network environment

Results 176 - 200 of 225Sort Results By: Published Date | Title | Company Name
Published By: Trend Micro     Published Date: Feb 01, 2013
Despite increased awareness and focus on defending against targeted attacks from both business and security leaders, organizations continue to be breached and suffer the consequences. Many of today’s security investments are simply not aligned to defend against these targeted threat vectors. Advanced threat detection and response should not be a point solution but rather a combination of technologies and core competencies. Detecting and responding to advanced threats should involve tight integration of multiple security technologies, network analysis and visibility (NAV) tools, the ability to automatically generate content such as security rules and signatures, context on attacker history, and overall customization and flexibility to ensure that the solution is fine-tuned for your specific IT environment.
Tags : 
security, advance threat detection, nav
    
Trend Micro
Published By: McAfee     Published Date: Jan 23, 2013
Learn how McAfee Network Security Platform helps you realize greater consolidation benefits while minimizing project costs and disruption to your production environment.
Tags : 
network security, network consolidation, consolidation capabilities, anti spam, anti spyware, anti virus, business continuity, disaster recovery
    
McAfee
Published By: HP     Published Date: Dec 06, 2012
Download this free white paper from HP to learn about their Intelligent Management Center, and how it can help you develop the skills needed to manage your fast-growing enterprise.
Tags : 
network, switches, routers, servers, wireless, network management, infrastructure, network architecture
    
HP
Published By: HP     Published Date: Dec 06, 2012
This white paper describes the characteristics and HP's vision of Software-Defined Networks. It describes how cloud computing and enterprise IT environments can benefit from Software-Defined Networks.
Tags : 
network, cloud, enterprise, virtualization, database security, cloud computing
    
HP
Published By: HP     Published Date: Dec 04, 2012
Many enterprises are unable to create business innovation because of aging networking environments.
Tags : 
enterprises, power of sdn, networking, virtual application, power, it management
    
HP
Published By: Dell Software     Published Date: Jul 24, 2012
Quest Workspacetm Help Desk is a robust help desk solution for small to medium-sized businesses with complex network environments. It provides a powerful combination of management features integrated with a best-of-breed IT help desk platform. Use the help desk software to manage the ticket system workflows, dashboards, reporting and end-user self-service portals. Use the embedded management features within the help desk platform to proactively manage network events, desktops, servers and applications as well as resolve issues faster and more effectively.
Tags : 
help desk, active directory, resolve issues, reports, windows, iphone, priorituze requests, auto escalation
    
Dell Software
Published By: IBM     Published Date: Jul 09, 2012
SAP users have been slow to adopt cloud computing, but IBM PureFlex Systems offer the potential to transform the server, storage and network infrastructures that support SAP enterprise environments and extend management services to non-SAP applications. Read this executive summary to learn how PureFlex Systems can dramatically reduce costs and cycle times.
Tags : 
ibm, technology, software, customer, smb group research, storage, application performance management, business analytics
    
IBM
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
Palo Alto Networks uniquely delivers on the network security demands found in both types of data center environments.
Tags : 
palo alto, enterprises, infrastructure
    
Palo Alto Networks
Published By: Rapid7     Published Date: May 22, 2012
The ongoing struggle to prevent hackers from breaching assets and malware from gaining a foothold requires a vulnerability management strategy that begins with a comprehensive measurement of security risk. Organizations must examine the entire IT stack, including the operating system, network, applications, and databases. These new technologies include dynamic, virtualized environments and services outside traditional physical IT infrastructures, such as virtualized, cloud-based services and social networking.
Tags : 
security, risk management, security intelligence, security assessment, prevent data breach, cyber security, vulnerability management, penetration testing
    
Rapid7
Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper find out what you need to know about network visibility, network security and network forensics in 1, 10, 40 and 100Gbps network environments.
Tags : 
endace, pack capture, data management
    
Endace
Published By: ScriptLogic     Published Date: Nov 14, 2011
Security Explorer provides IT administrators with one platform to completely manage access controls and security across a Windows network environment.
Tags : 
scriptlogic, desktop authority, computer-based management, desktop management tool, validation logic, software deployment, reporting, remote support
    
ScriptLogic
Published By: IBM Corp     Published Date: Sep 23, 2011
Networked storage is being deployed in combination with server virtualization by an increasing amount of organizations interested in - consolidation, reduced costs, improved flexibility and availability of mission-critical applications. This ESG Lab report presents the results of a mixed workload performance benchmark test designed to assess the real world performance capabilities of an IBM Storwize V7000 storage system and IBM x3850 X5 servers in a VMware-enabled virtual server environment. Download now to find out the results.
Tags : 
ibm, technology, esg, storage system, vmware, storwize v7000, storage management, data protection
    
IBM Corp
Published By: IBM Corp     Published Date: Jun 20, 2011
IBM brings together the widest choice of compatible chassis, blade servers, storage and networking solutions to help you build an open and flexible IT environment.
Tags : 
ibm, express seller, ibm blade center hs22, virtualization, infrastructure, power consumption, flexibility, servers
    
IBM Corp
Published By: HP     Published Date: Aug 04, 2010
Virtualization is moving to the mainstream and may soon be overtaking non-virtualized environments as a method for deploying applications. Does this broad adoption of virtualization, though, make network security easier or more difficult to achieve? While responses to this question are still highly varied, one thing is certain: most companies still have no clear and definite security policy for their virtual environments.
Tags : 
security hype, hyper-jacking, 3com, vm escape, vm hopping, vm theft, vm sprawl, virtualization security
    
HP
Published By: HP     Published Date: Jun 25, 2010
Network teams are faced with a race to build out data center network capacity and to effectively provision connectivity at an increasing speed.
Tags : 
networking dynamics, intelligent server access, matrix operating environment, investment protection, predictable performance, 3com, pragmatic deployment, flexfabric evolution path
    
HP
Published By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration
    
Absolute Software
Published By: IBM     Published Date: Feb 03, 2010
A recent IBM CEO study revealed innovation, along with global integration and a disruptive business model, to be among the key traits of the Enterprise of the Future.1 As to how that innovation will take place-CEOs include collaboration and the use of Web 2.0 tools at the top of the list.
Tags : 
ibm ep, empowering people, web 2.0, enterprise software, social networking environment, roi, network management, return on investment
    
IBM
Published By: SWsoft     Published Date: Aug 21, 2009
This joint Intel white paper explores how to address virtualization in an environment with high I/O. The paper includes a technology overview, network concerns and explains how Virtuozzo and Intel are well suited for the high I/O environment.
Tags : 
virtualization, network management, i/o, input/output, high i/o, intel, servers, server virtualization
    
SWsoft
Published By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage
    
NetApp
Published By: BlackBerry     Published Date: May 20, 2009
Mobility is no longer considered a luxury within enterprise but a critical part of a networking strategy as firms look to increase productivity and remain competitive in a rapidly changing environment. As mobility becomes an integral part of the infrastructure, IT must deal with supporting numerous devices including laptops, smartphones and other mobile handhelds. The challenge for IT will be enabling productivity improvements while mitigating the risk of numerous types of devices. The devices and their memory cards may hold sensitive organizational and personal information, including information about product announcements, 9inancial statements, or customer records.
Tags : 
blackberry, mobile applications, cio, deployments, pim, voip, smartphones, it communication
    
BlackBerry
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.
Published By: Mentor Graphics     Published Date: Apr 03, 2009
A powerful signal integrity analysis tool must be flexibility, easy to use and integrated into an existing EDA framework and design flow. In addition, it is important for the tool to be accurate enough. This report reviews a validation study for the Mentor Graphics HyperLynx 8.0 PI tool to establish confidence in using it for power integrity analysis.
Tags : 
mentor graphics, pdn simulation, eda framework, mentor hyperlynx 8.0 pi, integrity analysis, virtual prototypes, esr, capacitor
    
Mentor Graphics
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers
    
BlackBerry
Published By: Quocirca     Published Date: Feb 23, 2009
Network Centric Operations (NCO) recognises the demand for pervasive decision-making in the modern battlespace. NCO provides the ability to leverage information networks to generate a more dynamic and agile decision-making space. An important dimension of this approach is the technological flexibility to quickly move the decision-making authority hierarchically or geographically as the situation demands. A fundamental enabler to this approach is the concept of a services orientated architecture (SOA). The use of industry-standard IT architectures provides the means of ensuring that systems can be provisioned rapidly, can be shared as appropriate, and can give the flexibility and response times required within such challenging environments.
Tags : 
quocirca, network centric operations, agile decision-making, services orientated architecture, soa, enterprise service bus, esb, non-governmental organizations
    
Quocirca
Published By: Citrix     Published Date: Jan 20, 2009
With server virtualization now well established in the world's datacenters, IT leaders are turning their attention to virtualizing and centralizing desktop PCs to address some of their toughest computing challenges: . Managing complex end-user hardware and software infrastructure . Securing networks and information assets . Supporting a global workforce in an environment of constant change
Tags : 
citrix, virtualization, desktop virtualization, blade pc, on demand, hdx, xendesktop, sla
    
Citrix
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.