IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networking Architecture, Networking Architectures, WLAN Architectures, Network Architecture, Computer Network Architectures
DEFINITION: The design of a computer network that includes the hardware, software, access methods and protocols used.
Network Architectures Reports
1 - 25 of 776 Matches Previous Page  |  Next Page
eCommerce in the Cloud: Bringing Elasticity to Ecommerce
sponsored by Catchpoint Systems Inc.
WHITE PAPER: Learn about the rise of electronic commerce, and how enterprises can leverage content delivery networks and hybrid cloud networks to get ahead in the market.
Posted: 22 Sep 2016 | Published: 31 Dec 2014

Catchpoint Systems Inc.

Enterprise File, Sync and Share on the Cloud
sponsored by TeraGo Networks
WHITE PAPER: Discover a corporate file sync-and-share system that can displace the need to use consumer grade technology.
Posted: 20 Sep 2016 | Published: 20 Sep 2016

TeraGo Networks

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls
sponsored by Palo Alto Networks
WHITE PAPER: This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.
Posted: 19 Sep 2016 | Published: 19 Sep 2016

Palo Alto Networks

The Packet Train Difference
sponsored by AppNeta
WHITE PAPER: Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring
sponsored by AppNeta
CASE STUDY: "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture
sponsored by EfficientIP
WHITE PAPER: Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

EfficientIP

White paper: Network management and operational efficiency
sponsored by Forcepoint
WHITE PAPER: Learn how to make a NGFW work for your enterprise, both in the sense of security and the bottom line. Discover the intricacies of these firewalls, and what your enterprise might or might not need to manage one towards its potential.
Posted: 15 Sep 2016 | Published: 15 Sep 2016

Forcepoint

Report: NGFW security effectiveness and TCO
sponsored by Forcepoint
ANALYST REPORT: In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Forcepoint

Boost Your Cloud Infrastructure Agility With Integrated DDI
sponsored by EfficientIP
WHITE PAPER: Learn how to avoid the slog of trying to untangle your infrastructure in the cloud with IP address assignment and DNS registration to boost visibility. Learn the requirements and pitfalls of cloud infrastructure, and what tools to use to negotiate the maze of it all.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

EfficientIP

The DNS Global Threat: Your In-Depth Report
sponsored by EfficientIP
ANALYST REPORT: Within this report come to understand not only the technical and business impacts of DNS security, but also why they are underestimated, how businesses should counter them, and how most DNS security solutions are not adapted.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

EfficientIP

Case Study: Universities Embrace Wireless in the Smart Mobile Era
sponsored by Cisco Systems, Inc.
CASE STUDY: The Wi-Fi needs of one major university grew significantly, due to the rise of smart mobile devices and the introduction of various mobile apps. This case study details how the university was able to meet their increased Wi-Fi needs by choosing a vendor that provided a comprehensive wireless network and signal coverage for the entire campus.
Posted: 14 Sep 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

Gain Complete Control of Your Digital Ecosystem
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Is the Enterprise Ready for Network Functions Virtualization?
sponsored by Cisco Systems, Inc.
RESEARCH CONTENT: Today, virtualization and the cloud enable businesses to have compute agility. However, the network remains relatively inflexible. This ZK Research report explains why deploying network functions virtualization must be one of your top priorities, because doing so can align your network with your business goals in the digital era.
Posted: 14 Sep 2016 | Published: 29 Feb 2016

Cisco Systems, Inc.

Case study: Protecting high-profile clients with resilient network security
sponsored by Forcepoint
CASE STUDY: Learn what NETprotocol did to ensure that it provided the most resilient, scalable network security solution on the market. Discover how it helped its clients maximize efficiency and improve ROI from their IT budgets responded to the exact needs of each client, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

Forcepoint

Protecting Web Services for Grand Slam Roland-Garros
sponsored by EfficientIP
CASE STUDY: Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

Cisco Nexus Data Broker
sponsored by Cisco Systems, Inc.
WHITE PAPER: Network traffic monitoring has become more challenging as network and application traffic volume has increased. This document explains how Cisco Nexus Data Broker along with Cisco Nexus 9000 Series Switches combines with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.
Posted: 13 Sep 2016 | Published: 29 Jan 2016

Cisco Systems, Inc.

Advanced Security Evasion Techniques For Dummies
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

The Top 3 Reasons Your Network Matters in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Because of trends in more mobility, cloud applications, and connectivity in the enterprise, teams need to think more strategically about what their networks need to support the cloud. Discoer details on how these three IT trends impact your cloud strategy -- and how you can build a network that's ready for the cloud.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Juniper Networks, Inc.

Enterprise Campus Network Comparison Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: This resource examines four key aspects of campus networks and the key points of comparison for each one. Get a new perspective on how the various options stack up on the most important features and capabilities.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Juniper Networks, Inc.

Get Point-and-Click Fabric Lifecycle Management
sponsored by Cisco Systems, Inc.
PRODUCT OVERVIEW: IT departments need tools that can help them accelerate infrastructure changes as they also simplify the lifecycle management of data center fabrics. This solution overview highlights one fabric manager that provides the tools that your IT department needs to build and manage your data center fabric lifecycle.
Posted: 12 Sep 2016 | Published: 31 Mar 2016

Cisco Systems, Inc.

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Why Now Is the Time to Re-Architect the Enterprise Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

SD-WAN Bill of Rights
sponsored by Cisco Systems, Inc.
RESOURCE: This infographic lays out the 10 things you can expect of future SD-WAN tools. If you can't secure every one of these freedoms, it's time to reevaluate your infrastructure.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Cisco Systems, Inc.
1 - 25 of 776 Matches Previous Page    1 2 3 4    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement