network ha

Results 201 - 225 of 1599Sort Results By: Published Date | Title | Company Name
By: Avaya     Published Date: Jan 28, 2015
Midmarket Collaboration For Dummies, Avaya Custom Edition, explores the midmarket business trends in collaboration, how collaboration can drive productivity and strategic advantage, the networking and security challenges for midmarket businesses, and much more!
Tags : midmarket collaboration, a guide to midmarket collaboration, collaboration solutions, avaya
     Avaya
By: SolidFire_NetApp     Published Date: May 10, 2016
Founded in 1992 as a provider of integrated network, voice and data centre solutions, Colt’s business today has grown to encompass a wide range of IT services, spanning enterprise application hosting, business critical cloud and end-user computing solutions. Colt has 29 data centre locations supporting thousands of customers across 28 countries in Europe and Asia, including Swiss International Airlines, Shurgard, Berenberg, and Jaguar Land Rover. Colt’s award-winning solution portfolio is based on end-to-end data centre, network and IT services capabilities; its aim is to help its customers compete and win in their markets without being held back by hardware, licensing and resource limitations.
Tags : network management, best practices, network optimization, network applications, application management, technology, telecommunications
     SolidFire_NetApp
By: Workday     Published Date: Oct 13, 2017
Netflix is the world’s leading Internet television network with over 81 million members in over 190 countries enjoying more than 125 million hours of TV shows and movies per day, including original series, documentaries, and feature films. Members can watch as much as they want, anytime, anywhere, on nearly any Internet-connected screen. Members can play, pause, and resume watching, all without commercials or commitments.
Tags : 
     Workday
By: CA Technologies     Published Date: Sep 25, 2017
Reports of cyberattacks now dominate the headlines. And while most high-profile attacks—including the major breaches at JP Morgan, Anthem and Slack—originated outside of the victimized organizations, theft and misuse of data by privileged users is on the rise. In fact, 69% of enterprise security professionals said they have experienced the theft or corruption of company information at the hands of trusted insiders. There are also cases where a company’s third-party contractors, vendors or partners have been responsible for network breaches, either through malicious or inadvertent behavior.
Tags : threat analytic systems, siems, firewalls, entity optimization, fraud prevention, ca technologies
     CA Technologies
By: CA Technologies     Published Date: Sep 25, 2017
Enterprise security traditionally relied on a fortress strategy tha locked down user endpoints and created walls around the network. Today, this strategy cannot support or secure the use of mobile devices and SaaS capabilities, which exist outside the fortress. As a result, Chief Information Security Officers (CISOs) have been looking for new solutions that can secure these technologies today, and adapt as threats and business needs change. The credit card industry’s security model is one example that provides a new way to think about risk and contain it—that is, if you can see past the occasional bad rap it’s gotten from attacks and breaches.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     CA Technologies
By: Tenable     Published Date: Aug 07, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security, container security, mobile security, was, iot, ot security
     Tenable
By: Juniper Networks     Published Date: Oct 19, 2015
Over the years and across industries, it has been proven that increased automation leads to greater efficiency, enhanced productivity and a more agile way of doing business. The same is true for IT: as budgets dwindle, or become stretched to cover a greater range of responsibilities, the need for automation becomes more pronounced.
Tags : juniper, network, automation, efficiency, productivity, information technology, networking, data management, data center
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
In both legacy IT data centers and emerging private and public clouds, virtualization is becoming the norm. Through virtualization, organizations are realizing the benefits of scalability, agility and efficiency.
Tags : juniper, network, scalability, information technology, private cloud, public cloud, virtualization, networking, it management, data management, data center
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : juniper, network, cloud, datacenter, virtualization, data, traffic, analytics, networking, security, it management
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
In today’s rapidly evolving world, the modern enterprise has the benefit of many technologies that were unheard of just 10 years ago – the cloud, for instance. However, with every new technology – cloud included – there are new security challenges. With huge numbers of users, devices and data deployed to take advantage of the latest technologies, the enterprise is becoming increasingly vulnerable to data loss, malicious attacks and network instability.
Tags : juniper, security, network, enterprise, cloud, device, networking
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
New Juniper Networks-sponsored research, by the RAND Corporation, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity,” introduces a first-of-its-kind heuristic model that helps companies map the economic drivers and challenges of defense.
Tags : juniper, rand, cybercrime, cybersecurity, threat, malware, security
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
The exponential growth of cloud continues, from the adoption of public and private cloud to the mass consumerization of IT and the emergence of the Internet of Things (IoT). The rapid pace of this change is posing a challenge for your business, as increasing volumes of traffic place greater demands on network infrastructure.
Tags : network, data center, performance, iot, network infrastructure, cloud
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
Many organizations that have realized the benefits of server virtualization are ready to move to network virtualization. By combining hardware and software resources and functionality into a single, software-based administrative entity, these organizations can reap the benefits of greater data center agility
Tags : best practices, network, virtualization, data center, software
     Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
In the wake of billion-dollar acquisitions, some industry watchers believe SDN is poised to revolutionize traditional networking, while others claim that it is significantly over-hyped.
Tags : juniper, sdn, networking, software, software development, it management
     Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
To meet the growing need for agility and flexibility, the data center components (compute, network and storage) also need to evolve and provide a level of automation and orchestration that can meet present and future demands.
Tags : juniper, network, automation, orchestration, data center, networking, it management, enterprise applications, platforms
     Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
Design a flexible and agile campus and data center network that will scale with a fast growing business.
Tags : juniper, cloud, data center, zulily, network, networking, security, storage, data management
     Juniper Networks
By: Juniper Networks     Published Date: Oct 20, 2015
A Fast, Flat Network for Medium-Sized and Large Data Centers
Tags : network, virtual, data center, applications
     Juniper Networks
By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
     Butler Technologies
By: Butler Technologies     Published Date: Jul 02, 2018
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network.
Tags : 
     Butler Technologies
By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
     Butler Technologies
By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
     Butler Technologies
By: Butler Technologies     Published Date: Jul 03, 2018
MPO connectors increase your data capacity with a highly efficient use of space. But users have faced challenges such as extra complexities and time required for testing and troubleshooting multi-fiber networks. VIAVI helps overcome these challenges with the industry's most complete portfolio of test solutions for MPO connectivity.
Tags : 
     Butler Technologies
By: IBM APAC     Published Date: Aug 22, 2017
For any sized organization, securing data and networks today is a daunting task. New vulnerabilities are discovered almost daily; new malware strains are developed as soon as a detection script is written for the old ones; and cybercriminals can buy prepackaged exploit kits on the Darknet backed by professional support teams. As a security analyst, you need more than a few point solutions designed to defend the network’s edge. You need visibility, perspective and an innate sense of when things just don’t seem right.
Tags : ibm, qradar, cloud, analytics, flexibility, scalability, organization
     IBM APAC
By: IBM APAC     Published Date: Aug 22, 2017
For many organizations, managing network vulnerabilities and risks is a lesson in frustration. Vulnerability scans are typically conducted in response to compliance mandates, and they can reveal up to tens of thousands of exposures—depending upon network size. Scan results are often a complex puzzle of misconfigured devices, unpatched software, and outdated or obsolete systems. And security administrators must struggle to quickly identify and remediate or mitigate the exposures that pose the greatest risk.
Tags : network security, account security, data management, network security, secure systems, application security, network performance, network diagnostics
     IBM APAC
By: IBM APAC     Published Date: Aug 22, 2017
Sometimes the best clues to a security breach aren’t found in the contents of the files that are traversing your network. Instead, they’re found in the details of the network metadata. An unusually large data transfer associated with simple web-browsing traffic can indicate the injection of malware. Also, an examination of any changes in an attached file’s entropy can reveal encryption or compression activities that can indicate the addition of embedded malware.
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM APAC
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com