packet

Results 51 - 75 of 96Sort Results By: Published Date | Title | Company Name
By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Drive smart grid transformation with Ethernet-based packet-optical networks. Download the white paper to learn how.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
     Ciena
By: Ciena     Published Date: Nov 15, 2016
Discover how a converged network allows government and educational organizations to offer better service with lower taxpayer cost.
Tags : sdh, sonet sdh, sonet/sdh, sdh network, synchronous digital hierarchy, what is sdh, sonet vs sdh, define sdh, sonet, sonet definition, what is sonet, sonet ring, sonnet def, sonet network, synchronous optical network, define sonet, g.707, sonet frame structure, sonet technology, sts 12
     Ciena
By: Blue Coat     Published Date: Nov 23, 2015
It’s time for Proactive Incident Response: *Full logs in the SIEM, plus complete collection of packet data *Packet data indexed, easily searchable and correlated with threat intelligence and other data. Working with multiple sources of security data, threats are detected early.
Tags : 
     Blue Coat
By: Juniper Networks     Published Date: Oct 20, 2015
How did firewalls develop to provide the strong, deep security and sophisticated capabilities that they offer us today? It’s a long story that took place over a relatively short period of time, and most likely you were part of it.
Tags : juniper, firewall, packet, filter, security, networking
     Juniper Networks
By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : juniper, firewall, threat, security, policy, configuration, packet, networking, data management
     Juniper Networks
By: ArborNetworks     Published Date: Sep 16, 2015
As the world becomes more connected, it is no longer enough for enterprises to react once an alert indicates an attacker is inside the network. Instead, with continuous packet capture and threat feeds followed by analysis, it is now possible to hunt the attackers and locate them versus waiting for an alert.
Tags : security, it management, data management
     ArborNetworks
By: XO Communications     Published Date: Apr 13, 2015
Explore the optimization tools that give you the ability to see and control the performance and security of your WAN traffic, a vital component to your cloud success. Among other things, these tools help you counteract the effects of latency introduced by geographical WAN distances and allow you to alleviate network congestion that might results from sending a lot large files and retransmitting dropped packets.
Tags : 
     XO Communications
By: IBM     Published Date: Apr 09, 2015
Optimize the process of investigating and gathering evidence on attacks and data breaches with Network Forensics software. Learn how using full network packet capture data can deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : ibm, optimization, security, cyber crime, network security, it security
     IBM
By: VSS Monitoring     Published Date: Apr 01, 2015
In May 2014 VSS Monitoring announced a significant expansion of its solution portfolio for providing packet visibility into high-speed 40G and 100G enterprise and service provider networks. With the release of the vBroker 6000 and vBroker 520, the company took aggressive and definitive steps to deliver high-performing solutions for high-density carrier and cloud infrastructure deployments and 100G transitions, allowing IT organizations to maintain operations monitoring and security integrity throughout upgrades to and new deployments of extreme high-speed networks.
Tags : ema, vss, 100g, visibility solutions, nvc, npb, it management
     VSS Monitoring
By: Noction     Published Date: Feb 17, 2015
In this white paper you will learn how BGP performance automation ca help you boost network availability, minimize latency and packet loss as well as reduce operational costs by intelligently rerouting traffic across the Internet.
Tags : network performance, congestion, outages, downtime, hosting, bgp, router, ip network, network latency, network congestion, network downtime, ip performance, networking
     Noction
By: IBM     Published Date: Feb 11, 2015
IBM Security QRadar Incident Forensics optimizes the process of investigating and gathering evidence on attacks and data breaches, using full network packet capture data to deliver insight and analysis that cannot be achieved using only log source events and network flow details.
Tags : ibm, data breaches, it attacks, cyber-crime, forensics solution, security, it management
     IBM
By: McAfee     Published Date: Jan 20, 2015
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, networking
     McAfee
By: Intel Security     Published Date: Jan 20, 2015
This book provides an overview of network security in general, and explains how cybercriminals can use hidden or currently undetectable methods to penetrate protected network systems. Advanced evasion techniques (AETs) bypass current common network security solutions. They can transport any attack or exploit through network security devices and firewalls, next generation firewalls, intrusion detection and prevention systems, and even routers doing deep packet inspection. In this book you’ll find out all about AETs, and get useful pointers and advice to help you secure your organization. If you’re working in government, the military, banking, industry, e-commerce or with other critical infrastructures, read this book to find out what you’re up against and how to better protect against advanced evasions.
Tags : next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, security
     Intel Security
By: Intel Security     Published Date: Jan 20, 2015
Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations. Most network security devices are not capable of detecting them. While many pass industry tests with high ratings, those ratings are based on protection against a limited number of threats. The exact number of AETs is unknown, but it is close to hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking, security
     Intel Security
By: cPacket Networks     Published Date: Oct 02, 2014
The modern applications delivery environment is distributed and dependent on data centers and network connectivity. Therefore, users are increasingly dependent on consistent network performance for day-to-day activities. Learn what pitfalls a business should avoid when implementing a network monitoring solution.
Tags : cpacket, cpacket networks, data center, network intelligence, network performance, application delivery, cloud computing, cloud network
     cPacket Networks
By: Riverbed     Published Date: Sep 05, 2014
If you work on a network operations team, you know how increasingly hard it is to understand and ensure application performance for your end users. You need visibility into areas where issues may occur – end-user devices, network and infrastructure – in order to identify and diagnose problems quickly and minimize downtime. But it hasn’t been easy to gain this level of visibility across the WAN or hybrid network without deploying additional probes, packet capture devices or remote site technicians. Blind spots are everywhere making it difficult to focus on managing and monitoring the applications that matter the most to your business. And when nearly 50% of a network’s traffic is web-based and it all looks the same to the network, identifying your important applications and staying ahead of their performance problem is more difficult than ever. That could mean inefficient troubleshooting, longer time to resolution, and an overall lack of application intelligence. Who wants that?
Tags : application, network, performance, nirvana, visibility, infrastructure, enterprise applications
     Riverbed
By: Riverbed     Published Date: Aug 22, 2014
The performance of RecoverPoint continuous remote replication can be impacted by characteristics common to wide-area networks, including packet loss, latency and limited bandwidth. SteelHead WAN optimization appliances can be leveraged to overcome the negative effects of these impairments, delivering LAN-like performance for RecoverPoint and all other business applications traversing the WAN. In this paper you will learn about performance benefits of the combined EMC RecoverPoint and Riverbed SteelHead solution, as measured through collaborative testing from EMC and Riverbed.
Tags : performance, benefits, best-practices, networks, emc recoverpoint, collaborative testing
     Riverbed
By: McAfee     Published Date: Aug 14, 2014
The exact number of AETs is unknown, but there may be hundreds of millions. To defend against AETs, your network security should incorporate seven critical features into your next gen firewall. Get this free report today.
Tags : advanced evasion techniques, aets, next gen firewall, ngfw, data normalization, deep packet inspection, full stack inspection, apt, malware, network firewall, ips, hacking
     McAfee
By: VSS Monitoring     Published Date: Jul 09, 2014
Learn how to optimize network monitoring in high-frequency trading (HFT) When a millisecond can cost a $1 million-plus, there's no tolerance for packet loss or latency. Download this white paper to learn how: The bursty data traffic of HFT can overwhelm networks & their legacy monitoring systems.
Tags : vss monitoring, network monitoring, security, threats, cyber terrorists, security protocols, high frequency trading, it management
     VSS Monitoring
By: Riverbed     Published Date: Jan 28, 2014
The purpose of this book is to introduce you to common network performance management (NPM) issues and give you a new way of looking at solving them. This perspective allows you to see your network from your users’ point of view, namely, the services and applications they use and their experience with them. Of course, you can still get down to the other flow and packet levels, but macro-level visibility is a key differentiator in your ability to monitor and troubleshoot network performance efficiently.
Tags : application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting, networking, it management, enterprise applications
     Riverbed
By: IBM     Published Date: Jan 02, 2014
In this white paper we will explore the leasing option for technology asset acquisitions and IBM’s particular suitability to this market. We will also use several case studies to provide examples of how this works including the toy company LEGO and the telecommunications services provider, Packet One. By the end of the paper you will be able to see the leasing proposition clearly and understand the advantage of doing business with IBM.
Tags : ibm, lease versus purchase, technology purchases, it life cycles, lease choice, decrease risk, disposal process, global financing, attractive price, refurbishing and reselling, diverse assortment, life planning, lego, lease master agreement
     IBM
Start   Previous    1 2 3 4    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com