traffic

Results 251 - 275 of 531Sort Results By: Published Date | Title | Company Name

“Encrypted Traffic Management for Dummies”/Blue Coat Special Edition

Published By: Blue Coat     Published Date: Feb 04, 2016
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances: **Give your security devices an instant look at SSL-encrypted traffic **Protect user privacy **Allow you to control SSL’s use.
Tags : 
    
Blue Coat

Samsung Smart Signage with Ping HD Drives Concession Sales, Reduces Wait Times

Published By: Samsung     Published Date: Feb 03, 2016
Delaware North Sportservice provides food concessions to fans at U.S. Cellular Field, home of the Chicago White Sox baseball team. Delaware North operates 20,000 square feet of food service areas that feed up to 40,000 hungry fans per game. The company needed to replace old light box menu boards with cost-effective digital displays to improve promotion of food items and drive visitor traffic to the Chicago Sports Depot retail store.
Tags : 
samsung, displays, tech, digital, brand, data, customer interaction service, sales & marketing software
    
Samsung

Samsung Displays Build Retail Brand and Customer Awareness Inside and Out

Published By: Samsung     Published Date: Feb 03, 2016
Maverik is a regional convenience store chain that operates more than 270 convenience stores with a brand identity and décor theme around adventure, sports, and the outdoors. Maverik needed a digital signage program to reinforce the brand, drive foot traffic from the pump stations into the store, and promote food purchases.
Tags : 
samsung, display, retail, maverik, digital, brand, optoelectonics & displays
    
Samsung

IBM Commerce Eighth Annual Online Retail Holiday Readiness Report

Published By: IBM     Published Date: Jan 12, 2016
With the holiday season right around the corner, it's time for retailers to take a closer look at the strategies that can ensure success to uncover any potenital roadblocks on the horizon. Read the report to get the latest online shopping trends and best practices to maximize holiday returns.
Tags : 
mobile traffic, trends, best practices
    
IBM

How to Improve a Lead Generation Campaign

Published By: Act-On     Published Date: Jan 07, 2016
We’ve reached out to a number of the world’s leading experts and asked them to share their secrets on lead generation and how they drive tens of thousands –or even more– visitors to their websites each month!
Tags : 
lead generation, best practices, ebook, web traffic
    
Act-On

Amazon Web Services: Enhance Application Delivery & Load Balancing, Brocade Virtual Traffic Manager

Published By: Brocade     Published Date: Nov 25, 2015
Your business demands more than the basic load balancing solution offered by Amazon Web Services. Boost application performance by adding a sophisticated Brocade vADC to seamlessly integrate with any application deployed on AWS—improve user experience, scalability, and control.
Tags : 
amazon, brocade, aws, fucntionality, amazon elb, web services, it management
    
Brocade

Keep Apps Running with Global Load Balancing

Published By: Brocade     Published Date: Nov 25, 2015
Improving traffic management can deliver big benefits, especially across a global infrastructure. Read this Brocade white paper to see how virtualizing traffic management helps you improve business continuity and transform the customer experience-without the cost and management overhead of additional hardware.
Tags : 
brocade, birtual, traffic manager, cloud, public cloud, san, data centers, it management
    
Brocade

Infographic: Gain 20/20 Vision Into Network and Application Traffic

Published By: Citrix Systems     Published Date: Nov 23, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
citrix, network, application traffic, application delivery, network visibility, data, networking, enterprise applications
    
Citrix Systems

Encrypted Traffic Management for Dummies

Published By: Blue Coat     Published Date: Nov 23, 2015
Malware hiding in SSL/TLS has become an urgent priority for security executives. Read "Encrypted Traffic Management for Dummies," a new e-book brought to you by Blue Coat. This must-read e-book is a great introduction to learn how dedicated, high-performance appliances:
Tags : 
    
Blue Coat

Simplify Your Network

Published By: Cisco     Published Date: Nov 18, 2015
Imagine you manage a warehouse for a small shipping firm. You have a simple job: route packages. But your employer expands to 25 western cities and 50 locations. After further expansion you now need to track packages coming by truck, rail, and plane and route them based on contents and weight to 10,000 different locations worldwide. While keeping traffic in and out tightly secured, making sure each package reaches its destination on time, and without going over budget. You might be wondering how things could get so complicated so quickly. But as an IT professional, you are nodding your head, because it all sounds very familiar.
Tags : 
cisco, network, business growth, virtual network, networking, security
    
Cisco

Top 10: Firewall Shopping List

Published By: Juniper Networks     Published Date: Oct 20, 2015
As with sports cars, performance is a top buying criteria for firewalls. Because if you can’t keep up with the traffic—real traffic, not traffic in the labs—your apps will be unhappy, and your users even more so.
Tags : 
juniper, firewall, traffic, networking, security
    
Juniper Networks

Network Automation and Orchestration: Simplicity and Agility for the Cloud Datacenter

Published By: Juniper Networks     Published Date: Oct 19, 2015
A new wave of application workloads and associated data traffic - related to virtualization, cloud, mobility, analytics, and social media — have placed unprecedented strain on the datacenter network and forced commensurate architectural and operational changes.
Tags : 
juniper, network, cloud, datacenter, virtualization, data, traffic, analytics
    
Juniper Networks

Networks that know Simplicity

Published By: Juniper Networks     Published Date: Oct 19, 2015
The exponential growth of cloud continues, from the adoption of public and private cloud to the mass consumerization of IT and the emergence of the Internet of Things (IoT). The rapid pace of this change is posing a challenge for your business, as increasing volumes of traffic place greater demands on network infrastructure.
Tags : 
network, data center, performance, iot, network infrastructure, cloud, infrastructure, network management
    
Juniper Networks

VMware NSX® Micro-segmentation Solution Overview

Published By: VMware     Published Date: Oct 05, 2015
Most data center security emphasizes strong perimeter defense to keep threats on the outside. But this model is ineffective against today’s new types of threats, which may be borne by east-west traffic inside your data center. Some of these intrusions may lurk for days, weeks, or months to discover and exploit vulnerabilities. An existing concept called micro-segmentation is the solution. But until now, it was hardware-intensive and costly. In this solution overview, you’ll learn why micro-segmentation is now within your organization’s reach. Get your free copy now.
Tags : 
vmware, data center security, data center, micro segmentation, micro segmentation solution, security, data protection, database security
    
VMware

IBM QRadar Security Intelligence: Evidence of Value

Published By: IBM     Published Date: Oct 02, 2015
In this report, Ponemon Institute presents findings from in-depth interviews with enterprises who switched to IBM Security QRadar from another Security Information and Event Management (SIEM) solution. The reports summarizes their rationale for switching SIEM providers as well as metrics on the deployment and performance in managing and containing network traffic anomalies.
Tags : 
ibm, security, qradar, siem, network traffic anomalies, it management
    
IBM

IBM Commerce Eighth Annual Online Retail Holiday Readiness Report

Published By: IBM     Published Date: Sep 30, 2015
Online shopping trends and best practices to maximize holiday returns.
Tags : 
mobile traffic, trends, best practices
    
IBM

5 Strategies For Converged Infrastructure Efficiency

Published By: Xangati     Published Date: Sep 14, 2015
Efficiency is not about maxing out utilization, nor is it about achieving the highest possible MIPS, IOPS or any other standard metric. Technically, efficiency is about the ratio of useful work performed to the energy expended in doing that work. You want the greatest amount of output from your IT infrastructure for the lowest possible cost. It’s a bit like long-distance driving and working to achieve the highest possible miles per gallon through constant observation of time, speed and gas consumption in the face of varying traffic and weather conditions. Flooring the gas pedal is not always the best option. What can you do to optimize your converged infrastructure efficiency? While there are no 10-second, quick-fix answers, here are five strategies you can start implementing right now to bring your organization much closer to optimal efficiency and long-term cost savings.
Tags : 
infrastructure efficiency, optimal efficiency, long-term cost savings, utilization
    
Xangati

Why Website Personalization Matters

Published By: Sitecore     Published Date: Sep 10, 2015
More conversions, traffic, repeat visitors and happier customers: imagine the possibilities when your website has the ability to sense and adapt to what each visitor wants.
Tags : 
wpm, sitecore, content profiling, segmentation targeting, online business
    
Sitecore

Five Steps For Securing The Data Center: Why Traditional Security May Not Work

Published By: Cisco     Published Date: Aug 24, 2015
Download this white paper to see why securing the data center requires a solution that can: -Provide visibility and control over custom data center applications -Handle asymmetric traffic flows and application transactions between devices and data centers -Adapt as data centers evolve: to virtualization, software-defined networking (SDN), network functions virtualization (NFV), Cisco -Application-Centric Infrastructures (ACIs) and beyond -Address the entire attack continuum: before, during, and after an attack -Integrate with security deployed across the entire network -Support geograpically dispersed inter-DC traffic and deployments, including private, public and cloud environments
Tags : 
data center security, traditional security, functionality, virtualization, visibility, sdn, nfv, acis
    
Cisco

How UGC Helps You Get High Quality Traffic

Published By: Yotpo     Published Date: Aug 12, 2015
In the crowded eCommerce space, everyone’s looking for an upper hand to gain traffic and customers. We’re going to let you in on a little marketing secret that high-performing eCommerce stores know: Adding just one type of UGC to your marketing toolkit can significantly improve all your existing efforts and increase the amount of high-quality new and returning traffic for your store.
Tags : 
yotpo, ecommerce, ugc, high quality traffic, marketing solutions, ecommerce solutions
    
Yotpo

Pura Vida Uses Yotpo to Boost Sales and Social Traffic

Published By: Yotpo     Published Date: Aug 12, 2015
Read this case study today to discover how Pura Vida used Yotpo to boost not only their sales but social traffic as well!
Tags : 
yotpo, pura vida, social traffic, sales solutions, sales enablement
    
Yotpo

Eliminate Blind Spots in SSL Encrypted Traffic

Published By: Venafi     Published Date: Aug 07, 2015
Most organisations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative.
Tags : 
eliminate blind spots, ssl, security, security application, anti spam, anti spyware, anti virus, application security
    
Venafi

Infographic: Gain 20/20 Vision Into Network and Application Traffic

Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
    
Citrix Systems

Are Cybercriminals Hiding in Your SSL Traffic?

Published By: Venafi     Published Date: Jul 27, 2015
According to Gartner, by 2017, more than ?50% of network attacks will use encrypted SSL/TLS. Most organizations cannot decrypt and inspect SSL communications to detect these threats, which creates security blind spots.
Tags : 
ssl traffic, venafi, tls, security blind spots, it security, it security solutions, it management, knowledge management
    
Venafi

Putting the Kibosh on Shadow IT: Best Practices for Hybrid Cloud Management

Published By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : 
shadow it, hybrid cloud management, visibility, network security, cloud traffic, wan, networking, security
    
XO Communications
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.