IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networking Architecture, Networking Architectures, WLAN Architectures, Network Architecture, Computer Network Architectures
DEFINITION: The design of a computer network that includes the hardware, software, access methods and protocols used.
Network Architectures White Papers (View All Report Types)
51 - 75 of 400 Matches Previous Page  |  Next Page
How IT Automation with Network Virtualization Works
sponsored by VMware
WHITE PAPER: This white paper details how network automation can help you break free from the constraints of your physical network. Learn how a network virtualization platform brings the operational model of a virtual machine to the data center network, transforming the economics and agility of network and security operations.
Posted: 26 Oct 2016 | Published: 30 Jun 2016

VMware

3 Ways Businesses Use Network Virtualization
sponsored by VMware
WHITE PAPER: This white paper discusses how virtualizing the network can help you meet the increasing demands of today's IT environment. Learn how IT teams can identify which areas need help most, and slowly extend virtualization to other parts of the network as time and budget permit.
Posted: 26 Oct 2016 | Published: 31 Aug 2016

VMware

10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

Protecting the Distributed Enterprise: Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: The solution guide provides 5 key requirements that will collectively dictate the success of a distributed enterprise firewall deployment. It will elaborate on the details of each requirement and how it can be adopted to drive a cost-effective and reliable way to better protect your organization.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

The Packet Train Difference
sponsored by AppNeta
WHITE PAPER: Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

4 IT Initiatives Boosted by Network Virtualization
sponsored by VMware
WHITE PAPER: Why is network virtualization becoming mission-critical for enterprises? Because physical devices lack the functionality that IT needs to support LOB demands. Access this white paper that details how virtualizing your network can help meet LOB demands by shortening the timetable for 4 pressing IT initiatives.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

What is Network Virtualization and Why Do You Need it Now?
sponsored by VMware
WHITE PAPER: 88% of survey respondents insist that it's "important" or "mission critical" to adopt a network virtualization solution in the next 2 to 5 years. Access this white paper to learn about network virtualization and why it has become an enterprise necessity.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

The Top Five Security Threats to Your Business
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Cyber security breaches are more common now than they have ever been. And the risks they present are all serious. This infographic details the top five security threats to your business and highlights a network-based security solution that protects against them.
Posted: 08 Jul 2016 | Published: 30 Jun 2016

Level 3 Communications, Inc.

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

5 Signs Your Cloud Connection is Mission Critical Ready
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Is your cloud connection "mission-critical" ready? Access this infographic that provides 5 signs that your cloud connection is "mission-critical" ready and offers complete solutions if it isn't.
Posted: 07 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Cloud Agility with Performance
sponsored by Array Networks
WHITE PAPER: As enterprises adopt cloud and virtualization, many will deploy application delivery and security functions in cloud environments. Read this white paper that explains how to successfully deploy models for application delivery controllers and secure access gateways in cloud environments.
Posted: 28 Jun 2016 | Published: 02 May 2016

Array Networks

Redefining Networking with Network Virtualization
sponsored by VMware
WHITE PAPER: 82% of enterprises have mapped out a hybrid cloud strategy, but there is a major road block; hardware-centric networking. Discover why legacy network infrastructures are being held back from hybrid clouds by inflexible hardware and how to move forward.
Posted: 14 Jun 2016 | Published: 29 Feb 2016

VMware

Citrix NetScaler: A Powerful Defense Against Denial of Service Attacks
sponsored by Citrix
WHITE PAPER: Denial of service (DoS) attacks are on the rise after years of relative dormancy. In that time they have evolved and are honed in on attacking the different networking layers. Discover how DoS attacks have evolved and how to approach DoS protection at each layer of your network.
Posted: 13 Jun 2016 | Published: 30 Jan 2015

Citrix

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.
Posted: 16 May 2016 | Published: 29 Jan 2016

VMware

Why Get Certified in Network Virtualization?
sponsored by VMware
WHITE PAPER: Today's networks are now playing catch-up with how much agility and flexibility virtualization can provide to the compute world. Get onboard and uncover the benefits of virtualization certification so you can help your organization deliver apps and services at the speed of business.
Posted: 10 May 2016 | Published: 10 May 2016

VMware

Why Businesses Are Adopting Network Virtualization
sponsored by VMware
WHITE PAPER: Discover how network virtualization can help your enterprise achieve major advances in simplicity, speed, agility, and security, by automating and simplifying many of the processes that go into running a data center network.
Posted: 09 May 2016 | Published: 09 May 2016

VMware

The Emerging Opportunity for Full Stack Communications in the Midmarket
sponsored by Avaya CenturyLink
WHITE PAPER: If your business is struggling with communications complexities, you may be in a communications environment that fails to benefit your customers and employees. This white paper written by Principal Analyst, Dave Michels, covers the issues with IT and communications and explains how a full-stack communications approach may be able to remove them.
Posted: 01 Jul 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Quality Contact Recording Increases Workforce Optimization
sponsored by Avaya CenturyLink
WHITE PAPER: Choosing top tier contact recording services can empower businesses by optimizing the performance of their customer-facing resources. Read this white paper that educates you on communication monitoring services and how they can help you achieve performance improvement that increases customer retention.
Posted: 30 Jun 2016 | Published: 31 Dec 2015

Avaya CenturyLink

Build a Secure Network Access Architecture
sponsored by Fortinet, Inc.
WHITE PAPER: Evolving changes in mobile usage, devices, and applications create an enormous challenge for IT to protect the network. Explore ways to enable a secure network access architecture that helps keep internal enterprise assets safe, and protects users from cyberattacks.
Posted: 23 Jun 2016 | Published: 23 Jun 2016

Fortinet, Inc.

Nemertes Research: Re-Architecting the Enterprise Network For WLAN, Cloud, Mobility, Bandwidth, and Cybercrimes
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and security infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

IDC Research: 7 Trends Impacting Enterprise Campus Networks
sponsored by Juniper Networks, Inc.
WHITE PAPER: Reliance upon cloud applications for mission-critical business functions has heightened network requirements at the edge. Discover in this exclusive white paper 7 prevalent issues in today's enterprise campus networks, and how to leverage a cloud-enabled network to seamlessly glue your network edge to the cloud and optimize your cloud applications.
Posted: 06 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.
51 - 75 of 400 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement