IT Management  >   Systems Design and Development  >   Architectures  >  

Networking Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Networking Architecture White Papers (View All Report Types)
 
Advanced Attacks Require an Advanced Solution
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper outlines a simple three phase framework for detecting and blocking concealed threats and protecting data on your network and beyond.
Posted: 12 May 2015 | Published: 29 Apr 2015

Fortinet, Inc.

Opening the Way to Data Center Agility
sponsored by Cisco Systems, Inc and Citrix
WHITE PAPER: Access this white paper now to discover the barriers to data center agility and how to overcome them to deploy new products and services faster, leveraging new technologies faster, and responding to market changes faster.
Posted: 27 Apr 2015 | Published: 26 Dec 2014

Cisco Systems, Inc and Citrix

Protecting DNS Infrastructure: An Internet Utility That Demands New Security Solutions
sponsored by Cloudmark
WHITE PAPER: This exclusive white paper details key factors about the DNS threat landscape and offers a look at different security risks and types of attacks hackers are using to disrupt the network today. Read on to learn more.
Posted: 13 Jan 2015 | Published: 13 Jan 2015

Cloudmark

Cisco VM-FEX, Adapter FEX, and Nexus 1000v Clarified
sponsored by Global Knowledge
WHITE PAPER: This paper addresses three Cisco data center server and hypervisor integration technologies—Cisco Nexus 1000v, Cisco VM-FEX, and Cisco Adapter FEX—clarifying their function, purpose, and benefits.
Posted: 04 Aug 2014 | Published: 08 Jul 2014

Global Knowledge

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

5 Reasons Why Multi-Tenant Unified Communications Beats Multi-Instance
sponsored by ThinkingPhones
WHITE PAPER: This step-by-step whitepaper helps you plan for an enhanced unified communications model by outlining strategies for effective architecture.
Posted: 12 Mar 2015 | Published: 12 Mar 2015

ThinkingPhones

Security, Storage, and Collaboration Gains from Cloud Solutions
sponsored by Box
WHITE PAPER: Access this white paper to learn how Avago Technologies implemented a new cloud file sync and share service, yielding greater business agility, infrastructure cost-savings and simplified management for greater security.
Posted: 21 May 2015 | Published: 31 Jul 2014

Box

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

How Mobile and BYOD Transform Business
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explains the benefits of and barriers to adopting mobility and gives you ideas for how you can implement mobility in your workplace.
Posted: 11 Mar 2015 | Published: 31 Dec 2014

Dell, Inc. and Intel®

Is Network Functions Virtualization (NFV) Moving Closer to Reality?
sponsored by Global Knowledge
WHITE PAPER: This paper examines the history of Network Functions Virtualization (NFV) and explores the prospects for networking to gradually evolve from a hardware-centric approach to a software-driven model.
Posted: 05 Aug 2014 | Published: 23 Jul 2014

Global Knowledge
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement