network resources

Results 126 - 150 of 169Sort Results By: Published Date | Title | Company Name
Published By: Aviatrix     Published Date: Jun 11, 2018
Global Transit Network architecture is critical to the success of your AWS cloud deployment. Implemented correctly, a Global Transit Hub enables traffic to securely flow from on-prem to VPCs, or from VPC to VPC, in a way that minimizes complexity and cost and maximizes agility and availability. Implemented poorly, it becomes a choke point that is time-consuming – and costly – to maintain and troubleshoot. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei reviews seven best-practice topics for Global Transit Network architecture. Free Evaluation Checklist In addition to the slides, you’ll also receive a handy spreadsheet-based checklist with 50 architecture and business goals to consider when evaluating solutions for your own Global Transit Network. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Published By: A10 Networks     Published Date: Aug 21, 2009
This white paper highlights the complex nature of traditional authentication and identity management practices and shows how A10 Networks unified identity and access management solutions simplify the convergence of network, security, and identity resources for proper deployment.
Tags : 
identity management, authentication, access control, anti spam, anti spyware, anti virus, a10, a10 networks
    
A10 Networks
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Using strategic points of control to aggregate and dynamically provision IT resources can help organizations meet network-related challenges and move past the hype to successfully build, deploy, and secure private clouds. By using strategic points of control to aggregate and dynamically provision resources, organizations can meet network-related challenges and successfully build, deploy, and secure private clouds.
Tags : 
cloud implementation, secure, private cloud, self-sevice it, automation and orchestration, transitioning to a hybrid model, virtualization of the network, it management
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Sep 05, 2012
Private cloud-as an approach to IT operations-calls for organizations to transform their data centers, including the network. Using strategic points of control to aggregate and dynamically provision IT resources can help organizations meet network-related challenges and move past the hype to successfully build, deploy, and secure private clouds.
Tags : 
cloud, cloud computing, technology, operations, data center, network
    
F5 Networks Inc
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 16, 2014
Read Social Recruiting for Dummies to get simple, practical advice on recruiting with social media, from creating and implementing a social recruitment strategy to fostering a truly aspirational employment brand.
Tags : 
zenithoptimedia, oracle, transformational knowledge, operational efficiency, knowledge management, business management, social recruiting, recruit talent, employee networks, scaling efforts, best practices, social networks, human resources, consolidation, social recruit
    
Oracle
Published By: Oracle     Published Date: Jan 28, 2013
Your company may see the potential for social recruiting or may be using tools today, but a social recruiting strategy needs to be part of overall company goals and objectives to deliver true return on investment (ROI).
Tags : 
social recruiting, social network, recruiting, human resources, legal risks
    
Oracle
Published By: Oracle     Published Date: Sep 24, 2012
This paper will outline why social recruiting is becoming an imperative for companies today and how you can get started in reaching highly qualified candidates and passive job seekers while building brand recognition and reducing sourcing costs.
Tags : 
social recruiting, social network, recruiting, human resources, legal risks, business technology
    
Oracle
Published By: Butler Technologies     Published Date: Jul 02, 2018
Increasingly complex networks, require more than a one-size-fitsall approach to ensuring adequate performance and data integrity. In addition to the garden-variety performance issues such as slow applications, increased bandwidth requirements, and lack of visibility into cloud resources, there is also the strong likelihood of a malicious attack. While many security solutions like firewalls and intrusion detection systems (IDS) work to prevent security incidents, none are 100 percent effective. However, there are proactive measures that any IT team can implement now that can help ensure that a successful breach is found quickly, effectively remediated, and that evidential data is available in the event of civil and/or criminal proceedings.
Tags : 
    
Butler Technologies
Published By: Dell EMC     Published Date: Nov 02, 2015
Download this infographic to see how how PowerEdge FX takes a more modular approach to converged infrastructure, which gives you the flexibility to tailor converged compute, storage and networking resources to meet specific workload requirements.
Tags : 
    
Dell EMC
Published By: Dell EMC     Published Date: May 11, 2016
Its power is in its precision. Download this infographic to see how PowerEdge FX takes a more modular approach to converged infrastructure, which gives you the flexibility to tailor converged compute, storage and networking resources to meet specific workload requirements.
Tags : 
    
Dell EMC
Published By: CDW     Published Date: Mar 31, 2015
As mobile computing becomes an increasingly important technology, the need for robust, reliable wireless networks is growing. In addition to enterprise-issued devices, users are bringing their own tablets and smartphones and demanding access to IT resources. Organizations need a wireless infrastructure that can support these demands. Our research shows that in addition to mobile demands, aging hardware is driving many organizations' wireless upgrade plans. Download this white paper to read more about the research.
Tags : 
wireless, infrastructure, wi-fi, mobile computing, byod, upgrade, networking, it management
    
CDW
Published By: Polycom Inc.     Published Date: Oct 14, 2010
This white paper will look at High Profile from both the business and technology perspectives, and provide answers to these questions.
Tags : 
polycom, h.264 high profile, visual communication, real-time video, video compression
    
Polycom Inc.
Published By: Cisco     Published Date: Nov 18, 2015
In January 2015, Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment enterprises may realize by deploying Cisco TrustSec. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco TrustSec on their organizations. The Cisco TrustSec solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, Cisco TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks.
Tags : 
cisco, trustsec, tei, total economic impact, network, networking
    
Cisco
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Published By: Aerohive Networks     Published Date: Aug 22, 2014
Cloud networking introduces a new way to deploy, operate, & manage distributed enterprise networks. It delivers network capabilities via a cloud infrastructure with minimal capital investment or IT resources. This paper provides details on cloud networking, the state of the cloud market & its benefits.
Tags : 
cloud networking, enterprise, it resources, deploy, operate, mange, infrastructure, networking
    
Aerohive Networks
Published By: SilverSky     Published Date: May 09, 2014
This paper provides an overview of the benefits of outsourced security solutions such as managed security services. The managed security services option saves money, improves the network security posture, and maximizes the efficiency of existing corporate resources.
Tags : 
silversky, business value, security services, the cloud, security conundrum, decrease threats, service providers, managed solutions, security solutions, it management
    
SilverSky
Published By: PC Mall     Published Date: Oct 12, 2011
85% of networking costs are incurred after the initial equipment purchase. Join Cisco to hear how a next generation network can reduce network TCO and free up precious IT resources to drive innovation across your business.
Tags : 
cisco, pc mall, technology, economics, networking, tco, business, business technology
    
PC Mall
Published By: ForeScout     Published Date: Aug 14, 2012
Business wants more fluid access to data while IT organizations must maintain security. As the variety of access and multitude of threats to network resources and sensitive information have grown, so has the need for more flexible and automated ways to effectuate security policies, controls and enforcement. Rarely is this need more keenly felt than at the network endpoint, where people, technology, information assets and requirements for security and compliance meet most directly.
Tags : 
pragmatic, path, achieving nac results, essential implementation, process, control, consideration, data, access, it organization, security, protection, network, access, control, nac, interoperability, 802.1x standards, control, options
    
ForeScout
Published By: Creekpath     Published Date: Aug 21, 2009
An effective storage management solution must consider the role of SAN security in ensuring network and data integrity. When Direct Attached Storage (DAS) was the majority of storage, security was not an issue. By preventing access to the server you could stop access to the server-owned storage resources of disk and tape. Holes in SAN security practices can threaten data integrity and system availability.
Tags : 
storage management, som, storage operations management, direct attached storage, das, san security, high availability, data integrity, database security, data protection, backup, creekpath
    
Creekpath
Published By: IGLOO Software     Published Date: Dec 29, 2009
Networked business models are the wave of the future as we extend collaboration, knowledge sharing and networking beyond the corporate firewall to customers, partners and suppliers. Focusing resources on optimizing your relationships with these stakeholders can make you more resilient and adaptive to shifts in the market.
Tags : 
social marketplace, igloo, collaboration, facebook, linkedin, twitter, web 2.0, loyalty, erp, crm, google analytics
    
IGLOO Software
Published By: Breakout Solutions     Published Date: Sep 24, 2008
Current trends are telling organizations exactly where their customers are congregating online but there seems to be a disconnect between users spending more time online in social networks and organizations spending more dollars and resources to reach them. Read this research today!
Tags : 
breakout solutions, blogs, videos, social networks, social media, web 2.0, social media optimization, social media marketing, social influence marketing
    
Breakout Solutions
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Aviatrix     Published Date: Jun 11, 2018
Join Aviatrix for a discussion of next-generation transit hubs that are purpose-built to treat the network as code, rather than as a virtualized instance of a data center router. Learn how a software-defined approach can transform your AWS transit hub design from a legacy architecture exercise into a strategic infrastructure initiative that doesn’t require you to descend into the command-line interface and BGP of the IT networking world. As part of our fact-filled AWS Bootcamp series, Aviatrix CTO Sherry Wei and Neel Kamal, head of field operations at Aviatrix share the requirements that our most successful customers have insisted upon for their Global Transit Networks, and demonstrate the key features that deliver on those requirements. Who Should Watch? Anyone responsible for connectivity of cloud resources, including cloud architects, cloud infrastructure managers, cloud engineers, and networking staff.
Tags : 
aws, aws vpc, aws global transit network, aws transit vpc, cisco csr, csr 1000v
    
Aviatrix
Start   Previous    1 2 3 4 5 6 7    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.