IT Management  >   Systems Operations  >   Networking  >  

Peer-to-Peer Communication

RSS Feed    Add to Google    Add to My Yahoo!
Peer-to-Peer CommunicationWhite Papers (View All Report Types)
 
The Top 5 Security Challenges of Higher Education
sponsored by Tenable Network Security
WHITE PAPER: This informative white paper discusses how in addition to the same IT security challenges as commercial enterprises, universities face a number of difficulties that are entirely unique to higher education.
Posted: 24 Oct 2014 | Published: 24 Oct 2014

Tenable Network Security

IPV6: Complete these 5 Steps to Prepare
sponsored by AT&T Corp
WHITE PAPER: This paper provides guidelines to help you take advantage of the strategic opportunities IPv6 will bring, while avoiding loss of business, marketing challenges, increased SPAM activity and other potential problems.
Posted: 01 Mar 2011 | Published: 01 Mar 2011

AT&T Corp

Unauthorized Applications: Taking Back Control
sponsored by Sophos, Inc.
WHITE PAPER: This paper explains why it is important for businesses to control unauthorized applications such as instant Messaging, VoIP, games and peer-to-peer file-sharing and how malware protection is the simplest and most cost-effective solution.
Posted: 01 Jul 2008 | Published: 01 Dec 2007

Sophos, Inc.

White Paper: Controlling Recreational Peer-to-Peer Traffic to Improve Application Performance
sponsored by Exinda Networks
WHITE PAPER: This white paper provides a practical overview on the evolution of recreational P2P traffic, how it is impacting corporate networks and, offers specific recommendations for controlling these recreational applications.
Posted: 18 Apr 2008 | Published: 01 Apr 2008

Exinda Networks

Potentially Unwanted Programs: Spyware and Adware
sponsored by McAfee, Inc.
WHITE PAPER: Potentially unwanted programs (PUPs) like adware and malware can compromise your computer network's privacy and security and the associated risks can weaken your entire network. Read this white paper to learn how to effectively protect against PUPs.
Posted: 27 Mar 2007 | Published: 01 Oct 2005

McAfee, Inc.

Filtering the Spectrum of Internet Threats: Defending against Inappropriate Content, Spyware, IM and P2P at the Perimeter
sponsored by St. Bernard Software
WHITE PAPER: This paper reviews how a perimeter network security appliance can be well suited for SMBs because it lowers total cost of ownership with rapid deployment and ease of configuration, and provides a secure and stable appliance-based solution.
Posted: 20 Feb 2006 | Published: 01 Jan 2005

St. Bernard Software

Unchain Your Network with Application Intelligence and Control
sponsored by SonicWALL
WHITE PAPER: This paper discusses the new risks facing organizations in light of the prevalence of Web-based applications and offers best practices for gaining control of applications, data and bandwidth.
Posted: 24 Feb 2011 | Published: 24 Feb 2011

SonicWALL

Data Centre Projects: System Planning
sponsored by Schneider Electric
WHITE PAPER: Access this white paper to examine a methodology for planning your data center project that's designed to improve the quality and speed of the results. You'll learn how basing your planning around 4 tasks will allow you to ensure that the right people are able to make the right decisions in the right order to maximize efficiency.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Schneider Electric

The Total Economic Impact Of INetU’s Managed Server And Infrastructure Hosting
sponsored by INetU Inc.
WHITE PAPER: This resource examines the total economic impact and the real-world value of INetU's Managed Hosting services. You'll also get better insight into how this solution allows you to manage your networking and server environments so that you can focus on using the system data to run your day-to-day operations, improving efficiency and capaci
Posted: 30 Oct 2014 | Published: 28 Jun 2013

INetU Inc.

Fast, secure mobile access to patient records and resources.
sponsored by Dell Software
WHITE PAPER: Maximize mobile productivity, secure private patient data and ensure that your organization remains in compliance with healthcare regulations. Read the use case and discover how Dell™ Enterprise Mobility Management enables healthcare organizations to achieve their goals while helping them to embrace their unique mobile/BYOD strategy.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement