net

Results 76 - 100 of 7688Sort Results By: Published Date | Title | Company Name

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks

10 Ways to Secure Your Digital Content

Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security
    
Limelight Networks

10 Ways to Sell Management on a Network Upgrade

Published By: Focus     Published Date: May 13, 2009
A network upgrade is necessary; however, you need everyone to agree. Get the help to sell it. Download your FREE research report now.
Tags : 
information technology, networking, infrastructure, internetworking hardware, it spending, total cost of ownership
    
Focus

10 Ways to Sell Upper Management on a Network Upgrade

Published By: ITManagement     Published Date: Jul 24, 2008
The days of deploying new equipment for the sake of having the latest and greatest ended when the Internet bubble burst. So when you know it's time for a network upgrade, you need to have more than the technical facts — you need to arm yourself with a rock-solid business case. Start with these 10 ways to sell the members of your upper-management team on the network upgrade.
Tags : 
it management, upgrade, servers, management, network, network upgrade, selling management, itmanagement
    
ITManagement

10/40 Gigabit Ethernet Capture Performance Evaluation

Published By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : 
ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
    
Viavi Solutions

100% Malware-Free Email: A Guaranteed Approach

Published By: Panda Security     Published Date: Feb 27, 2008
E-mail is the primary communication tool upon which every business and corporation depends.  This communication source is also the battleground where cybercriminals use sophisticated email infiltration-techniques to propagate malware and attack corporate networks.
Tags : 
malware, hacker, hacking, hackers, email security, e-mail security, panda, panda security
    
Panda Security

100G Networking Is Here, But Where’s the Visibility?

Published By: Endace     Published Date: Dec 28, 2012
Your company is a voracious consumer of bandwidth - perhaps a very large enterprise, a research lab, or a service or content provider of some description. Running on ultra high speed data links may blind you from seeing real issues arising.
Tags : 
endace, 100g, networking, bandwidth, speed traffic, data management, business technology, data center
    
Endace

100G Networking is Here, But Where’s the Visibility?

Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation

11 Proven Ways to Grow Your Email Marketing List

Published By: Net Atlantic     Published Date: Nov 30, 2009
Net Atlantic's whitepaper, "11 Proven Ways to Grow Your Email Marketing List" helps email marketing and communications managers increase the number of list members who are actively engaged. A larger list of interested, opt-in leads is by far the best population for creating opportunities. Sending responsibly frequent email campaigns to your mailing list will improve your overall marketing ROI better than just about any other tactic.
Tags : 
net atlantic, email compliance, email marketing, unsubscribers, bounces, roi spam, can-spam, healthcare
    
Net Atlantic

11 Steps for Scaling a Startup

Published By: TriNet     Published Date: Mar 27, 2013
11 steps from a serial entrepreneur and investor.
Tags : 
trinet, steps for scaling a startup, business infrastructure, human resources, business technology
    
TriNet

12 Terms To Know And Understand When Ordering Business Phone Services

Published By: Cox Communications     Published Date: Nov 10, 2014
One of the most fundamental aspects of marketing your business is having the right technology in place, And at the forefront of your technology hub should be a reliable phone service. Having a dependable phone network your company can is vital in more ways that one. Even in today's world of competing technology and emerging tech-trends, a proper phone system is the link that enables you to connect with anyone, from co-workers down the hallway to the business partner on the other side of the globe.
Tags : 
tech-trends, voip, pbx, hosted pbx, sip, ports, did, pots
    
Cox Communications

14 Best Practices for Skype for Business Enterprise Voice Deployment - Developing a Cap-and-Grow Str

Published By: Polycom     Published Date: Jun 08, 2016
"There are many ways to take advantage of the rich set of collaboration tools provided by Microsoft Skype for Business. IT leaders should consider a cap-and-grow Skype for Business strategy and then think through how it can be leveraged as a replacement technology. Digest this white paper by leading UC analyst Zeus Kerravala for insight on the 14 best practices for a Skype for Business Enterprise Voice deployment. Enabling IM and presence first, expanding desktop applications, and more are details in this informative piece. "
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, productivity, business intelligence
    
Polycom

15 Ideas to Grow with Digital Marketing

Published By: Vocus     Published Date: Mar 19, 2014
Find out the most efficient ways to build social media influence, monitor your target audience online, and drive business to your front door.
Tags : 
marketing software, social media marketing, digital marketing, media list, marketing automation, internet marketing, journalists, facebook marketing
    
Vocus

15 Stats to Inform your Social Strategy

Published By: Spredfast, Inc.     Published Date: Mar 04, 2014
What have savvy brand marketers and social media strategists learned recently? Here’s a quick wrap-up of significant network trends, consumer behaviors, and brand results.
Tags : 
spredfast, marketing, social strategy, media strategy, social network, consumer behaviors
    
Spredfast, Inc.

15 Trade Secrets of Email Service Providers

Published By: Net Atlantic     Published Date: Mar 19, 2010
Net Atlantic's whitepaper, "15 Trade Secrets of Email Service Providers" uncovers the details behind email service providers (ESPs) and their practices. It highlights the differences between an email marketing server and a static web server, the methods used to avoid SPAM, and how ESPs achieve and maintain high deliverability rates. Marketers should know these secrets before embarking on an email marketing strategy, or entering into a deal with an ESP.
Tags : 
net atlantic, esp, email service provider, deliverability, spam, anti-spam
    
Net Atlantic

17 Financial Crime Predictions for 2017

Published By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : 
network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
    
FICO

2-Min Teaser VOD: Get Ready for 802.11ac Wave 2

Published By: Cisco     Published Date: Apr 10, 2015
Get Ready for 802.11ac Wave 2, prepare your access network for new innovations with Cisco Catalyst Multigigabit Technology.
Tags : 
cisco, catalyst, networks, byod, mobile computing, wifi, mobile data systems, mobile workers
    
Cisco

2-Min Teaser VOD: Get Ready for 802.11ac Wave 2

Published By: Cisco     Published Date: Jun 02, 2015
Prepare your access network for new innovations with Cisco Catalyst Multigigabit Technology.
Tags : 
gigabit, networking, wireless solutions, data, cisco, gigabit networking, network management, quality of service
    
Cisco

20 CXM Experts on the Future of Customer Experience

Published By: Sprinklr     Published Date: Nov 22, 2016
CXM is the process of providing unforgettable experiences to your customers at every touchpoint – online, on the phone, on social, and in person. It’s the future of every business operating in a networked world. So where do you begin?
Tags : 
customer service, customer experience, customer retention, voice of the customer, social customer service, social customer care, customer care
    
Sprinklr

20 Fast Facts About Microsoft Windows Server 2012

Published By: Dell & Microsoft     Published Date: Aug 14, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : 
microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
    
Dell & Microsoft

20 Fast Facts About Microsoft Windows Server 2012

Published By: Dell     Published Date: Sep 12, 2013
Laying the Cornerstone of the Next Generation of Computing
Tags : 
microsoft windows server, 2013, next generation computing, dell poweredge, storage, networking, systems management
    
Dell

2009 Document Management Survey Report

Published By: Oce Business Services     Published Date: Jun 22, 2009
This penetrating survey report clarifies how organizations are leveraging document management practices, such as records management and document imaging, to help meet the current economic challenges and gain a competitive edge in the eventual recovery.
Tags : 
oce, business, document management, economy, recession, budget, recovery, office print
    
Oce Business Services

2010 Midrange IP Phone Comparison Guide

Published By: Focus VoIP     Published Date: Jan 19, 2011
NEWLY UPDATED: Save time researching business phones with our free Midrange IP Phone Comparison Guide.
Tags : 
altigen communications, nortel networks, ip phone, cisco systems, shoretel, polycom, avaya, phone system
    
Focus VoIP

2010 Threat Predictions

Published By: McAfee     Published Date: Dec 28, 2009
McAfee Labs foresees an increase in threats related to social networking sites, banking security, and botnets, as well as attacks targeting users, businesses, and applications. However, in 2010 McAfee also expects to see an increase in the effectiveness of law enforcement to fight back against cybercrime is also anticipated. Read this report to learn more about what to expect in 2010.
Tags : 
mcafee, cybersecurity, hackers, malware, security threats, trojan horses, virus protection, vulnerability assessments
    
McAfee

2010: Cybercrime Coming of Age

Published By: ESET     Published Date: Feb 11, 2010
This document combines the thoughts of both Research teams in ESET Latin America and ESET, LLC into a single paper, proposing a comprehensive vision of how the threatscape is likely to evolve in 2010.
Tags : 
eset, cybercrime, security, threat, crimeware, botnets, malware, social engineering
    
ESET
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.