IT Management  >   Systems Operations  >   Network Management  >  

Network Optimization

RSS Feed    Add to Google    Add to My Yahoo!
Network Optimization White Papers (View All Report Types)
 
Ponemon Study Finds IT Security Not Prepared for Advanced Attacks
sponsored by Prelert
WHITE PAPER: This white paper examines how security vulnerabilities compile when you ignore your organization's threat intelligence strategy. View now to learn the top network threats and how to detect them faster by enhancing threat intelligence.
Posted: 04 Feb 2016 | Published: 28 Oct 2015

Prelert

Why Hybrid WAN and SD-WANs are Replacing the Traditional Model
sponsored by Silver Peak
WHITE PAPER: Traditional WAN architectures are feeling the strain being put on them by the increasing need for mobile and remote computing. The balance between Internet and data center service traffic is shifting. The solution is to move to a hybrid WAN architecture. See how one company is overcoming the challenges presented by changing models.
Posted: 10 Mar 2016 | Published: 28 Dec 2015

Silver Peak

The Future of Storage is Now: Two Tier Storage Strategy
sponsored by Scality Inc.
WHITE PAPER: Data growth and workload diversity is challenging traditional infrastructures in a major way and are revealing all their limits and constraints in terms of agility and, more in general, TCO. Access this white paper to see what benefits a two tier storage strategy will provide your business.
Posted: 25 Mar 2016 | Published: 15 Mar 2016

Scality Inc.

The Role of High Performance WAN in Enterprise Cloud Transformation
sponsored by Earthlink.
WHITE PAPER: This paper discusses the business trends that are driving enterprise IT transformation. Included inside is a description of the role of WAN services in a cloud-centric IT environment.
Posted: 21 Mar 2016 | Published: 01 Mar 2016

Earthlink.

Architecting for Security Resilience
sponsored by Ixia
WHITE PAPER: As a network architect, you understand that resilience starts at the foundation. Review the several strategies to create an inline security architecture and find out which is best for your organization.
Posted: 22 Mar 2016 | Published: 25 Nov 2015

Ixia

Top Strategies to Automate Across Your Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: The cloud is forcing IT decision-makers to re-evaluate how they deploy their networks to ensure the best security and efficiency. Attackers know the cloud is their next big target. Access this white paper to learn how to deal with the threat landscape and drive business forward while reducing operating costs.
Posted: 06 May 2016 | Published: 29 Apr 2016

Juniper Networks, Inc.

Why Businesses Are Adopting Network Virtualization
sponsored by VMware
WHITE PAPER: Discover how network virtualization can help your enterpriseachieve major advances in simplicity, speed, agility, and security, by automatingand simplifying many of the processes that go into running a data center network.
Posted: 09 May 2016 | Published: 09 May 2016

VMware

Dailymotion's Challenge: Cost-effectively Provide High Quality Streaming Across the Globe
sponsored by Limelight Networks, Inc.
WHITE PAPER: This case study examines how Dailymotion chose a content delivery network to provide high-quality global streaming, especially for APAC users, complete with up-to-the-minute traffic insights for most requested content.
Posted: 20 May 2016 | Published: 20 May 2016

Limelight Networks, Inc.

Superior Network Service Provisioning and Performance
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: This whitepaper dives into one possible network solution that claims to deliver scalable network capabilities that can gracefully handle even the most demanding applications. Make wait time a thing of the past, and unleash your applications with the right infrastructure to support them.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Cisco Systems, Inc and Citrix

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Blue Coat Systems
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement