Networking White Papers

Results 1 - 25 of 4299Sort Results By: Published Date | Title | Company Name
By: iboss     Published Date: Jan 22, 2018

The conversation around the cloud has been booming of late, with the topic showing up everywhere from IT back offices to Fortune 500 C-Suites.

Tags : iboss, vpn, cloud applications, cloud computing, vpn, infrastructure, distributed computing, internet security
    
By: iboss     Published Date: Jan 22, 2018

Choosing the right cybersecurity solution has never been more important. Organizations need to understand why all security technologies are not alike.

Tags : iboss, cybersecurity, intrusion detection, security, cyberattack, network security, hacker detection, intrusion prevention
    
By: iboss     Published Date: Jan 22, 2018

While no approach is going to guarantee security across networks and devices, taking a strategic approach to IT defense not unlike those taken in real-world combat is the best course to success.

Tags : iboss, device security, intrusion, network security, distributed computing, firewalls, intrusion prevention, wireless security
    
By: iboss     Published Date: Jan 22, 2018

When the General Data Protection Regulation (GDPR) replaces the European Union’s Data Protection Directive 95/46/ec on May 25, 2018, businesses across the globe will be subject to a wealth of potential fees and penalties for non-compliance.

Tags : iboss, gdpr, gdpr compliance, compliance, general data protection regulation, remote access, security policies, web service security
    
By: iboss     Published Date: Jan 22, 2018

On behalf of iboss, Researchscape conducted an online survey of 104 U.S. IT executives at large enterprises to better understand attitudes and initiatives for addressing cybersecurity.

Tags : iboss, remote access, byod, cybersecurity, mobile workforce, network security, vpn, access control
    
By: Hewlett Packard Enterprise     Published Date: Jan 11, 2018

This white paper reports on a new 3D printing technology that creates parts quickly and less expensively.

Tags : 3d printing, product design, product engineering, manufacturing design, infrastructure, enterprise resource planning, performance testing, product lifecycle management
    
By: Hewlett Packard Enterprise     Published Date: Jan 11, 2018

A published report projected 3D printing’s economic impact could reach $500 billion annually by 2025. But first, as John Hauer writes in this article, the infrastructure for 3D printing – such as software, color capabilities, and affordable printing materials – needs to keep advancing. 

Tags : 3d printing, infrastructure, printing materials, manufacturing design, best practices, business metrics, it spending, performance testing
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Is your organization ready for this brave new world of digital content distribution? This whitepaper explores how to prime your organization to leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Sangoma     Published Date: Jan 30, 2013

The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.

Tags : sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking, knowledge management
    
By: Sangoma     Published Date: Jan 30, 2013

The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.

Tags : vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution, networking
    
By: Sangoma     Published Date: Jan 30, 2013

The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.

Tags : sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management
    
By: Sangoma     Published Date: Jan 30, 2013

Sangoma has introduced the most cost-effective, easiest to provision and easiest to manage line of enterprise SBCs on the market. The four available options deliver maximum flexibility when selecting a solution -- Learn how they can help you.

Tags : sangoma session border controllers, sbc series, carriers, enterprise, cost effective, easy to manage, sbc, networking
    
By: Sangoma     Published Date: Jan 30, 2013

IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.

Tags : ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking
    
By: Astaro     Published Date: Jan 19, 2011

Astaro now ensures that the network is running smoothly and the entire organization has become more productive through content filtering.

Tags : astaro, healthcare technology, associates for rehabilitation medicine, data management, data privacy, network security, content filtering, hipaa compliance
    
By: Astaro     Published Date: Jan 19, 2011

Botnets are based on similar principles as legitimate clouds, but serve malicious business interests. Find out more about how botnets work and the right steps after having detected infected machines within your own network.

Tags : astaro, cloud computing, botnets, network, security, network management, anti spam, anti spyware
    
By: Astaro     Published Date: Jan 19, 2011

This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.

Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
By: Astaro     Published Date: Jan 19, 2011

Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.

Tags : astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management
    
By: Coyote Point Systems     Published Date: Sep 07, 2010

If your organization's servers run applications that are critical to your business, chances are that you'd benefit from an application delivery solution. Today's Web applications can be delivered to users anywhere in the world and the devices used to access Web applications have become quite diverse.

Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, load balancing
    
By: Coyote Point Systems     Published Date: Sep 02, 2010

At a projected market of over $4B by 2010 (Goldman Sachs), virtualizationhas firmly established itself as one of the most importanttrends in Information Technology. Virtualization is expectedto have a broad influence on the way IT manages infrastructure.Major areas of impact include capital expenditure and ongoingcosts, application deployment, green computing, and storage.

Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
By: Coyote Point Systems     Published Date: Sep 02, 2010

In this paper, we'll explore how to use Coyote Point's Envoy to ensure 24x7 availability and fast connections for web content deployed at more than one geographiclocation.

Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
By: Coyote Point Systems     Published Date: Sep 02, 2010

The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.

Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network
    
By: Coyote Point Systems     Published Date: Aug 25, 2010

Application Delivery Controllers understand applications and optimize server performance - offloading compute-intensive tasks that prevent servers from quickly delivering applications. Learn how ADCs have taken over where load balancers left off.

Tags : coyote point, systems, slbs, server load balancers, adc, adcs, ssl, load balancing
    
By: AppAssure Software     Published Date: Jun 29, 2010

Recover from any server outage in 15 minutes or less and use 80% less storage space for backups with Replay's built-in deduplication.

Tags : appassure, sql, hyper-v, windows, vmware, replay, windows server, application server
    
By: Bell Micro     Published Date: Jun 14, 2010

In this Customer Solution Profile a Fortune five organization put the IBM XIV storage system through its paces in their Microsoft Exchange 2003 environment.

Tags : bell micro, microsoft exchange, ibm xiv storage system, resilience, performance, email system, network performance management, storage management
    
By: Bell Micro     Published Date: Jun 14, 2010

In this white paper, we describe the XIV snapshot architecture and explain its underlying advantages in terms of performance, ease of use, flexibility and reliability.

Tags : bell micro, hardware, storage management, vmware, ibm xiv, network architecture, server hardware
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Active Directory
175 Documents
Bandwidth Management
284 Documents
Cloud Computing
1310 Documents
Colocation and Web Hosting
268 Documents
Content Management
349 Documents
Convergence
336 Documents
Data Center
1531 Documents
Data Center Design and Management
823 Documents
Data Management
2632 Documents
Distributed Computing
207 Documents
Enterprise Applications
3141 Documents
Ethernet Networking
192 Documents
Fibre Channel
158 Documents
Gigabit Networking
170 Documents
Governance
211 Documents
Green Computing
300 Documents
Grid Computing
177 Documents
Infrastructure
1151 Documents
Internetworking Hardware
266 Documents
Interoperability
224 Documents
IP Networks
349 Documents
IP Telephony
325 Documents
IT Management
3234 Documents
Knowledge Management
1514 Documents
Load Balancing
184 Documents
Local Area Networking
233 Documents
Migration
307 Documents
Monitoring
355 Documents
Network Architecture
686 Documents
Network Management
1013 Documents
Network Performance
635 Documents
Network Performance Management
560 Documents
Network Provisioning
237 Documents
Network Security
645 Documents
OLAP
145 Documents
Optical Networking
159 Documents
Power and Cooling
295 Documents
Quality Of Service
216 Documents
Remote Access
330 Documents
Remote Network Management
271 Documents
Server Hardware
305 Documents
Servers
565 Documents
Small Business Networks
293 Documents
TCP/IP Protocol
185 Documents
Test And Measurement
201 Documents
Traffic Management
198 Documents
Tunneling
153 Documents
Utility Computing
165 Documents
VPN
225 Documents
Wide Area Networks
246 Documents
Wireless
756 Documents

Add White Papers

Get your company's white papers in the hands of targeted business professionals.