network secure

Results 101 - 125 of 238Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
F5 and both Oracle and BEA have collaborated on delivering market-leading Application Delivery Networking solutions. For BEA WebLogic Server 10, F5 has designed an integrated and adaptable network platform for delivering WebLogic applications across the LAN and WAN. The result is an intelligent and powerful solution that secures and speeds your WebLogic deployment today, while providing an optimized architecture for the future.
Tags : 
oracle, bea, weblogic applications, weblogic deployments, optimized architecture, networking
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
In this paper, SAP and F5 present how modern application and network technologies can be combined to form productive SAP business application landscapes that perform well and securely when used globally.
Tags : 
sap, soa, service-oriented architecture, application ready network, sap business application, data management
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
Getting your applications to work properly over a Wide Area Network (WAN) is a complex task, and it is not likely to get easier any time soon. Trends such as data center consolidation, the advent of Web 2.0 applications, and the move to web-based application delivery have only served to increase complexity and slow user response times. Often, the result is sluggish application response and at worst, abandoned applications and shopping carts due to slow or failed web page loads. The good news is that you can do something to improve application performance over slow or congested WAN networks. An Application Delivery Network can accelerate your applications and help make sure they’re secure, fast, and available.
Tags : 
acceleration, data center consolidation, web-based application, application performance, application delivery network, accelerate, optimize, big-ip, wanjet, webaccelerator, storage, data management
    
F5 Networks Inc
Published By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, data center
    
Citrix Systems
Published By: Viavi Solutions     Published Date: Apr 14, 2017
NPMD solutions are typically not directly involved in the actual card cardholder transaction. However, given that many can potentially capture and transmit cardholder data they must be viewed as an integral part of a business’ PCI DSS compliance strategy, especially when investigating data breaches for the purposes of reporting or remediation. Therefore, beyond satisfying your service delivery monitoring and troubleshooting requirements, be sure to verify your NPMD solution protects cardholder data and aids your efforts in PCI DSS compliance.
Tags : 
network security, account security, data management, network protection, secure systems, application security, network performance, network diagnostics
    
Viavi Solutions
    
Ciena
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Connecting your VPC and corporate data helps make the AWS Cloud a valuable extension of your data center. Using IPsec AWS managed VPN connections and secure gateways provides secure access to seamlessly connect to AWS hosted resources just like any other internally facing resource.
Tags : 
    
Amazon Web Services
Published By: Lenovo and Intel     Published Date: Aug 14, 2018
Get our Security Solutions Brochure Backed by deep expertise and supported by a global network of trained and certified technical service professionals, Lenovo’s 360° approach to security gives you the complete experience of: Secure supply chain Best-in-class hardware security Securely developed software Complete component verfication Adoption and extension of security technology
Tags : 
security, supply, chain, hardware, security
    
Lenovo and Intel
Published By: Citrix Systems     Published Date: Feb 14, 2019
"If you're moving to multi-, hybrid-, or cloud-based infrastructures, your networking solution could be the key to a streamlined transition. In our e-book, ""How your network can take on the cloud — and win,"" you'll learn how the right network solution will simplify app delivery and protect your entire infrastructure, so that you can navigate your journey to the cloud with confidence. Download our e-book and find out how: - Reduce risks with secure contextualized access - Ensure reliability and performance - Make informed decisions using intelligent insights and visibility"
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Now that 72.3% of cloud users have a mix of on-prem/off-prem clouds, the networking game has changed. Traditional app delivery solutions can’t ensure reliable, secure access in a SaaS, multi-device, hybrid, and multi-cloud world.  Get this solution brief to learn why a holistic strategy innately reduces complexities that otherwise would prohitib visibility and control in distributed architectures. The brief also explains: - The Citrix Networking approach to delivering reliability and a high-quality experience - How to ensure reliable access to apps at branch and remote locations while keeping costs low - How to provide full visibility and analytics for your network, applications, users, and data"
Tags : 
    
Citrix Systems
Published By: Citrix Systems     Published Date: Feb 14, 2019
"Security threats come in a variety of different forms — from network to web and app attacks. As these form factors continue to morph, they often evade traditional security measures, leaving organizations scrambling to protect their digital ecosystem. With a comprehensive end-to-end security solution, your organization can securely deliver the apps and data your teams need to be productive. Check out our e-book and discover: - Why a holistic security approach is crucial - What a new security approach looks like - How Citrix solutions provide security across your entire stack"
Tags : 
    
Citrix Systems
Published By: SafeNet     Published Date: Oct 06, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
SafeNet
Published By: F5 Networks Inc     Published Date: Jun 24, 2015
To meet the challenges of IT organizations, Cisco and F5 have developed a shared architectural vision and joint solution to simplify networking and solve pain points in next-generation data centers. The solution extends the F5 Synthesis architecture and programmable Software-Defined Application Services (SDAS) within the Cisco Application Centric Infrastructure (ACI), helping customers efficiently deliver applications that are fast, secure and available. Read the whitepaper to learn more.
Tags : 
appplication services, cloud, software, load balancing, iot, agility, automation, operational efficiency, cisco ace, big-ip, deployment, software development, it management, data management, business technology, data center
    
F5 Networks Inc
Published By: Cisco     Published Date: Jan 12, 2016
The idea of bring your own device (BYOD) for connectivity has been well recognized in most networking environments. Yet some corporations are still struggling to understand its potential impacts. For them, the concept of users attaching privately owned and managed smartphones, tablets or laptops to their secure networks is a relatively new and worrisome concept. However, it is a challenge that customers in higher education have been dealing with for years as students have increasingly turned to easy-to-connect and affordable laptops as study aids.
Tags : 
cisco, byod, connectivity, education, networking environment, networking, it management, knowledge management, data management
    
Cisco
Published By: Extreme Networks     Published Date: Feb 05, 2015
A smarter network operating system that delivers plug-and-play, resilient, secured connectivity.
Tags : 
app networking, network operating system, secured connectivity, network switches, network infrastructures, it management, knowledge management, data management
    
Extreme Networks
Published By: Safenet     Published Date: Oct 11, 2010
Only by unlinking your encryption strategy from your network architecture can you implement a totally secure, full performance, high speed Ethernet WAN.
Tags : 
safenet, high speed ethernet wan, network security, autonomous encryption architecture, tco, compliance, data privacy, information risk management
    
Safenet
Published By: Webroot UK     Published Date: Dec 20, 2013
The Webroot® Intelligence Network (WIN) is a key component of a revolutionary approach to next-generation malware protection. Together, WIN and Webroot is combined with Webroot’s ultra-efficient endpoint agent — Webroot® SecureAnywhere™ Business - Endpoint Protection ensure that both known and... that both known and unknown infections are removed before they do harm.
Tags : 
webroot, passmark software, webroot security, endpoint protection, performance benchmark, testing, endpoint security
    
Webroot UK
Published By: VMware SD-WAN by VeloCloud     Published Date: Feb 19, 2019
The Wide Area Network (WAN) is in the midst of a significant evolution. Software-defined WAN (SD-WAN) is the key factor driving this evolution and bringing along with it many transformational changes. SD-WAN has enabled several new WAN uses cases, such as enabling reliable, secure and high performance support of software-as-a-service (SaaS), cloud compute, cloud storage, cloud security and the ability to use non-deterministic Internet services to provide business-class transport. The traditional WAN architecture was ill equipped to support these new use cases. As is usually the case with an emerging market, the first entrants into the SD-WAN space were start-ups. However, given the ability of SD-WAN to support both traditional and emerging WAN use cases, the market has recently been flooded with a range of vendors, solutions and technologies offering varying types of SD-WAN solutions. While having differing types of solutions provided by numerous suppliers is potentially beneficial, it
Tags : 
sd-wan, wan, cloud security
    
VMware SD-WAN by VeloCloud
Published By: XO Communications     Published Date: Apr 13, 2015
Use this step-by-step guide from enterprise technology expert David Linthicum to help improve your network to handle services delivered from multiple clouds. With the right network infrastructure, it is much easier to connect, secure and speed up delivery of all of the cloud applications and services consumed by your organized. No matter where you are in your cloud implementations, learn best practices and strategies in this eBook series focused on Building the Network that Empowers Digital Business. Part 2 of the series, this guide focuses on best practices and creating a master implementation plan. Interested in crafting your strategy and business case for using multiple clouds, watch for Part 1 in the series "The Evolution from Network to Multi-Clouds."
Tags : 
    
XO Communications
Published By: Riverbed DE     Published Date: Oct 16, 2017
Is your IT organization taking the proper steps toward successful cloud adoption? Legacy networking technology is hampering IT agility. Cloud providers have initiated an agility revolution but secure inter- and intra-cloud network connectivity are still very challenging. Easier alternatives are either expensive, worsen application performance and/or hamper network efficiency. Riverbed’s unique SD-WAN solution helps unlock agility across the complete enterprise network allowing for easier deployment and management of cloud-centric networks. This cloud adoption Use Case outlines challenges and solutions for cloud-centric enterprise architectures including: ·       Unlocking cloud agility through simple workflows in the WAN such as single-click secure connectivity to cloud and branch networks ·       The importance of bandwidth reduction and application acceleration to ensure cloud adoption ·       Distinguishing between application and network problems through enhanced visibility
Tags : 
cloud analytics, cloud development, cloud storage, cloud management, cloud security, cloud services, storage analytics
    
Riverbed DE
Published By: Trend Micro SPN     Published Date: Nov 24, 2009
How do you measure security effectiveness? Conventional security solutions may appear to be holding back targeted malware attacks but this eBook shows you how to check the performance of your current infrastructure. Whether you are 'secure', 'infected' or 'recovering', you can benefit from a Threat Discovery Assessment.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, threat discovery assessment, secure, infected, recovering, instant messaging
    
Trend Micro SPN
Published By: GFI Software     Published Date: Mar 21, 2011
Read about the benefits of GFI LANguard, an award-winning solution used by thousands of customers that allows you to scan, detect, assess and rectify security vulnerabilities on your network and to secure it with minimal administrative effort.
Tags : 
gfi, network scanner, vulnerability management, patch management
    
GFI Software
Published By: Proofpoint     Published Date: Apr 06, 2012
Email Security: Gartner, Inc. positions Proofpoint in the Leaders quadrant in its 2011 Magic Quadrant for the Secure Email Gateway (email security, anti-spam, anti-virus, outbound content filtering, email encryption, intrusion prevention) market.
Tags : 
secure email, email security, spam, virus, encryption, phishing, anti-spam solution, cloud intelligence, dlp, saas, virus filtering, spam filtering, archiving, antivirus, email encryption, transport layer security, tls, network intrusion prevention system, gartner email security magic quadrant, 2011
    
Proofpoint
Published By: Cisco     Published Date: Jan 28, 2009
A wireless network can help your employees stay productive as they move around your company. But to take advantage of the benefits of wireless networking, you need to be sure that your network is safe from hackers and unauthorized users. Every device in a wireless network is important to security. Because a wireless LAN (WLAN) is a mobile network, you need a thorough, multilayered approach to safeguard traffic.
Tags : 
cisco, wireless lan, wlan, mobile network, wireless network, antivirus policy, identity policy, remote access policy, password policy, cisco asa 5500, secure vpn, networking
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.