traffic control

Results 1 - 25 of 38Sort Results By: Published Date | Title | Company Name
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether its for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, its crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What you cant see will hurt you The situation is critical, because the percentage of encrypted user traffic has more than doubled since 2014, exceeding 80 percent, according to F5 Labs' 2017 TLS Telemetry report. So, of course, now there are SSL visibility solutions that provide decryption services allowing those security controls to see what theyre doing. But visibility, by itself, isnt enough. Security teams and network operations have found that setting up decryption zones is not easy. Security teams often have to resort to manual daisy-chaining or tedious configuration to manage decryption/encryption across the entire security stack. And then they find that exceptions abound. And lastly, you need to scan your inbound and outbound traffic for tomorrows threats, and SSL Orchestrator is the tool that lets your security controls keep your organizations name out of the papers and away from those pesky GDPR fines. Download the eBook to find out how you can gain visibility into e
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: May 27, 2019
What's Hiding in Your Encrypted Traffic? SSL Orchestration ensures encrypted traffic can be decrypted, inspected by security controls, then re-encrypted. This technology will allow you to maximize your inbound and outbound threats including exploitation, callback, and data exfiltration. Download the overview to learn: o How to maximize your investments in security inspection technologies o How SSL Orchestrator delivers the latest SSL encryption technologies across your entire security infrastructure o The benefits and features of SSL Orchestrator
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: ipoque     Published Date: Feb 14, 2019
Virtualized Evolved Packet Core (vEPC) is a major breakthrough in network function virtualization (NFV). When asked where they have deployed NFV in production networks, communication service providers (CSPs) consistently name vEPC as one of the top answers. Why is that? In order to maximize their processing capacity, CSPs virtualize a subset of their network applications, including mobile edge computing (MEC), base stations (small/macro cells) and the mobile core, because these systems use a large bandwidth. The mobile packet core builds the foundation of the core network on which mobile CSPs offer IP-based services to their customers. Implementing vEPC solutions can help CSPs obtain the scale necessary to accommodate growing numbers of subscribers and large amounts of traffic or connections while controlling costs and improving on quality of experience (QoE). In the past, evolved packet core (EPC) solutions were deployed on purpose-built hardware. NFV enables operators to deploy EPC c
Tags : 
dpi, deep packet inspection, vepc, sdn, nfv, network analytics, virtual network
    
ipoque
Published By: Intel     Published Date: May 02, 2017
Enabling communications service providers to scale up and support rapidly rising 4G LTE traffic while controlling costs
Tags : 
virtualisation, cost reduction, network transformation
    
Intel
Published By: Gigamon     Published Date: Apr 10, 2019
Need powerful visibility and insights into network traffic while reducing risk, complexity and costs? Download the new Definitive Guide to Next-Generation Network Packet Brokers to learn why you should shift your infrastructure strategy to include NGNPBs, which offer new, expanded feature sets that simplify your architecture, realize the true ROI of your security tools and give you visibility into critical security threats. Learn how to see, control and secure what matters -- download now!
Tags : 
    
Gigamon
Published By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : 
model, ddos, protection, solutions
    
F5 Networks Inc
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
New technologies used in Web 2.0 applications have increased the volume and complexity of network traffic. More than ever, businesses must deploy new methods of monitoring and controlling these applications in order to discover and mitigate new hidden security threats.
Tags : 
fortinet, web application security, web application control, application threats, web 2.0, network security, application security, network security appliance
    
Fortinet, Inc.
Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSLs use.
Tags : 
    
Blue Coat
Published By: F5 Networks Inc     Published Date: Feb 19, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
application, delivery, controllers, evolved, data center, adcs, advancements
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
gartner, f5 networks, application delivery, data center architecture, enterprises, adcs, infrastructure, application management
    
F5 Networks Inc
Published By: Aruba Networks     Published Date: Nov 15, 2013
Whether you are an early adopter who has already started planning, or like several organizations, unsure of your next step, the following guidelines will help you prepare and plan for a successful migration to an 802.11ac WLAN.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle gnration. La vitesse gigabit et lamlioration des capacits et de la fiabilit offertes par le standard 802.11ac aux rseaux LAN sans fil (WLAN) se rvlent tre dinestimables atouts face la croissance rapide du nombre dutilisateurs, dappareils et dapplications mobiles. Que vous soyez un adepte prcoce ayant dj commenc tout planifier ou, comme bon nombre dentreprises, encore hsitant concernant la marche suivre, nhsitez pas tlcharger ce guide en cinq tapes qui vous aidera prparer et planifier une migration russie vers un rseau WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Lapplication Microsoft Lync modifie en profondeur la structure des cots de la tlphonie dentreprise et plonge lutilisateur dans une nouvelle exprience o chaque communication devient plus captivante et plus conviviale. Voici 10 conseils pour garantir le bon fonctionnement de Lync sur les appareils mobiles de votre rseau.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
802.11ac ist auf dem besten Weg der neue Standard fr Next-Generation Wi-Fi zu werden. Dieser neue 802.11ac Standard fr Wireless LANs (WLANs) gewhrleistet Gigabit-Geschwindigkeit, verbesserte Leistung und erhhte Zuverlssigkeit und deckt damit alle Anforderungen ab, die durch die stetig steigende Zahl an mobilen Usern und mobilen Gerten sowie die verstrkte Nutzung von mobilen Applikationen entstehen. Ob Sie ein Early Adopter sind und bereits angefangen haben zu planen oder wie viele Unternehmen noch abwarten, laden Sie sich unsere Anleitung herunter und Sie erfahren, wie Sie in nur fnf Schritten ein 802.11ac WLAN aufsetzen knnen.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync optimiert nicht nur die Kostenstruktur fr die Unternehmenstelefonie, sondern schafft auch ein vllig neues Benutzererlebnis, frdert den Austausch und strkt die Zusammenarbeit im Unternehmen. Um die Vorteile von Lync umfassend ausschpfen zu knnen, muss die zugrunde liegende Infrastruktur optimal genutzt werden. Da die Zahl an Laptops, Smartphones und Tablets langfristig die Zahl der Desktops bertreffen wird, bentigen Unternehmen sichere und zuverlssige Wireless-Infrastrukturen. Mit nur geringem Aufwand knnen Sie die Qualitt und die Zuverlssigkeit multimedialer Kommunikation in Ihrem WiFi-Netzwerk verbessern. Wir haben die Top-10-Tipps fr Sie, wie Sie von den Vorteilen von Lync auf mobilen Endgerten in Ihrem Netzwerk profitieren knnen
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
802.11ac va por buen camino para convertirse en el modelo para la prxima generacin de Wi-Fi. La velocidad de transmisin de gigabits, su capacidad mejorada y la fiabilidad que proporciona 802.11ac a las redes inalmbricas LAN son amplificadas ya que el nmero de usuarios de mviles y dispositivos, as como el uso de aplicaciones continan creciendo a gran velocidad. Tanto como si usted es uno de los primeros que ya han empezado a planificarse como si, al igual que les sucede a diversas organizaciones, no est seguro de qu es lo siguiente que debe hacer, descrguese esta gua en cinco pasos que le ayudar a prepararse y planificar una migracin exitosa a WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync est cambiando la estructura de costes en la telefona empresarial y est marcando una nueva experiencia para sus usuarios en la cual cada comunicacin se convierte en una interaccin cada vez ms colaborativa y atractiva. Aqu tiene 10 consejos para asegurarse de que Lync funciona bien en los dispositivos mviles en la red. Microsoft Lync no slo est cambiando la estructura de costes en la telefona empresarial sino que, adems, est marcando una nueva experiencia para sus usuarios en la cual cada comunicacin se convierte en una interaccin cada vez ms colaborativa y atractiva.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
L'802.11ac sulla buona strada per diventare lo standard del Wi-Fi di nuova generazione. La velocit in gigabit, le migliori capacit e l'affidabilit che l'802.11ac conferisce alle reti LAN senza filo (WLAN) sono amplificate, mentre cresce a vista d'occhio l'utilizzo da parte di utenti, applicazioni e dispositivi. Sia che siate dei precursori che hanno gi iniziato a pianificare o, come molte aziende, siate incerti sul da farsi, scaricando questa guida in cinque fasi potrete prepararvi e pianificare la corretta migrazione verso una rete WLAN da 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync cambia la struttura dei costi della telefonia aziendale e apre la strada ad una nuova esperienza per il cliente, in cui ogni comunicazione si trasforma in un'interazione pi collaborativa e coinvolgente. Ecco 10 consigli per garantire il corretto funzionamento di Lync sui dispositivi mobili della vostra rete.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks
Published By: F5 Networks Inc     Published Date: Jan 03, 2014
Turning on firewall features can sometimes result in a significant performance hit, creating an obstacle for network architects. In this Network World Clear Choice test, learn about a firewall solution that can help your business overcome these performance challenges by maxing our network capacity while also offering filtering and attack protection capabilities.
Tags : 
network world, data center, firewall, load balancer, scalability, data center management, dos protection, security
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network
    
F5 Networks Inc
Published By: Riverbed     Published Date: Apr 24, 2015
Read this white paper to learn how to: Architect an integrated WAN to support evolving application deployment models using the Internet in concert with MPLS. Create a WAN solution that can optimize traffic flows between the Internet and the MPLS for all applications and between both internal and external users. Deploy a solution across all independent network services that can monitor, report, control and optimize end-to-end path forwarding for all endpoints.
Tags : 
enterprise wan, integrated wan, public cloud services, connectivity, application performance, networking, software development, it management
    
Riverbed
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.