Search Results for: security_tutorial

Beginner’s guide to manufacturing PLM tools
In this product lifecycle managment (PLM) e-guide, discover an overview of the basics of PLM tools, software selection and implementation tips from industry experts, the value of cloud PLM, 3D CAD imagery, and social media add-ons, and why− and how− PLM is branching out from discrete manufacturing into process manufacturing.

IQMS

Essential Guide to Software Defined Networks
Software defined networking (SDN) allows network engineers to support a switching fabric across multi-vendor hardware and application-specific integrated circuits. A network administrator can shape traffic from a centralised control console without having to touch individual switches.

TechTarget ComputerWeekly.com

Your guide to disaster recovery strategy and the ways virtualisation can help
We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

TechTarget ComputerWeekly.com

IP telephony trends: Migrating from PSTN to SIP trunking
Uncover the top five trends in enterprise IP telephony and learn the benefits and challenges of replacing PSTN with SIP-based services.

TechTarget Security

Security Products for Protection: Endpoint and Anti-Malware
Picking a security platform can be difficult. Inside this e-guide, expert Ed Tittel explores strategies and criteria to ensure you are picking the most successful security platform for your company.

Carbon Black

E-Guide: Selecting the data backup option that is right for you
It is ultimately up to each individual health care facility to determine the data backup options that best suit their needs, so long as the overall solution adheres to regulatory requirements.Access this e-guide for an overview of pros and cons of different types of backups.

Dell Compellent

Focus ASEAN: Security & Digital Transformation
With cyber threats and attacks making headlines almost every day, governments and enterprises in Southeast Asia are placing greater emphasis on shoring up their cyber defenses, more so as they transform their economies digitally.

TechTarget ComputerWeekly.com

How to properly secure your organization: evolving your threat-detection techniques and endpoint security strategy
Learn the steps of evolving your endpoint security strategy as well as the benefits and challenges that can arise when utilizing threat detection products.

Bit9, Inc.

Software licensing – battleground or crucible?
Will software licensing continue to be a battleground for suppliers and users, or can new, mature relationships between the two sides be forged in the digital crucible of contemporary on-demand, pay as you go software?

TechTarget ComputerWeekly.com

How does SDN automation work?
In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.

Juniper Networks, Inc.