network professionals

Results 1 - 25 of 32Sort Results By: Published Date | Title | Company Name
Published By: Juniper Networks     Published Date: Mar 27, 2018
In our 40-criteria evaluation of data center hardware platforms for software-defined networking (SDN), we identified the nine most significant players Alcatel-Lucent Enterprise, Arista Networks, Extreme Networks (which recently acquired Brocade Communications Systems data center networking business), Cisco Systems, Cumulus Networks, Dell, Huawei, Juniper Networks, and Pluribus Networks and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations professionals (I&O) make the right choice.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Nov 06, 2014
Hear the views of 250 network professionals in this Webinar with GigaOM Research and Juniper Networks. Like-minded professionals speak on effective cloud adoption, the potential of software-defined networking and network automation.
Tags : 
gigaom, cloud adoption, network professionals, software-defined networking, network automation, cloud
    
Juniper Networks
Published By: CA Technologies EMEA     Published Date: Sep 11, 2018
Suddenly, the network is cool again. Tech trends such as the Internet of Things, software-defined networking and growing end-user expectations all add up to a demand for dialtone network performance and reliability. But as the data deluge continues to accelerate, and as organizations continue to rely on multiple clouds to achieve business goals, how can the network keep up, much less meet tomorrows demands? This e-book looks at the trends that are impacting the enterprise networkthe modern networkthe issues it creates for NetOps professionals, and how organizations can act today to plan for tomorrow.
Tags : 
    
CA Technologies EMEA
Published By: HP - Enterprise     Published Date: Sep 27, 2013
Learn how the CIO of the United Arab Emirates University community addressed the major challenges faced by the University's network security professionals.
Tags : 
united arab emirates, united arab emirates university, network security, security, network, internet security, network security appliance, security management, vulnerability management
    
HP - Enterprise
Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
    
Viavi Solutions
Published By: Extreme Networks     Published Date: Feb 23, 2017
The network has never been as critical to the healthcare sector as it is today. Electronic health records, Wi-Fi-connected medical devices, and clinician smart phones are among a plethora of healthcare technologies that depend on a stable network. The consistent development of this infrastructure is key for the healthcare sector to continue its successes in creating new possibilities for management, patient and family experience, and patient outcomes. Extreme Networks posed key questions to Nolan Greene, a senior research analyst with IDCs Network Infrastructure group, who highlights the critical issues healthcare IT professionals must consider when building a network that maintains industry needs. Download this report to learn about: Why having a modern healthcare infrastructure is so important The major challenges IoT brings to healthcare networks How IEC 80001 is impacting compliance Trends that confront a network IT professional in healthcare Risks Healthcare IT must eli
Tags : 
healthcare, iot, iec 800001, extreme networks, healthcare it
    
Extreme Networks
Published By: Brother     Published Date: Mar 08, 2018
The last decade has seen many exciting advances in connectivity accelerated by the near universal availability of smartphones and tablets leading to a highly interconnected world. The security of networks - and the businesses and individuals that rely on them - has become top of mind for the IT Security professionals who are responsible for ensuring the safety of the data and the networks where this information is utilized. As high-visibility security breaches occur - affecting ecommerce, banking, retail and other industries - the critical importance of the security of the infrastructure these businesses rely on continues to grow. Security in the workplace is a daily fact of life. From using ID cards to control physical access, to entering passwords to join the network, to using software to monitor and prevent unauthorized access, all are routinely used to protect critical assets and information. However, there is one key area where many organizations still have potential vulnerabili
Tags : 
network security, security breaches, pci, dss, hippa
    
Brother
Published By: Cisco     Published Date: Dec 27, 2017
Hyperconvergence has been receiving a tremendous amount of attention because it represents the next step in the evolution of IT resource delivery. This technology takes the idea of integrating compute, storage and networking that started with converged systems design and has improved on those architectures by adding deeper levels of abstraction and automation. Hyperconverged infrastructure (HCI) vendors promise simplified operation and the ability to quickly and easily expand capacity by deploying and launching additional modules; simplicity has been the key selling point for the HCI pioneers. As HCI ventures even deeper into the enterprise and cloud environments, the architectures will need to become more efficient, agile and adaptable to help IT professionals shoulder the burden of rapidly growing data sets and workloads. This report discusses the benefits of HCI and the enhancements that must be made to expand HCI deeper into the mainstream enterprise datacenter.
Tags : 
    
Cisco
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : 
fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management, network performance, network performance management, network security appliance, security management
    
Fortinet, Inc.
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security, database development, database security
    
Forrester
Published By: Riverbed     Published Date: Nov 30, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through data center networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
    
Riverbed
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
This paper is intended for people who will be proposing solutions, providing installation services or consulting, and who may be assisting in deploying Office SharePoint Server 2007 solutions accessed over a Wide Area Network (WAN). It will also be of interest to IT professionals who may be deploying and/or managing such Office SharePoint Server 2007 solutions.
Tags : 
webaccelerator, wan technology solution, networking, it management, wide area networks
    
F5 Networks Inc
Published By: Jive Software     Published Date: Oct 08, 2009
Learn how the Air Force Medical Service connects 20,000 Department of Defense medical personnel on a highly-secure online community -- in hospitals, in remote stations, and on the battlefield.
Tags : 
highly-secure online community, social business software, jive
    
Jive Software
Published By: Lenovo     Published Date: Aug 14, 2018
Get our Security Solutions Brochure Backed by deep expertise and supported by a global network of trained and certified technical service professionals, Lenovos 360 approach to security gives you the complete experience of: Secure supply chain Best-in-class hardware security Securely developed software Complete component verfication Adoption and extension of security technology
Tags : 
security, supply, chain, hardware, security
    
Lenovo
Published By: Riverbed     Published Date: Nov 02, 2016
Digital transformation on the 3rd Platform continues to present unprecedented opportunities and challenges for enterprise networks and the IT professionals who operate them. Indeed, the requirements associated with cloud computing have already reverberated through datacenter networking, with software-defined networking (SDN) arising as an architectural approach that provided the network with the agility and responsiveness that it lacked previously but has come to require. Now, the focus is turning to how the WAN must change to accommodate the requirements of cloud applications and services. Fortunately, technologies such as hybrid WAN and software-defined WAN (SD-WAN) are coming to the rescue, giving enterprise IT the means to allow the WAN to meet these challenges directly.
Tags : 
    
Riverbed
Published By: 8x8 Inc.     Published Date: Feb 13, 2017
The migration of contact centers from on-premises to the cloud is well underway and dramatically changing how companies deliver customer experience. Thats the conclusion of this 2016 survey by 8x8 and the Contact Center Network Group (CCNG) of 154 contact center professionals in the U.S. and UK. The November 2016 survey results uncover a range of trends and opportunities that highlight the importance of analytics, the increase in remote working, and the integration of more non-voice channels into the contact center. Download this complimentary report to learn: Major business drivers that are leading contact centers to cloud Surprising top method for measuring and improving agent performance Concerns and obstacles around moving to the cloud Increased prevalence of remote working and key challenges reported The most popular non-voice channels contact center managers would like to incorporate
Tags : 
cloud contact center, ccng, analytics. remote working, non-voice channels
    
8x8 Inc.
Published By: Beyond.com     Published Date: Nov 28, 2011
Learn how a smart niche recruitment strategy can effectively and affordably target the right candidates, and significantly reduce your cost per hire.
Tags : 
niche recruitment, recruiting, recruitment, hire, hiring practices, qualified candidates, talent acquisition, talent sourcing, targeting, budget, strategy, applicant pool, career website, career network, online recruiting, hr professionals
    
Beyond.com
Published By: TeamQuest     Published Date: Apr 09, 2014
Your customers rely on you to efficiently manage a highly dynamic, rapidly changing, highly shared, distributed environment so they can do their jobs effectively. This means working through the complexities of understanding the services in your virtualized networks, machines and storage, and determining how and when customers will be affected. Listen to virtualization expert Bernd Harzog discuss the complexities that many IT professionals face.
Tags : 
teamquest, virtualization, it professionals, optimize software, distributed environment, data center, performance, data management
    
TeamQuest
Published By: Intel Security     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what theyre seeing.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, security
    
Intel Security
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, identity management, internet security, policy based management, security management, security policies
    
Qualys
Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities, security management, vulnerability management
    
Qualys
Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
BlackBerry
Published By: Siemon Company     Published Date: May 12, 2010
Siemon, a global leader in network cabling solutions and data center physical layer infrastructure, offers this new 66-page E-Book focused on guiding data center professionals and service providers through key infrastructure challenges.
Tags : 
siemon, ieee, cooling, data center, cabling, cooling, networking, physical infrastructure, saas, paas, infrastructure, internetworking hardware, local area networking, network performance management, network provisioning, server hardware, small business networks, business intelligence, configuration management, database development
    
Siemon Company
Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you cant afford to suffer through APTs, breaches and data leakages just to provide teachable moments for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.