networks

Results 1 - 25 of 1949Sort Results By: Published Date | Title | Company Name
Published By: Kaspersky Lab     Published Date: Aug 27, 2015
As networks increase in complexity, keeping them secure is more challenging. With users connecting to unsecured public networks, running multiple applications on both company-owned and personal devices, corporate data can now be accessed – and lost – from more endpoints than ever. This guide provides simple, practical advice to help simplify these issues.
Tags : 
    
Kaspersky Lab
Published By: Hewlett Packard Enterprise     Published Date: Jan 30, 2020
Ensuring the network performs at its best can be a challenge especially for midsize businesses with limited staff and budget. To stay competitive, you need a simple, smart, and secure network that enhances productivity and drives business growth. Find out how a cloud-managed network is the secret to success. See in the eBook how a cloud-managed network can help you: • Do more and spend less • Save time with easy management • Identify source of network bottlenecks
Tags : 
    
Hewlett Packard Enterprise
Published By: HP Inc. APAC     Published Date: Feb 13, 2020
Research shows that a printer is 68% more likely to be the source of an external breach now than it was in 2016. Yet only 30% of IT professionals recognise that printers pose a security risk. Even among IT professionals who recognise the risk, securing the glut of end-user devices often takes top priority, leaving printers wide open and networks vulnerable. In this survey commissioned by HP, you will learn about the following: • Why printer security might be the biggest risk in your company. • Why IT managers continue to be complacent on the state of endpoint security in their networks. • Why it’s time to take printer security seriously.
Tags : 
    
HP Inc. APAC
Published By: HashiCorp Q1-20     Published Date: Jan 21, 2020
In this video, Armon Dadgar, a founder and co-CTO of HashiCorp, explains how to secure your infrastructure in a dynamic, multi-cloud world. The key: Tools that adopt the zero-trust network philosophy. In this new world of zero-trust networks, Armon suggests three important aspects for success: - Good secrets management: don't hard-code service passwords - Segmentation: don't segment by network, but do it by service - Data protection: encrypt data at rest
Tags : 
    
HashiCorp Q1-20
Published By: Delta Risk     Published Date: Jan 30, 2020
Most businesses have trouble keeping up with today’s constant barrage of cyber threats. Many are turning to MSSPs (managed security services providers) to protect their networks cost-effectively and reliably. Here are 10 best practices to follow when selecting an MSSP.
Tags : 
    
Delta Risk
Published By: IBS Software     Published Date: Feb 19, 2020
The NDC program was initiated by IATA (International Air Transport Association) with the objective of streamlining distribution networks through an industry-level standardization protocol and give airlines greater flexibility to differentiate and sell their products via third-party intermediaries. As NDC gains momentum in the industry, airlines can explore multiple strategies to help them achieve their NDC initiatives such as product differentiation, personalized offers, rich content & ancillaries offers. One way to do this would be to move from a legacy PSS system to a modern distribution platform. However, in doing so, should they look at NDC compliant or NDC native platforms? In this Whitepaper, we answer these questions and touch upon: • Demystifying the differences between NDC native and NDC compliant platforms • How do NDC compliant (non-native) platforms work? • What does it take to build a NDC native solution? • Why should airlines invest in a NDC native PSS solution?
Tags : 
    
IBS Software
Published By: Sangoma     Published Date: Jan 30, 2013
IP communications across multiple, sometimes untrusted, networks needs to be normalized, managed and secured. As part of the most cost-effective, easiest to manage line of Session Border Controllers on the market. Read to learn how they can help you.
Tags : 
ip communications, sangoma, ip firewall, datasheet, sangoma, session border control, carrier appliance, networking
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking, knowledge management
    
Sangoma
Published By: Aryaka Networks     Published Date: Sep 06, 2018
Makino, a leader in manufacturing, required a global network to transfer massive amounts of data from their HQ to regional tech departments. Learn why Makino replaced their MPLS circuits with Aryaka.
Tags : 
    
Aryaka Networks
Published By: Virtela Communications, Inc.     Published Date: Nov 16, 2009
Frost & Sullivan review the limitations associated with a single-provider approach to MPLS networks and its impact on the enterprise. They examine Virtela's Global Service Fabric - a multi-carrier network approach that provides a best-of-breed global MPLS network solution.
Tags : 
virtela, frost & sullivan, mpls networks, virtela's global service fabric, mpls network solution, cos, multi-protocol label switching, wide area network
    
Virtela Communications, Inc.
Published By: StrongMail     Published Date: Jul 31, 2009
The rise of social media is intrinsically connected to email, which was itself the first social network. Email marketers must leverage this complementary channel to expand their reach beyond the email list, realizing the power of viral marketing in the social web.
Tags : 
strongmail, social media, email marketing, emarketing, roi, swyn, networks, social networking
    
StrongMail
Published By: StrongMail     Published Date: Jun 08, 2008
The growing trend towards insourcing marketing and transactional email is being driven by businesses that are looking for ways to improve their email programs, increase data security and lower costs. When evaluating whether it makes more sense to leverage an on-premise or outsourced solution, it's important to understand how the traditional arguments have changed.
Tags : 
strongmail, social media, email marketing, on-premise advantage, transactional email, insourcing, bounce management, spam trappers
    
StrongMail
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
Astaro
Published By: Comcast Business     Published Date: Feb 07, 2020
Venue owners and operators have limitless opportunities to differentiate themselves and create new sources of revenue by creating the fan experiences they expect now as well as novel ones they haven't imagined yet. The key lies in supporting those customer experiences with reliable, high-capacity networks required to to keep pace with innovation. Your fans won't have to go far to find food and drink specials or that special team jersey when WiFi-based location services serve up the refreshments and merchandise they want based on their current whereabouts, direction they're walking and interactions during past visits.
Tags : 
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 07, 2020
With large sprawling networks, and a variety of communication protocols being deployed at retail stores (wireless LANs, GPRS, Bluetooth, NFC, RFID and cellular technologies among them), the entry points for attacks have multiplied substantially. Add to that list various connected applications, more digital touchpoints, smart appliances and infrastructure, in-store associates’ devices, and customers’ mobile phones and we begin to see the magnitude of not just the risk, but the complexity involved in safely yet efficiently managing the network environment.
Tags : 
    
Comcast Business
Published By: Comcast Business     Published Date: Feb 07, 2020
Many facilities are moving to upgrade their networks to accommodate the technologies that are increasingly at the vanguard of healthcare. The impact of data-intensive applications and increased connectivity demands are changing the way networks are being built. SDN helps to ease the complexity of the network. Its benefits are many, ranging from agility and cost savings to efficiency and security. In particular, SDN offers benefits of interest to healthcare provider
Tags : 
    
Comcast Business
Published By: Dell EMC     Published Date: Aug 07, 2018
The media and entertainment industry was valued at $1.81 trillion in 2016, and is expected to reach $2.14 trillion by 2020. Activities within this industry have grown over the last couple of years, and now range from creating content for movies, TV and games, to delivering that content. This is increasingly performed via on-demand data networks rather than traditional over-the-air broadcasting, watched over high resolution displays that enhance the overall viewing experience of the user, and even the latter is being delivered from the same storage repositories. Media production is also now prevalent in areas not traditionally associated with this activity, such as training, museums, and education.
Tags : 
    
Dell EMC
Published By: Cox Business     Published Date: Apr 27, 2017
ealthcare workers understand the complexity of fighting infections better than most. As medications are developed, germs evolve and become resistant to those medications. Over time, germs become incredibly complex and difficult to treat as they continue to evolve and adapt. Unfortunately, computer viruses seem to be following a similar pattern—and the healthcare industry is struggling to catch up.
Tags : 
    
Cox Business
Published By: Cisco     Published Date: May 24, 2019
In the past, desktops, business apps, and critical infrastructure were all located behind the firewall. Today, more and more is happening off-network. More roaming users. More corporate-owned laptops accessing the internet from other networks. More cloud apps, letting users get work done off the corporate network. And more branch offices connecting directly to the internet.
Tags : 
    
Cisco
Published By: Cisco     Published Date: May 24, 2019
Uncover the MR45 performance, product highlights and features within this data sheet. Whether you’re looking to deliver high density, high throughput, or high efficiency wireless, the new Wi-Fi 6 compatible MR45 can do it all. Deliver a rich, seamless experience to users of the next generation of wireless networks.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 16, 2016
This white paper reveals how Cisco’s Threat-Centric Security Solutions for Service Providers delivers consistent security policy across physical, virtual, and cloud environments by combining the power of open and programmable networks with deep integration of Cisco and third-party security services.
Tags : 
cyber threat, security, security solutions, service providers, security protection, cisco, security policies, security services
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
Cisco ACI, the industry-leading software-defined networking solution, facilitates application agility and data center automation. With ACI Anywhere, enable scalable multicloud networks with a consistent policy model, and gain the flexibility to move applications seamlessly to any location or any cloud while maintaining security and high availability.
Tags : 
    
Cisco
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Cisco     Published Date: Jan 02, 2019
The network is the foundation of robust security, and the critical network security element is the firewall. For that reason, Cisco has been committed to delivering a next-generation firewall that can stop threats at the edge and focus on security efficacy. Those efforts are paying off in substantial momentum, and market observers are taking note. Cisco has been named a leader in the 2018 Gartner Magic Quadrant for Enterprise Network Firewalls. Beginning with our world-class threat-intelligence organization, Talos - the Cisco NGFW stands out from the competition. It goes beyond prevention and gives visibility into potentially malicious file activity across users, hosts, networks, and infrastructure. It saves you time and enables automation using our integrated architecture. No other firewall vendor have the strength and breadth of networking and security capabilities that Cisco offers. Learn More about it by downloading Gartner’s 2018 Magic Quadrant for Enterprise Network Firewalls.
Tags : 
security, enterprise network, firewall, cisco, gartner, magic quadrant
    
Cisco
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.