> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 101 - 125 of 4630Sort Results By: Published Date | Title | Company Name

3 Steps to become a Successful Cloud-enabled Enterprise

White Paper Published By: Equinix     Published Date: May 18, 2015
Download this infographic to find out how to maximise the benefits of the cloud for your unique business needs.
Tags : 
cloud, power of the cloud, benefits of cloud, cloud computing, maximise benefits of cloud
    
Equinix

3 Steps to Better Cloud Performance

White Paper Published By: Digital Realty     Published Date: Jan 23, 2019
Download the new white paper from Digital Realty that explores how to improve cloud performance through a multi-cloud platform, centralized governance, and on-demand networking.
Tags : 
digital realty, cloud, cloud computing, governance, cloud infrastructure
    
Digital Realty

3 Steps to Server Virtualization Visibility

White Paper Published By: Viavi Solutions     Published Date: Sep 30, 2015
Each enterprise has its own reasons for moving to virtual infrastructure, but the common benefit is better and more efficient server utilization. Ensure comprehensive visibility with three practical steps highlighted in this white paper.
Tags : 
server virtualization visibility, virtual infrastructure, server utilization, virtualization, viavi
    
Viavi Solutions

3 Steps to Server Virtualization Visibility

White Paper Published By: Viavi Solutions     Published Date: Sep 30, 2015
Each enterprise has its own reasons for moving to virtual infrastructure, but the common benefit is better and more efficient server utilization. Ensure comprehensive visibility with three practical steps highlighted in this white paper.
Tags : 
server virtualization visibility, virtual infrastructure, server utilization, virtualization, viavi
    
Viavi Solutions

4 Big Reasons Why Videoconferencing Is the Future

White Paper Published By: Glowpoint     Published Date: Oct 13, 2015
It’s not just about cutting travel costs. Videoconferencing offers a number of business benefits that can help organizations gain a competitive edge and become companies of the future, rather than the past. Read on to find out more.
Tags : 
glowpoint, videoconferencing, talent acquisition, productivity, efficiency
    
Glowpoint

4 Characteristics of Top-Notch Big Data Cloud Solutions

White Paper Published By: IBM     Published Date: Jan 14, 2015
Cloud-delivered big data analytics presents an enormous opportunity for organizations that want to become more agile, more efficient and more competitive. To capitalize on the full potential of this opportunity, businesses need cloud-enabled big data analysis solutions that are flexible, simple, secure and open.
Tags : 
big data, data management, the cloud, cloud solutions, data
    
IBM

4 Critical Risks Facing Microsoft® Office 365™ Implementation

White Paper Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud
    
Mimecast

4 Data Center Trends of the Future

White Paper Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability
    
Emerson Network Power

4 Key Qualities of Effective Host-Based Intrusion Prevention (HIP) Systems

White Paper Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection
    
Third Brigade

4 Steps to Successful IT Systems Management

White Paper Published By: Kaseya     Published Date: Jul 29, 2013
Discover, Manage, Automate and Validate
Tags : 
kaseya, it systems management, validate, it services, it teams
    
Kaseya

4 Steps to Successful IT Systems Management

White Paper Published By: Kaseya     Published Date: Mar 12, 2015
Discover, Manage, Automate and Validate
Tags : 
it automation management systems, network management, byod, software management, integrated web-based platform
    
Kaseya

4 Steps to Successful IT Systems Management

White Paper Published By: Kaseya     Published Date: May 13, 2015
While seemingly counter intuitive, organizations can actually create IT efficiencies without having to cut service levels by adopting a systems management strategy that embraces the concept of “Discover, Manage, Automate and Validate.”
Tags : 
kaseya, hybrid, cloud, management, msp
    
Kaseya

4 Steps to Surviving Big Data

White Paper Published By: Viavi Solutions     Published Date: Apr 01, 2015
Big data projects are becoming reality for nearly every major enterprise. According to a recent survey, 49 percent of respondents say they are implementing, or likely to implement big data projects in the future. Twelve percent already have. With big data comes surprising impacts to your network. The 4 Steps to Surviving Big Data white paper will help you identify problems before they start.
Tags : 
big data, data projects, network performance, data management, network impact
    
Viavi Solutions

40 Questions You Should Have in Your Vendor Security Assessment

White Paper Published By: BitSight Technologies     Published Date: Jan 11, 2016
Need some assistance with the creation of your vendor security risk assessment? This eBook contains vital questions you should be incorporating into your vendor risk management program.
Tags : 
networking, security, it management, knowledge management, enterprise applications
    
BitSight Technologies

40% PCI Non-Compliance? How to Beat The Stats Without Breaking a Sweat

White Paper Published By: Solidcore     Published Date: Jan 15, 2008
New report issued by Fortrex, Emagined Security and Solidcore reveals the cost of PCI compliance is justified. These PCI requirements exist to protect sensitive data - yet, research indicates that these are among the least satisfied requirements across Level 1 merchants, with almost 40% non-compliance. 
Tags : 
security, monitoring, auditing, compliance, data protection
    
Solidcore

451 Group Report: AlienVault USM - A Security Operations Center for the SMB

White Paper Published By: AlienVault     Published Date: Jul 16, 2014
AlienVault's USM is tailor-made for the needs of the security-savvy SMB. It offers affordability, and a comprehensive and ever-increasing feature set powered by the respectable AV Labs and Open Threat Exchange.” In this analyst report, Javvad Malik of The 451 Group, reviews AlienVault's SMB-focused approach to SIEM and discusses the competitive landscape.
Tags : 
alienvault, alienvault usm, security operations center, smb, javvad malik
    
AlienVault

451 Survey Data Identifies EFSS Winners, Losers and Big Changes

White Paper Published By: Dropbox for Business     Published Date: May 07, 2015
Dropbox is named the most popular Enterprise File Sync and Share Product over other vendors like Microsoft, Google Drive and Box.
Tags : 
efss, enterprise file sync and share, hybrid-cloud systems, data management, cloud migration
    
Dropbox for Business

451: Silver Peak Claims Proof-Positive of Network Virtualization’s Agility

Case Study Published By: Silver Peak     Published Date: Feb 12, 2013
Silver Peak Systems' new Agility technology initiative gives application owners easy control with point-and-click virtual workload acceleration thanks to tight integration with VMware vCenter and other virtual infrastructure management consoles.
Tags : 
virtualization, data center, network, study, bandwidth management
    
Silver Peak

5 Approaches to Messaging Security: A Technical Overview of the Tradeoffs

White Paper Published By: Sigaba     Published Date: Aug 21, 2009
This white paper reviews the five most common current approaches to messaging security. While the five approaches discussed here are not the comprehensive list of available solutions, they are the basis for most variations of messaging security solutions available today.
Tags : 
email security, security management, security policies, secure instant messaging, intranets
    
Sigaba

5 Benefits of Having USB Ports on Your Rack PDUs

White Paper Published By: Raritan     Published Date: Sep 24, 2014
Connecting your PDUs to a Wi-Fi Network is only one reason, there's four more you should learn about now for your growing organization.
Tags : 
raritan, usb, power, data center, rack
    
Raritan

5 Best Practices for Defending the Enterprise

White Paper Published By: Entrust Datacard     Published Date: Jan 16, 2015
With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.
Tags : 
entrust, server, risk, assessment, authentication
    
Entrust Datacard

5 Considerations for Selecting an IaaS Provider in 2014

White Paper Published By: Logicalis     Published Date: Mar 07, 2014
Learn the top trends and concerns for choosing the right infrastructure-as-a-service (IaaS) provider.
Tags : 
logicallis, iaas, security, compliance, cloud
    
Logicalis

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Perform

White Paper Published By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : 
coyote point, adc, buyer's guide, web applications, server load
    
Coyote Point Systems

5 Great Reasons to Use Colored Rack PDU's

White Paper Published By: Raritan     Published Date: Sep 24, 2014
Why Color Rack PDU's? Make it east for Technicians working on your IT rack and Reduce Lighting In Your Datacenter. Download now to find out the other benefits.
Tags : 
raritan, rack, data center, power, data center power
    
Raritan

5 Keys to Unlock an Easy Network Access Control Implementation

White Paper Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control
    
Great Bay Software
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Content Management, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.