft Corp, Symantec Corp, and Trend Micro, Inc.
Tags : 
server, security, anti-virus, endpoint security
    
Lumension
Published By: IBM     Published Date: Apr 04, 2016
Tolly Group evaluated the security and performance of the IBM Security Network IPS GX7800 vs. a standard signature-based platform.
Tags : 
ibm, ibm security network, ips gx7800, security, knowledge management, enterprise applications
    
IBM
Published By: IBM     Published Date: Jul 15, 2016
Read Tolly's assessment of web application protection, federation capabilities, risk-based access features and overall performance of IBM Security Access Manager.
Tags : 
ibm, security, security access manager, federation capabilities, risk management, best practices, technology, it management, business technology
    
IBM
Published By: Symantec     Published Date: Aug 09, 2013
Symantec, Corp. commissioned Tolly to benchmark the performance of its new Symantec Endpoint Protection (SEP) 12.1 within VMware vSphere 5 virtual environments vs. agentless and agent-based solutions from competing vendors. Specifically, this testing focused on the system resource requirements of each solution when performing on-demand and on-access scanning functions, and during distributed virus definition updates.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: Symantec     Published Date: Aug 09, 2013
As virtualization-aware endpoint security solutions continue to evolve, more and more functionality is offloaded from a single VM to its supporting infrastructure in the form of Virtual Appliances (VA). In addition to considering the performance impact of this re- architecting, administrators must also ensure that the protection offered remains fully-functional, even in virtual environments. Learn More.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology, business technology
    
Symantec
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
The Tolly Group’s hands-on evaluation of BLADE’s RackSwitch G8000 demonstrates that the device offers non-blocking 1/10G switching, lower latency and less energy consumption than the Cisco 4948-10GE. These are very important productivity indicators for the top-of-the-rack switches deployed in the data center where latency-sensitive applications such as clusters and financial applications set strict requirements.
Tags : 
rackswitch, blade network technologies, non-blocking 1/10g switching, cisco 948-10ge, top-of-the-rack switches, storage
    
BLADE Network Technologies
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
The Tolly Group’s hands-on evaluation of BLADE’s RackSwitch G8100, based on a FocalPoint FM4224 low-latency 10GbE switch chip from Fulcrum Microsystems, demonstrates that the device offers non-blocking 10GbE switching, far lower latency and less energy consumption than the Catalyst 4900M.
Tags : 
blade network technologies, rackswitch g8100, focalpoint fm4224, catalyst 4900m, non-blocking 10gbe switching, top-of-the-rack switches, storage
    
BLADE Network Technologies
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept