network environment

Results 76 - 100 of 236Sort Results By: Published Date | Title | Company Name
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
    
Dell and Nutanix
Published By: Dell and Nutanix     Published Date: Oct 26, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented.
Tags : 
    
Dell and Nutanix
Published By: DellEMC and Intel®     Published Date: Oct 25, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel Inside®. Intel otwiera nowe mo?liwo?ci. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel Logo, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside Logo, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi, and Xeon Inside are trademarks of Intel Corporation or its subsidiaries in the U.S. and/or other countries.
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: VMWare EMEA     Published Date: Oct 23, 2017
VMware vRealize® Suite is the market-leading cloud management platform* purpose-built for heterogeneous, multi-cloud environments. It provides a comprehensive management stack for IT services on VMware vSphere® and other hypervisors, physical infrastructure, OpenStack, and external clouds such as VMware vCloud® Air™ and Amazon Web Services, all with a unified management experience. With vRealize Suite, IT can provision and manage at scale—compute, storage, network, and application services across multiple private and public cloud environments.
Tags : 
cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
    
VMWare EMEA
Published By: AlienVault     Published Date: Oct 20, 2017
Security Information and Event Management (SIEM) is a foundational cyber security technology. However, a properly executed SIEM strategy is difficult to execute even in static network environments with limited assets, much less for companies that have heterogeneous networks, transient end users, and plans of expansion. In this analyst report from Frost & Sullivan, you’ll read about several factors that companies big and small need to consider when purchasing and deploying a SIEM. You’ll also learn about AlienVault’s unified approach to solving for these challenges, with its on-prem appliance (USM Appliance™), and cloud-based SIEM-as-service, (USM Anywhere™). Download this report now to learn more about the changing SIEM market and AlienVault’s unified approach to security information and event management.
Tags : 
    
AlienVault
Published By: DellEMC and Intel®     Published Date: Oct 18, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel Inside®. Nya möjligheter på utsidan. Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logotyp, intel atom, intel atom inside, intel core, intel inside, intel inside logotyp, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon
    
DellEMC and  Intel®
Published By: Riverbed DE     Published Date: Oct 16, 2017
Think SD-WAN is the panacea for modern networking? While there’s no doubt that SD-WAN technology is absolutely necessary to support the rapid innovation required by today’s cloud-first enterprise, it is just one of many capabilities that make next-generation networking possible. Read this eBook to learn how to take your enterprise network to a best-practices level with a complete solution that includes: • Cloud-grade SD-WAN to automate connectivity and orchestration across hybrid WANs, cloud networks, and remote branch LANs/WLANs. • Rich visibility into heavily-encrypted environments for an end-to-end view of performance and fast resolution of problems. • Built-in optimization that unifies application acceleration and SD-WAN network services for complete control over application performance.
Tags : 
cloud networking, wan, network services, application performance, technology
    
Riverbed DE
Published By: DellEMC and Intel®     Published Date: Sep 20, 2017
A related recent development in the data center is converged infrastructure (CI). Instead of the traditional silo deployment approach to storage, compute, and network resources, all infrastructure elements are delivered and managed in a single environment, providing virtualized access to business services in an efficient manner. This is particularly suitable for cloud-based delivery models. However, since CI achieves lower costs through optimization of data center resources, it can be effective for all IT organizations, regardless of the way in which the services are managed or presented. Intel® Xeon® processor Ultrabook, Celeron, Celeron Inside, Core Inside, Intel, Intel logotyp, Intel Atom, Intel Atom Inside, Intel Core, Intel Inside, Intel Inside logotyp, Intel vPro, Itanium, Itanium Inside, Pentium, Pentium Inside, vPro Inside, Xeon, Xeon Phi och Xeon Inside är varumärken som tillhör Intel Corporation eller dess dotterbolag i USA och/eller andra länder
Tags : 
ultrabook, celeron, celeron inside, core inside, intel, intel logo, intel atom, intel atom inside, intel core, intel inside, intel inside logo, intel vpro, itanium, itanium inside, pentium, pentium inside, vpro inside, xeon, xeon phi
    
DellEMC and  Intel®
Published By: Alcatel Lucent Enterprise     Published Date: Aug 31, 2017
Where education connects with technology that works. For your school, college or university. With global reach and local focus, we deliver purpose built networking and communications for the education environment that enable secure, reliable collaboration between your faculty and students.
Tags : 
teachers, administrators, education leaders, cyber security, iot devices, digital content
    
Alcatel Lucent Enterprise
Published By: Juniper Networks     Published Date: Aug 08, 2017
The constant growth of cloud, IoT, virtualization, mobility, and digital transformation has brought tectonic changes to the world of networking. Long viewed as a bastion of single-purpose, inflexible, and closed solutions, networks have started to transform in line with the demands for flexibility, scalability, ease of management, interoperability, and application support. Networking departments need to achieve all of the tasks above while keeping costs under control. Additionally, security requirements for the new network are not letting up — quite the opposite, as the virtualized network (and general IT) environment requires rethinking, virtualization, and evolution of security architectures.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 08, 2017
Juniper Networks hybrid cloud architecture enables enterprises to build secure, high performance environments across private and public cloud data centers. The easy-tomanage, scalable architecture keeps operational costs down, allowing users to do more with fewer resources. Security is optimized by the space-efficient Juniper Networks® SRX Series Services Gateways, which are next-generation firewalls (NGFWs) with fully integrated, cloud-informed threat intelligence that offers outstanding performance, scalability, and integrated security services. Designed for high-performance security environments and seamless integration of networking, along with advanced malware detection with Juniper Sky™ Advanced Threat Prevention (ATP), application visibility and control, and intrusion prevention on a single platform, the SRX Series firewalls are best suited for enterprise hybrid cloud deployments.
Tags : 
    
Juniper Networks
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Most organizations have invested in improving the performance and resiliency of their on-premise Global Load Balancing (GLB) capabilities, but very few organizations are able to achieve the level of performance and high availability that a cloud-based anycast DNS network can offer. Enterprises across the globe have begun complementing their existing GLB with a DNS service that operates in an always-on manner and can effectively manage and balance internet traffic through intelligent steering capabilities. Download whitepaper and learn the keys to: • Maintaining availability - through global and regional load balancing • Improving digital experience in a hybrid cloud environment • Increasing performance and reliability through a secondary DNS solution Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Juniper Networks     Published Date: Jun 22, 2017
This document is targeted at networking and virtualization architects interested in deploying VMware NSX network virtualization in a multi-hypervisor environment based on the integrated solution from VMware and Juniper. VMware’s Software Defined Data Center (SDDC) vision leverages core data center virtualization technologies to transform data center economics and business agility through automation and non disruptive deployment that embraces and extends existing compute, network and storage infrastructure investments. NSX is the component providing the networking virtualization pillar of this vision. As a platform, NSX provides partners the capability of integrating their solution and build on the top of the existing functionalities. NSX enables an agile overlay infrastructure for public and private cloud environments leveraging Juniper’s robust and resilient underlay infrastructure that also helps bridge the physical and virtual worlds using the L2 gateway functionality.
Tags : 
network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
    
Juniper Networks
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Intel     Published Date: May 17, 2017
The network functions virtualization (NFV) revolution – where software-based services running in virtualized environments on Intel® architecture servers replace purpose built appliances – has taken communications service providers by storm.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization, architecture, infrastructure, network architecture, network management, virtualization
    
Intel
Published By: Intel     Published Date: May 15, 2017
This white paper from Intel and VMware introduces key NFV infrastructure (NFVI) performance concepts and issues, giving CSPs the tools they need to better understand and manage overall performance as they deploy NFV in their networks.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization, architecture
    
Intel
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: IBM     Published Date: Apr 24, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
IBM QRadar and BigFix solutions empower IT security teams to view, prioritize and respond to endpoint intelligence in near real time. How can an organization stay ahead of these advanced security threats? Maintaining a high level of baseline security by consistently enforcing security policies and patch levels on endpoints and servers is definitely required and important. But when networks can have multiple vulnerabilities per IP address at scan time, the slow process of mitigating and patching these weaknesses can result in dangerous security gaps. Today’s IT personnel have to make difficult, risk-based decisions on where to focus their efforts—often without having a complete picture of the security environment. This is even more critical when the number of vulnerabilities across the organization is increasing while the organization has limited resources and skills to fix the vulnerabilities.
Tags : 
risk management, vulnerability management, asset security, database accuracy, enterprise security, security solutions
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Published By: Viavi Solutions     Published Date: Apr 14, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
technology efficiency, market dynamics, data privacy, data security, device management, platform management, enterprise management, data breach
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 07, 2017
Growing in number and becoming increasingly more malicious, security threats and attacks pose a severe threat to the survival of a business. Security operations teams need to leverage every available tool to respond more quickly and effectively to these incidents. While network packet capture and forensic analysis has traditionally been used by network operations, such a tool can also help security teams augment existing defenses and get on top of these threats. Given the hostile IT security environment, close collaboration between these groups is crucial to overall IT organizational success. This white paper explains the importance of packet capture and forensic analysis to security operations, examines the dynamics of this growing collaboration between security and network teams, and explores a leading platform in this market from Viavi Solutions.
Tags : 
    
Viavi Solutions
Published By: Akamai     Published Date: Mar 08, 2017
This solution needs to reach audiences reliably wherever they are, scale as fast as they grow, and adjust intelligently to dynamic network environments for the highest viewing quality possible. Missteps in online video strategy can have a long-lasting effect on audience perceptions, not only of the video experience – but also on the brand being represented.
Tags : 
video, online video strategy, video experience, engagement, customer engagement, online audience
    
Akamai
Published By: Eaton     Published Date: Feb 09, 2017
While network closets take on all shapes and sizes, they are essentially an arm of the data center and as an important component of all mission-critical environments, must be organized, protected, and managed efficiently and effectively. IT professionals are charged with keeping the technology infrastructure functioning, even in the face of constrained resources and increasing complexity.
Tags : 
    
Eaton
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.