IT Management  >   Systems Operations  >  

Element Management

RSS Feed    Add to Google    Add to My Yahoo!
Element Management Reports
 
Proactive Security and Reliability Testing for Communication Systems
sponsored by Synopsys
WHITE PAPER: Discover how networking vendors can proactively address reliability and security challenges. Learn how tools such as static analysis, fuzzing and software composition analysis can automatically identify risks and vulnerabilities in the system.
Posted: 07 Sep 2016 | Published: 07 Sep 2016


Case Study: Anticipating Problems in the SAP Environment
sponsored by CA Technologies
CASE STUDY: This short case study reveals how a healthcare company focused on R&D was able to implement a centralized monitoring approach to achieve end-to-end visibility and anticipate problems in their SAP environment.
Posted: 14 Sep 2016 | Published: 31 Dec 2015

CA Technologies

Competitive Landscape: Carrier-Class Network Firewalls
sponsored by Juniper Networks, Inc.
WHITE PAPER: As communications service providers (CSPs) move toward software-defined networking (SDN), and virtualizing network functions, new security capabilities must be in place. Access this report to uncover essential competitive insights into carrier network firewall providers.
Posted: 23 Aug 2016 | Published: 25 Nov 2015

Juniper Networks, Inc.

E-Book : Network security guide "Advanced Evasion Techniques for Dummies"
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

A 6-Step Guide to Getting Started with Network Automation
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper features a six-step guide to getting started with network automation. Read on to find an outline of the processes involved in planning for automation, how different areas of business can benefit, and how to ensure the tools and partners you've selected are the right ones.
Posted: 22 Aug 2016 | Published: 22 Aug 2016

Juniper Networks, Inc.

Quantifying the Business Benefits of NFV-based Managed Enterprise Services
sponsored by Ciena
WHITE PAPER: This white paper discusses the requirements for network operations transformation and outlines the key benefits of new technology approaches that, when combined in an operational platform, satisfy the novel management needs of a virtualized network.
Posted: 29 Aug 2016 | Published: 31 May 2016

Ciena

Prevent Your Business Continuity Plan from Being an Epic Failure
sponsored by Charter Communications
WEBCAST: Register to attend this webinar on October 4th, 2016 at 1 PM EST, and hear from expert speakers on how to successfully secure network performance and maintain operations during unplanned disruptions. Register now for the October 4th webinar to ensure that your business continuity plan not only looks good on paper, but functions during any disaster.
Posted: 15 Sep 2016 | Premieres: Oct 4, 2016

Charter Communications

Case study : How the French Ministry of Education strengthens front-end security
sponsored by Forcepoint
CASE STUDY: Learn how the largest employer in France, the Ministry of Education, updated its massive network to include a powerful next-gen firewall (NGFW) that could support standard central services but also decentralized campus structures and data centers.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Forcepoint

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement