traffic

Results 276 - 300 of 529Sort Results By: Published Date | Title | Company Name

Viavi Special Report: Network Tools Hold Critical Insight In Attack Remediation

Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions

Your Guide To Troubleshooting VoIP

Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions

Now Entering the Zettabyte Era

Published By: Cisco Systems     Published Date: Oct 01, 2013
Annual global IP traffic has increased fourfold in the past five years, and it will surpass the zettabyte threshold by 2017. In this Cisco® Visual Networking Index (VNI) paper, discover the details and methodology of this forecast. Read report.
Tags : 
ip traffic, technology, cisco visual networking index, vni, best practices, telecommunication, wireless, business technology, telecom
    
Cisco Systems

Cisco Global Cloud Index: 2016 Forecast

Published By: Cisco Systems     Published Date: Oct 01, 2013
The Cisco® Global Cloud Index is an ongoing effort to forecast the growth of global data center and cloud-based IP traffic. In this paper, take a look ahead at virtualization and cloud computing trends on the horizon. View report.
Tags : 
cisco global, cloud, forecasting, best practices, virtualization, cloud computing, trends, telecommunication, wireless, business technology, telecom, data center
    
Cisco Systems

IDC MarketScape: Worldwide Enterprise WLAN 2013–2014 Vendor Analysis

Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market, best practices, business integration, business intelligence, business management
    
Aruba Networks

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
Cisco

Rethinking the Network as a Security Sensor and Enforcer

Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco

Whitepaper: Demonstrating SD-WAN Business Value with ESG

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud

Drive More Traffic with Search on Native

Published By: Oath     Published Date: May 31, 2017
Searching for auto-related terms signals that a consumer is interested in a vehicle. And, 96% of people who search for auto-related terms can be found on a Yahoo site within a week of searching. Learn how to leverage these search signals to re-target consumers with native advertising by reading our infographic.
Tags : 
search advertising, native advertising, search ads, native ads
    
Oath

AutoWeb: How Oath Can Drive Success Via Multiple Routes

Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath

Reduce Complexity in the Data Center with the Right Architecture

Published By: Juniper Networks     Published Date: Jul 31, 2019
As modernized data centers scale up and out, there is a strong potential for growing complexity as well. IT teams need to be vigilant in simplifying architectures and operations as the technological landscape changes. While the potential of monitoring and analytics in your data center is huge, to take advantage, you'll need an architecture that can handle shifting traffic patterns. In this expert eGuide, you'll discover three ways of simplifying architectures, and how they can help you reduce complexity, improve workforce efficiency, and ease administration.
Tags : 
cloud providers, cloud provisioning, cloud services, data centre, data centre provider
    
Juniper Networks

The Key to Retail Success in the Digital Era

Published By: BrickWork Software     Published Date: Oct 24, 2017
In the world of Amazon, the future of retail may seem uncertain. With a 57% decline in brick-and-mortar traffic over the last five years, increases in store closings, and a growing number of retail bankruptcies, today’s retailers face many challenges. The truth is that while you can’t beat Amazon, you can survive in the digital era — but you need a completely new strategy. In this e-book, you’ll learn: ? Why e-commerce alone can’t save you ? Why 80% of store customers start their journey to your store online ? How the modern customer journey changes everything ? Which customers you need to captivate ? How to leverage digital to drive in-store sales
Tags : 
    
BrickWork Software

How 8 Brands Took Personalization to The Next Level

Published By: Monetate     Published Date: Jun 27, 2018
Delivering personalized experiences at scale is a challenge the travel and hospitality industry would be well advised to take on. While segmentation can work to a point, truly 1:1 experiences are the key to more conversions. This case-study brief shows how eight companies, including one in the luxury travel space, used personalization to make an impact. In the case-studies you’ll learn: • What one luxury travel company did to achieve a +33.5% lift in email sign up traffic. • How a leading apparel company saw a 73.9% lift to email sign ups without offering a discount • How a retailer achieved a 3.3% reduction in homepage bounce rate with a customized carousel. • What 5 more companies did to achieve equally impressive results from their personalization efforts.
Tags : 
    
Monetate

AWS Security and Networking - Load Balancing

Published By: Amazon Web Services     Published Date: Apr 11, 2018
Elastic Load Balancing distributes incoming application traffic across multiple EC2 instances, in multiple geographic areas. This increases the fault tolerance of your applications. Load Balancing
Tags : 
    
Amazon Web Services

AWS Security and Networking - Filtering Cloud Network Traffic and Preventing Threats

Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services

Increase Visibility to Boost Security

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd

Increase Visibility to Boost Security

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd

SSL Outbound Visibility

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd

SSL Outbound Visibility

Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd

Yahoo Japan Clos Fabric Network Infrasture Case Study

Published By: Apstra     Published Date: Aug 19, 2019
Yahoo Japan Corporation, one of Japan’s largest Internet service providers, is deploying Clos fabric networks for efficiently addressing their ever-growing data center traffic. Apstra® was selected for streamlining the design, build, and operations of these networks.
Tags : 
    
Apstra

Important Things You Need To Know About Securing Your High-Speed Ethernet WAN

Published By: SafeNet     Published Date: Oct 06, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management, ethernet networking, network management, network security, wide area networks
    
SafeNet

The Blind State of Rising SSL/TSL Traffic: Are your Cyber Threats Visible?

Published By: F5 Networks Inc     Published Date: Aug 16, 2016
Download this white paper for an overview of SSL/TLS, its impact on the enterprise and the challenges associated with failing to inspect SSL/TLS traffic.
Tags : 
ssl, tsl, cyber threats, network security, security, networking, enterprise applications, business technology
    
F5 Networks Inc

Mobile Web Strategy and Development Approaches: Best Practices and Winning Solutions

Published By: Trilibis Mobile     Published Date: Aug 14, 2012
Smartphones and tablets are overtaking web traffic. Read about "mobile first" strategy and learn best practices for overcoming the challenges of developing mobile websites and hybrid apps in a rapidly evolving market.
Tags : 
mobile web, mobile strategy, trilibis, hybrid apps, mobile first, smartpath, html5, mobile design, mobile development, mobile websites, msite, adaptive design, responsive design, proxy site, tablets, best practices, javascript, mobile apps, native apps, web app
    
Trilibis Mobile

Important Things You Need To Know About Securing Your High-Speed Ethernet WAN

Published By: Safenet     Published Date: Oct 11, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management, ethernet networking, network management, network security, wide area networks
    
Safenet

The Failure of End Point Security Calls for New Alternatives

Published By: Panda Security     Published Date: Feb 27, 2008
With thousands of new malware threats being created and unleashed into the Internet daily, the End Point security model is failing.  Without additional layers of security, infiltration may be virtually impossible to stop.  This important white paper explores alternatives that eliminate dangerous traffic prior to reaching the network or server.
Tags : 
email security, e-mail security, security appliance, desktop, endpoint security, end point security, anti-spam, spam, anti spam, panda, panda security, network security, network security appliance
    
Panda Security
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.