> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 426 - 450 of 4630Sort Results By: Published Date | Title | Company Name

2015 Cost of Data Breach Study: United States

White Paper Published By: IBM     Published Date: Apr 04, 2016
What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.
Tags : 
ibm, data breach, united states, ponemon institute, knowledge management
    
IBM

Enabling and Optimizing Hybrid IT Operations

White Paper Published By: IBM     Published Date: Apr 04, 2016
Enterprises are trending toward hybrid IT operations, turning to the cloud and managed service providers to fill the gaps in complex IT environments. This demands a new generation of MSS, enabling on-premise and managed functions to be viewed and controlled as part of a common platform.
Tags : 
ibm, managed security services, hybrid it operations, security, knowledge management
    
IBM

2015 Cyber Security Intelligence Index

White Paper Published By: IBM     Published Date: Apr 04, 2016
The Cyber Security Intelligence Index offers a high-level overview of the major threats to businesses worldwide over the past year.
Tags : 
ibm, cybersecurity, cybersecurity intelligence index, security threats, security
    
IBM

Four top cyber crime trends

White Paper Published By: IBM     Published Date: Apr 04, 2016
This report from IBM Emergency Response Services discusses four key trends in cybersecurity based on field experience in responding to client security incidents.
Tags : 
ibm, cybersecurity, ibm emergency response services, cyber crime trends, security
    
IBM

IBM 2016 C-suite Study

White Paper Published By: IBM     Published Date: Apr 04, 2016
The 2015 C-Suite Cybersecurity Study "Securing the C-Suite - Cybersecurity Perspectives from the Boardroom and C-Suite". IBM conducted a survey of over 700 C-Suite executives - excluding the CISO - from 28 countries, across 18 industries - to understand any patterns, as well as any differing or aligning attitudes on cybersecurity. 60 percent of respondents are located in mature markets and 40 percent from emerging markets. Participants spanned traditional C-Suite roles, from CEOs and Board members to CFOs, Chief Risk Officers, CMOs, COOs, CHROs, Chief Compliance Officers and Legal Counsel. This report will cover: C-Suite views of the risks and actors - Is the C-Suite view versus reality aligned? IT and business alignment and collaboration - Who's engaged and who's not? The tone from the top on external collaboration and sharing of incident information. Characteristics of more "Cyber-Secure" companies based on C-Suite responses to what their organization has accomplished
Tags : 
ibm, c-suite study, cybersecurity, security, knowledge management
    
IBM

Integrated Threat Protection System for Dummies, 1st Edition

White Paper Published By: IBM     Published Date: Apr 04, 2016
"Integrated Threat Management for Dummies lays the foundation for effective tools and techniques that work together to counter today's advanced threats. Read the ebook to learn: The principles of attack prevention How security tools work together to protect an organization IBM's tools for prevention, detection, and response"
Tags : 
ibm, integrated threat management, threat mitigation, threat management, security
    
IBM

Making a business case for fraud-prevention technology

White Paper Published By: IBM     Published Date: Apr 04, 2016
Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.
Tags : 
ibm, fraud loss reduction, fraud management, fraud prevention, security
    
IBM

Staying ahead of threats with global threat intelligence and automated protection

White Paper Published By: IBM     Published Date: Apr 04, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
ibm, threat management, global threat intelligence, automated processes, web fraud
    
IBM

Fraud Protection Doesn't have to be an uphill battle

White Paper Published By: IBM     Published Date: Apr 04, 2016
The IBM Security Trusteer Fraud Protection Suite offers a simplified approach to fraud management to help financial organizations more accurately identify and prevent fraud—all while helping to lower costs and improve the customer experience.
Tags : 
ibm, fraud protection, fraud management fraud prevention, security, knowledge management
    
IBM

CISOs Guide to Enabling a Cloud Security Strategy: Focus on SaaS

White Paper Published By: IBM     Published Date: Apr 04, 2016
Focusing on SaaS, this IDC report details considerations to help optimize your cloud security model to align with business requirements.
Tags : 
ibm, ciso, cloud, cloud security, saas
    
IBM

How to evaluate a cloud access security broker (CASB)

White Paper Published By: IBM     Published Date: Apr 04, 2016
CASBs provide CISOs with a critical control point for cloud service visibility, security and compliance. Use Gartner CASB frameworks to support continuous cloud service discovery, adaptive access, verification, protection and the prioritization of CASB evaluation criteria.
Tags : 
ibm, gartner, cloud, cloud security, casb
    
IBM

On the Radar: IBM Cloud Security Enforcer manages the secure deployment of cloud services

White Paper Published By: IBM     Published Date: Apr 04, 2016
"Enterprises recognize the value of cloud. Ovum research shows that 80% of organizations will be increasing their use of cloud services over the next two years. Employees want to use cloud services that are convenient, easy to use, and make their working lives simpler. However, business and employee views on cloud rarely correspond. The outcome, often referred to as ""shadow IT,"" is uncontrolled growth of cloud services, away from the watchful eyes of company IT departments. "
Tags : 
ibm, ovum, cloud, cloud security, ibm cloud security enforcer
    
IBM

The Case for Security Intelligence Services, Hosted from the Cloud

White Paper Published By: IBM     Published Date: Apr 04, 2016
Moving your company's security intelligence monitoring and management to the cloud can provide access to market leading capabilities and reduce capital expense. This paper outlines the advantages of the IBM security intelligence solution, delivered from the cloud, and monitored by service professionals.
Tags : 
ibm, security intelligence services, ibm security intelligence solution, cloud, security
    
IBM

Easy, agile development and administration: For cloud, analytics and mobile computing

Webinar Published By: IBM     Published Date: Apr 01, 2016
Keep your workforce and systems current for faster DevOps, deployment, and management of cloud, analytics and mobile applications. Learn about updated, intuitive mainframe tools that are easy-to-to use for both millennials and baby-boomers.
Tags : 
ibm, agile, agile development, cloud, mobile
    
IBM

Transform software delivery capability to help deliver solid ROI

Webinar Published By: IBM     Published Date: Apr 01, 2016
Learn about the latest IBM DevOps solutions for IBM z Systems mainframe that can accelerate and simplify deployments. Attend this session to find out about leveraging skills and teams dealing with multiple tools, processes and platforms.
Tags : 
ibm, z systems, devops, software delivery, it management
    
IBM

Innovation in the API economy: A Broadcast from Marie Wieck and John Musser

Webinar Published By: IBM     Published Date: Mar 31, 2016
"The API economy is the source of much of the innovation that is happening today, both in how companies manage their information technology and how they do business. To succeed in the API economy and reach new markets, companies need a clear strategy to define the best way to achieve monetization. But what, really, is this thing we call API economy? And how do you take advantage of it? In this exciting broadcast, experts will explore how companies are leveraging APIs to disrupt entire industries and how organizations can get started today. Who Should Attend this Webcast: business audience"
Tags : 
ibm, api, api economy, integration, application program interface
    
IBM

Enabling Multi-speed IT Transformation With WebSphere Application Server and Java EE 7

Webinar Published By: IBM     Published Date: Mar 31, 2016
"Cloud, Mobile and Social are today's communication and engagement models for customers, employees and partners. And to support these models, your infrastructure needs to be simple, flexible, stable, scalable and highly secure. While the changing market dynamics provide growth opportunities for businesses, capitalizing on them requires organizations to build new capabilities that: Enable continuous delivery of new features Shorten product innovation time to market Bring the business value chain closer to customers, partners and employees
Tags : 
ibm, websphere application server, java ee 7, it transformation, cloud
    
IBM

Using Analytics to Proactively Deter Insider Threats (Insider Threat & VI)

White Paper Published By: SAS     Published Date: Mar 31, 2016
The pace and sophistication of data breaches is growing all the time. Anyone with valuable secrets can be a target, and likely already is. According to the Privacy Rights Clearinghouse, at the time of this writing, 884,903,517 records were breached in 4,621 incidents documented since 2005.
Tags : 
analytics, prevention practices, best practices, data security, data management
    
SAS

Simplify Your Cloud Adoption Journey with IBM Cast Iron

Webinar Published By: IBM     Published Date: Mar 31, 2016
"Is ‘Integration’ becoming a barrier to cloud adoption and preventing you from getting there fast? With Cloud adoption gaining momentum, the diversity as well as complexity of cloud integration use cases is on the rise. The right integration strategy is the single most important determinant of success. IBM’s leading cloud integration offering—IBM Cast Iron—is constantly evolving to address the changing cloud landscape. Cast Iron has been an integration platform of choice for enterprises of all sizes, across different industry verticals. Its simple configuration-based ‘no coding’ approach and extensive pre-built connectors and templates make it suitable for emerging bi-modal IT teams. Cast Iron supports the complete spectrum of Cloud Integration use cases—from data migration to bi-directional sync, from API centric invocation style to eventbased integrations. Join us to learn the newer platform features and enhancements and how IBM Cast Iron can help you embrace cloud, paving the way fo
Tags : 
ibm, cloud integration, websphere, integration, ibm cast iron
    
IBM

Internet Performance Management is Key to Maximizing Enterprise Online Performance

White Paper Published By: Dyn     Published Date: Mar 30, 2016
IPM offers unparalleled visibility across the Internet allowing you the ability to optimize infrastructure costs, mitigate risk, and protect your revenue. Unlike APM and NPM which only provide visibility into your applications or internal network respectively, IPM provides a complete end-to-end view of the public Internet so you can: - Decide where to host content and applications for top performance - Determine the impact website partners, such as cloud providers and ISPs, have on web responsiveness - Identify optimal cloud hosts, NSPs, CDNs, and SaaS providers for Internet traffic, by region - Monitor and measure service provider performance and SLA compliance
Tags : 
dyn, internet performance management, online performance, ipm, apm
    
Dyn

Critical Capabilities for Web Conferencing

White Paper Published By: Zoom     Published Date: Mar 29, 2016
Web conferencing can be used in many meeting scenarios, from internal collaboration to presentations, training and large events. IT leaders must examine the use cases that will drive their requirements for a portfolio of online meeting technologies.
Tags : 
zoom, gartner report, web conferencing, office collaboration, video conferencing
    
Zoom

Zoom Case Study: BAYADA

White Paper Published By: Zoom     Published Date: Mar 29, 2016
BAYADA was finding it hard to scale their expensive video conferencing hardware with their growing company. Read more to learn how Zoom software and Logitech hardware helped BAYDA see higher adoption rates, increased efficiency and lower cost of ownership with integrated solutions.
Tags : 
zoom, bayada, home health care, video conferencing software, logitech hardware
    
Zoom

Zoom Case Study: Trend Micro

White Paper Published By: Zoom     Published Date: Mar 29, 2016
Trend Micro resolved the following issues by purchasing Zoom: • Overly complex or difficult communications platforms • Expensive hardware or software systems • Unreliable or poor service quality • Using too many different solutions • Difficulties connecting remote teams or sites • The need for a more efficient/effective way to reach customers and other external parties Read more to learn about the benefits of using Zoom and which features are used more frequently by Trend Micro.
Tags : 
zoom, trend micro, screen sharing, mobile meetings, group messaging
    
Zoom

Machine Learning for Email Marketers

White Paper Published By: Boomtrain     Published Date: Mar 29, 2016
Learn how to send exceptionally relevant emails and boost engagement with the most powerful technology for email marketers.
Tags : 
machine learning for marketers, marketing automation, email marketing, content analytics, content personalization
    
Boomtrain

OpenStack Demands New Approach to Application Delivery

White Paper Published By: Avi Networks     Published Date: Mar 25, 2016
This white paper examines the challenges of guaranteeing application performance in OpenStack-based cloud environments and looks at new alternatives to traditional application delivery solutions.
Tags : 
avi networks, openstack, application delivery, cloud computing services, networking
    
Avi Networks
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.