network ha

Results 1 - 25 of 1742Sort Results By: Published Date | Title | Company Name
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries 36% overall and 59% in the government sector.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Weve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. Thats more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, well talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Dataflow is increasing at a rate unseen in history. Network managers are tasked with enabling massive quantities of new data in a secure and highly available fashion, all while facilitating access to new types of form factors and data stores. This challenge is often met with layers of networking hardware and tools resulting in a complex mess, or even worse, a culture of network protectionism that inhibits business innovation.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations infrastructureincluding, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Your organization depends on all kinds of inline tools to keep your network up and running, but those same tools can fail, leaving you vulnerable. Moreover, as network speeds increase, slower tools can bottleneck network traffic, making organizations purchase more and more tools, which then introduce complexity and cost. There is a better way to increase network resiliency while reducing security issues, and thats inline bypass.
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that todays network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
    
Gigamon
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Readings survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Check out our infographic to see six common security pitfalls that put your users, their devices, and your data at risk. By avoiding these common security mistakes, youll be protecting your network against todays threats and beyond. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isnt efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"Its no secret that the way people work has changed dramatically over the past few years. As highly distributed environments become the norm, security teams are scrambling to protect users, the growing number of device types they carry, and their data. With more users, devices, and applications connecting to the network, the number of risks and vulnerabilities is also increasing triggering a total transformation in the security landscape. In this research readout, we explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of todays increasingly distributed enterprise.Explore the complex factors that make remote and roaming user security a challenge, and the emerging solutions best positioned to meet the needs of todays increasingly distributed enterprise. "
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
We have covered a great risk in the web attack vector of ransomware, and greatly improved our user experience in regards to Internet connectivity. -Jason Hancock, Global Senior Network Engineer, Octapharma
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe its time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
    
Cisco Umbrella EMEA
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Readings survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network, cos mapping, network consolidation, network management, network performance management, network security, wide area networks
    
Virtela Communications, Inc.
Published By: Virtela Communications, Inc.     Published Date: Oct 12, 2011
Multinational companies (MNCs) are facing a unique combination of escalating customer, competitive and operational pressures which are forcing them to fundamentally change the way they do business and manage their IT infrastructures supporting network, security and mobility needs. Lack of IT resources, limited capex and more complex global implementations are driving an increasing proportion of MNCs to offload, or 'out-task', various aspects of their day-to-day management responsibilities to skilled third-parties that can help perform these functions well.
Tags : 
health, global management service, cloud services, technology
    
Virtela Communications, Inc.
Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, data center design and management
    
Coyote Point Systems
Published By: MuleSoft     Published Date: Jun 27, 2019
Banks of all sizes, from multinational firms to regional credit unions, face unparalleled pressure to digitally transform in the face of evolving customer expectations. Learn how a top 10 bank partnered with MuleSoft to address these pressures by developing an application network to rapidly modernize legacy systems, digitally transform mortgage lending, and accelerate Salesforce implementation. Read this whitepaper to learn: How banks can leverage APIs to accelerate integration between core banking systems, legacy applications, and modern SaaS endpoints. The step-by-step approach a top 10 bank took to build a Center for Enablement (C4E) and transform their SDLC to accelerate application development. How the bank created unified customer experiences across different product lines, from mortgages to wealth management, across in-person, and digital engagement channels.
Tags : 
    
MuleSoft
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Published By: Time Warner Cable Business Class     Published Date: Apr 15, 2010
Time Warner Cable Business Class delivers all the communication services your business needs with scalable Internet, Phone and Cable TV services supported by our reliable wholly-owned network. Meet with our local, dedicated account representatives for a free evaluation so they can tailor a solution that's right for your business. For a free communications evaluation, contact us to learn more!
Tags : 
broadband for business, broadband internet for business, bundles for businesses, business adsl, business broadband, business bundle, business bundles, business cable, business class, business dsl, business high speed internet, business internet, business ip phone, business isp, business isps, business local service, business long distance, business phone, business telephone, business voip
    
Time Warner Cable Business Class
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.