> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1101 - 1125 of 1260Sort Results By: Published Date | Title | Company Name
White Paper Published By: SAS     Published Date: Nov 04, 2015
How does marketing compare to a game of pool? Sometimes you hit a good shot – 9 ball corner pocket – like when you’ve marketed a product and your customer purchases it. But sometimes your shot misses, and you knock in your opponent’s ball. You could even knock your ball into the pocket, but mistakenly knock your opponent’s ball into a different pocket at the same time. Of course, you can’t predict everything in a game of pool – or in marketing. A campaign may reveal a weakness that sends customers scuttling to a competitor. A new product can cannibalize an existing product line. Customers could leave one of your legacy product lines to consume one of your newly launched products – perhaps causing you to lose some revenue. But unlike pool, it’s hard to observe and measure with the naked eye what’s happening in marketing. The way to improve your chances of success is to build a solid measurement plan that lets you define and measure diagnostic metrics.
Tags : 
sas, marketing analytics, data driven decision making, consumer behavior, marketing mix
    
SAS
White Paper Published By: Okta     Published Date: Nov 03, 2015
Gartner has named Okta as the only leader in its 2015 Identity & Access Management as a Service (IDaaS) Magic Quadrant. Access your complimentary Gartner report today.
Tags : 
okta, gartner, magic quadrant, identity and management, idaas
    
Okta
White Paper Published By: Okta     Published Date: Nov 03, 2015
Enterprise mobility management and identity and access management offerings are moving toward meaningful integration. IAM and mobility leaders must take advantage to gain convenience, security and efficiency benefits.
Tags : 
okta, enterprise mobility, mobility management, access management, mobility leaders
    
Okta
Webinar Published By: Okta     Published Date: Nov 03, 2015
One of the biggest challenges when migrating to Office 365 from your existing Exchange infrastructure, is that of Active Directory integration. Watch this demo to learn how to easily connect your Office 365 environment back to Active Directory without any new servers in your data center.
Tags : 
okta, directory sync, demo, office 365, exchange infrastructure
    
Okta
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This guide will examine seven common misconceptions and distinguish between myth and reality.
Tags : 
mcafee, intel, security, malware, cyber
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This report provides details on the most common attack methods used by cyber-criminals, how they operate, and the technologies you need to stay safe.
Tags : 
mcafee, intel, security, cyber, criminal
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 20, 2015
If your business is still running Windows Server 2003, you must act now to keep your business secure. This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 20, 2015
Companies are well aware of the benefits of virtualization and cloud computing, but many are reluctant to embrace the public clould because they don't have a way to assess and ensure security. This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
aberddeen, data center, datacenter, cloud, server security
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 20, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 20, 2015
Fortunately, implementing and managing DLP isn’t nearly as difficult as many security professionals expect. For over 10 plus years Securosis has covered the technology — talking with hundreds of DLP users . In this 30 page report they have compiled valuable tips, tricks, and techniques for streamlined and effective DLP deployments into straightforward processes to ease most common pain points.
Tags : 
intel, mcafee, dlp, securosis, networking
    
Intel Security
White Paper Published By: IBM     Published Date: Oct 06, 2015
This Edison Group study provides an overview of three of the market leading MADPs -- IBM, SAP and Koney -- and discusses how they compared them using a real-world use case.
Tags : 
networking, it management, business technology
    
IBM
White Paper Published By: VMware AirWatch     Published Date: Sep 11, 2015
An infographic on Enterprise Mobility Management from AirWatch illustrating top market trends and mobile opportunities, market challenges and reasons to engage in Enterprise Mobility Management through AirWatch.
Tags : 
mobile empowerment, airwatch, mobile, cloud, networking
    
VMware AirWatch
White Paper Published By: EvolveIP     Published Date: Sep 09, 2015
When considering any new financial undertaking, you need to conduct a comparison between what you are already spending and what you will spend. In most financial comparisons, you can look at previous patterns to predict future costs or options.
Tags : 
networking, it management, knowledge management, data management, business technology
    
EvolveIP
White Paper Published By: Cisco     Published Date: Jul 30, 2015
Business benefits of IoT.
Tags : 
iot, internet of things, data management, business efficiency, manufacturing process
    
Cisco
White Paper Published By: IBM     Published Date: Jul 07, 2015
Through the IBM Network Innovation Centers, IBM brings together networking services and technology capabilities together to demonstrate infrastructure agility.
Tags : 
demonstrations, network innovation, networking solutions, interoperability, manageability
    
IBM
Webinar Published By: IBM     Published Date: Apr 01, 2015
Is email still the “killer app” it used to be? Social technologies and mobile capabilities are changing the way people communicate in the workplace. Many organizations are employing BYOD strategies and embracing social business tools like file sharing, chat, wikis and communities. In the past, email was used for storing and sharing documents and having conversations with groups. Tasks which are much better suited for today's social cloud collaboration tools. Email usage may be evolving, but email is not dead. In fact, everyone in the organization from executives to factory workers needs email to stay connected. And many organizations are moving their messaging to cloud to take advantage of the flexibility and cost savings a cloud environment provides. In this webcast, you will learn: • How the nature of email has changed and why everyone in your organization needs it. • Why the cloud makes sense for messaging for everyone from executives, to sales, to boundary workers, either as hybrid solution or for the entire workforce. • How email complements social business technologies and how you can start using your email more efficiently in the workplace. • How moving messaging to the cloud can help reduce IT cost and complexity.
Tags : 
email, social technologies, byod, file sharing, chat
    
IBM
White Paper Published By: BitSight Technologies     Published Date: Feb 20, 2015
Download "Continuous Third Party Security Monitoring Powers Business Objectives And Vendor Accountability" (a commissioned study conducted by Forrester Consulting on behalf of BitSight) to learn how companies are continuously managing third party risk.
Tags : 
networking, software development, it management, knowledge management, storage
    
BitSight Technologies
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Constantly available networks typically rely on several Internet service providers to ensure always-on connectivity and increase bandwidth. Augmented VPN aggregates all Internet Service Provider links to obtain a single high capacity tunnel.
Tags : 
asset, networking
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection
    
McAfee
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Advanced evasions will break the security protection model that most organizations are using today. Given this changing threat landscape we need to rethink traditional security models. Here’s advice on how to evade AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection
    
McAfee
Case Study Published By: CDW     Published Date: Jan 07, 2015
Learn how optimizing your campus network solutions will transform the student body by allowing students to seamlessly surf the web, but also communicate with each other in a more fluid manner.
Tags : 
enterprise, networking, architecture, customer, technology
    
CDW
White Paper Published By: Epicor Software     Published Date: Nov 25, 2014
This whitepaper identifies eight ideas on how to deliver more value to your customers in a completely different way.
Tags : 
enterprise resource planning, erp, erp system, software, software implementation
    
Epicor Software
White Paper Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions
    
Cisco
White Paper Published By: Juniper Networks     Published Date: Sep 10, 2014
Get insight into the innovative solutions demanded by data center security in IDC’s Whitepaper. Read about the unique challenges enterprises face in securing data centers, and how Juniper Networks security technologies meet these.
Tags : 
security challenges, data center demand, innovative solutions, security technologies, innovative solutions
    
Juniper Networks
Webinar Published By: Juniper Networks     Published Date: Sep 10, 2014
Discover how a dynamic, intelligent firewall can improve your security with our Webinar. Learn about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall.
Tags : 
next generation firewall, intelligent firewall, security, intelligent protection, active defense
    
Juniper Networks
Start   Previous    37 38 39 40 41 42 43 44 45 46 47 48 49 50 51    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.