traffic

Results 51 - 75 of 507Sort Results By: Published Date | Title | Company Name

Sky Bet Success Story

Published By: Adobe     Published Date: Nov 07, 2013
Advanced management and tracking in Adobe Social helps Sky Bet drive revenue through timely delivery of targeted high-impact social campaigns.
Tags : 
adobe, skybet, success story, advanced management, adobe social, drive revenue, traditional digital marketing, drive new customers
    
Adobe

Mobile Retail Guide: Best Practices for the Ultimate Mobile Customer Experience

Published By: Phunware     Published Date: May 22, 2014
Retailers and mall owners now have a major opportunity to differentiate their brands and locations, more deeply engage their customers, and jump ahead of competitors. Get insight on, gaining a competitive advantage with mobile, monetizing store traffic through mobile, the importance of the mobile shopper connection and engaging shoppers with location-aware mobile apps.
Tags : 
shopper whitepaper, software development
    
Phunware

VMware NSX® Micro-segmentation Solution Overview

Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security, data protection, database security
    
VMware

Building a Mission-critical Communications Network

Published By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : 
ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture
    
Nokia

Got Bots? How to Evaluate Solutions for Bot Management & Mitigation

Published By: Akamai Technologies     Published Date: Mar 19, 2019
If you have a website, you most likely have an infestation of bots. While some bots are beneficial, bots can make up a significant portion of your daily website traffic. Malicious bots bombard websites with direct and specific attack goals, such as stealing customer information, scraping content, and even initiating DDoS attacks. Our latest eBook explores the differences between good bots and bad bots, and explains the best way to manage harmful bots.
Tags : 
    
Akamai Technologies

2019 SOTI Security Report: Retail and API Traffic

Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 13, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Lowe’s Establishes Solid Omnichannel Foundation with Akamai Digital Performance Management

Published By: Akamai Technologies     Published Date: Apr 25, 2018
How Lowe’s, a Fortune 50 retailer, transformed into a omnichannel commercial success with digital performance management. In this case study, learn how Lowe’s transformed into a performance culture and delivered: Over USD$1 billion in eCommerce sales driven with growth in traffic and conversion Slashed average page load speed by half Correlated site performance with sales impact using predictive analytics Established data-driven decision making for increased customer focus and revenue
Tags : 
lowes, omnichannel, foundation, akamai, digital, performance, management, ecommerce
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Cisco Global Cloud Index: Forecast and Methodology, 2012–2017

Published By: Cisco     Published Date: Apr 04, 2014
This report consists of research and important statistics in an effort to forecast the growth of global data center and cloud-based IP traffic.
Tags : 
cisco, global cloud index, forecast, research, ip traffic, data center virtualization, data center
    
Cisco

Cisco Service Provider Wi-Fi: A Platform for Business Innovation and Revenue Generation

Published By: Cisco     Published Date: Apr 07, 2014
Cisco presents its research findings on mobile data traffic, wireless trends and how the service providers can capture the Wi-Fi opportunity.
Tags : 
wi-fi, wireless, cisco, service providers, wifi, wireless hardware, wireless infrastructure, wireless service providers
    
Cisco

Holiday Guide to Social: Integrating Social to Drive Seasonal Success

Published By: Bazaarvoice     Published Date: Aug 12, 2013
It’s well known that social content has been proven to increase traffic, engagement, and sales – especially during the holidays. This step-by-step guide will help ensure you're setup for social success this holiday season and into 2014.
Tags : 
holiday campaigns, engaging shoppers, engaging consumers, consumer engagement, customer engagement
    
Bazaarvoice

Assuring the Performance of Cloud-Based Applications

Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud
    
Blue Coat Systems

Assuring the Performance of Cloud-Based Applications

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas, infrastructure, network performance management, cloud computing
    
Blue Coat Systems

Top 5 Requirements for Guest Wi-Fi Access

Published By: Blue Coat Systems     Published Date: Jul 18, 2013
"While free Wi-Fi is ubiquitous in airports, coffee shops, hotels, and other highly trafficked areas, this service is no longer unique to these locales. Guest Wi-Fi is now expected in nearly every industry – but how do you deliver Wi-Fi while enforcing acceptable use policies and meeting compliance regulations? Dive into the requirements for Wi-Fi security by consulting this brief resource today. Inside, find five essential recommendations to help you make Wi-Fi security your business reality – read on to get started now."
Tags : 
free wi-fi, security, acceptable use, application security, wireless application software, wireless infrastructure, wireless service providers
    
Blue Coat Systems

Blue Coat SSL Visibility

Published By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : 
blue coat, ssl, ssl visibility, server hardware, servers, small business networks, service management
    
Blue Coat Systems

Eliminate Blind Spots in SSL Encrypted Traffic

Published By: Venafi     Published Date: Mar 26, 2015
Gartner expects that by 2017, more than 50% of network attacks will use SSL/TLS. Yet most organizations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative. Download this Solution Brief: Eliminate Blind Spots in SSL Encrypted Traffic to learn how.
Tags : 
blind spots, ssl encrypted traffic, network attacks, tls, decryption, security threats
    
Venafi

Lowe’s Establishes Solid Omnichannel Foundation with Akamai Digital Performance Management

Published By: Akamai Technologies     Published Date: Apr 25, 2018
How Lowe’s, a Fortune 50 retailer, transformed into a omnichannel commercial success with digital performance management. In this case study, learn how Lowe’s transformed into a performance culture and delivered: Over USD$1 billion in eCommerce sales driven with growth in traffic and conversion Slashed average page load speed by half Correlated site performance with sales impact using predictive analytics Established data-driven decision making for increased customer focus and revenue
Tags : 
lowes, omnichannel, foundation, akamai, digital, performance, management, ecommerce
    
Akamai Technologies

Solving API Performance, Security & Reliability Challenges

Published By: Akamai Technologies     Published Date: Apr 25, 2018
APIs are increasingly powering mobile applications, websites, single-page applications, and data sharing. APIs connect across business and technology boundaries—meaning every enterprise has good reason to be developing, delivering, and consuming APIs. Learn more about: How to overcome API latency & traffic spike challenges Options to ensure 100% availability How to design a security stack for your APIs
Tags : 
api, performance, security, developing, applications, data
    
Akamai Technologies

Making the Right Decision - Build or Buy DPI?

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity

Deep Packet Inspection for Wireless Access Points: Analyze. Control. Secure.

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
According to many market research analysts, the global wireless access point (WAP) market is anticipated to continue its upward trajectory and to grow at an impressive compound annual growth rate (CAGR) of approximately 8% through 2020. Many enterprises are utilizing cloudcomputing technology for cost-cutting purposes, eliminating investments required for storage hardware and other physical infrastructures. With significant growth expected in Internet usage, particularly bandwidth consuming video traffic, WAP vendors need to enable their customers to monitor and improve device performance, improve end user experience, and enhance security. These customers include general enterprises that offer Internet access to patrons like airports, hotels, retail / shopping centers and so on. These external Internet access providers can differentiate themselves by offering optimum service through advanced network analytics, traffic shaping, application control, security capabilities and more.
Tags : 
utilization, challenges, dpi, benefits, airport, public, wifi, qoe
    
Rohde & Schwarz Cybersecurity

Barracuda Firewalls Rely on DPI engine R&S Pace 2

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity

Deep Packet Inspection for Threat Analysis Advisory

Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organizations and deploy customized malware, which potentially remains undetected for months. Such attacks are caused by cybercriminals who target individual users with highly evasive tools. Legacy security approaches are bypassed to steal sensitive data from credit card details to intellectual property or government secrets. Traditional cybersecurity solutions, such as email spam filters, anti-virus software or firewalls are ineffective against advanced persistent threats. APTs can bypass such solutions and gain hold within a network to make organizations vulnerable to data breaches.
Tags : 
it security, vendor, malware, analysis, service, malicious attacks, network, traffic
    
Rohde & Schwarz Cybersecurity

Architecting an SD-WAN with Quality of Service Over Broadband

Published By: Silver Peak     Published Date: Apr 12, 2016
This white paper reveals how with an SD-WAN, enterprises can improve the resiliency of their WAN, dynamically balance traffic across multiple paths and increase application performance.
Tags : 
wan, connectivity, wide area network, data, sd-wan, infrastructure, network architecture, network management
    
Silver Peak

Riverbed Cascade Gives The International Herald Tribune The Inside Scoop On Its IT Infrastructure

Published By: Riverbed     Published Date: Jul 17, 2013
International Herald Tribune (IHT) needed to ensure that all of its journalists, regardless of their location, have network access 24x7 to meet their demanding editorial schedule. Read the case study to learn how IHT deployed Riverbed Cascade™ to gain insight into their WAN traffic and a true end-to-end view of the application delivery path from servers to desktops.
Tags : 
herald tribune, iht, network access, riverbed cascade, riverbed, cascade, wan traffic, wan
    
Riverbed
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.