> White Papers > Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 1 - 25 of 3764Sort Results By: Published Date | Title | Company Name
By: IBM     Published Date: Jul 31, 2015
Market trends and vendor evaluation criteria.
Tags : security, data, event management, infrastructure, network management
     IBM
By: Tenable Network Security     Published Date: Jul 23, 2015
Download this white paper to learn how continuous asset discovery gives risk and security management insight into their network so they can direct security and operations staff to take the corrective action needed to reduce risk to meet the expectations of executive management.
Tags : risk management, cybersecurity, asset visibility, active scanning, risk blind spot
     Tenable Network Security
By: BitSight Technologies     Published Date: Jul 23, 2015
Since Vendor Security Risk Management is a relatively new field, there are plenty of intricacies to come to terms with. To help your introduction to VRM go a little more smoothly, we have compiled a list of FAQs and tips to get you started.
Tags : vendor risk management, vrm, risk management program, penetration tests, risk management strategy
     BitSight Technologies
By: Tenable Network Security     Published Date: Jul 23, 2015
This paper talks about IT security challenges within the healthcare industry.
Tags : compliance, healthcare organizations, mobility, medical technology, security management
     Tenable Network Security
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to find out how this approach enables you to retain top-down visibility and control of network security and manage the impact of cloud traffic on your WAN.
Tags : shadow it, hybrid cloud management, visibility, network security, cloud traffic
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Gannett views its private cloud and WAN capability as a strategic core competency and was looking for a strategic partner to support its growth and cloud initiatives. XO embraced this partnership and earned the trust of the media giant by providing superior technical expertise, smooth implementations, and responsive customer support.
Tags : gannett, private cloud, xo mpls ip-vpn wan, scalability, strategy
     XO Communications
By: XO Communications     Published Date: Jul 22, 2015
Download this white paper to learn how XO MPLS IP-VPN helps Wine.com prevent traffic bottlenecks at order processing centers, especially during high-volume periods, so orders get processed and packages don't get lost.
Tags : xo mpls ip-vpn, traffic bottlenecks, order processing, vpn, networking
     XO Communications
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Rush University Medical Center (Rush) is a not-for-profit healthcare, education, and research enterprise with a 664-bed academic medical center that includes hospital facilities for adults and children. Rush offers residency and fellowship programs in medical and surgical specialties to more than 2,000 students. With a large and experienced IT team, Rush manages three data centers across its campuses. The organization currently supports approximately 1,600 virtual desktops and 600 virtual servers, along with 10,000 physical desktops. The Rush IT team is tasked with supporting users on all devices, including smartphones and tablets. Watch the video to see how Rush protects the entire organization and protects against advanced threats with Trend Micro solutions, including Deep Discovery. Webinar Brought To You By CDW-Trend Micro
Tags : security threats, trend micro, security solutions, mobile devices, network
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : networking, security, it management
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Watch this video to learn why you should defend against targeted attacks, and how the Trend Micro Custom Defense provides unique solutions to detect, analyze and respond to your attackers. Webinar Brought To You By CDW-Trend Micro
Tags : trend micro, targeted attacks, security solutions, technology, networking
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
Don’t be that guy. The one who downloads every app he sees. You wouldn’t order a dish in a restaurant without knowing what’s inside. Apps might look good on the surface but can hide a nasty surprise. Cyber criminals create dangerous apps and websites designed to steal your private data. Watch this video to learn how Trend Micro Mobile Security detects and blocks the bad stuff keeping your mobile devices protected. Webinar Brought To You By CDW-Trend Micro
Tags : mobile security, apps, cyber criminals, cyber security, trend micro
     CDW-Trend Micro
By: CDW-Trend Micro     Published Date: Jul 17, 2015
A small business owner named Pete needs a complete security solution that protects everyone on his staff when they email, browse, and share using their Macs, PCs, or mobile devices. Watch this video and see Pete discover Trend Micro™ Worry-Free™ Business Security is an easy-to-use solution that provides complete user protection for all his employees. Webinar Brought To You By CDW-Trend Micro
Tags : security solution, cyber attack, mobile devices, business security, user protection
     CDW-Trend Micro
By: Citrix Systems     Published Date: Jul 17, 2015
Simplify adoption of the Google Chrome computing platform.
Tags : application delivery, platform, computing, architecture, security device optimization
     Citrix Systems
By: Carpathia     Published Date: Jul 17, 2015
Download this Healthcare Informatics e-book for a closer look into cloud computing and some of the strategic considerations involved in moving forward to internet-based technologies as an integrated health system.
Tags : carpathia, cloud computing, cloud services, healthcare it, cloud
     Carpathia
By: VMware, Inc.     Published Date: Jul 15, 2015
This infographic discusses the benefits of this hybrid cloud service.
Tags : hybrid cloud, hybrid cloud solutions, infrastructure support, virtualization, cloud computing
     VMware, Inc.
By: VMware, Inc.     Published Date: Jul 15, 2015
This paper talks about hybrids, how they connect to multiple clouds and the steps towards cloud implementation.
Tags : cloud computing, hybrid cloud solutions, cloud adoption, multiple clouds, automation
     VMware, Inc.
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Federal: This white paper reviews requirements from the National Institute for Standards and Technology (NIST) and the Defense Information Systems Agency (DISA) about Mobile Device security for usage in Federal affairs.
Tags : nist requirements, dod requirements, mobile device management, federal affairs, government
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Manufacturing: The Bring Your Own Device (BYOD) policies that thrive in other industries are gaining momentum in manufacturing as well.
Tags : mobile device management, manufacturing, mobile devices, smartphone, tablet
     MaaS360 by Fiberlink
By: MaaS360 by Fiberlink     Published Date: Jul 09, 2015
Get the latest mobile devices and apps in the hands of learners and educators quickly and securely with mobile device and app management.
Tags : mobile device management, education, educators, students, app management
     MaaS360 by Fiberlink
By: VMware, Inc.     Published Date: Jul 09, 2015
This paper talks about the benefits and chance that come with cloud computing in a federal agency level.
Tags : cloud computing, cloud solutions, cloud collaboration, opdivs, hhs
     VMware, Inc.
By: VMware, Inc.     Published Date: Jul 09, 2015
Transform the government IT Environment.
Tags : government, cloud, infrastructure, management, applications
     VMware, Inc.
By: VMware, Inc.     Published Date: Jul 09, 2015
Cloud for Disaster Recovery
Tags : cloud, environment, consistency, flexible, disaster
     VMware, Inc.
By: IBM     Published Date: Jul 09, 2015
Steps for successful software delivery.
Tags : software, delivery, applications, network, network management
     IBM
By: VMTurbo     Published Date: Jul 08, 2015
This paper examines the evolution of enterprise applications, the data centers in which these applications reside and the increasing expectations of businesses and end-users on the Quality of Service (QoS) their applications deliver.
Tags : application control, application performance, enterprise applications, cloud-based applications, apm
     VMTurbo
By: IBM     Published Date: Jul 08, 2015
This book defines the basics of application release and deployment, and provides best practices for implementation with resources for a deeper dive.
Tags : application integration, life cycle, software deployment, automation, itil
     IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search White Papers      

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.