network computing

Results 26 - 50 of 154Sort Results By: Published Date | Title | Company Name

Whitepaper: Your users have left the perimeter. Are you ready?  

Published By: Cisco Umbrella EMEA     Published Date: Oct 12, 2018
Not long ago, even the most astute executives couldn’t fully anticipate how quickly emerging technologies would transform their business operations — and even their business models. Laptops, smartphones, and other mobile devices; high-bandwidth wireless networks; and cloud-based computing services have proven to be among the most impactful of these advances, collectively untethering workers from office environments and fundamentally altering work behaviors. employees today work anytime, anywhere while accessing applications and data that reside on company servers and in the cloud. Cisco Umbrella can help your business overcome these problems, download this whitepaper today to find out more.
Tags : 
    
Cisco Umbrella EMEA

Comprehensive Data Protection for Physical, Virtual and Cloud Infrastructures

Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

The New Integration

Published By: TIBCO     Published Date: Nov 11, 2013
In an IT landscape dominated by big data, mobility, social networking and cloud computing, integration will not only grow in importance, its very nature will change. This paper will discusses the 21st Century IT landscape as it relates to the new integration, and argues that the need for a comprehensive integration strategy has never been more urgent.
Tags : 
tibco, mobile strategy, integration, technology, best practices, inefficient integration, platform, business strategy
    
TIBCO

Powering Transformation: The IT Revolution is Now

Published By: ServiceNow     Published Date: Nov 22, 2013
As technology continues to advance and the new reality is based on an infrastructure that includes physical, virtual and cloud resources, IT departments need to find new ways of managing and securing this vastly different technology ecosystem.
Tags : 
servicenow, enterprise it, it department, cloud generation, social networks, mobile workforce, virtualization, cloud computing
    
ServiceNow

5G Driving Device to Cloud Innovations

Published By: Intel     Published Date: Nov 29, 2016
Just after the turn of the decade researchers are predicting there will be somewhere north of 24 million subscriptions to next generation 5G networking services. Today most of those services are little more than pilot projects. But thanks to emerging network function virtualization (NFV) software running on Mobile Edge Computing (MEC) platforms enabled by Intel most of those 5G services should be in production before the end of the decade. Come learn how MEC platforms are about to transform every corner of the networking world to not only drive the creation of a vast array of new IT services, but also make networks more agile and responsive than anyone ever thought possible.
Tags : 
    
Intel

The Drivers and Benefits of Edge Computing

Published By: Schneider Electric     Published Date: Feb 12, 2018
Internet use is trending towards bandwidth-intensive content and an increasing number of attached “things”. At the same time, mobile telecom networks and data networks are converging into a cloud computing architecture. To support needs today and tomorrow, computing power and storage is being inserted out on the network edge in order to lower data transport time and increase availability. Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source. This white paper explains the drivers of edge computing and explores the various types of edge computing available.
Tags : 
    
Schneider Electric

The Benefits of Cloud Networking

Published By: Aerohive     Published Date: May 13, 2015
A paper on enabling cloud networking to lower IT costs & boost IT productivity.
Tags : 
benefits of cloud networking, advantages of cloud networking, cloud, networking, cloud networking, aerohive networks, hivemanager, cloud computing
    
Aerohive

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies

Identity-Centric Security: Enabling and Protecting the Business

Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies

SDN 102: Software Defined Networks and the Role of Application Delivery Network Services

Published By: Citrix Systems     Published Date: Jul 28, 2015
Organizations are looking to SDN to improve network agility by incorporating network automation in cloud computing platforms. So far the focus of SDN has been on L2-L3 switching and routing services. However applications don’t just need network connections. They also need L4-L7 network services.
Tags : 
    
Citrix Systems

Fortune 500 Security on a Budget

Published By: BAE Systems     Published Date: Dec 29, 2015
How to secure your network without busting your IT budget
Tags : 
bae systems, applied intelligence, fortune 500, business security, network security, it management, security products, security systems
    
BAE Systems

Navigating the Data Explosion, A New Way of Looking at Edge Computing

Published By: Flexential     Published Date: Jul 17, 2019
By 2020, there will be 50 billion devices producing 600Zb of data, driving enterprises to assess their IT infrastructures to keep pace with unprecedented data processing demands. Is your business ready to handle this data explosion? In this on-demand webinar, you’ll hear Tim Parker, Vice President of Network Services at Flexential, and Craig Matsumoto, Senior Analyst of Data Center Services at 451 Research, discuss the evolution of data – and how enterprises are processing and creating it. Download now to hear Parker and Matsumoto examine how edge computing solutions are meeting the latency demands of an increasingly digitized world.
Tags : 
    
Flexential

5 Steps to a 5G-Ready Cloud

Published By: Intel     Published Date: Aug 17, 2017
5G will be a transformative force, offering enhanced mobile broadband and enabling a huge volume of machine to machine communications, based on its ultra-reliable, and low latency network. For comms service providers it puts them in a strong position to offer new services, including in the Internet of Things (IoT), visual computing, analytics, and enhanced mobility.
Tags : 
    
Intel

Cloud Computing : Best Practices

Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
Macquarie Telecom

The Top 10 Trends in Cloud Computing

Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security
    
Macquarie Telecom

The Introductory Guide to Cloud Computing

Published By: Macquarie Telecom     Published Date: Mar 30, 2015
This paper will help you choose the right cloud provider, optimise your security and deploy the solution.
Tags : 
virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
Macquarie Telecom

ESG - What's Needed for Cloud Computing

Published By: Riverbed     Published Date: Mar 31, 2011
Just what is cloud computing anyway? Skeptics might say it is nothing but industry hyperbole, visionaries might say it is the future of IT. In reality, both statements are true-cloud computing has been embellished by the tech industry, but it does hold real potential for new types of on-¬-demand dynamic IT services. This paper seeks to clarify the definition of cloud computing, identify how far along users are in terms of cloud deployment, and examine the role of the network in the cloud computing model.
Tags : 
riverbed, cloud computing, networking
    
Riverbed

I'm in the Cloud - Now What?

Published By: Sage     Published Date: Oct 29, 2014
If you have recently been to a seminar, attended a conference or webcast, or read a white paper or blog, you have most likely heard about cloud technology as it relates to the accounting profession. Cloud technology is an enabler that allows a business to shift computing power from local networks and desktop environments to a remote off-premises computing environment. Ef?ciency of operations is enhanced by removing the burden of managing networks, upgrades, and information technology operational issues.
Tags : 
cloud technology, service offerings, efficiency, managing networks, operational issues
    
Sage

Downtime is Not an Option - High Availability Next Generation Firewall

Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint

Downtime is Not an Option - High Availability Next Generation Firewall

Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint

Downtime is Not an Option - High Availability Next Generation Firewall

Published By: Forcepoint     Published Date: May 14, 2019
Downtime Is Not an Option: High Availability Next Generation Firewall Access to applications, data, and resources on the Internet is mission-critical for every organization. Downtime is unacceptable. Security for that network must also be highly available and not cause performance degradation of the network. The increased workload of security devices as they analyze traffic and defend users from malicious attacks strains computing resources. The next generation of security solutions must build in high availability that can scale as the business changes. Download this whitepaper to find out how high availability is at the core of the Forcepoint NGFW (Next Generation Firewall).
Tags : 
    
Forcepoint

Cyber Exposure for Dummies

Published By: Tenable     Published Date: Nov 06, 2018
Networks and attack surfaces are changing fast – there’s so much more than servers and endpoints. Now, you’re responsible for securing everything from cloud platforms to DevOp containers to web apps. Cyber Exposure is an emerging discipline for measuring and managing cyber risk across this modern attack surface. This ebook takes a close look at Cyber Exposure, including the Cyber Exposure gap created by legacy security offerings and the Cyber Exposure platform designed to protect all computing assets. If you’re responsible for guarding your organization’s fast-changing assets, this ebook is a must-have.
Tags : 
cyber exposure, vulnerability management, vulnerability assesment, vulnerabiility scanner, cyber risk management, cyber risk, cyber security, devops security
    
Tenable

Next-Gen LAN: Everything Except the Kitchen Sink

Published By: Brocade     Published Date: Sep 07, 2010
Tomorrow's local-area network will be the plumbing for everything business leaders want to do, from adding HC video to using FCoE to slash storage costs. So how we ensure our LANs are robust enough to handle the pressure?
Tags : 
brocade, lan, network computing, informationweek analytics, unified storage, data network, data center, hd videoconferencing
    
Brocade

The Role of Integrated Network Services in Next-Generation Application Delivery

Published By: F5 Networks Inc     Published Date: Jan 21, 2014
Cloud computing and the "bring your own device" (BYOD) trend will impact the design of future datacenters and their supporting networks. To attain the kind of business agility that companies now demand, network infrastructure needs to provide the flexibility required by cloud application workloads and the changing traffic patterns fostered by BYOD. To make networks more agile, new approaches to network implementation need to be enabled. As these trends continue, application delivery controllers (ADCs) will be critical elements in the new network infrastructure. This Technology Spotlight examines these trends and the role that F5 Networks' integrated scalable platform plays in this strategic market.
Tags : 
f5 networks, idc, cloud, cloud computing, bring your own device, byod, datacenter, network
    
F5 Networks Inc

Riverbed SteelCentral vs. JDSU Network Instruments

Published By: Riverbed     Published Date: Feb 26, 2015
The Riverbed SteelCentral network performance management suite of products provides considerable advantages over those of JDSU Network Instruments because of its breadth, depth and ease of use to quickly understand and pinpoint the root cause of performance problems.
Tags : 
network performance management, performance issues, performance management, end-user experience management, cloud computing, mobile device, network management, network performance
    
Riverbed
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.