net

Results 451 - 475 of 7724Sort Results By: Published Date | Title | Company Name

A New Paradigm for Cloud: Architecting Control & Resilience at Scale with Fugue

Published By: Fugue     Published Date: Mar 27, 2017
Directed at cloud architecting concerns, this paper covers streamlining complexity at scale, knowing infrastructure state, and using easily repeatable patterns that bolster security, compliance, and disaster recovery. Get this white paper now.
Tags : 
cloud management, cloud infrastructure management, cloud operating systems, cloud, cloud infrastructure, cloud computing, cloud adoption, cloud migration, devops, aws, amazon web services, cloud operations, cloud ops, continuous delivery, continuous integration, ci/cd, cicd, cloud automation, serverless, lambda
    
Fugue

A New Security Reality: The Secure Breach

Published By: SafeNet     Published Date: Jun 03, 2013
To learn more about the current state of the data braech epidemic and how to implement a strategy to prevent it, read SafeNet's Secure Breach Manifesto.
Tags : 
data breach, it security, data security, data protection
    
SafeNet

A New Strain of Malware Infecting Healthcare Networks

Published By: Cox Business     Published Date: Apr 27, 2017
ealthcare workers understand the complexity of fighting infections better than most. As medications are developed, germs evolve and become resistant to those medications. Over time, germs become incredibly complex and difficult to treat as they continue to evolve and adapt. Unfortunately, computer viruses seem to be following a similar pattern—and the healthcare industry is struggling to catch up.
Tags : 
    
Cox Business

A new visibility architecture for high-speed networks

Published By: Endace     Published Date: Apr 12, 2012
In this whitepaper learn how a 100% accurate network monitoring and recording fabric can give you the application-level visibility you need to reduce MTTR and improve network uptime.
Tags : 
endace, architecture, high-speed, networks, high-speed networks
    
Endace

A New Way to Bend the Cost Curve

Published By: Grand Rounds     Published Date: Dec 16, 2015
In this white paper you'll learn how to: • Use data to improve care and reduce costs • Create an outcomes-focused program • Make your employees more informed healthcare consumers • Unlock the ROI potential within your existing provider network
Tags : 
roi, employer-funded healthcare, quality of care, cost reduction, provider network
    
Grand Rounds

A New World Order for IT

Published By: Okta     Published Date: May 09, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
    
Okta

A New World Order for IT

Published By: Okta     Published Date: Jul 19, 2016
With a secure foundation in place to manage internal IT, many IT leaders are thinking about a foundation for the entire business. In the new world of mobile apps, cloud services, and the Internet of Everything, people, processes, data, and devices are all converging to reshape how day-to-day business is done. Companies are reaching out to customers and partners—and even intelligent objects like connected cars and monitoring systems—and modifying the products and services they bring to market as a result. To an unprecedented degree, the future of an enterprise lies in the hands of the CIO and her IT staff who orchestrate these connections and act on the benefits they bring. IT leaders are finding new opportunities in an era of digital disruption. This executive brief provides a quick overview of how they are driving growth and increasing efficiency by securely connecting the digital enterprise with customers, partners, suppliers and distributors.
Tags : 
identity, idaas, iam, identity lifecycle management, mobile, provisioning, active directory, security, cloud applications, best practices, business intelligence, business management, business technology, cloud computing
    
Okta

A Non-Geek's Guide to the Internet of Things 

Published By: SAS     Published Date: Jun 06, 2018
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
    
SAS

A Non-Geeks A-to-Z Guide to the Internet of Things

Published By: SAS     Published Date: Oct 18, 2017
This A-to-Z guide includes 101 common terms related to the Internet of Things. It’s not an exhaustive list, given that the IoT and big data are evolving so quickly, but rather a quick go-to resource for the technically savvy data professional who wants to get a handle on this vast IoT and big data ecosystem. This guide for the “non-geek” does include some technical terms, but they are explained sans technical “geek speak.” We also provide context to how a term may be connected to a larger discussion by grouping terms by category.
Tags : 
    
SAS

A Powerful Defense Against Denial of Service Attacks

Published By: Citrix     Published Date: May 08, 2014
A report into the marked insurgence of denial of service (DoS) attacks and the benefits of Citrix NetScaler in the defense of these attacks.
Tags : 
denial of service, dos, adc, defence, security, citrix, netscaler, access control, ddos, intrusion prevention, application integration, application performance management, mobile device management
    
Citrix

A Practical Guide for Beginning the Migration to IPv6

Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : 
fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management, network performance, network performance management, network security appliance, security management
    
Fortinet, Inc.

A Practical Guide To Data Center Planning And Design

Published By: Schneider Electric     Published Date: Aug 15, 2017
In today’s world of being “on” 24/7, data centers are at the core of business and viewed as the way to create competitive differentiation. Speed, efficiency, flexibility, and scale are now critical for winning the race to meet new connectivity and processing demands caused by the Internet of Things (IoT) and Big Data.
Tags : 
planning process, reference designs, cost analysis, design, site selection, schneider, electric
    
Schneider Electric

A Practical Guide to Database Security

Published By: McAfee     Published Date: Nov 14, 2012
Why is database security so important? For a company that has suffered a serious data breach, it boils down to monetary damage in its many forms: business disruption, bad publicity, stiff fines for noncompliance, and undermined customer confidence.
Tags : 
database, security, mcafee, data breach, compliance, ipsec, password management, database security, pci compliance
    
McAfee

A practical guide to optimizing the care pathway for hospitals

Published By: ALE     Published Date: Dec 05, 2018
A hospital’s network is the foundation for the critical applications that run on it, where most of those applications are related to the hospitals core businesses. The return on the investments made in EMR (electronic medical records), PACS (picture archiving and communication system), clinical imaging systems and workstations on wheels, can only be truly realized if those assets are always available to the people in need in a reliable, secure and highly optimized way, at a fixed location, or while mobile. Find out how to simplify network management and enhance application and service visibility with Smart Analytics and PALM by downloading this whitepaper today.
Tags : 
    
ALE

A Practical Guide to SOA for IT Architects

Published By: Systinet     Published Date: Aug 21, 2009
As a strategy for creating a flexible and agile IT, service-oriented architecture (SOA) has gained considerable momentum in recent years, largely due to the advent of standards-based Web services.
Tags : 
web services security, web services, web service security, information management, business analytics, business metrics, system management software, programming application, service oriented architecture, service-oriented architecture, systinet, it management, platforms, web service management
    
Systinet

A Primer on Cloud-Native App Development

Published By: Rackspace     Published Date: Jan 19, 2016
In recent years, the term “cloud” has appeared seemingly everywhere. But it’s become difficult to understand what precisely someone means when they say “cloud.” The National Institute of Standards and Technology defines cloud computing as a “model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g. networks, servers, storage, applications and services) that can be rapidly provisioned and released with minimal management effort or service provider interaction.”
Tags : 
rackspace, cloud, application, software development, security
    
Rackspace

A Primer: Oracle Intelligent Bots - Powered by Artificial Intelligence

Published By: Oracle     Published Date: Feb 21, 2018
Over the last decade we have seen the dramatic increase in adoption of Mobile as an engagement channel for consumers and employees within the enterprise. What we are seeing now is the emergence of messaging through channels like FB Messenger, WhatsApp, WeChat, Slack, SMS, as a dominant engagement channel. Over 4.1 Billion users around the world are on instant messaging apps, adopted a rate that was much faster than on social networks. What makes these channels the default choice is the expected instant response if the other person is on or the push notification that triggers the person on the other side to respond immediately. These users that use instant messaging channels to converse with their friends and family want to use the same familiar user experience and channel to instantly communicate with the enterprise. These channels are doing to apps what browsers did to client server apps i.e. these channels are rapidly becoming the next browser. This is leading to the innovations in c
Tags : 
    
Oracle

A Proper Foundation: Extended Validation SSL

Published By: Entrust Datacard     Published Date: May 15, 2014
To bolster consumer trust in the foundation of ecommerce before it was irreparably damaged, several CAs and browser vendors came together to establish a higher security approach based on common standards: Extended Validation SSL certificates. EV SSL is universally supported by all desktop browsers and provides an EV trust indication. All mobile browsers support EV SSL and some provide an EV indication. Extended Validation SSL certificates have the highest impact on consumers, reassuring them that the site they are visiting is legitimate through visual cues in un-modifiable parts of the browser interface “chrome.” For example, the latest versions of Microsoft Internet Explorer, Google Chrome, Mozilla Firefox, Opera and Apple Safari display the corporate name with a green background for sites protected by an Extended Validation SSL certificate.
Tags : 
entrust, ssl, ecommerce, extended validation, chrome, mobile browsers, networking, it management
    
Entrust Datacard

A Proven Security Intelligence Model for Combating Cyber Threats: A Reference Model for IT Security

Published By: LogRhythm     Published Date: Aug 08, 2016
IT environments have become much more vulnerable as enterprise mobility, cloud services and “bring-your-own-everything” have broken down the defensible perimeter and added layers of complexity to securing the enterprise. At the same time, the nature of cyber threats has changed dramatically. Threat actors are well organized and well funded, and many of them are known to be supported by nation states. They have sophisticated technical skills which allow these actors to create custom malware for very specific targets, and they are relentless in pursuit of their objectives. Moreover, almost anyone with a malicious intent can purchase malware and rent botnets on the Dark Web, lowering the bar for criminal entities, nation states, and terrorists to use cyber as a weapon of choice towards their intended purpose.
Tags : 
security, technology, best practices, information technology, cyber threats, mobility, business analytics, business management, business technology
    
LogRhythm

A Recruiters Social Recruiting Survival Guide

Published By: iCims     Published Date: Jan 24, 2017
here are many benefits to social recruiting. To start, social recruiting enables organizations to hire the best talent. This can be done by connecting, educating, and inspiring people through social networks. While some businesses have dabbled in the social arena, the majority are hesitant to fully pursue social recruiting.
Tags : 
    
iCims

A revolution in cloud networking: Citrix TriScale Technology

Published By: Citrix Systems     Published Date: Feb 10, 2016
With its new TriScale Technology, Citrix is enabling a genuine revolution for enterprise cloud networks by providing an unrivaled set of capabilities that smartly scale application and service delivery infrastructures, affordably and with no additional complexity.
Tags : 
    
Citrix Systems

A Revolution in Cloud Networking: Citrix TriScale Technology

Published By: Citrix     Published Date: Feb 22, 2013
An enterprise cloud network is one that embodies the characteristics and capabilities that define public cloud services. These include being 'elastic' so that performance can be scaled and etc. Read on to learn more about Citrix Triscale Technology.
Tags : 
revolution in cloud networking, triscale technology, triscale technology, application management, capability management, network performance, cloud computing, business technology, data center
    
Citrix

A revolution in cloud networking: Citrix TriScale Technology

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
With its new TriScale Technology, Citrix is enabling a genuine revolution for enterprise cloud networks by providing an unrivaled set of capabilities that smartly scale application and service delivery infrastructures, affordably and with no additional complexity.
Tags : 
citrix, cloud, triscale, network, application performance management, server virtualization, cloud computing
    
Citrix Systems, Inc.

A Revolution in cloud networking: Citrix TriScale Technology for NetScaler

Published By: Citrix Systems     Published Date: Nov 23, 2015
A market leader, Citrix NetScaler is an all-in-one web ADC that makes applications run five times faster, reduces web app ownership costs and ensures that apps are always available.
Tags : 
citrix, triscale technology, netscaler, cloud, networks, networking, enterprise applications, storage, data management, business technology, data center
    
Citrix Systems

A SANS White Paper: SIEM Integration with Endpoint Data for Accuracy and Speed

Published By: McAfee     Published Date: Jan 28, 2014
SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.
Tags : 
siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus, application security, disaster recovery, hacker detection, internet security, intrusion detection, intrusion prevention, security management, security policies, vulnerability management
    
McAfee
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.