it networks

Results 126 - 150 of 831Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Aug 21, 2017
Découvrons ensemble 6 bonnes raisons de migrer vers Juniper Unite pour préparer votre entreprise au cloud et prendre la voie de la transformation digitale.
Tags : 
    
Juniper Networks
Published By: Intel     Published Date: May 15, 2017
This white paper from Intel and VMware introduces key NFV infrastructure (NFVI) performance concepts and issues, giving CSPs the tools they need to better understand and manage overall performance as they deploy NFV in their networks.
Tags : 
intel, vmware, nfv infrastructure, nfvi, network functions virtualization, architecture
    
Intel
Published By: Intel     Published Date: May 19, 2017
For today’s service providers and enterprises, bandwidth demands continue to increase and evolve. The introduction of Internet of Things (IoT) solutions, such as smart homes, smart cities, connected cars, and connected medical devices, is forcing organizations to change existing business models and to build more cost-effective networks.
Tags : 
nfv, enterprises, service providers, internet of things, network performance, virtualization, infrastructure
    
Intel
Published By: TIBCO Software     Published Date: Aug 13, 2018
The use of SaaS applications within an organization is the new normal. In fact, there's a good chance that just your marketing department alone is using over 10 SaaS products. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double to $67.2 billion by 2019. Integration needs are changing, with SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels all new integration points that will need to be captured in your business processes. Read “Five Principles for Integrating Software as a Service Applications” to learn: Key principles for successful hybrid integrations New integration use cases to grow your business upward and outward The why and how of integration as both an enabler and a differentiator Benefits of the TIBCO integration platform and its various offerings
Tags : 
    
TIBCO Software
Published By: Fortinet EMEA     Published Date: Dec 11, 2018
If you’re dealing with the high cost and complexities of delivering reliable wide area connectivity over traditional carrier-based networks, you’re probably considering some form of software-defined wide area networking (SD-WAN). With the variety of constraints that you face, selecting the right SD-WAN solution for your enterprise may require a few compromises. Security, however, should not be one of them. There are various models for combining SD-WAN and network security, but only one that can truly be called “secure SD-WAN.” Fortinet, the most trusted name in network security, has leveraged its industry-leading FortiGate Next Generation Firewall (NGFW) to deliver integrated best-of-breed SD-WAN capabilities. Powered by the new FortiOS 6.0 operating system, SD-WANenabled FortiGate solutions provide the right level of service for every application, while ensuring effective protection from advanced evolving threats across your distributed enterprise.
Tags : 
    
Fortinet EMEA
Published By: Gigamon     Published Date: Dec 13, 2018
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
"Security Delivery Platforms for Dummies" shows IT professionals how to transform the network deployment of security and monitoring tools for better efficiency and effectiveness. Learn how to detect threats faster by removing network blind spots, monitor what's happening across the global enterprise and optimize your security tools’ performance and efficacy. If you are responsible for protecting corporate networks or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Mar 26, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Stop deploying cyberthreat prevention tools in detection mode. Get “Scaling Inline Threat Prevention Tools” to learn the benefits of an inline bypass architecture. Learn how inline bypass removes failure points by automatically distributing traffic to the right security tools, keeping both traffic and protection up and running. Discover how you can add, remove, and upgrade security tools at the speed of your network to maximize threat prevention, security resilience, and network uptime. Get the paper. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read “Security at the Speed of Your Network” to learn why organizations are using an architectural approach to improve security posture and reduce costs. Enable security tools to work more efficiently across physical, virtual and cloud environments. Deploy a diverse set of security solutions as a centralized security tool farm. You can secure more data on faster networks with no compromise between security, performance and cost. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now. 
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 10, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper "Network Architecture with Security in Mind" and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Jun 21, 2019
Read the Gigamon paper, “Harnessing the Power of Metadata for Security,” to see why metadata is the new security super power. Metadata is data about data. It is a summary or high-level view of data. Providing security tools with a summary of the packet data traversing networks, metadata becomes a powerful weapon for enterprises looking to separate signals from noise, reduce time to threat detection and improve overall security efficacy. Read now.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Feb 20, 2019
As the hunger for bandwidth and the number of devices within enterprise networks continue to increase, collaboration between NetOps and SecOps for a fast, secure network is a must. Download the SANS whitepaper Network Architecture with Security in Mind and learn about a new security approach that relies on pervasive visibility to send the right data to the right tools that are already in place, rather than adding more performance-hindering layers of security
Tags : 
    
Gigamon
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: TIBCO Software     Published Date: May 31, 2018
The use of SaaS applications within an organization is the new normal. There is a good chance that just your marketing department is using more than 10 SaaS products, which is reflected in the amount you are spending on SaaS. According to Gartner, the 2015 worldwide market for SaaS software application sales was $33.4 billion, with projections to double that to $67.2 billion by 2019.1 Clearly, your integration needs are changing. SaaS applications, as well as mobile traffic, social networks, IoT, suppliers, partners, and customer channels are new integration points that will need to be captured in your business processes. This paper presents five principles for successful hybrid integrations.
Tags : 
    
TIBCO Software
Published By: Oracle     Published Date: Nov 30, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
DDoS attacks can impair your website, tarnish your brand, and impact your bottom line. Conventional security products like firewalls and intrusion prevention systems and newer cloud-based scrubbing services can’t protect your DNS infrastructure against today’s increasingly sophisticated attacks. The best way to defend against DDoS attacks is to trust the operation of your DNS infrastructure to a managed service provider that lives and breathes DNS. Best-of-breed managed DNS providers operate global anycast networks that mitigate DDoS threats to keep your online business up and running.
Tags : 
dns, provider, global, anycast, network, customer, pop, business
    
Oracle Dyn
Published By: Pure Storage     Published Date: Apr 18, 2018
Deep learning opens up new worlds of possibility in artifi cial intelligence, enabled by advances in computational capacity, the explosion in data, and the advent of deep neural networks. But data is evolving quickly and legacy storage systems are not keeping up. Advanced AI applications require a modern all-fl ash storage infrastructure that is built specifically to work with high-powered analytics.
Tags : 
    
Pure Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.