network connection

Results 76 - 85 of 85Sort Results By: Published Date | Title | Company Name

Case Study - OEM's Increased Global Network Performance

Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Faced with degrading network performance and the need to drive global expansion, Measurement Specialties partnered with Virtela to design, implement and manage a high-performance, multi-carrier MPLS network across all twelve of their global sites.
Tags : 
virtela, network performance, multi-carrier mpls network, original equipment manufacturers, point-to-point connections, network and security solutions, network management, network performance management, test and measurement, network security appliance
    
Virtela Communications, Inc.

New Workspace Experience: Borderless Network Access

Published By: PC Mall     Published Date: Jul 08, 2010
Download this Cisco white paper to learn how to deliver a new workspace experience, connecting anyone, anywhere to any resource: securely, reliably and smoothly.
Tags : 
pcmall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection, network reliability, seamless network, routers, switches, server hardware, network security appliance, wireless application software
    
PC Mall

Cisco EnergyWise: Power Management Without Borders

Published By: PC Mall     Published Date: Jul 09, 2010
Learn how to actively manage and reduce power consumption by using your network intelligently to realize significant cost savings.
Tags : 
pc mall, internet security, networking, wireless networking, network security, network hardware, network protection, network connection, network reliability, seamless network, routers, switches, reduce power, reduce energy, green it, energy efficiency, cost reduction, server hardware, wireless infrastructure, green computing
    
PC Mall

THE AUTONOMOUS GRID: Machine Learning and IoT for Utilities

Published By: SAS     Published Date: Aug 04, 2016
Machine learning and the Internet of Things (IoT) are two of the hottest terms out there today for utilities. Both have the power to create an increasingly autonomous grid that can eventually handle billions of endpoints on utility networks, but the industry may not be maximizing the benefit of these disruptive innovations, nor adequately leveraging the connection between the two of them.
Tags : 
best practices, networks, utility network, autonomous grid, innovation, competitive advantage, business analytics, business intelligence, business management, business technology
    
SAS

Governing Institute: Managing Data Across the Government Enterprise (Enterprise Fraud)

Published By: SAS     Published Date: Apr 20, 2017
Hype and hope — Big Data has generated a lot of both. Thanks to an abundance of enterprise information systems, networks, applications and devices that churn out huge volumes of information, government agencies are awash in Big Data. Add to this data growth the emerging trend of the Internet of Things (IoT) — the network of people, data, things and processes that is increasingly linked through automated connections and sensors — and the future of Big Data can seem quite daunting.
Tags : 
    
SAS

SDN vs. Network Automation – What Questions Should You Be Asking?

Published By: Juniper Networks     Published Date: Sep 10, 2014
Watch our Webinar to find out more about the capabilities offered by connecting networks to IT automation tools as well as capabilities offered by SDN solutions. Find out if you need to employ just one or both of these technologies.
Tags : 
sdn, network automation, it automation, network connection, sdn solutions, automation tools, it capabilities, networking, it management
    
Juniper Networks

Whitepaper: The Total Economic Impact Of A Virtual Cloud Network (by Forrester)

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
    
VMware SD-WAN by VeloCloud

Countdown to Compromise: The Timeline of a Spear-Phishing Attack on Your Organization

Published By: Mimecast     Published Date: Jun 24, 2015
The article is a helpful reminder that your employees often make life easier for attackers by being the weakest link in your network defenses. Social media is a rich hunting ground for hackers. Names, locations, photos, interests, connections, partnerships, vacation details, email addresses and phone numbers – this is often the information that hackers use to target specific employees through well-crafted, highly personalized emails.
Tags : 
mimecast, social media, spear-phishing, data breach, personalized emails, network defenses, security, it management, knowledge management, data management
    
Mimecast

White Paper: Keep Customers Happy & Spending with Business Continuity Support

Published By: U.S. Cellular     Published Date: Aug 24, 2016
Primary internet connections fail for a variety of reasons: severe weather, downed poles and lines or simply heavier than usual network congestion. Business continuity solutions provide businesses with back-up internet access via a cellular network when primary Wide Area Network (WAN) connections fail or are over-loaded. These solutions enable businesses to: Maintain seamless, uninterrupted access to the internet Process credit card transactions Access to important information stored online This paper will provide an overview of business continuity solutions, examples of in-use scenarios and a path to adoption in an easy to understand and digestible way. Download now.
Tags : 
    
U.S. Cellular

Gartner 4 Mobile Security Insights for CISOs

Published By: Lookout     Published Date: Aug 28, 2017
Mobile devices have rapidly become ground zero for a wide spectrum of risk that includes malicious targeted attacks on devices and network connections, a range of malware families, non-compliant apps that leak data, and vulnerabilities in device operating systems or apps. Read the four mobile security insights CISOs must know to prepare for a strategic conversation with the CEO and board about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Tags : 
mobile security, mobile risks, device attacks, network attacks, malware attack
    
Lookout
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.