network environment

Results 101 - 125 of 221Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Jun 10, 2013
Securing your network requires more than just new hardware and software. It’s abouta change in your organization’s culture to a more security-conscious environment. Your staff needs strong and diverse passwords.
Tags : 
cdw, external threats, malware, defense, internal threats, security
    
CDW
Published By: McAfee     Published Date: Jan 23, 2013
Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.
Tags : 
network security, network consolidation, consolidation capabilities, anti spam, anti spyware, anti virus, business continuity, disaster recovery, encryption, firewalls, internet security, security management, change management, vulnerability management
    
McAfee
Published By: McAfee     Published Date: Feb 06, 2013
High performance for modern data center network fabrics, scalable deployment, and integrated inspection for physical and virtual environments. Next generation network security for your next generation data center.
Tags : 
data center, data center security, server virtualization, cloud computing, data center deployment, virtual data center, next generation data center, hybrid data center, virtual machines, best practices, virtualization, infrastructure
    
McAfee
Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Database Activity Monitoring automatically finds databases on your network, protects them with preconfigured defenses, and helps you build a custom security policy for your environment making it easier to demonstrate compliance to auditors.
Tags : 
database security, database activity monitoring, database compliance, database audit, database virtual patching, database virtualization, anti spam, anti spyware, anti virus, application security, business continuity, compliance, disaster recovery, encryption, hacker detection, internet security, intrusion detection, intrusion prevention, vulnerability management
    
McAfee
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Cisco     Published Date: May 14, 2015
Virtualized environments support private clouds on which application engineers can now provision their own virtual servers and networks in environments that expand and contract on demand.
Tags : 
cloud computing, erp, productivity, applications, efficiency, unified computing, cisco, application integration, best practices, virtualization, infrastructure, design and facilities
    
Cisco
Published By: Polycom     Published Date: May 12, 2015
To build deep relationships across a distributed network of consumers without skyrocketing costs, FSIs are turning to Highly Interactive Virtual Environments (HIVEs).
Tags : 
polycom, enterprise, collaboration, fsi, compliance, customer interaction service, customer relationship management, customer satisfaction, customer service, finance
    
Polycom
Published By: SAP     Published Date: Mar 08, 2016
This white paper discusses the various challenges facing the manufacturing supply chain. It highlights the importance of networks, collaboration, and supply chain visibility as they pertain to the supply chain's role, relative to the external environment. The evolution must then occur within the internal supply chain environment to meet these external requirements, while meeting internal business objectives.
Tags : 
sap, idc, supply chain, manufacturing, knowledge management, data management
    
SAP
Published By: SAP     Published Date: Mar 22, 2016
All participants will use digital innovation to run their enterprise in real time and operate in a global network. They will provide superior products and services for a unique customer experience with the highest safety and environmental standards. This also paves way for new mobility concepts and business models. Our vision is where urban mobility and transportation systems run in a sustainable ecosystem while protecting natural resources and environment. This requires the ability to connect companies, people, and vehicles in real time for accident-free driving with zero-emission operated vehicles.
Tags : 
digital network, digital enterprise, value creation, best business practices, sap
    
SAP
Published By: Citrix Systems     Published Date: Nov 13, 2018
Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: 1. Ensure end-to-end network visibility for your operations 2. Gain real-time analytics for application optimization and uptime 3. Scale your application infrastructure according to workload demand Read the e-book today to find out all six must-haves for application delivery in the cloud.
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: 1. Ensure end-to-end network visibility for your operations 2. Gain real-time analytics for application optimization and uptime 3. Scale your application infrastructure according to workload demand Read the e-book today to find out all six must-haves for application delivery in the cloud."
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Jun 04, 2019
Discover why ninety-four percent of organizations surveyed are already modifying, overhauling, or reassessing their network infrastructure to facilitate application delivery in hybrid- and multi-cloud environments. Read this e-book to learn why you should re-architect your network infrastructure to optimize application delivery: Ensure end-to-end network visibility for your operations Gain real-time analytics for application optimization and uptime Scale your application infrastructure according to workload demand Read the e-book today to find out all six must-haves for application delivery in the cloud.
Tags : 
    
Citrix Systems
Published By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : 
citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla, service level agreement, scalable, streamline, tco, view composer, virtual machine, total cost of ownership, hyper-v, microsoft, datacenter, server virtualization, servers
    
Citrix
Published By: Cisco     Published Date: Jan 12, 2016
Network readiness is an important factor in any new IT project at companies both large and small. New applications seem to require more bandwidth than the applications that they replace. These applications can also bring in new users, sometimes by the thousands. In some cases, the network services and/or capacity are not ready for these changes, and the IT rollout suffers. This guide covers the following topics: bandwidth, wireless, firewalls, content filtering, proxy servers, and others.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, security, it management, wireless
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
Higher education has come under increasing scrutiny as never before due to rising costs, changes in future job requirements, and new forms of learning opportunities offered by non-traditional companies and institutions. Students and parents are rightfully questioning the value of higher education based on perceived outcomes as well as staggering student loans that in some cases could take a lifetime to pay back. While the value equation debate rages on, there is another phenomenon taking place. It is nothing short of a revolution regarding the advances in technology and how institutions of higher learning along with nontraditional organizations are utilizing these powerful new tools. These new tools include new mobile devices, enhanced and feature-rich learning management systems, data-feeding sensors, 3D printers, smart classrooms, smart buildings, and collaboration tools allowing students and faculty to collaborate just about anywhere face-to-face, virtually.
Tags : 
cisco, byod, connectivity, education, networking environment, digital revolution, higher education, networking, it management, wireless
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
This white paper will discuss the challenges currently facing local educational entities, describe 10 exemplary local alliances that enabled connection to CalREN in California, and finish with a set of recommendations for other local entities wishing to create a successful local consortium that could duplicate this success for themselves and for their local educational ecosystems.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, security, it management, knowledge management
    
Cisco
Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management, data management
    
Cisco
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation, organizational data, customize reports, cuztomize dashboards, data fields, scriptlogic, quest software, itil, service levels, proactive event management, data management, infrastructure, internetworking hardware
    
Dell Software
Published By: Tidal Software     Published Date: Sep 03, 2008
IT groups must support many applications and servers across multiple platforms that frequently operate independently of each other. However, coordinating job scheduling across all these applications and networks is often required to optimize resource utilization. The traditional approach of applying more staff, toolkits, and rudimentary scheduling software to cobble together automated batch processing solutions becomes cost-prohibitive, inefficient, and error-prone, as the number of moving parts increases and the environment becomes more heterogeneous.
Tags : 
job scheduling, job scheduler, batch scheduling, batch processing, cron, workload automation, application scheduling, enterprise scheduling, tidal, tidal software, network management, business process automation, business process management, enterprise resource planning, project management, system management software, service management
    
Tidal Software
Published By: OpenText     Published Date: Nov 08, 2013
Leverage infrastructure investments and reduce costs with a unified, IP-based OpenText RightFax system that fully integrates with your Cisco network environment.
Tags : 
voip, phone systems, voice over internet protocol, voice over ip
    
OpenText
Published By: Delta Risk     Published Date: Jun 07, 2016
Regardless of how many security controls are placed on a network and the components that go into making a network operate, there will always be vulnerabilities in a connected world. So, what do you do in an environment that allows for such risk of compromise? One of the best methods of protecting organizations is by ensuring that response capabilities are effective and efficient, and one of the most valuable steps in strengthening a response capability is learning from others’ experiences. This white paper discusses the pain points that organizations grapple with when responding to incidents, and how they can address them.
Tags : 
cyber threats, security breaches, malware and vulnerabilities, internet security, security
    
Delta Risk
Published By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : 
cloud networking, wan, network services, application performance, technology
    
Riverbed DE
Published By: Microsoft     Published Date: Jul 20, 2018
At its Build conference in May, Microsoft took the wraps off Cosmos DB, the new incarnation of its existing cloud-based Azure DocumentDB NoSQL database. With a nod to the dramatic, Microsoft terms Cosmos DB as its biggest database bet since SQL Server; it is positioning it as its flagship cloud database, suited for use cases ranging from security and fraud detection, to IoT (consumer and industrial), personalization, e-commerce, gaming, social networks, chats, messaging, bots, oil and gas recovery and refining, and smart utility grids. Cosmos DB is a good example of how cloud platform providers are rethinking databases for scalable, elastic environments and commodity infrastructure. The platform that is most comparable is Google Cloud Spanner, but each of these databases is engineered for different purposes: Cosmos DB as a globally distributed operational database and Spanner as a globally distributed SQL-supporting OLTP database. The highlights of Cosmos DB include its flexibility in
Tags : 
    
Microsoft
Published By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : 
ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi, network management, return on investment, web services
    
IBM
Published By: Secure Computing     Published Date: Feb 20, 2008
Reputation systems add a critical first line of advanced protection to help organizations accurately detect and block all types of threats to their messaging, web, and network environments.  In simplest terms, deploying a reputation service at the network edge is analogous to having a peephole in the front door of your house.  You let in people you know and trust, question the ones you don’t know and shun the ones who look suspicious.  Just by taking these simple measures you reduce your risk.
Tags : 
it spending, whitelist, whitelisting, email security, spam, antispam, cast iron, castiron, roi, storage, bandwidth management, anti spam, return on investment
    
Secure Computing
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.