network ha

Results 1 - 25 of 1744Sort Results By: Published Date | Title | Company Name
By: Gigaom     Published Date: Oct 22, 2019
Nearly all cyberattacks must cross the network, but security analysts often struggle to make quick sense of traffic at scale for hunting and incident response, trapped between data-starved logs (e.g. Netflow) and too much data (full packets) to analyze in time. What if instead there was a “Goldilocks’ for network data? This free 1-hour webinar from GigaOm Research brings together experts in network traffic analysis, featuring GigaOm analyst Simon Gibson and a special guest from Corelight, Steve Smoot. They’ll discuss the evolution of network analysis and explain how open-source Zeek (formerly Bro) came to be the network traffic analysis tool of choice for security analysts to make fast sense of their traffic. We’ll dive into Zeek’s creation at Livermore Labs and discusses some of the challenges that come with using it in large, fast network environments and explain how Corelight enables organizations to quickly take advantage of the power of Zeek at scale. In this 1-hour webinar, you
Tags : 
     Gigaom
By: Barracuda     Published Date: Oct 14, 2019
Traditional email-security defenses aren’t enough anymore. In today’s rapidly evolving threat environment, to stop email-borne threats, you must effectively defend against phishing and other potentially-devastating social-engineering attacks. These sophisticated threats are often able to bypass defenses using back-door techniques, including email spoofing, spear phishing and personal email fraud to penetrate network defenses and wreak havoc. Here’s a total email-protection strategy that can help radically reduce an organization’s susceptibility to attacks.
Tags : 
     Barracuda
By: Dell EMEA     Published Date: Oct 10, 2019
Eliminate complexity and siloed IT for SAP landscapes. Industry - leading Intel based SAP HANAready compute, storage, CI/HCI, networking and data protection solutions from Dell EMC span from edge to core to cloud. Make SAP available anytime, anywhere—providing coverage for the entire business with solutions that aren’t confined to a single location. Support all your SAP workloads and enjoy world-record SAP application performance. The Dell EMC PowerEdge and broader portfolio of solutions for SAP modernizes your IT, reduces risk and simplifies IT management. Dell EMC infrastructure powered by Intel®
Tags : 
     Dell EMEA
By: AWS     Published Date: Oct 07, 2019
Imperva, an APN Security Competency Partner, can help protect your application workloads on AWS with the Imperva SaaS Web Application Security platform. The Imperva high-capacity network of globally distributed security services protects websites against all types of DDoS threats, including networklevel Layer 3 and Layer 4 volumetric attacks—such as synchronized (SYN) floods and User Datagram Protocol (UDP) floods—and Layer 7 application-level attacks (including the OWASP Top 10 threats) that attempt to compromise application resources. Harnessing real data about current threats from a global customer base, both the Web Application Firewall (WAF) and DDoS protection, incorporate an advanced client classification system that blocks malicious traffic without interfering with legitimate users. Enterprises can easily create custom security rules in the GUI to enforce their specific security policy. In addition, this versatile solution supports hybrid environments, allowing you to manage th
Tags : 
     AWS
By: AWS     Published Date: Oct 01, 2019
Trying to keep up with the growing number of instances and containers, Informatica would spin up new security policies with shared key access. This led to a sprawling, complex network of multiple security interfaces that were difficult to manage. Informatica began working with Aporeto to track, block, and audit users through their environment, and eventually implemented keyless SSH access to their Amazon Elastic Compute Cloud (Amazon EC2) instances. Read our case study to learn how Aporeto saved Informatica hundreds of development hours with automated authentication and authorization policies across their environment.
Tags : 
     AWS
By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
     Juniper Networks
By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
     Intel
By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
     Intel
By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
     Intel
By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
     Intel
By: Outreach.io     Published Date: Sep 17, 2019
LinkedIn is the largest social networking platform for business professionals, but utilizing it effectively to build your brand and move the needle for you business is a delicate balance. Many leaders struggle with finding the right balance of building an authentic brand. To help you begin building your brand, establish your voice, and drive business and opportunity for yourself and your team, this guide will answer the following questions about effectively using LinkedIn: Does building my brand help me close deals? How can the platform move the needle for my pipeline? What is proper etiquette when communicating with peers? How do I enable my sales team to incorporate LinkedIn into the outbound efforts? Download today to establish your presence on LinkedIn!
Tags : 
     Outreach.io
By: Larsen & Toubro Infotech(LTI)     Published Date: Sep 17, 2019
Nordics based financial company had challenges in migrating the old legacy network design to Cisco ACI for a new Datacentre. Also it did not had service overview and CMDB to support 150 business services transition. LTI leveraged and implemented several ServiceNow modules, customised 100 odd patterns for 150 business services and executed extensive integration of 25 legacy systems. These transactions and implementation helped in easy cost computation for new business expansions ii. Benefits 1. 25% reduction in DC migration time by creating business service oriented move groups 2. Accurate costing of each business service for replication in new regions/geographies
Tags : application management, artificial intelligence, b2b technology, cloud applications, cloud architect
     Larsen & Toubro Infotech(LTI)
By: MuleSoft     Published Date: Sep 09, 2019
More and more financial institutions are partnering with fintechs and leveraging Application Program Interfaces (APIs) to attract new prospects and to delight current consumers through unprecedented Customer Experience (CX). APIs offer a bridge between systems while paving a digital path to a connected financial ecosystem. The institutions that are able to drive this digital transformation successfully, do not think of these capabilities as additional channels and services. Rather, these institutions understand that they must move from a vision of banking as a physical network of branches and ATMs, to a digital platform, comprising core capabilities such as account servicing and the provision of financial products that can be accessed wherever, and whenever, customers wish. Join this webinar and learn how these institutions are building a digital banking platform with APIs. Presented by: Angie Campos, Industry Marketing for FS&I, MuleSoft Michel Vaja, Head of UK Payments Practice, C
Tags : 
     MuleSoft
By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The combination of Citrix Networking and Google Cloud helps IT overcome several challenges for application delivery and management.
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
Application performance and delivery have changed. Should your network change too? Cloud is changing the fundamentals of how IT teams deliver applications and manage their performance. Applications are increasingly deployed farther from users, crossing networks outside of IT’s direct control. Instead of enterprise data centers, many apps now reside in public and hybrid cloud environments. There are even new breeds of applications, built upon microservices and containers. Today, IT needs modern solutions that: ? Extend on-premises networks, apps, and infrastructure resources to the cloud. ? Maintain high levels of performance, user experience, and security across all applications, including microservices based apps. ? Sustain operational consistency across on-premises and cloud environments. ? Move away from the expense, complexity, and poor performance of traditional networking methods. These solutions are available for apps running on Google Cloud Platform (GCP) through the allia
Tags : 
     Cisco and NVIDIA Corporation
By: TIBCO Software     Published Date: Sep 03, 2019
For years, manufacturers have been trying to streamline processes and associated supply chains by building marketplaces, standardized exchanges, and monolithic systems. In many cases, these solutions missed the mark, resulting in fragmented and brittle processes without easy data sharing. Blockchain, the underlying technology behind Bitcoin and other cryptocurrencies, can potentially solve these problems. Sharing information via a trusted distributed network with embedded business logic offers many benefits for manufacturing, especially when combined with the IoT and AI communities. Watch this webinar: Blockchain & Manufacturing: A Smarter Way to Drive Efficiency in the Semiconductor and Electronics Supply Chains, with speaker Nelson Petracek, chief technology officer, TIBCO Software.
Tags : 
     TIBCO Software
By: Gigamon     Published Date: Sep 03, 2019
This white paper will examine the security issues introduced by more data over faster networks, how an architectural approach can solve those challenges and introduces the GigaSECURE® Security Delivery Platform, the leading next-generation network packet broker purpose-built for security tools to work more efficiently across physical, virtual and cloud environments. In fact, IHS Markit1 has named Gigamon the market leader and the best-known vendor in the space with #1 market share in multiple industries – 36% overall and 59% in the government sector.
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
We’ve arrived at the second anniversary of the Equifax breach and we now know much more about what happened due to the August 2018 release of the GAO Report. New information came out of that report that was not well-understood at the time of the breach. For example, did you know that while Equifax used a tool for network layer decryption, they had certificates nine months out of date? This lapse gave the threat actors all the time they needed to break in and exfiltrate reams of personal data. As soon as Equifax updated the certs on their decryption tools, they began to realize what happened. On the heels of the Equifax breach, we are reminded of the importance of efficient decryption for effective threat detection. That’s more important than ever today; Ponemon Institute reports that 50% of all malware attacks utilize encryption. During this webinar, we’ll talk about: -How TLS/SSL encryption has become a threat vector -Why decryption is essential to security and how to effectively pe
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Dataflow is increasing at a rate unseen in history. Network managers are tasked with enabling massive quantities of new data in a secure and highly available fashion, all while facilitating access to new types of form factors and data stores. This challenge is often met with layers of networking hardware and tools resulting in a complex mess, or even worse, a culture of network protectionism that inhibits business innovation.
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
The IT pendulum is swinging to distributed computing environments, network perimeters are dissolving, and compute is being distributed across various parts of organizations’ infrastructure—including, at times, their extended ecosystem. As a result, organizations need to ensure the appropriate levels of visibility and security at these remote locations, without dramatically increasing staff or tools. They need to invest in solutions that can scale to provide increased coverage and visibility, but that also ensure efficient use of resources. By implementing a common distributed data services layer as part of a comprehensive security operations and analytics platform architecture (SOAPA) and network operations architecture, organizations can reduce costs, mitigate risks, and improve operational efficiency.
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Your organization depends on all kinds of inline tools to keep your network up and running, but those same tools can fail, leaving you vulnerable. Moreover, as network speeds increase, slower tools can bottleneck network traffic, making organizations purchase more and more tools, which then introduce complexity and cost. There is a better way to increase network resiliency while reducing security issues, and that’s inline bypass.
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Network operations teams can no longer ignore the application layer. Application experience can make or break a digital enterprise, and today most enterprises are digital. To deliver optimal performance, network operations tools must be application-aware. However, application-awareness in the network and security tool layer is expensive and difficult to scale. Enterprises can mitigate these challenges with a network visibility architecture that includes application-aware network packet brokers (NPBs). EMA recommends that today’s network operations teams modernize their approach with full application visibility. EMA research has found that network teams are increasingly focused on directly addressing security risk reduction, service quality, end-user experience, and application performance. All of these new network operations benchmarks will require deeper application-level visibility. For instance, a network team focused on service quality will want to take a top-down approach to perfo
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Network performance and security are vital elements of any business. Organisations are increasingly adopting virtualisation and cloud technologies to boost productivity, cost savings and market reach. With the added complexity of distributed network architectures, full visibility is necessary to ensure continued high performance and security. Greater volumes of data, rapidlyevolving threats and stricter regulations have forced organisations to deploy new categories of security tools, e.g. Web Access Firewalls (WAFs) or Intrusion Prevention Systems (IPS). Yet, simply adding more security tools may not always be the most efficient solution.
Tags : 
     Gigamon
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
     Cisco Umbrella EMEA
By: Spectrum Enterprise     Published Date: Aug 29, 2019
Many businesses attempting to implement digital strategies are held back by subpar Internet connectivity. Networks with insufficient bandwidth and inconsistent performance cause a wide range of problems that prevent businesses from competing effectively. Such issues can range from unsatisfying online experiences for customers to unreliable connectivity for employees to the inability to run latency-sensitive applications and share large files. In short, their networks are delivering poor value that affects nearly all areas of their businesses.
Tags : 
     Spectrum Enterprise
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com