IT Management  >   Systems Design and Development  >   Architectures  >  

Network Architectures

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Networking Architecture, Networking Architectures, WLAN Architectures, Network Architecture, Computer Network Architectures
DEFINITION: The design of a computer network that includes the hardware, software, access methods and protocols used.
Network Architectures Reports
101 - 125 of 768 Matches Previous Page  |  Next Page
10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

Protecting the Distributed Enterprise: Network Security for the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: The solution guide provides 5 key requirements that will collectively dictate the success of a distributed enterprise firewall deployment. It will elaborate on the details of each requirement and how it can be adopted to drive a cost-effective and reliable way to better protect your organization.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

Securing the Borderless Enterprise
sponsored by Fortinet, Inc.
DATA SHEET: This enterprise firewall checklist provides you with a view of where your expected enterprise firewall capabilities stand when put into comparison against those of your peers and in the process, help identify the gaps. Download now and uncover the insight you need to deploy the best fit enterprise firewall for your business.
Posted: 07 Oct 2016 | Published: 01 Sep 2016

Fortinet, Inc.

The Packet Train Difference
sponsored by AppNeta
WHITE PAPER: Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring
sponsored by AppNeta
CASE STUDY: "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

Advanced Evasion Techniques for Dummies
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

Buying Criteria for Next-Generation Network Security
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

SD-WAN Securely Delivers a Consistent User Experience
sponsored by Citrix
VIDEO: This short video shows a user maintaining security while demonstrating network performance despite deteriorating conditions. You'll see how an SD-WAN can make up for failures in your MPLS.
Posted: 30 Aug 2016 | Premiered: 19 Aug 2016

Citrix

Understanding the Differences Between Network Virtualization and Software-Defined Networking
sponsored by VMware
ESSENTIAL GUIDE: If you've been researching how to make changes to your network, then you've heard about software-defined networking (SDN) and network virtualization.They might sound alike—but they aren't the same thing. Access this essential guide to learn about these two approaches to networking and their key differences.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

VMware

4 IT Initiatives Boosted by Network Virtualization
sponsored by VMware
WHITE PAPER: Why is network virtualization becoming mission-critical for enterprises? Because physical devices lack the functionality that IT needs to support LOB demands. Access this white paper that details how virtualizing your network can help meet LOB demands by shortening the timetable for 4 pressing IT initiatives.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

What is Network Virtualization and Why Do You Need it Now?
sponsored by VMware
WHITE PAPER: 88% of survey respondents insist that it's "important" or "mission critical" to adopt a network virtualization solution in the next 2 to 5 years. Access this white paper to learn about network virtualization and why it has become an enterprise necessity.
Posted: 05 Aug 2016 | Published: 01 Jul 2016

VMware

Computer Weekly – 9 August 2016: Will Rio's 4G sink or swim?
sponsored by ComputerWeekly.com
EZINE: The Rio Olympic games are meant to be the fastest Games ever – not just for the athletes, but also for mobile data speeds. Users will want to upload photos and videos in real time. In this week's Computer Weekly, we investigate how operators are working round Brazil's patchy 4G. We also find out how Glasgow's smart city initiatives are evolving.
Posted: 05 Aug 2016 | Published: 09 Aug 2016

ComputerWeekly.com

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

Using DNS Monitoring to Detect Network Breaches
sponsored by Dyn
EGUIDE: Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

How DNS Information Can Help Cut Millions from Your Infrastructure Costs
sponsored by Dyn
EGUIDE: This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

Is Passive Optical Networking Good For Enterprises?
sponsored by Nokia
EGUIDE: This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Nokia

SD-WAN Bill of Rights
sponsored by Cisco Systems, Inc.
RESOURCE: This infographic lays out the 10 things you can expect of future SD-WAN tools. If you can't secure every one of these freedoms, it's time to reevaluate your infrastructure.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Cisco Systems, Inc.

Your SD-WAN Roadmap
sponsored by Citrix
EGUIDE: Discover how making the transition to SD-WAN can save you money and simplify your current WAN structure.
Posted: 19 Aug 2016 | Published: 15 Aug 2016

Citrix

How to Make Your WAN Architecture Software-Defined
sponsored by Citrix
EGUIDE: In this e-guide, you will receive advice on how to choose the right SD-WAN for your enterprise needs. Discover how to analyze the vast array of SD-WAN vendors by isolating your particular needs, and uncover insight into securing and deploying the SD-WAN tool that will meet your goals.
Posted: 18 Aug 2016 | Published: 16 Aug 2016

Citrix

What You Need to Know When Choosing Between Office 2016 and Office 365
sponsored by SearchEnterpriseDesktop
EBOOK: Use this expert e-book to discover whether the local Office 2016 or cloud-based Office 365 is the right fit for your enterprise. Explore topics such as the different costs of each program, increased file encryption in Office 2016, and the system requirements that it takes to run each Office suite.
Posted: 16 Aug 2016 | Published: 16 Aug 2016

SearchEnterpriseDesktop

Which Way Now for Your WAN?
sponsored by SearchNetworking.com
EBOOK: Wire area networks and WAN connection types have evolved. In this technical guide, learn whether your WAN is what it needs to be.
Posted: 15 Aug 2016 | Published: 15 Aug 2016

SearchNetworking.com

SD-WAN Helps Secure Hybrid Networks
sponsored by Citrix
EGUIDE: SD-WAN enables enterprises to create hybrid networks. But many network engineers eyeing hybrid WAN architectures are asking themselves the question: It can't be as safe as running on MPLS, right? Access this expert e-guide to learn about SD-WAN platforms' security features that finally make hybrid networks secure enough for widespread use.
Posted: 15 Aug 2016 | Published: 12 Aug 2016

Citrix

How Does SDN Automation Work?
sponsored by VMware
EGUIDE: While the DevOps style of application development requires rapid provisioning, scalable resources, and automated operations to flexibly deliver IT services, most methods can't scale to meet the demands of large data centers or complex distributed apps. Expert Lee Doyle explains how software-defined networking enables network automation.
Posted: 03 Aug 2016 | Published: 02 Aug 2016

VMware
101 - 125 of 768 Matches Previous Page    3 4 5 6 7 8    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement