it networks

Results 776 - 800 of 823Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Sep 24, 2012
This paper will outline why social recruiting is becoming an imperative for companies today and how you can get started in reaching highly qualified candidates and passive job seekers while building brand recognition and reducing sourcing costs.
Tags : 
social recruiting, social network, recruiting, human resources, legal risks, business technology
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2013
Your company may see the potential for social recruiting or may be using tools today, but a social recruiting strategy needs to be part of overall company goals and objectives to deliver true return on investment (ROI).
Tags : 
social recruiting, social network, recruiting, human resources, legal risks
    
Oracle
Published By: uberVU via HootSuite     Published Date: Nov 08, 2012
Social media has grown out of it's infancy and is no longer an optional task for brands. Emerging with audiences on established social networks is now a key part of business interaction. Learn to tap into social leads with hootsuite.
Tags : 
hootsuite, social media, interaction, social media leads, tips and tactics
    
uberVU via HootSuite
Published By: Arbor     Published Date: Sep 20, 2013
Financial services companies have been the target of a serious, sustained, and well-funded DDoS campaign for more than a year. What these attacks have continued to demonstrate is that DDoS will continue to be a popular and increasingly complex attack vector. DDoS is no longer simply a network issue, but is increasingly a feature or additional aspect of other advanced targeted attacks. The motivation of modern attackers can be singular, but the threat landscape continues to become more complex and mixes various threats to increase the likelihood of success. There have certainly been cases where the MSSP was successful at mitigating against an attack but the target Website still went down due to corruption of the underlying application and data. In order to defend networks today, enterprises need to deploy DDoS security in multiple layers, from the perimeter of their network to the provider cloud, and ensure that on-premise equipment can work in harmony with provider networks for effective and robust attack mitigation
Tags : 
distributed denial of service, ddos attack, financial services, financial services company, ddos defense, ddos protection, security, finance, ddos mitigation
    
Arbor
Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions, networking, data center
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 10, 2014
Watch our Webinar to find out more about the capabilities offered by connecting networks to IT automation tools as well as capabilities offered by SDN solutions. Find out if you need to employ just one or both of these technologies.
Tags : 
sdn, network automation, it automation, network connection, sdn solutions, automation tools, it capabilities, networking, it management
    
Juniper Networks
Published By: Oracle     Published Date: Jul 05, 2017
The fast-evolving digital landscape is changing the game for all organizations. The way we consume content, conduct research, consume video and music, and drive efficiency in our work environment is raising the bar for digital experience. Organizations that rely on the internet to reach customers and drive revenue increasingly turn to cloud-based infrastructure and content delivery networks (CDNs) to achieve the reach and global footprint needed to keep up with customer demands. Delivering these services with high availability and performance across an unpredictable internet over which you have very little visibility and control is a major challenge.
Tags : 
it infrastructure, operations professionals, digital experience, time to resolution, cloud, dns
    
Oracle
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware, big data, data management
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
Cisco vision for the internet is one that is entering into the next generation. Connecting enterprises through rapid adoption of digital infrastructure: 5X faster than electricity and telephony. The agenda includes: Understanding the Connected Factory and its benefits to the organization's overall profitability, case studies: reducing costs, increasing quality, and maximizing productivity, the building blocks of an IoT network: unique design considerations for environments with rigid requirements.
Tags : 
technology, digital infrastructure, productivity, networks
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Historically, the speed of a wired connection at the access edge has always been faster than that of a wireless connection. This means workers had to choose between the performance of wired connectivity and the convenience of wireless connection. Today evolution of the gigabit can change this sentiment
Tags : 
    
Cisco
Published By: Riverbed     Published Date: Apr 14, 2017
"In the cloud era, businesses need levels of agility that traditional networks can’t provide. The software-defined WAN (SD-WAN) is emerging at branch offices and other remote locations to drive increased efficiencies and to optimize user experiences across cloud applications and services. What you’ll learn from this powerful resource: Why the SD-WAN market is expected to hit $6B by 2020. The products and services that form the SD-WAN landscape. Some essential guidance for SD-WAN planning and implementation."
Tags : 
    
Riverbed
Published By: GENBAND     Published Date: Apr 01, 2014
See how GENBAND offers CIOs of large multi-site enterprises effective ways to reduce telecom spend by leveraging their IP data networks for inter-site, intra-enterprise multimedia communication and consolidation of connectivity to service providers.
Tags : 
genband, enterprise, telecom, ip data networks, service provider networks
    
GENBAND
Published By: Globalscape     Published Date: Mar 21, 2014
This paper outlines the essential requirements for file sharing across a wide-area network (WAN), and briefly discusses the limitations of appliance-based WAN optimization when applied specifically to document collaboration. The paper uses a solution analysis to compare common business needs to required features, and explains how appliance-based optimization falls short of these needs. The paper then describes how Globalscape's software-only solution. (WAFS) provides file replication and collaboration across globally dispersed networks, securely and reliably, with the performance of local file sharing.
Tags : 
file sharing, wan optimization, high bandwidth, low overhead, file replication, autodesk, revit, wafs, file locking, version history, file integrity, network traffic, security, centralized backup, centralized management
    
Globalscape
Published By: Globalscape     Published Date: Mar 21, 2014
This whitepaper examines the way in which enterprise mobility has both increased employee productivity and decreased the security of corporate networks. The paper discusses the challenges IT managers have with controlling the "Bring Your Own Device" (BYOD) trend to allow mobile users to have access to the corporate network. Explained in the paper is the limit to visibility and control of file transfers when employees use ad hoc methods, and that educating employees on proper data access is not enough to protect the corporate network. The paper concludes by describing how Globalscape's EFT™ and Tappin™ can provide mobile access, without compromising security and controls over file sharing.
Tags : 
mobile, mobile access, remote access, byod, smartphones, tablets, laptops, ad hoc, file sharing, on-premises control, eft, tappin, sma, secure mobile access, mft, it management
    
Globalscape
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Polycom     Published Date: Nov 09, 2015
In this paper, we consider the different alternatives, and how the inclusion of multiple network abilities in an audio conferencing device can assure both excellent performance and investment protection.
Tags : 
polycom, audio conferencing, investment protection, digital, knowledge management, business technology
    
Polycom
Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats, networking
    
McAfee
Published By: Aerohive     Published Date: Feb 17, 2015
This video reveals how using enterprise wireless networks improves classroom efficiency by giving teachers the tools needed to communicate and teach students.
Tags : 
enterprise wi-fi for education, benefits of using wireless networks, aerohive networks for education, benefits of using wi-fi in classrooms, wireless networks
    
Aerohive
Published By: Aerohive     Published Date: Feb 17, 2015
This video reveals how using enterprise wireless networks improves classroom efficiency by giving teachers the tools needed to communicate and teach students.
Tags : 
enterprise wi-fi for education, benefits of using wireless networks, aerohive networks for education, benefits of using wi-fi in classrooms, wireless networks
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2015
This video reveals how using enterprise wireless networks improves classroom efficiency by giving teachers the tools needed to communicate and teach students.
Tags : 
enterprise wi-fi for education, benefits of using wireless networks, aerohive networks for education, benefits of using wi-fi in classrooms, wireless networks
    
Aerohive
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
As organizations prioritize digital transformation initiatives, many are finding that legacy networks are holding them back. To support new business models, cloud adoption, and an explosion in connected devices, modern networks must support interoperability across data centers, multiple clouds, branch locations, and edge devices. Applications now run at every point on this spectrum, and they are critical to businesses’ ability to win in hypercompetitive marketplaces. Yet, even as business success has become more dependent on this new architecture, and the amount of data flowing across connections has increased, many organizations still lack a unified approach to management, automation, and security
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
This in-depth report provides a detailed look at a recent survey carried out by Intel Security exploring the topic of data exfiltration. Participants were asked about their top concerns, breach and exfiltration details, outsider and insider threats, exfiltration differences between traditional networks and cloud applications, and the tools and practices they use to identify and prevent data exfiltration.
Tags : 
data exfiltration, data loss prevention, dlp, data management
    
Intel Security
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data, business technology
    
ArborNetworks
Published By: Mitel     Published Date: Jan 26, 2016
Mitel and Mavenir have combined to pursue the same vision of communications industry convergence and to provide business critical voice and high value business collaboration services across Mobile and Enterprise networks.
Tags : 
real time communications, enterprise communication, cloud, high value business collaboration, mobile and enterprise networks
    
Mitel
Start   Previous    19 20 21 22 23 24 25 26 27 28 29 30 31 32 33    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.