internet service provider

Results 26 - 42 of 42Sort Results By: Published Date | Title | Company Name
Published By: Dyn     Published Date: Feb 06, 2015
Whether youíre serving customers, partners, or internal users through two data centers or twenty, you want all users to have the best experience. Global load balancing (GLB) is the effective management and balancing of the Internet traffic to and from your data centers and cloud service providers and has become critical to growing enterprise ecommerce revenue, serving customers and empowering employee productivity.
Tags : 
glb, internet traffic, ecommerce revenue, employee productivity, cloud-based services, it management, data management, data center
    
Dyn
Published By: Equinix     Published Date: Mar 26, 2015
The client had an extensive global multiprotocol label switching (MPLS) network with over 30 Gbps of bandwidth. However, the client was experiencing bandwidth growth of >30% compound annual growth rate (CAGR) and foresaw increasing demands for multi-media applications, data center to data center traffic, and cloud solution usage to support its business units and global workforce. It became crucial for the client to re-architect their current network to support growth and provide a globally consistent user experience at lower cost. With 40% of their WAN traffic being http internet traffic, they needed regional internet service provider (ISP) breakouts. The client needed a lower cost/MB high capacity WAN backbone for better application performance and cloud optimization. Their network needed to be scalable to poise them for anticipated growth and offer improved site connectivity options.
Tags : 
bandwidth growth, multi-media applications, data center, cloud solution, internet service provider, cloud optimization
    
Equinix
Published By: ThousandEyes     Published Date: Jan 14, 2018
Steve Loyd, VP of Engineering Ops, uses ThousandEyes to gain visibility in application health and Internet service provider (ISP) performance.
Tags : 
thousandeyes, network performance, network intelligence
    
ThousandEyes
Published By: Ping Identity     Published Date: May 05, 2009
This white paper, intended for a management-level audience, describes why and how any organization can implement secure Internet single sign-on with a federated identity management system. Learn more today!
Tags : 
pingidentity, sso, secure internet, single sign-on, federated identity management system, software as a service, saas, business process outsourcing, bpo, ciso, attack, threats, personally-identifiable information, pii, trojan, virus, proprietary security mechanisms, crypto libraries, security assertion markup language, saml
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Ping Identity     Published Date: May 05, 2009
With the success of single sign-on (SSO) inside the enterprise, users are calling for interoperability outside of the enterprise’s security domain to outsourced services, including business process outsourcing (BPO) and software as a service (SaaS) providers, and trading partners, as well as within the enterprise to affiliates and subsidiaries. Learn more today!
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: WhichVoIP     Published Date: Jul 23, 2010
Receive FREE customized, no obligation, business VoIP phone service quotes and learn how your company can benefit from VoIP (Voice over IP) technology.
Tags : 
whichvoip, business phone quote, hosted voip phone system, voice over internet protocol, ip pbx, voip service provider
    
WhichVoIP
Published By: Dyn     Published Date: Sep 25, 2013
Domain-based Message Authentication, Reporting & Conformance (DMARC) has been created as a standard to help properly authenticate your sends and monitor and report phishers that are trying to send from your name. Read this whitepaper to learn the importance of DMARC and what it does for you.
Tags : 
dmarc, domain based message authentication, reporting comfirmation, authenticate sends, isp, internet service provider, dyn
    
Dyn
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Ciscoís proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: iDirect     Published Date: Aug 21, 2009
The Internet boom continues to grow as more and more businesses, residential and SOHO clients start using the Internet. As service providers begin to scale their networks to accommodate this tripledigit growth, traffic engineering and scalability of the network has been of utmost importance.
Tags : 
soho, soho security, service providers, network scalability, traffic management, network expansion, idirect
    
iDirect
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip, networking
    
Quocirca
Published By: Quocirca     Published Date: Dec 02, 2008
The internet offers any business the opportunity to present a commercial image independent of the organization's size and location. Small and medium sized businesses (SMBs) across the UK have exploited the internet as it has evolved from an interesting medium for the technology-aware to an essential commercial platform. With this increasing importance, and the internet’s ability to extend the reach of a business, it is valuable to realize precisely what different internet service providers (ISPs) offer before buying. This includes evaluating service level and support capabilities and understanding how these vary throughout the UK.
Tags : 
quocirca, smbs, internet service providers, information technology, security
    
Quocirca
Published By: MASERGY     Published Date: Jul 20, 2007
Organizations of all sizes are evolving to an enlightened, business-focused method of choosing network services and service providers called Total Customer Experience (TCE). This white paper describes the evolution toward a TCE approach and the benefits and clarity that TCE brings to the marketplace.
Tags : 
mice, multimedia, internet, communications, entertainment, service level, service level agreement, ip networks, collaboration, tce, quality of service, service provider, network provider, isp, masergy
    
MASERGY
Published By: Ping Identity     Published Date: May 05, 2009
Web Services are emerging as the preeminent method for program-to-program communication across corporate networks as well as the Internet. Securing web Services has been a challenge until recently, as typical Web authentication and authorization techniques employed browser-to-server architectures (not program-to-program). This resulted in user identity ending at the Web Application Server, forcing the Web Services Provider to trust blindly that the Web Services Requester had established identity and trust with the end user.
Tags : 
pingidentity, sso, standards-based, web 2.0, identity enabled, browser-to-server, soap, saml, security assertion markup language, pki, public key infrastructure, soa, oasis, ws-trust, sso, single sign-on, service oriented architecture, rest, user identity mapping, ldap
    
Ping Identity
Published By: Infoblox     Published Date: Dec 28, 2012
Learn about defeating Dos/DDoS attacks in real time -- Know about the causes of rapid growth in the number of Denial of Service (DoS/DDoS) attacks and more.
Tags : 
infoblox, dos, ddos, denial of service attacks, security, denial of service, isp, internet service provider, it management, business technology
    
Infoblox
Published By: McAfee     Published Date: Jan 20, 2015
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
asset, networking
    
McAfee
Published By: Juniper Networks     Published Date: Jun 22, 2017
This study was conducted with independent global research firm Wakefield Research between November 24 through December 14th, 2015. The data was based on an online study of 20 content questions, plus screeners and demographics of 2704 respondents, in 8 markets: US, China, Australia, Japan, India, UK, Germany, and France. All respondents were restricted to the following industries: service provider organizations, healthcare, retail, and financial services. In this case, the definition of service provider includes companies offering web content services, cable, internet service providers, or telecom. Juniper Networks challenges the status quo with products, solutions and services that transform the economics of networking. Our team co-innovates with customers and partners to deliver automated, scalable and secure networks with agility, performance and value. Visit www.juniper.net for more information.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Juniper Networks
Previous    1 2     Next   
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.