IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architecture

RSS Feed    Add to Google    Add to My Yahoo!
Network Architecture Reports
 
Case Study: Universities Embrace Wireless in the Smart Mobile Era
sponsored by Cisco Systems, Inc.
CASE STUDY: The Wi-Fi needs of one major university grew significantly, due to the rise of smart mobile devices and the introduction of various mobile apps. This case study details how the university was able to meet their increased Wi-Fi needs by choosing a vendor that provided a comprehensive wireless network and signal coverage for the entire campus.
Posted: 14 Sep 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

Internal Segmentation Firewall: Protecting Your Network From the Inside-Out
sponsored by Fortinet, Inc.
WHITE PAPER: Uncover key features of ISFWs how their deployment can provide instant network visibility and protection. Learn how to isolate internal network threats based on device, user, and application to safeguard your sensitive information.
Posted: 21 Jun 2016 | Published: 21 Jun 2016

Fortinet, Inc.

Protecting Web Services for Grand Slam Roland-Garros
sponsored by EfficientIP
CASE STUDY: Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

Simplify your Virtual Data Center Network by Moving to the Cloud
sponsored by Red Hat
WHITE PAPER: To simplify operations, your data center network must be as agile as your virtual server and storage infrastructure. Discover ways software-defined networking-based cloud tools create nimble, flexible networks.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Red Hat

The Best Ways to Manage Shadow IT
sponsored by Juniper Networks, Inc.
ESSENTIAL GUIDE: Shadow IT raises challenges, namely security, integration, and operational ones. This essential guide looks at the trends that are driving the rise of shadow IT, explores the drawbacks and benefits it offers and explains how to design the right network for your preferred shadow IT strategy.
Posted: 06 Sep 2016 | Published: 30 Oct 2015

Juniper Networks, Inc.

Network Security Playbook Guide
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Successful enterprises deal with network security threats quickly and efficiently by relying on network security playbooks. Access this white paper that explains how to build your playbook and highlights a security platform that can be crucial to your network security.
Posted: 08 Jul 2016 | Published: 01 Jun 2016

Level 3 Communications, Inc.

Cisco Nexus Data Broker
sponsored by Cisco Systems, Inc.
WHITE PAPER: Network traffic monitoring has become more challenging as network and application traffic volume has increased. This document explains how Cisco Nexus Data Broker along with Cisco Nexus 9000 Series Switches combines with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.
Posted: 13 Sep 2016 | Published: 29 Jan 2016

Cisco Systems, Inc.

Passive Optical LAN, Explained
sponsored by Nokia
WHITE PAPER: This paper outlines the key elements of an enterprise POL. Access now and discover why POL is an optimal enterprise network option for today's digital world.
Posted: 01 Sep 2016 | Published: 29 Jul 2016

Nokia

How Does SDN Automation Work?
sponsored by VMware
EGUIDE: While the DevOps style of application development requires rapid provisioning, scalable resources, and automated operations to flexibly deliver IT services, most methods can't scale to meet the demands of large data centers or complex distributed apps. Expert Lee Doyle explains how software-defined networking enables network automation.
Posted: 03 Aug 2016 | Published: 02 Aug 2016

VMware

Building a Profitable Hybrid IT Service Catalog
sponsored by Autotask Corporation
WHITE PAPER: ITSPs and MSPs are increasingly turning to hybrid IT services offerings in order to gain more sales and customers. Access this guide now to learn how to get started building your service catalog, and how to do it effectively in order to gain and retain clients.
Posted: 06 Jul 2016 | Published: 06 Jul 2016

Autotask Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement