> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 351 - 375 of 4630Sort Results By: Published Date | Title | Company Name

Support of USB Devices: USB Lockdown - Secure KVM Switching

White Paper Published By: Avocent     Published Date: Aug 22, 2011
This white paper discusses elements of evaluation and the overall benefits such an evaluation will provide to you, your company and your clients.
Tags : 
avocent, usb devices, security risk, usb lockdown, secure kvm switching
    
Avocent

Ready Your Infrastructure for the Cloud

White Paper Published By: Avocent     Published Date: Aug 22, 2011
This whitepaper discusses how enterprises can take steps to optimize their data center infrastructures before experimenting with cloud computing.
Tags : 
avocent, data center infrastructure, cloud computing, power management, infrastructure
    
Avocent

Centralized Management Software: Best Practics to Control Your Data Center

White Paper Published By: Avocent     Published Date: Aug 22, 2011
Download this whitepaper to learn how to achieve secure access to any server or network device from a single interface.
Tags : 
avocent, centralized management software, best practices, data center control, secure access
    
Avocent

Pragmatic Approach to Data Center Management Control and Manageability

White Paper Published By: Avocent     Published Date: Aug 22, 2011
Enterprise Management Associates® (EMAT) analysts explore a pragmatic view of data center management in order to deliver the best practices in real-world data centers for over-arching management solutions.
Tags : 
avocent, data center manangement control, centralized data center manageability, ema™, enterprise management associates ®
    
Avocent

Achieving Control Over Data Center Implementations and Operations

White Paper Published By: Avocent     Published Date: Aug 22, 2011
By enabling services for controlling access to the infrastructure and monitoring for activity, management decisions can be made to improve data center services.
Tags : 
avocent, data center services, infrastructure, ema, data center operations control
    
Avocent

Designing a Responsible Cloud Infrastructure

White Paper Published By: Avocent     Published Date: Aug 22, 2011
Cloud computing implementations have the potential to drive significant improvements in operational efficiency and reductions in operational expenditures.
Tags : 
avocent, cloud computing, infrastructure, emat, responsible cloud
    
Avocent

Branch Infrastructure Management (SRMI)

White Paper Published By: Avocent     Published Date: Aug 22, 2011
Challenges and solutions for centralized remote office management.
Tags : 
avocent, branch infrastructure management, srmi, remote office management, centralized it staff
    
Avocent

Proven Best Practices for Network Device Management

White Paper Published By: Avocent     Published Date: Mar 15, 2011
In this brief paper, we'll address some of the best practices we've observed our customers implementing with the Avocent Corporation network infrastructure management technology. You will take away some useful insights on how to best work toward meeting your end goals.
Tags : 
infrastructure, network device management, device, network management, avocent
    
Avocent

Secure, Remote Access for IT Infrastructure Management

White Paper Published By: Avocent     Published Date: Mar 06, 2011
Download this Free Paper to learn how the Avocent ACS advanced console server offers the most feature-rich set of capabilities in modern console servers. The ACS console server provides the scalability, reliability and security a company requires to control and manage servers and other networked devices.
Tags : 
manage servers, avocent, emerson, pbx, device management
    
Avocent

Meeting SOX, PCI, and HIPAA Compliance with Secure and Auditable Vendor Access

Webinar Published By: Axeda Corporation     Published Date: Nov 14, 2007
How secure are the VPNs and modems that your vendors and partners use to access your data center? Can you confidently track all activity to meet SOX, PCI, and HIPAA compliance requirements? Learn how Axeda ServiceLink for Data Centers empowers you to provide your vendors and partners with secure and auditable access to your mission-critical data center.
Tags : 
remote, remote access, remote network, network management, network security
    
Axeda Corporation

Secure Remote Vendor Access to the Enterprise Data Center

White Paper Published By: Axeda Corporation     Published Date: Sep 06, 2007
Enabling IT equipment vendors to perform remote service on your data centers helps maximize uptime and lower TCO—but at what risk? Dial-up modems and VPNs introduce security vulnerabilities and lack sufficient auditing capabilities—making it virtually impossible to track external access and maintain data center security. Download this white paper to learn how you can manage security risks, lower service-related costs, achieve regulatory and internal compliance, and more.
Tags : 
remote, remote access, remote network, network management, network security
    
Axeda Corporation

What is the Emphasis on Choosing an IM Software For Business?

White Paper Published By: B Labs     Published Date: Sep 19, 2010
This white paper briefly overviews a functionality of enterprise-level IM systems and describes new features and tasks that can be important to corporate and business users.
Tags : 
chat, instant messaging, communication, server, messenger
    
B Labs

NoSQL Operational Checklist

White Paper Published By: Basho     Published Date: Jul 29, 2015
Download this white paper to learn why Riak KV Enterprise is especially suited to fulfill your Enterprise NoSQL requirements including operational simplicity.
Tags : 
nosql, riak kv enterprise, enterprise nosql, operational simplicity, applications
    
Basho

How Riak Helps Telcos Provide Innovative Services

White Paper Published By: Basho     Published Date: Apr 13, 2015
Today’s consumers expect instant access to communications services whether they’re in the office, at home, or on the road. With data speeds increasing and international roaming costs decreasing, data usage is rapidly growing. Telecommunications Service Providers (TSPs) are under pressure to deliver more services to more people and approach 100% uptime all while lowering prices to consumers. Traditional relational databases can’t meet the requirements for massive scalability, availability, and fault tolerance that the rapid growth in data usage and rise of big data demands. Read this solution brief to learn how Riak excels at these. Riak is a distributed NoSQL database optimized for big data. Riak meets many of the challenges you may be facing with your own service operations systems.
Tags : 
riak, basho, telecommunications service provider, license fees, scalability
    
Basho

IBM XIV® Storage System: Storage Reinvented for VMware Environments

White Paper Published By: Bell Micro     Published Date: Jun 14, 2010
In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.
Tags : 
bell micro, hardware, storage management, vmware, ibm xiv
    
Bell Micro

Microsoft Exchange on IBM XIV Storage Systems - resilience and performance

White Paper Published By: Bell Micro     Published Date: Jun 14, 2010
In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.
Tags : 
bell micro, microsoft exchange, ibm xiv storage system, resilience, performance
    
Bell Micro

Securing the SaaS-Based Enterprise: Solving the Right Problems

Free Offer Published By: bitglass     Published Date: Aug 19, 2014
In this Gigaom Research Webinar, we will separate the real threats from the hype, identify the most common forms of security breaches, and discuss the tools and processes businesses can put in place to minimize exposure and damage.
Tags : 
bitglass, saas, saas security, crm, microsoft
    
bitglass

Seven Essential Buying Criteria for Successful Video Delivery

White Paper Published By: BitGravity     Published Date: Dec 17, 2009
This paper outlines the seven essential buying criteria that every decision-maker needs to consider when making a decision on a video delivery provider. These buying criteria are shared across the gamut of small, video-centric startups and established, familiar media giants.
Tags : 
bitgravity, video delivery, legacy cdns, network architecture, internet video
    
BitGravity

Password Peril: The Frontline Security Challenge in the SaaS Age

White Paper Published By: Bitium     Published Date: Dec 09, 2013
As enterprises large and small shift their information to the cloud, an explosion of SaaS tools are making it easier than ever for employees to collaborate and innovate. Much of this sharing is being done across time zones and physical locations, by workers who are telecommuting, working in shared or public spaces, and from open networks. Information is stored on central, third-party servers that are accessible across the company and the world by anyone with an internet connection. As a result, online security is increasingly being pushed to the forefront as a major corporate expense. Yet, 89% of the global information workforce lack clarity on how security applies to the cloud. “Data is suddenly everywhere, and so are the number of people, access points and administrators who can control – or worse, copy – the data." Please download the white paper to learn more.
Tags : 
single sign on, sso, identity as a service, idaas, access and identity management
    
Bitium

40 Questions You Should Have in Your Vendor Security Assessment

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
networking, security, it management, knowledge management, enterprise applications
    
BitSight Technologies

Are Energy and Utilities at Risk of a Major Breach?

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Why does the cyber security performance of several industries differ? Download the latest BitSight Industry Benchmarking report to find out.
Tags : 
networking, security, it management, knowledge management, data management
    
BitSight Technologies

The Evolution of Vendor Risk Management in Financial Institutions

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
As third party data breaches have increased in recent years, regulators and organizations have moved from relying solely on static questionnaires and assessments, to continuously monitoring the security of vendors. Learn how financial institutions have adopted a continuous monitoring approach for their vendor risk management programs.
Tags : 
networking, security, it management, knowledge management, data management
    
BitSight Technologies

Peer-To-Peer Peril: How Peer-To-Peer Sharing Impacts Vendor Risk and Security Benchmarking

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Is Illegal File Sharing Occurring Within Your or Your Vendors’ Cyber Ecosystem? Learn about the risks posed by peer-to-peer file sharing and why you should be monitoring this activity.
Tags : 
networking, security, it management, data management, human resource technology
    
BitSight Technologies

5 WAYS YOUR VENDOR RISK MANAGEMENT PROGRAM LEAVES YOU IN THE DARK

White Paper Published By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : 
vendor risk management, vrm, risk management program, penetration tests, risk management strategy
    
BitSight Technologies

Continuous Third-Party Security Monitoring Powers Business Objectives And Vendor Accountability

White Paper Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, security, software development, it management, knowledge management
    
BitSight Technologies
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.