> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 51 - 75 of 1225Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud, networking
    
IBM
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
Tags : 
akamai, security, cybersecurity, web application security, web application firewall
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity
    
Akamai Technologies
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Protecting confidential data while keeping mobile users productive.
Tags : 
ibm, mobile, mobilize, mobile data security, security
    
IBM MaaS360
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Learn How Enterprise Mobility Has Forever Changed the Way Enterprises Conduct and Secure Business
Tags : 
ibm, maas360, mobile, security, mobile security
    
IBM MaaS360
White Paper Published By: IBM     Published Date: Sep 26, 2016
SPSS and open source seamlessly complement each other. With open source, IBM makes it easy to build your own extensions, adding new functionality to existing products. Coding is not required for the use of extensions. IBM offers an extensive library of already developed extensions that can be downloaded and used immediately.
Tags : 
ibm, ibm spss, open source, statistics, modeler
    
IBM
White Paper Published By: Extreme Networks     Published Date: Sep 15, 2016
Read this in-depth white paper to learn how to tailor your arguments along a variety of business-aligned pain points and motivations to help you get the backing of key constituents within your organization.
Tags : 
extreme networks, wireless, cloud, cloud networks, networking
    
Extreme Networks
White Paper Published By: Extreme Networks     Published Date: Sep 15, 2016
Here’s what is covered: - Overview of the rapid evolution of wireless LANs - The Ins and outs of Cloud-Managed Networking - The many benefits of a Cloud-Managed Network - Top considerations you need to know when evaluating solutions
Tags : 
extreme networks, networking, network, cloud, cloud networks
    
Extreme Networks
Webinar Published By: IBM     Published Date: Sep 15, 2016
This webcast session will discuss and demonstrate a new set of mobile capabilities within the IBM Digital Experience portfolio. These exciting new capabilities enable the line of business to work hand in hand with mobile app developers to deliver personal, adaptive, and relevant content to hybrid or native mobile applications. Come see how a new content authoring experience brings workflow, segmentation, and mobile notifications together to help drive the right mobile app experience for your users.
Tags : 
ibm, commerce, mobile, apps, mobile app
    
IBM
Webinar Published By: Cisco     Published Date: Sep 08, 2016
In today's technology landscape, IT organizations face many diverse and ever-changing challenges that require flexibility in cloud deployment. Many companies have heard of the hybrid cloud and the opportunities it can offer, but like with all technologies, businesses want to know more. This webcast aims to shed more light on the topic, as we bring to you the insights of Forrester Research, business leaders and industry experts addressing similar situations. Extend your existing datacenter resources into public clouds with secure hybrid cloud. Improve business agility. Increase flexibility. Cut costs. During the hour, Dave Bartoletti, principal analyst at Forrester will be joined by industry experts and business leaders to discuss the challenges of hybrid cloud and how enabling choice and control across a secure hybrid cloud can help businesses simplify heterogeneous cloud deployment.
Tags : 
cisco, cloud forrester, webinar, hybrid cloud, networking
    
Cisco
White Paper Published By: Oracle     Published Date: Sep 08, 2016
This report examines how two major players in the grocery, pharmacy and wholesale markets are leveraging loss prevention technology to centralize enterprise-wide data collection, analysis, and reporting to protect profits, reduce shrink and provide actionable insight across the organization from merchandising and planning to supply chain.
Tags : 
analytics, loss prevention, enterprise applications, best practices, networking
    
Oracle
Webinar Published By: Sage     Published Date: Sep 08, 2016
It’s no secret that more companies are adopting cloud ERP solutions to help them grow their operations while keeping overhead costs low to better compete in the global economy. Cloud solutions deliver increased agility, responsiveness, and real-time insights to improve operational efficiency and increase profits. Although broader ERP solutions can provide value, focusing on the needs of your specific industry requirements can enhance your investment. Join this webcast, sponsored by Sage, to learn how an industry-focused cloud ERP strategy can help your business grow.
Tags : 
sage, cloud, erp, cloud erp, erp strategy
    
Sage
White Paper Published By: CloudHealth Technologies     Published Date: Sep 06, 2016
Read this eBook to learn 8 best practices for reducing your Microsoft Azure Spend so you can harness both the cost savings and agility of the public cloud.
Tags : 
azure, microsoft azure, azure cloud, azure cost, azure pricing
    
CloudHealth Technologies
White Paper Published By: Extreme Networks     Published Date: Aug 30, 2016
Rise above the noise and learn how to effectively find and evaluate the best technology provider for your business needs.
Tags : 
extreme networks, forrester, vendors, vendor selection, networking
    
Extreme Networks
White Paper Published By: Extreme Networks     Published Date: Aug 30, 2016
Discover the information you need to help you make better decisions before purchasing and deploying 802.11ac Wave 2.
Tags : 
extreme networks, 802.11ac wave 2, 802.11ac, networking, wireless
    
Extreme Networks
White Paper Published By: Extreme Networks     Published Date: Aug 30, 2016
Organizations looking to deliver a flexible infrastructure that supports new methods of engagement, including customer-facing applications, are turning to cloud for the management of their wired and wireless networks. Discover how to tailor your arguments along a variety of business-aligned pain points and motivations to help you get the backing of key constituents within your organization.
Tags : 
extreme networks, wireless, cloud, cloud networks, networking
    
Extreme Networks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.