traffic

Results 201 - 225 of 507Sort Results By: Published Date | Title | Company Name

Web Notification Inspiration Guide

Published By: Urban Airship     Published Date: Jul 24, 2017
Thinking about adding web notifications to your marketing mix? Download our Web Notifications Inspiration Guide for: The 3 kinds of messages every brand should consider sending via web notifications How web push notifications can fit into (and help you get more value from) your current messaging and notifiation strategy 15 use cases that will spark ideas for your brand See how web notifications can help you can deepen connections and engagement with your web visitors. Get the guide today.
Tags : 
notifications, messaging, marketing, branding, web traffic
    
Urban Airship

How Push Notifications Impact Mobile App Retention Rates

Published By: Urban Airship     Published Date: Jul 24, 2017
Have you ever wondered how push notifications impact app user retention rates? This first of its kind study analyzed the 90-days after first app open for 63 million new app users, comparing retention rates of those who received push notifications with those who did not. We uncovered surprising, and critical, insights as well as devised recommendations on how to keep users engaged and decrease user churn. This 61 page benchmark report is full of data points, insights and recommendations. Download it to learn about: • The impact of messaging at different intervals in the app user lifecycle • Recommendations on when & what to message to increase new user retention rates • Insights on the data specific to four key verticals - retail, media, sports & recreation and utility & productivity.
Tags : 
retention rates, push notifications, app traffic, user engagement, user churn
    
Urban Airship

Network Monitoring - Is Your NOC Flying Blind?

Published By: Emulex Corporation     Published Date: Nov 07, 2013
How long did it take to get a permanent fix for your last network problem? Too long? Even worse, did you fall short of actually getting one? If so, it’s not surprising. But because of network visibility problems, chances are good that your organization is leaking real money in network and business downtime. You can’t manage and protect what you can’t see. While many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their missioncritical high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. This situation has never been ideal, but it is now becoming costlier than ever as we grow more dependent on networks to transact business. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation

‘Seeing’ Means ‘Saving’ in Network Operations

Published By: Emulex Corporation     Published Date: Nov 07, 2013
Having 100% accurate network visibility is a looming requirement for avoiding substantial financial losses. Why? And how can you get it? You can’t manage and protect what you can’t see. But while many hundreds of network monitoring tools exist, organizations today know surprisingly little about the traffic on their mission-critical, high-speed networks. It takes them so long to fix network problems that the business suffers while the seconds, minutes, and hours of downtime accumulate. Download this Whitepaper for more information.
Tags : 
network monitoring, network visibility, technology, endace, best practices, networking
    
Emulex Corporation

New Security Challenges for State and Local Governments

Published By: FireEye     Published Date: Mar 05, 2014
Never before have state and local governments been expected to do so much with so little. Even as budgets remain tight in a post-recession environment, tech-savvy citizens demand higher levels of service, they want to pay taxes by credit card, renew their driver's license online, and check traffic from their smartphone. These responsibilities make cyber security critical for state agencies, municipalities, and public utilities. Governments possess residents' most sensitive information - including inviolable personal data such as Social Security numbers and birth certificates. This white paper highlights: Why traditional tools fail to detect advanced attacks; Gaining a cohesive, correlated view of all major threat vectors; How to leverage signature-less, real-time security that thwarts zero-Day attacks.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
FireEye

Oracle Retail Showcase - Stage Stores

Published By: Oracle     Published Date: Jan 28, 2015
After doubling its e-commerce traffic in 2012, the following year Stage Stores launched an aggressive six-month upgrade to bring an enterprise-class commerce platform on-line in time for the holiday season. Hear direct from Stage Stores CIO, on why the retailer selected Oracle Retail to ensure they met their expedited timeframe for deployment.
Tags : 
    
Oracle

Security of Mobile Banking

Published By: MobileIron     Published Date: Feb 12, 2019
The speed at which technologies evolve is all but a cliché, and nowhere is that speed more apparent than in the rise of mobile. The mobile tipping point—the point at which more people used mobile devices to access the web than desktop devices—came in the first quarter of 2017, when 50.03% of global web traffic was from mobile devices. Today, mobile is the de facto standard. Simply put, if you are not already building your business on the assumption that your digital visitors are using mobile, you are missing the mark.
Tags : 
    
MobileIron

“Encrypted Traffic Management for Dummies”/Blue Coat Special Edition

Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat

7 Considerations to Future-Proof Your Load Balancing Strategy

Published By: Avi Networks     Published Date: Mar 06, 2018
Can your current ADC solution elastically scale load balancers and application servers? Does it provide real-time insights and visibility into traffic? There is a lot to consider when it comes to the future of your load balancing strategy. Download our free e-book today!
Tags : 
    
Avi Networks

IDG: Protecting and Enabling the Network

Published By: Juniper Networks     Published Date: Aug 03, 2017
Security, network complexity and growing volumes of traffic are the top factors affecting enterprise network strategy, based on a recent IDG Research Services poll among IT leaders. Here’s what they’re planning to do about these issues
Tags : 
information technology, data security, network complexity, traffic volume, network strategy
    
Juniper Networks

The New Way to Convert Traffic into B2B Sales Leads

Published By: CloudTask     Published Date: May 11, 2018
In a world where every competitor claims to be the best, it's extremely challenging to differentiate yourself as a market leader. Effective differentiation is one of the main challenges businesses face while trying to convert traffic into B2B leads. Essentially, it all comes down to great service and personalization Great service doesn't just include solving problems post sale, it also means being in the right place to answer questions and provide information pre-sale. The more your prospects believe that you are there to serve them and their specifc needs, the more likely it is that they will become genuine leads and eventually customers.
Tags : 
    
CloudTask

Seven Criteria for Building an AWS Global Transit Network

Published By: Aviatrix     Published Date: Jun 11, 2018
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei reviews seven best-practice topics for Global Transit Network architecture. Free Evaluation Checklist In addition to the slides, you’ll also receive a handy spreadsheet-based checklist with 50 architecture and business goals to consider when evaluating solutions for your own Global Transit Network. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix

Application Usage and Risk Report

Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The Application Usage and Risk Report from Palo Alto Networks provides a global view into enterprise application usage by summarizing network traffic assessments conducted in 1,636 organizations worldwide.
Tags : 
palo alto networks, risk report, application usage, business technology
    
Palo Alto Networks

Definitive Guide to Branch Transformation (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite attraverso questa guida come ridirigere in maniera ottimale il traffico delle vostre filiali, per permmettere un accesso diretto ad internet e alle vostre applicazioni nel cloud. Abbassate i vostri costi, ottenete una visibilita’ completa sul vostro traffico e migliorate l’esperienza dei vostri utenti mettendo in sicurezza le vostre filiali remote.
Tags : 
    
Zscaler

Zscaler Cloud Security Insights : an analysis of SSL/TLS Based Threats (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Scoprite il nostro rapport semestrale Cloud Security Insights Threat Report 2019 – Uno studio delle minacce basate sui protocolli SSL/TLS, che analizza il traffico criptato nel cloud Zscaler tra luglio e dicembre 2018. Il rapporto, stilato dal nostro team di ricerca ThreatLabZ, si focalizza sulla varieta’ di attacchi via SSL e bloccati da Zscaler, tra cui gli attacchi di phishing, i botnet, malware, etc.
Tags : 
    
Zscaler

Secure Enterprise SD-WAN (Italy)

Published By: Zscaler     Published Date: Jun 19, 2019
Il concetto di backhaul verso un data center sembra interessante in un contesto in cui sia gli utenti che le applicazioni risiedono al suo interno. Tuttavia con i dipendenti nelle diverse filiali e le applicazioni che migrano verso il cloud, ridirigere il traffico su una rete a stella offre una pessima esperienza all’utente oltre ad essere costoso e introduce rischi non necessari. La rete SD-WAN rappresenta una soluzione a questo problema. Facilita le connessioni locali all’internet. Zscaler le mette in sicurezza. Scoprite come con questo rapporto.
Tags : 
    
Zscaler

Throughput and Scalability Report

Published By: McAfee     Published Date: Feb 25, 2015
This report summarizes the McAfee 5206's throughput based on the latest version 5.8 software, with various firewall policies applied and different traffic scenarios.
Tags : 
mcafee 5206's throughput, mcafee, testing of the mcafee ngfw, security, firewall, security internet, dpi, url filtering
    
McAfee

Gartner: Magic Quadrant for Application Delivery Controller

Published By: F5 Networks Inc     Published Date: Feb 19, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
application, delivery, controllers, evolved, data center, adcs, advancements
    
F5 Networks Inc

Gartner: Magic Quadrant for Application Delivery Controllers

Published By: F5 Networks Inc     Published Date: Aug 13, 2013
The application delivery controller has evolved into a key component of the data center architecture, and enterprises should evaluate ADCs based on how they integrate with this architecture and support more-advanced features, such as user and traffic control and monitoring.
Tags : 
gartner, f5 networks, application delivery, data center architecture, enterprises, adcs, infrastructure, application management
    
F5 Networks Inc

Wan Optimization For Today and Tomorrow

Published By: Blue Coat Systems     Published Date: Oct 24, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, network architecture, network management, network performance, network performance management
    
Blue Coat Systems

10 Best Free & Paid Website Optimization Tools

Published By: Clicktale     Published Date: Dec 04, 2012
In this guide, we'll be introducing the full gamut of web solutions, starting with tools that evaluate your entire site traffic, and ending with techniques and best practices for understanding the individual user.
Tags : 
customer experience analytics, web optimization, web analytics
    
Clicktale

5 Steps to 11ac Migration

Published By: Aruba Networks     Published Date: Nov 15, 2013
Whether you are an early adopter who has already started planning, or like several organizations, unsure of your next step, the following guidelines will help you prepare and plan for a successful migration to an 802.11ac WLAN.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks

Top 10 Considerations for Deploying Lync on Smartphones and Tablets

Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks

5 Steps to 11ac Migration

Published By: Aruba Networks     Published Date: Nov 15, 2013
Le standard de transmission 802.11ac est en passe de devenir la norme du Wifi nouvelle génération. La vitesse gigabit et l’amélioration des capacités et de la fiabilité offertes par le standard 802.11ac aux réseaux LAN sans fil (WLAN) se révèlent être d’inestimables atouts face à la croissance rapide du nombre d’utilisateurs, d’appareils et d’applications mobiles. Que vous soyez un adepte précoce ayant déjà commencé à tout planifier ou, comme bon nombre d’entreprises, encore hésitant concernant la marche à suivre, n’hésitez pas à télécharger ce guide en cinq étapes qui vous aidera à préparer et à planifier une migration réussie vers un réseau WLAN 802.11ac.
Tags : 
just media, aruba networks, emea, audit infrastructure, migrate to 802.11ac, hardware replacement, gigabit wifi, optimize to leverage
    
Aruba Networks

Top 10 Considerations for Deploying Lync on Smartphones and Tablets

Published By: Aruba Networks     Published Date: Nov 15, 2013
L’application Microsoft Lync modifie en profondeur la structure des coûts de la téléphonie d’entreprise et plonge l’utilisateur dans une nouvelle expérience où chaque communication devient plus captivante et plus conviviale. Voici 10 conseils pour garantir le bon fonctionnement de Lync sur les appareils mobiles de votre réseau.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction
    
Aruba Networks
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.