network professionals

Results 26 - 39 of 39Sort Results By: Published Date | Title | Company Name

Industry Experts Speak Out: The Network Performance and Security Trade-Off

Published By: Intel Security     Published Date: Jan 20, 2015
Industry experts discuss the common and risky tradeoff many organizations are forced to make between network performance and security. Nearly half of IT professionals report they continue to make this tradeoff, and if you believe our experts, that number is being under-reported based on what they’re seeing.
Tags : 
next generation firewall, network performance, mcafee next generation firewall, ngfw, security
    
Intel Security

Top 10 Reports for Managing Vulnerabilities

Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention. However, with shrinking budgets and growing responsibilities, time and resources are at constrained. Therefore, sifting through pages of raw vulnerability information yields few results and makes it impossible to accurately measure your security posture.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerability management, misconfigurations, guard, identity management, internet security, policy based management, security management, security policies
    
Qualys

The Top 10 Reports for Managing Vulnerabilities

Published By: Qualys     Published Date: Nov 11, 2009
New network vulnerabilities appear constantly and the ability for IT security professionals to handle new flaws, fix misconfigurations and protect against threats requires constant attention.
Tags : 
qualys, network secure, it security, vulnerability, it budget, risk management, vulnerabilities, security management, vulnerability management
    
Qualys

Mobile Social Networking: The New Ecosystem

Published By: BlackBerry     Published Date: Feb 25, 2009
When interactivity is combined with unified communications and location awareness, next-generation social networks will have significant business value. Unified communications integrates the wide variety of voice, data, video and collaboration tools that business professionals use today into a single environment. This can dramatically improve the speed of decision-making by connecting collaborators quickly, regardless of their location.
Tags : 
blackberry, ecosystem, social networking, unified communications, microsoft exchange, mobile device management, mobile device management software, mobile workers, remote computing, wireless applications software, wireless computing, mobile computing, mobile data systems, pda, smart phones, wifi, wireless application software, wireless communications, wireless hardware, wireless infrastructure
    
BlackBerry

Data Center E-Book: Deploying, Managing and Securing an Efficient Physical Infrastructure

Published By: Siemon Company     Published Date: May 12, 2010
Siemon, a global leader in network cabling solutions and data center physical layer infrastructure, offers this new 66-page E-Book focused on guiding data center professionals and service providers through key infrastructure challenges.
Tags : 
siemon, ieee, cooling, data center, cabling, cooling, networking, physical infrastructure, saas, paas, infrastructure, internetworking hardware, local area networking, network performance management, network provisioning, server hardware, small business networks, business intelligence, configuration management, database development
    
Siemon Company

When On- the-Job Training Is a Recipe for Disaster

Published By: Symantec     Published Date: Sep 14, 2015
In the running battle with cyberthreats, your first line of defense is your IT staff: the system and network administrators, SOC and NOC operators, incident response and forensics analysts, and application development and QA teams. Are these IT professionals ready to take on an ever-growing army of innovative, persistent cybercriminals and hackers? Probably not, if you expect them to acquire the knowledge and skills they need through self-directed study and on-the-job training. There is too much to learn, and few members of the IT staff have the time to research every new threat. And you can’t afford to suffer through APTs, breaches and data leakages just to provide “teachable moments” for IT personnel. There is another solution. Security simulation immerses IT professionals in a realistic online environment and challenges them to fill the roles of cyberattackers and cyberdefenders. It borrows from education theory and online gaming to present knowledge in ways that motivate learning a
Tags : 
on-the-job training, it professionals, cyber security services, security programs, security
    
Symantec

The Forrester Wave™: Endpoint Security Suites, Q4 2016

Published By: Symantec     Published Date: Jul 11, 2017
In our 25-criteria evaluation of endpoint security suite providers, we identified the 15 most significant ones — Bromium, Carbon Black, CrowdStrike, Cylance, ESET, IBM, Intel Security, Invincea, Kaspersky Lab, Landesk, Palo Alto Networks, SentinelOne, Sophos, Symantec, and Trend Micro — and researched, analyzed, and scored them. This report shows how each provider measures up and helps S&R professionals make the right choice.
Tags : 
endpoint security, security, threat prevention, threat detection, security solution
    
Symantec

Transforming Cloud Datacenter Security for Business Mobility

Published By: VMware     Published Date: Feb 24, 2017
Cloud datacenter security is becoming imperative in the new age of malware attacks. To stay competitive and secure, organizations are turning to smart networking in an effort to close the datacenter security gap. The combination of VMware NSX, AirWatch Tunnel and Horizon View helps close this gap and simplifies security management for IT professionals. With the upcoming prevalence of authentication and identity management in an organization’s infrastructure, the need to delegate and define network access continues to highlight the important role of hybrid cloud security that addresses all end-user devices.
Tags : 
    
VMware

The Eaton Rack and Enclosures Fundamentals Handbook

Published By: Eaton     Published Date: Feb 08, 2017
Not so many years ago, network closets, server rooms and data centers were designed from a “room to rack” standpoint. Deciding specifically where to store your technology typically came later in the design process. However, rapid technology refresh cycles, the need to rackmount more equipment and the desire for increased cooling capacities in an enclosed rack (known as an enclosure), have all begun to reverse that trend. Today, IT professionals are designing these critical workspaces with more of a “rack to room” methodology.
Tags : 
    
Eaton

Getting the Most Out of the Network Closet

Published By: Eaton     Published Date: Feb 09, 2017
While network closets take on all shapes and sizes, they are essentially an arm of the data center and as an important component of all mission-critical environments, must be organized, protected, and managed efficiently and effectively. IT professionals are charged with keeping the technology infrastructure functioning, even in the face of constrained resources and increasing complexity.
Tags : 
    
Eaton

Major Concerns for Network and Systems Administrators in 2008

Published By: GFI     Published Date: Jan 11, 2008
2008 brings with it new challenges and issues that network and systems administrators should be aware of, particularly vulnerabilities brought on by users. This white paper examines the top concerns which network security professionals should be prepared to face in 2008, and how they can be mitigated.
Tags : 
gfi, employees, employee vulnerability, vulnerability management, vulnerability, vulnerabilities, security concerns, internal threats, internal, spam, gullibility, security holes, human error, pebcac, network security, access control, monitoring, email security, business activity monitoring, data protection
    
GFI

Accelerate Data Protection with Context Awareness

Published By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
    
Varonis

Healthcare Edition: What's out there threatening your network?

Published By: Cox Business     Published Date: Dec 19, 2016
As the healthcare industry continues to move forward into an age of big data, optimization, and greater coordination of care through the capabilities of better networking technologies, opportunities have never been greater to use technology to truly improve how healthcare professionals interacts with patients. However, growing dependence on your network for everything from medical records to billing information can also mean that healthcare networks hold greater amounts of data than ever before. This makes them a tempting target for hackers.
Tags : 
    
Cox Business
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.