network ha

Results 1551 - 1575 of 1599Sort Results By: Published Date | Title | Company Name
By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
     Avi Networks
By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
     Avi Networks
By: Akamai Technologies     Published Date: Dec 05, 2018
Akamai now mitigates the more than 65% of the 10,000-plus yearly DDoS attacks against its Prolexic platform via proactive mitigation controls, in 0 seconds and with no customer impact. The number of DDoS attacks instantly mitigated via the Prolexic platform has increased exponentially over the past four years. We attribute this growth to our proactive engagement with customers, and the ability to implement and manage proactive mitigation postures based upon their baselined network traffic. Akamai has been detecting and successfully mitigating DDoS attacks in an industry-leading SLA for 15 years. We will illustrate how Akamai continues to lead the industry with new capabilities including advanced customer traffic profiling and proactive mitigation controls to ensure the best possible results during an actual DDoS event.
Tags : 
     Akamai Technologies
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
In an innovation-powered economy, ideas need to travel at the speed of thought. Yet even as our ability to communicate across companies and time zones grows rapidly, people remain frustrated by downtime and unanticipated delays across the increasingly complex grid of cloud-based infrastructure, data networks, storage systems, and servers that power our work.
Tags : 
     Hewlett Packard Enterprise
By: LogRhythm     Published Date: Feb 07, 2017
In February 2016, the computer network at Hollywood Presbyterian Medical Center (HPMC) was down for more than a week as the Southern California hospital worked to recover from a ransomware attack. Hospital administrators declared an internal emergency as staff struggled to access patient records and computer systems critical for patient care.
Tags : 
     LogRhythm
By: Palo Alto Networks     Published Date: Sep 30, 2016
Virtualization is helping organizations like yours utilize data center hardware infrastructure more effectively, leading to a reduction in costs and improvements in operational efficiencies. In many cases, virtualization initiatives begin internally, with your own hardware and networking infrastructure augmented by tools like VMware® or Linux® KVM and OpenStack® to help manage your virtualized environment. Often referred to as private cloud, these projects are fueling significant expansion into what can be referred to as the public cloud.
Tags : 
     Palo Alto Networks
By: Juniper Networks     Published Date: Aug 03, 2017
Agility creates more opportunities for new business and stronger bottom lines. Research from more than a half-dozen experts supports it all. What makes Uber’s and Airbnb’s network infrastructures unique The top factor shaping network strategies today Research from industry experts including Gartner and McKinsey
Tags : business agility, data usage, network infrastructure, information technology
     Juniper Networks
By: Juniper Networks     Published Date: Feb 05, 2018
At Juniper, we believe in building coherent networks to help simplify both the physical topology as well as the operations of the network itself. Once having done that, we can then secure it. And, by moving to micro parameters, we can do a much better job of protecting the applications. Then finally, automation, particularly as we get into micro parameters, micro segments and the need for agility, is where SDN really pays off.
Tags : network, applications, cloud, enterprises, foundation, principles
     Juniper Networks
By: IBM     Published Date: Apr 20, 2017
The National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) have taken leading roles in exploring requirements for Mobile Device Management (MDM) systems for government agencies. Mobile devices, particularly smartphones, are exceptionally vulnerable to security breaches. They are easily lost, are filled with unknown applications, communicate over untrusted networks, and are often purchased by users without regard to IT standards and security features.
Tags : mobile security, mobile device management, enterprise data, application security, information security, communication interception, business data, app security
     IBM
By: IBM     Published Date: Jun 08, 2017
Digital transformation initiatives and the need for innovation are causing enterprises to rethink their IT landscapes including business-to-business (B2B) integration. Modern B2B integration is critical for enabling enterprises to achieve goals like increasing revenue, speeding up time to market, and improving efficiencies because these outcomes are dependent on having a successful business network. B2B practitioners have two goals — enable critical business initiatives and control costs — and cloud-based B2B services have been successful in helping enterprises achieve both goals. IDC interviewed eight IBM clients to understand how their use of IBM Sterling B2B Integration Services, part of the IBM B2B Cloud Services portfolio, has impacted their operations and businesses. These organizations reported achieving strong value with IBM Sterling B2B Integration Services, and IDC projects that their investment will yield an average three-year return on investment (ROI) of 308%, or more th
Tags : digital transformation, b2b integration, idc, ibm
     IBM
By: Cox Business     Published Date: Dec 19, 2016
Reliable and secure network connectivity is no longer optional. It supports critical priorities for healthcare providers, including enhancing patient care outcomes, improving operational efficiency and boosting financial returns. If a healthcare provider’s network infrastructure is not resilient, reliable and secure, the provider will not be able to reap the benefits of its healthcare IT investments.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and greater convenience through the capabilities of better networking technologies, opportunities have never been greater to use technology to make for a truly seamless hospitality experience. However, growing dependence on your network for everything from booking to entertainment can also mean that hospitality networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
Solutions that make it easy to keep track of security and software updates will give you an edge like no other. In many cases, hackers target specific holes in outdated software. Rather than dealing with the headache of continually updating each computer in your network, use tools that track and perform system updates automatically. You’ll always be ahead of the curve.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
As we continue to move forward into an age of big data, optimization, and shared information through the capabilities of better networking technologies, opportunities have never been greater for using technology to improve the way the government interacts with constituents. However, increasing dependence on web and network services also makes government a tempting target for hackers. Distributed Denial of Service attacks, data breaches, leaks, the risks can be enormous. Recent events have shown us that now more than ever, government servers are getting victimized by well-funded teams of foreign hackers, possibly funded by their government.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to healthcare and other networks, and how to protect against them. As we are expected to host more and more key information on our network, we increase our risk at risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data.
Tags : 
     Cox Business
By: Cox Business     Published Date: Dec 19, 2016
In this white paper, we’ll look at Distributed Denial of Service (DDoS) attacks, why they pose a threat to hospitality networks, and how to protect against them. As we are expected to host more information on our network, we increase our risk for an attack that can shut down vital services or serve to support a malicious actor out to steal private data. Customers expect to be able do everything online, and won’t tolerate any interruption in service. This expectation inhibit a situation where an attacker is holds your web services hostage, and you have to choose between paying them off or apologizing to a lot of angry customers.
Tags : 
     Cox Business
By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : mobile security, mobile risks, device attacks, network attacks, malware attack
     Lookout
By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
     VMware
By: Spectrum Enterprise     Published Date: May 15, 2017
Read this case study to learn how Catskill Hudson Bank can push over 30 time more data over its network than before with better reliability, speed, and security.
Tags : 
     Spectrum Enterprise
By: Spectrum Enterprise     Published Date: May 15, 2017
Read this case study to learn how Catskill Hudson Bank can push over 30 time more data over its network than before with better reliability, speed, and security.
Tags : 
     Spectrum Enterprise
By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
     Spectrum Enterprise
By: Juniper Networks     Published Date: Jun 22, 2017
In today’s technology-driven world, a financial services organization’s ability to evolve the business quickly depends on the network. MetaFabric architecture, which is the foundation of Juniper’s unique end-to-end data center networking solution, helps financial services firms respond confidently to whatever happens in the market. With an open, simple, and smart network in place, organizations can adapt quickly and seamlessly to changing requirements while eliminating the disruptions of forced upgrades and unnecessary purchases that come with vendor lock-in. Most importantly, the MetaFabric architecture helps companies stay at the forefront of innovation, keeping them one step ahead of the competition.
Tags : data management, data system, business development, software integration, resource planning, enterprise management, data collection
     Juniper Networks
By: Juniper Networks     Published Date: Jun 22, 2017
The digital financial services world has created an amplified set of challenges for the data center and network. Its role in enabling the success of the wider institution has become even more critical, but to deliver this it needs to provide a higher level of performance with increased agility, while maintaining high levels of efficiency and security. This is forcing institutions to transform their underlying IT capabilities, with the need to simplify the network, obtain more flexible connectivity, automate IT operations, and enable centralized control and administration being core strategies in this respect. As shown in Figure 8, this is driving a number of requirements for the future network. Key considerations for financial institutions in architecture design and vendor selection should be around moving toward a software-defined, intelligent, cloud-ready, and open network that enables the institution to meet its ICT imperatives and achieve these key ICT strategies.
Tags : account security, data management, network protection, secure systems, application security, network performance, network diagnostics
     Juniper Networks
Start   Previous    50 51 52 53 54 55 56 57 58 59 60 61 62 63 64    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com