net iq

Results 101 - 125 of 215Sort Results By: Published Date | Title | Company Name
Published By: Comcast Business     Published Date: Mar 24, 2015
Interconnecting three or more sites across a metro or wide area network has traditionally been accomplished via a hub and spoke network topology using Private Lines, Frame Relay or IP VPNs over the Internet. Ethernet services support hub and spoke topologies but also support an “any-to-any” network topology similar to a LAN but delivered over a wide area. This latter capability is unique to Ethernet services and cannot be cost effectively delivered using legacy point-to-point technologies such as Frame Relay or IP VPNs. This paper discusses two options for multi-site connectivity using Ethernet services. One option discusses the classical hub and spoke topology using Ethernet Virtual Private Lines (EVPL). The other option discusses the “any-to-any” topology using an Ethernet Private LAN (EP-LAN) service. Through examples, the paper illustrates the capabilities of the two approaches and their benefits.
Tags : 
multi-site connectivity, ethernet, security, ip transparency, performance, ep-lan, evpl, bandwidth management, ethernet networking, infrastructure, ip networks, local area networking, network management, quality of service, vpn
    
Comcast Business
Published By: Comcast Business     Published Date: Mar 24, 2015
Today’s K-12 schools are hungry for bandwidth. The reason is clear: highperforming, reliable and easily expanded network services support the latest classroom innovations, including videoconferencing, 1:1 computing, distance learning and modern learning management systems. It’s no surprise then that progressive educators now see a direct link between the overall success of their school districts and access to high-capacity networks. This emerged as a clear trend in new research by the Center for Digital Education (CDE) — a commanding 98 percent of administrators and IT representatives said the future of K-12 education hinges on ubiquitous connectivity. This white paper lays a framework for planning and implementing high-performance networks. In addition to explaining why now’s the time to plan network upgrades, this paper answers one of the fundamental questions asked by IT managers at schools everywhere: “How much network capacity will we actually need?”
Tags : 
education, network modernization, high-performance networks, bandwith, classroom innovations, networking, it management
    
Comcast Business
Published By: NetApp     Published Date: Dec 12, 2013
"How can you make sure that your private cloud is agile, responsive, and efficient? NetApp offers private cloud technology that aligns with the following recommendations from Enterprise Strategy Group: * Optimize storage to fully realize the benefits of server virtualization and private cloud * Treat storage efficiency as a strategic opportunity to hone and improve the overall cloud environment * Use techniques such as deduplication and compression to expand the available capacity of a private cloud"
Tags : 
private cloud, virtualization, technology, best practices, enterprise cloud, netapp, cloud deployments, data management, cloud computing, data center
    
NetApp
Published By: Riverbed DE     Published Date: Oct 16, 2017
Is your IT organization taking the proper steps toward successful cloud adoption? Legacy networking technology is hampering IT agility. Cloud providers have initiated an agility revolution but secure inter- and intra-cloud network connectivity are still very challenging. Easier alternatives are either expensive, worsen application performance and/or hamper network efficiency. Riverbed’s unique SD-WAN solution helps unlock agility across the complete enterprise network allowing for easier deployment and management of cloud-centric networks. This cloud adoption Use Case outlines challenges and solutions for cloud-centric enterprise architectures including: ·       Unlocking cloud agility through simple workflows in the WAN such as single-click secure connectivity to cloud and branch networks ·       The importance of bandwidth reduction and application acceleration to ensure cloud adoption ·       Distinguishing between application and network problems through enhanced visibility
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Riverbed DE
Published By: Microsoft     Published Date: Jul 20, 2018
Kevin Ashton founded the Auto-ID Center at the Massachusetts Institute of Technology, and has done pioneering work in radio-frequency identification and sensor technology. Ashton is known for coining the term “the Internet of Things” to describe a system where the Internet is connected to the physical world via ubiquitous sensors. In 2015, he spoke at a European customer service conference and noted that field service management is the first industry being transformed by IoT. Some people in the industry have noted that the entire IoT concept came from trying to solve field service problems in 1999. IoT’s origin story lies in field service management. Clearly, field service management and IoT are deeply intertwined. But how are the changes being implemented? And how can you benefit from them?
Tags : 
    
Microsoft
Published By: Panasonic     Published Date: Jan 10, 2019
Every day, Media & Entertainment companies face new challenges on all fronts, from traditional cable and broadcast to streaming services like Netflix and Hulu. Meanwhile, creators of live experiences struggle to convince fans to turn from their devices and see the real thing. This presents unique challenges to decision makers struggling to determine the most opportune time to adopt the technologies that can address these threats and trigger growth. This report looks at the trends, attitudes and behaviors that are determining the present and future of Media & Entertainment.
Tags : 
    
Panasonic
Published By: LockLizard     Published Date: Dec 09, 2008
NetMasterClass, as with all advanced elearning providers, have to be able to offer their training courses at any time with total availability – across the Internet.  NetMasterClass have made a significant investment in the development of proprietary training methods and techniques and have already experienced having their IPR stolen and made publicly available.
Tags : 
locklizard, netmasterclass, elearning, security, drm, return on investment, elearning security, protect, online training, elearning, intellectual property theft, enterprise applications
    
LockLizard
Published By: NetIQ     Published Date: Jan 12, 2011
This report is a deep dive into a potential way in which you could use the concepts of the Zero Trust Model and conceivably implement them in a real-world environment.
Tags : 
netiq, security, network architecture, forrester, auditing, best practices, zero trust model, compliance, encryption
    
NetIQ
Published By: NetIQ     Published Date: Jan 12, 2011
Addressing the potential for insider threats is an often overlooked security imperative for virtually all organizations worldwide.
Tags : 
netiq, insider threat, security, audits, access control, enterprise software, anti spam, anti spyware, anti virus, auditing, firewalls, intrusion detection, intrusion prevention
    
NetIQ
Published By: NetIQ     Published Date: Jul 07, 2011
Controlling distribution of passwords to highly sensitive environments in no longer enough; learn more about Privileged identity management (PIM) and what you can do to monitor and control your business to finest level of detail possible.
Tags : 
netiq, pci compliance, file integrity monitoring, fim, report on compliance, roc, audit, forrester, fraud management, pattern recognition, access control, auditing, encryption, hacker detection, identity management, internet security, intrusion detection, intrusion prevention, password management, vulnerability management
    
NetIQ
Published By: NetIQ     Published Date: Jul 07, 2011
In this white paper, we will examine some of the challenges that modern organizations face in their efforts to develop and adapt a compliance program to solve today's needs and support new requirements in the future.
Tags : 
netiq, pci compliance, sustainable, sustainability, file integrity monitoring, fim, report on compliance, roc, audit, regulatory compliance, access control, compliance, internet security, intrusion detection, intrusion prevention, vulnerability management
    
NetIQ
Published By: NetIQ     Published Date: Jul 27, 2011
Listen in as Andras Cser, Principal Analyst at Forrester Research, speaks about trends he is seeing in the Identity & Access Management (IAM) market, and specifically about the challenges and benefits of user provisioning.
Tags : 
active directory, ad administration, netiq, compliance, active directory administration, user provisioning, reduce administrative priviledge, itpa, it process automation, security, active directory management, data protection, information security, identity management, identity and access management, staffing, provisioning, threat, iam, privilege delegation
    
NetIQ
Published By: NetIQ     Published Date: Jul 27, 2011
In this on-demand webinar, John Kindervag, Senior Analyst at Forrester Research, defines "zero-trust architecture," outlines the 5 steps needed to make this model actionable, and explains how his clients are adopting a "zero-trust architecture."
Tags : 
zero trust, netiq, advanced threats, apt prevention, cybercrime, incident response, network analysis and visibility, network forensics, network security monitoring, situational awareness, threat geek, threat intelligence, threat mitigation, enterprise, networks, data, kindervag, forrester, architecture, monitoring
    
NetIQ
Published By: NetIQ     Published Date: Aug 05, 2011
In this white paper, you'll learn about how Novell Sentinel can make protecting your system against these costly security threats easy and efficient. Keep security threats out and your data safe.
Tags : 
novell, novell sentinel, netiq, bulldog solutions, identity and security, security management, siem solutions, log management, data security, access control, application security, authentication, business continuity, email security, encryption, intrusion detection, intrusion prevention, security policies, virtualization, infrastructure
    
NetIQ
Published By: NetIQ     Published Date: Dec 08, 2011
Learn more about Automating Active Directory in this informative webcast and how it enables security professionals to automate repetitive tasks.
Tags : 
automating, webcast, security, vulnerabilities, resources, productivity, access control, application security, authentication, business continuity, disaster recovery, email security, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, network security appliance, policy based management
    
NetIQ
Published By: NetIQ     Published Date: Dec 08, 2011
In this webcast IT security expert Matt Mosley will look at traditional detection methods and discuss discuss new alternatives to identify threats.
Tags : 
    
NetIQ
Published By: Sage     Published Date: Oct 14, 2014
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, human resources, recruit, risk, intellectual property
    
Sage
Published By: Sage     Published Date: Jan 30, 2015
Social media is making a huge impact on the way we use the Internet, communicate with friends and family, network with business colleagues, gather information, and make decisions. In business, social media can provide unique opportunities to promote products and services, find and recruit talented employees, and deliver an interactive customer experience. But there are also risks, such as the potential to damage the company’s reputation and brand, lose intellectual property, or invite lawsuits by employees, job applicants, or customers. From an HR perspective, it can be hard to tell if social media is your friend or your foe. This white paper discusses how HR can use social media and how it can go wrong.
Tags : 
sage, social media, interactive customer experience, hr perspective, intellectual property, human resources
    
Sage
Published By: McAfee     Published Date: May 22, 2014
FREE Security Software Tool from McAfee—Test any network security appliance to see how well it defends against Advanced Evasion Techniques. Download McAfee Evader Now.
Tags : 
security, software, network security, evasion technique, aet testing environment, cyberattacks, evader, application security, email security, encryption, internet security, security management
    
McAfee
Published By: NETIQ     Published Date: Jan 12, 2017
Today’s attackers are targeting insider credentials for abuse. Even with an effective program in place, there are loopholes that can be exploited by attackers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Businesses have to elevate their view of personalization and start thinking about how to make every interaction truly personal to customers.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
Our analysis of the survey findings indicates that as enterprise organizations attempt to respond to the need to provide more access to more information online, the ability to govern that access is being strained to a breaking point.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
As security threats continue to rise with online authentication, your organization must rise to the challenge, as usernames and passwords just don’t cut it.
Tags : 
    
NETIQ
Published By: NETIQ     Published Date: Jan 12, 2017
In organizations, employees are walking around with powerful mobile devices in their pockets, and so are their partners and customers. Enable users so they can work securely and seamlessly.
Tags : 
    
NETIQ
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.