sdc

Results 1 - 15 of 15Sort Results By: Published Date | Title | Company Name

Defeating Advanced Persistent Threat Malware

Published By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Protecting Your Enterprise Network

Published By: Infoblox     Published Date: Sep 04, 2013
Security challenges, costs & solutions for IT practitioners
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Are Your DNS Servers as Secure and Available as the Rest of Your Network?

Published By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

A Cybercriminal’s Guide to Exploiting DNS for Fun and Profit

Published By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Protecting DNS Infrastructure—Inside and Out

Published By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Designing a Secure DNS Architecture

Published By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
    
Infoblox

Selecting the Optimal Path to Private Cloud

Published By: EMC     Published Date: May 21, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms, cloud computing, infrastructure management
    
EMC

Three Key Considerations in Securing the Software-Defined Data Center

Published By: McAfee EMEA     Published Date: Nov 15, 2017
The transition to the SDCC gives IT managers and security professionals the opportunity to build in a security architecture that is designed from the ground up to meet the needs of the cloud era. With the right architectural model, security can be much simpler to deploy, provision, manage, and scale. Organizations can save money, enhance protection, and leverage the agility of private and hybrid cloud infrastructures. IT teams can expand their visibility from the data center into the cloud, uncovering threats wherever they appear and coordinating an appropriate and comprehensive response.
Tags : 
software, data center, security, managers, professionals, organizations, money
    
McAfee EMEA

Workload Rightsizing: How to Optimize Workload Configuration in Your Virtual Environment

Published By: VMTurbo     Published Date: Oct 24, 2013
This paper details VMTurbo’s approach to controlling workloads and the virtualized infrastructure in the desired state, leading to significant improvements in infrastructure efficiency and operational cost savings while assuring the storage performance of virtual workloads.
Tags : 
vmturbo, software defined control, sdc, workload, rightsizing, workload rightsizing, optimization, workload configuration
    
VMTurbo

Workload Rightsizing

Published By: VMTurbo     Published Date: Feb 11, 2014
Automatically and continuously optimizing workload configurations in your virtual environment
Tags : 
vmturbo, virtual environment, optimize workload configurations, workload rightsizing, virtualized data, data centers, infrastructure, risk solutions
    
VMTurbo

Selecting the Optimal Path to Private Cloud

Published By: EMC     Published Date: Apr 16, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms
    
EMC

Selecting the Optimal Path to Private Cloud

Published By: EMC     Published Date: Apr 16, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms, cloud computing, infrastructure management
    
EMC

Selecting the Optimal Path to Private Cloud

Published By: EMC     Published Date: Apr 16, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms, cloud computing, infrastructure management
    
EMC

Selecting the Optimal Path to Private Cloud

Published By: EMC     Published Date: Apr 16, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms, cloud computing, infrastructure management
    
EMC

Selecting the Optimal Path to Private Cloud

Published By: EMC     Published Date: Apr 16, 2014
IDC report on its findings in relation to cloud computer models, firms approaches to building an infrastructure platform and insights about implementing an internal or private cloud technology model.
Tags : 
private cloud, sdc, emc, infrastructure, platforms, cloud computing, infrastructure management
    
EMC
Search      

Add Research

Get your company's research in the hands of targeted business professionals.