network solutions

Results 201 - 225 of 369Sort Results By: Published Date | Title | Company Name
Published By: NEC     Published Date: Jan 28, 2010
Case Study: NEC provided intuitive and user friendly technology to enrich the whole guest experience with improved service times, personalized assistance and quality communications.
Tags : 
nec, peninsula shanghai, hotel, network solutions, real-time communication, productivity, ip telephony server, wireless technology, unified communications
    
NEC
Published By: IBM     Published Date: Jul 07, 2015
Through the IBM Network Innovation Centers, IBM brings together networking services and technology capabilities together to demonstrate infrastructure agility.
Tags : 
demonstrations, network innovation, networking solutions, interoperability, manageability, scalability, performance, networking, data management
    
IBM
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak, laptop, environment, data loss, data protection, data management, data leak prevention, dlp, agent-based technology, remote computing, leakproof, monitoring, enforcement
    
Trend Micro, Inc.
Published By: Iomega InfoCenter     Published Date: May 17, 2012
In this eBook you will learn about the efficient, economical ways to address the small business storage issues outlined above without busting the small business budget or hiring an IT department.
Tags : 
external hard drive, portable hard drive, network storage, multimedia, iomega, network storage, data storage, smb, storage, enterprise, infrastructure, it management, data management
    
Iomega InfoCenter
Published By: HP     Published Date: Aug 26, 2014
Just Right IT solutions, based on HP servers, storage, networking, and services, simplify business technology, giving you more time to focus on your business. Whether you’re just getting started with virtualization and file sharing, or supporting expansion with solutions for server consolidation, data backup, and business consolidation, Just Right IT solutions provide appropriate technologies for your organization’s needs today. And when your business is ready for the next level of expansion, HP offers Just Right IT solutions that address growing requirements for collaboration, continuity, and consolidation. Learn more.
Tags : 
virtualization, data backup, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, data management
    
HP
Published By: Cisco     Published Date: Apr 08, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at nextgeneration security solutions. It also offers: • An analysis of the capabilities you should look for (and demand) in your network security solutions • Arms you with the information you need to be an educated buyer • Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : 
next generation, firewall, malware, threat, complexity, costs, visibility, protection, network, enterprise, solution, security, data management
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2016
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next generation security solutions
Tags : 
cisco, next gen buyer, guide, network security, solutions, security, enterprise applications, business technology
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic, networking, security, software development, it management, business technology
    
Cisco
Published By: AWS     Published Date: Dec 15, 2017
Healthcare and Life Sciences organizations are using data to generate knowledge that helps them provide better patient care, enhances biopharma research and development, and streamlines operations across the product innovation and care delivery continuum. Next-Gen business intelligence (BI) solutions can help organizations reduce time-to-insight by aggregating and analyzing structured and unstructured data sets in real or near-real time. AWS and AWS Partner Network (APN) Partners offer technology solutions to help you gain data-driven insights to improve care, fuel innovation, and enhance business performance. In this webinar, you’ll hear from APN Partners Deloitte and hc1.com about their solutions, built on AWS, that enable Next-Gen BI in Healthcare and Life Sciences. Join this webinar to learn: How Healthcare and Life Sciences organizations are using cloud-based analytics to fuel innovation in patient care and biopharmaceutical product development. How AWS supports BI solutions f
Tags : 
    
AWS
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
This buyer’s guide provides an in-depth explanation of the factors that impel organizations to look at next-generation security solutions. It also offers: -An analysis of the capabilities you should look for (and demand) in your network security solutions -Arms you with the information you need to be an educated buyer -Helps you get what you need, and not a set of future capabilities packaged in a “marketecture” that you can’t deploy
Tags : 
network security, buyer's guide, next-generation security solutions, security solutions, networking, security, it management
    
Cisco
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Network performance Monitoring and diagnostics (NPMD) solutions are designed to capture and in many cases store network conversations in order to manage and troubleshoot IT service issues. Therefore, your NPMD solution must be viewed as an integral part of PCI DSS compliance efforts and never compromise these initiatives. This white paper goes through the best offerings that can strengthen these efforts.
Tags : 
    
Viavi Solutions
Published By: U.S. Cellular     Published Date: Aug 23, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular
Published By: Okta     Published Date: Jun 15, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
office 365, identity and mobility management, deployment, user adoption, adoption guide, it management
    
Okta
Published By: Okta     Published Date: Jul 01, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
    
Okta
Published By: Okta     Published Date: Feb 24, 2015
Microsoft made a massive push to the cloud in 2014, and as a result Office 365 is taking off. We’re seeing it in how Okta customers are using Okta to connect to Office 365 in increasing numbers. This eGuide provides some data from the Okta Application Network on the trends we are seeing around Office 365. It also describes the most important things to consider for Identity and Mobility Management during deployment. Office 365 is unlike any other cloud app in it’s complexity, and it is best for IT to plan and deploy solutions around Identity and Mobility Management in concert with their Office 365 roll-out to get maximum user adoption.
Tags : 
identity and mobility management, office 365, cloud, maximum user adoption
    
Okta
Published By: ATP International     Published Date: Mar 10, 2009
"High Speed Ethernet-Promoting Openness in Hybrid Control" debunks the myth that developments in Ethernet backbones are directed only towards high speed, real-time factory automation. This paper shows how high speed Ethernet supports hybrid control through standard and flexible function blocks, bridging Fieldbus networks and allowing the use of Foundation Fieldbus and Profibus solutions.
Tags : 
atp international, high speed ethernet, hybrid control, fieldbus, profibus, ethernet backbones, process automation, hse network, hse host
    
ATP International
Published By: Juniper Networks     Published Date: Aug 10, 2017
OpenLab provides an environment and set of resources where customers representing telecommunications, education, government, financial services, and virtually every other vertical market can explore new technologies, all in the spirit of network transformation. By examining SDN/network automation solutions such Network Functions Virtualization (NFV), software-defined WAN (SD-WAN), and others, OpenLab offers a platform for developing and delivering new network-integrated functionality that serves the greater need.
Tags : 
technology efficiency, cloud storage services, mobile devices, applications, online collaboration tools, client services, data encryption, remote access, workflow integration
    
Juniper Networks
Published By: Riverbed     Published Date: Aug 22, 2014
An IDC® study documented the business impact of WAN optimization solutions on enterprise organizations. Current trends and issues that were explored include evolving and shifting communication patterns, connection types, applications and bandwidth.
Tags : 
optimize, network, profit, business impact, solutions, organization, trends, issues, evolving, communication, patterns, connection types, applications, bandwidth, infrastructure
    
Riverbed
Published By: McAfee     Published Date: Oct 28, 2013
Eliminate high costs associated with MPLS and BGP with a new approach. This short video will show how secure and resilient connectivity between global sites is possible while increasing network bandwidth and quality of service.
Tags : 
stonesoft, network security software, network security solutions, network security appliance, network security systems, virtual network, virtual security, virtualization security, networking
    
McAfee
Published By: HP     Published Date: Feb 02, 2015
After an extensive review of vendors, including the industry’s largest networking provider, Orpic selected HP. HP provided a converged network solution that simplified network maintenance and administration. Download this case study to learn more.
Tags : 
    
HP
Published By: Viavi Solutions     Published Date: Jan 04, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: CradlePoint     Published Date: Sep 04, 2014
In this white paper, learn how PCI-DSS 3.0 effects how you deploy and maintain PCI compliant networks using CradlePoint solutions. Properly configure, monitor, and maintain your CradlePoint devices to meet the requirements of PCI DSS 3.0. Enabling features include network segmentation (ethernet ports, SSIDs, and VLANs), stateful firewall, MAC/IP/URL filtering, authentication/encryption, event logging, event alerts, time synchronization, and configuration/upgrade management from CradlePoint Enterprise Cloud Manager.
Tags : 
cradlepoint enterprise cloud manager, pci dss 3.0, pci compliance, stateful firewall, mac/ip/url filtering, authentication/encryption, event logging, event alerts, time synchronization, networking, it management
    
CradlePoint
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept