network intelligence

Results 1 - 25 of 103Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Dec 20, 2018
Intent-based networking is the difference between a network that needs continuous attention and one that simply understands what your organization needs and makes it happen. Its the difference between doing thousands of tasks manually and having an automated system that helps you focus on business goals. Cisco Digital Network Architecture (Cisco DNA) is your teams bridge to an intentbased network. It is an open, extensible, software-driven architecture that accelerates and simplifies your enterprise network operations, while lowering costs and reducing your risk. Only Cisco provides a single network fabric that is powered by deep intelligence and integrated security to deliver automation and assurance across your entire organization at scale. Cisco DNA gives IT time back from time-consuming, repetitive network configuration tasks so you can focus on the innovation your business needs. Cisco DNA automation and assurance are built on a Software-Defined Networking (SDN) controller, ri
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartners 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
The Enterprise Strategy Group (ESG) characterizes traditional security tactics as a "messy independent array of independent technologies." A decade ago, this could suffice, but it's no match for today's requirements. Read how an integrated, threat-focused approach can help.
Tags : 
network security, enterprise organizations, security threats, security architecture, central command, central control, firewall, distributed enforcement, integrated actionable intelligence, networking, security
    
Cisco
Published By: Dialpad     Published Date: Apr 19, 2016
Workplace expectations are changing and companies are ditching outdated technology in favor of flexible, cloud-based services, freeing their employees to work from anywhere. From modern office spaces to popular business tools, this eBook breaks down the top trends of the workplace revolution, including: 1. The age of Millennial workers 2. Modern workspaces 3. Improving employee productivity and satisfaction 4. The rise of remote work
Tags : 
communication, internet, network management, best practices, business intelligence, business management, mobile, content delivery, content management system, productivity, content management
    
Dialpad
Published By: Dialpad     Published Date: Apr 19, 2016
Today, everything about the way we work has changed. Your employees, customers, and extended ecosystem have greater expectations than ever before, and the voice and unified communication solution you select is one of the most important decisions you can make toward a collaborative, connected, and productive workforce. This list gives you some of the most important questions to include in an RFP this year, as well as key insights about how these will play out for your business.
Tags : 
communication, reporting, network management, business intelligence, business management, best practices, productivity, network performance, content management system, project management
    
Dialpad
Published By: GE Power     Published Date: Jan 30, 2017
Be the first to read the 2017 top digital trend predictions for the (remove second the) the power and utility industry, and gain a competitive edge by understanding whats next. Across the Electricity Value Network (EVN) - from generation through T&D and end user management, first movers and proactive digital adopters are far more likely to thrive in the future. Read the new Brief and learn how:
Tags : 
2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids, power industry, grid operators, cloud+edge, power plant software, platform economy
    
GE Power
Published By: Gigamon     Published Date: Oct 19, 2017
Read the Joint Solution Brief Gigamon Improves Security Visibility with Splunk Enterprise to see how to effectively analyze network events for security threats. Benefits include enhanced visibility and deeper, faster security analytics and intelligence based on all machine data (not just security events), among many others. Download now!
Tags : 
    
Gigamon
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
    
Fortinet EMEA
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, theres a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: SolidFire_NetApp     Published Date: May 10, 2016
Ultimate Software is a leading cloud provider of comprehensive human capital management (HCM) solutions delivered via Software as a Service (SaaS). More than 2,800 customers with employees in 150 countries count on Ultimates award-winning UltiPro suite to unite all aspects of HR, payroll, and talent management throughout the employee life cycle, all supported by powerful reporting and analytics.
Tags : 
software, network management, network solutions, best practices, business intelligence, productivity, business optimization, application integration, business management
    
SolidFire_NetApp
Published By: Arbor     Published Date: Mar 13, 2014
In this white paper, well examine how the Pravail portfolio from Arbor Networks can empower your network operations and security teams to more efficiently help protect the integrity and availability of your enterprise network against advanced attacks.
Tags : 
arbor, arbor networks, enterprise network, global attack, connecting workforces, internal operations, growing revenue, retaining customers, increase competitive edge, cyber attackers, pravail portfolio, pravail solutions, attack intelligence, enterprise defense, security, infrastructure, best practices, business intelligence, secure content management
    
Arbor
Published By: Aerohive     Published Date: Oct 23, 2014
Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive, weve always done it this way.
Tags : 
wireless networks, controller-less networks, the new mobility, network infrastructures, infrastructure, internetworking hardware, network architecture, network management, server hardware, 802.11, mobile computing, mobile data systems, mobile workers, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
Aerohive
Published By: ipoque     Published Date: Feb 14, 2019
Application-aware vEPC is the key to SDN/NFV service deployments. Deep packet inspection software provides granular network data, which lays the foundation for application awareness in mobile networks. This case study explains how a leading provider of virtualized network solutions uses the best-berforming deep packet inspection (DPI) software R&SPACE 2 by Rohde & Schwarz to provide their CSP customers with overall network intelligence at a highly granular level.
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: GE Power     Published Date: Jan 26, 2017
2016 was a year of accelerating change that will impact the power industry across the entire Electricity Value Network. Power leaders determined to thrive in this rapidly changing landscape must understand these trends, how they will impact their business models and the transformative role of digitalization. In this Executive Brief, GE outlines the trends that warrant consideration by every power and utility executive as they develop strategies for success in 2017.
Tags : 
2017 top digital trends, power plants, utilities, power producers, electricity value network, top digital trends, power plant cyber attacks, power grids, power industry, grid operators, cloud+edge, power plant software, platform economy, infrastructure, security management, best practices, productivity
    
GE Power
Published By: Cisco Umbrella EMEA     Published Date: Dec 03, 2018
Case study Objective: Enhance the customer experience by building automation into the security practice. Impact: Decreased incident response time from days to minutes through automation, enabled by the Investigate API Reduction in network security incidents and infected endpoints Increased protection against malware, ransomware, and other threats on and off the network Enriched security event data and threat intelligence with Investigate Download this case study today to find out the impact Cisco Umrella could have on your business.
Tags : 
    
Cisco Umbrella EMEA
Published By: IBM     Published Date: May 26, 2017
Securing your infrastructure, your customer interactions and protecting your data are critical to preserving your reputation and your bottom line. Many cyber attacks remain undetected for up to eight months1 and can cost an organization an average of 11 million USD.2 Todays cyber actors are becoming more sophisticated, agile and capable of getting past any network security. Organizations must evolve, replacing traditional defensive security strategies with a proactive, intelligence-driven offense to prevent and disrupt these threats. IBM i2 Enterprise Insight Analysis is a next generation intelligence solution that enables organizations to incorporate cyber threat hunting into their security strategy and turn their defense into a proactive offense.It helps organizations uncover critical insights about their threats and threat actors so they can mitigate and counter more threats with a combination of multi-dimensional visualte analysis capabilities
Tags : 
ibm, ibm i2, cyber security, customer interaction, enterprise insight analysis
    
IBM
Published By: IBM     Published Date: Jul 26, 2017
While there has been improvement in the amount of time an attacker spends in a network before detection decreasing from years to days in many cases the ongoing delay illustrates just how elusive attackers still are compared to an organization's ability to detect a problem. IDC believes that actionable threat intelligence is going to be a significant factor in improving this metric. Threat intelligence has historically been seen as a complex set of activities reserved for security operations centers (SOCs) and advanced security analysts. The tools to collect and apply threat intelligence have generally not existed commercially and the ability to integrate threat intelligence into the traditional security workflow has not been available. Over the last few years, threat intelligence has been growing in importance within the security workflow.
Tags : 
data security, threat intelligence, security operations, advanced security analysts
    
IBM
Published By: Extreme Networks     Published Date: Feb 10, 2015
Dans cet eBook, nous vous prsenterons des cas dutilisation illustrant comment une solution danalyse des applications peut tre utilise de manire efficace par le service informatique.
Tags : 
extreme networks, purview, analyse des applications, sans fil, wifi, solution rseau, solution de business intelligence, business intelligence, analyse applicative, datamining, rseau, optimisation du rseau, business analytics, application, scurit des applications, wireless
    
Extreme Networks
Published By: EMC Corporation     Published Date: May 27, 2014
RSA Technical Brief: The openness of today's networks and the growing sophistication of advanced threats make it almost impossible to prevent cyber attacks and intrusions. This technical brief discusses why combating advanced threats depends on organizations shifting more security resources from prevention to detection and remediation, and developing intelligence-driven security programs.
Tags : 
emc, security operations, security analytics, intelligence-driven security, threat detection, security monitoring, critical incident response, security, data center
    
EMC Corporation
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing, application security, database development, database security
    
Forrester
Published By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the lone wolf hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, ransomware, confidential, networks
    
MobileIron
Published By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the lone wolf hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : 
mobile, threat, detection, machine, learning
    
MobileIron
Published By: Aternity     Published Date: Mar 15, 2016
IT and Line of Business (LOB) management need precise, comprehensive metrics describing real end user experience, before and after going virtual, in order to support strategic desktop virtualization and consolidation decisions.
Tags : 
application virtualization, monitoring, strategic applications, best practices, network provisioning, network infrastructure, end user experience, business intelligence, network management, network performance, business metrics, server virtualization, productivity, manufacturing execution systems
    
Aternity
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.