network ha

Results 126 - 150 of 1603Sort Results By: Published Date | Title | Company Name
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprise chief information security officers (CISOs) are seeking ways to leverage existing security investments to bridge the divide between largely siloed security systems. The focus is on reducing the number of consoles needed to manage the security infrastructure. Network security vendors have a significant role to play in bridging the communication gap between these systems. The creation of a unified defense architecture enables threat data exchange between existing security systems. It helps automate the process of raising an organization's security posture when a security infrastructure component detects a threat. The following questions were posed by Fortinet to Robert Ayoub, program director in IDC's Security Products program, on behalf of Fortinet's customers.
Tags : 
     Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
     Fortinet EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
"VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution"
Tags : 
     Akamai Technologies
By: Dell EMC     Published Date: Nov 04, 2016
While there are significant potential benefits to migrating to a hyper-converged system, true cost and real life experience are critical decision factors. To accurately establish a case for going to one platform or another, you need a strong fact-based analytical methodology and approach. Download this Edison Group white paper to better understand the cost and measureable effort benefits of hyper-converged appliances. Dive into the details for the VCE VxRail Appliance from Dell EMC, including total cost of ownership, total cost of acquisition and relative work efforts to install, initialize and maintain as compared to building your own system.
Tags : storage, software, network, hardware, facilities
     Dell EMC
By: Dell EMC     Published Date: Nov 10, 2015
A new option from Dell, powered by an Intel® Xeon® processor, is finally giving SMBs access to storage area network technology that’s affordable and easy to manage. Read this white paper to learn more now, including what this technology can offer in terms of benefits, performance, and more.
Tags : 
     Dell EMC
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016
Chemist warehouse is one of Australia's most remarkable business success stories, doubling sales and growing its national store network from 100 to more than 400 stores in just five years.
Tags : kaspersky, kaspersky endpoint security, security, security application, kaspersky solutions, security solutions
     Kaspersky Lab Australia and New Zealand
By: Akamai Technologies     Published Date: Jun 14, 2018
"High-profile cyber attacks seem to occur almost daily in recent years. Clearly security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). This oversight leaves a massive gap in network defenses. But this infrastructure doesn’t have to be a vulnerability. Solutions that protect recursive DNS (rDNS) can serve as a simple and effective security control point for end users and devices on your network. Read this white paper to learn more about how rDNS is putting your enterprise at risk, why you need a security checkpoint at this infrastructural layer, how rDNS security solutio Read 5 Reasons Enterprises Need a New Access Model to learn about the fundamental changes enterprises need to make when providing access to their private applications.
Tags : rdns, dns, anti-virus, security, network defense
     Akamai Technologies
By: Dell     Published Date: Oct 24, 2014
This start-up guide provides instructions on how to configure the Dell™ PowerEdge™ VRTX chassis with Microsoft® Windows Server® 2012 in a supported failover cluster environment. These instructions cover configuration and installation information for chassis-shared storage and networking, failover clustering, Hyper-V, Cluster Shared Volumes (CSV), and specialized requirements for Windows Server 2012 to function correctly with the VRTX chassis.
Tags : server configuration, role configuration, virtual disks, server installation
     Dell
By: Dell Brought to you by Intel     Published Date: Dec 09, 2013
Many distributed offices are eager to simplify a complex, unwieldy mix of heterogeneous IT equipment. The Dell ™P converges servers, storage, networking and management into an office-optimized chassis the size of a tower server.
Tags : dell, poweredge™ vrtx platform, robo environments, it management
     Dell Brought to you by Intel
By: Collaborative Consulting     Published Date: Dec 20, 2013
Social, Mobile, Analytics and Cloud (SMAC), have broad potential to provide huge business value, while simultaneously presenting potentially overwhelming challenges. The rapid technology changes supporting SMAC and the overall complexity involved demand a systematic approach to building out your SMAC capability.
Tags : collaborative consulting, creating opportunities, driving disruption, social, mobile, analytics, cloud, infrastructure, elastic computing capacity, cloud computing, social network, mobile web, wireless data networks, drive change
     Collaborative Consulting
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : cloud security, scale, data center, ddos
     Akamai Technologies
By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : miercom, security, effectiveness, report, protect, network, threats, solutions
     Websense
By: Dell     Published Date: Feb 04, 2015
Technology is moving fast and your data center needs to keep up so your business can thrive. Migrating to the latest platforms and solutions, such as Windows® Server® 2012 R2, lets you take advantage of its virtualization advancements and tap into the Microsoft cloud OS. Combined with unique innovations featured in Dell server, storage and networking solutions, you can do more than modernize your IT — you can transform it.
Tags : dell, windows, microsoft, modernization, management, modernization, server, 2003, 2012, support, services, efficiency, cost, platforms, future, mobility, standardization, transformation, challenges, applications
     Dell
By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for Exchange 2013 are right-sized solutions including servers, storage, networking and services that have been optimized for Microsoft Exchange. There are two HP Flex-Bundles for Exchange. One has been configured for customers who have 200–499 mailboxes and another one for customers with 500-1000 mailboxes. These solutions are low risk investments because HP understands how to build infrastructures for Microsoft environments and applications. HP and Microsoft have the longest standing relationship in the IT industry spanning 30 years. During this time, HP has gained a deep and comprehensive understanding of Microsoft products. HP has more than 34,000 trained Microsoft specialists, with over 13,000 of them attaining Microsoft-certification. HP has been named Microsoft Enterprise Partner of the Year five times and is Microsoft’s largest Gold Certified partner.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for SMB with SQL Server 2014 were created to include everything that a business needs to easily build a new environment or upgrade an existing one. The following sections cover the server, storage, networking and services building blocks that make up these pre-defined configurations. HP Flex-Bundles are built on the HP ProLiant servers that include some of the latest and most powerful Intel processors. In designing the latest generation of the HP ProLiant server families, HP wanted to not only draw on 24 years of server experience, but also gain from the depth of knowledge and insight from customers.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
By: HPE     Published Date: Mar 23, 2015
If you’ve noticed more employees accessing the corporate network using their personally owned mobile devices, you’re not alone. Many employees are boosting their productivity by using their smartphones and tablets at work. Gone are the days of corporate IT departments dictating the types of mobile devices that could access the network. Bring your own device (BYOD) policies, while increasing employee satisfaction and productivity, are straining corporate networks. This white paper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks.
Tags : corporate network, personal devices, smartphone, tablet, legacy networks, byod
     HPE
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
     Hewlett Packard Enterprise
By: Akamai Technologies     Published Date: Oct 23, 2018
VPNs were created for the networks and business environment of yesterday: Most employees worked in an office, devices were limited, enterprise architecture was far less complex, and attacks, in general, were considerably less sophisticated and frequent. What worked 20 years ago cannot be trusted today. Your VPN is cumbersome and time consuming from a management and performance perspective. But what you might not want to concede is that VPNs, by their very nature, pose a significant threat to enterprise security. Read this white paper to learn more about: The vulnerabilities and inefficiencies of traditional remote access -Why VPN elimination must happen now -The four advantages to eliminating your VPN -How a cloud framework for application access works -Next steps to implement a more secure access solution
Tags : 
     Akamai Technologies
By: MobileIron     Published Date: Apr 20, 2015
A case study of how MobileIron Core, App@Work, and app delivery network technologies have been leveraged to augment and support ShiSeiDo operations. Study is in Japanese.
Tags : 
     MobileIron
By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : cisco infrastructure, enterprise network, network design
     Cisco
By: Cisco     Published Date: Oct 08, 2015
This paper outlines and explains the 5 steps to help defend your network from infection, hacking and hard to detect threats.
Tags : network defense, hacking, detecting threats, security
     Cisco
By: Cisco     Published Date: Oct 08, 2015
Cisco can help you get there, using capabilities embedded in the network you already have in place. And it is as easy as 1+1=2
Tags : simplifying your network, cisco visual network
     Cisco
By: Cisco     Published Date: Oct 08, 2015
Businesses looking to transition to 802.11ac Wave 2 should fully understand the new technology’s requirements for the wired network and choose a solution provider that can minimize the disruption to the business.
Tags : wi-fi networks, cisco, wifi speed, enterprise applications
     Cisco
By: ShoreTel     Published Date: Oct 26, 2012
Back in the days of wireline telephony, when all phone calls went over the Public Switched Telephony Network (PSTN), businesses would purchase "trunks" -dedicated lines or a bundle of circuits - from their service provider.
Tags : shoretel, sip trunking, best practices, pstn, public switched telephony network, trunks, circuits, roi, return on investment, enterprise applications
     ShoreTel
By: Brocade     Published Date: Jun 12, 2015
In diesem Bericht wird erläutert, welche Risiken die sinkende Bedeutung der IT-Abteilung in sich birgt, wie Sie Ihr Netzwerk selbst bewerten können und was Sie tun sollten, um die Flexibilität Ihrer IT-Infrastruktur zu verbessern.
Tags : guide for it decision makers, it decision makers, it department, it agility, network challenges limiting it agility, infrastructure, it management
     Brocade
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com