Business of Information Technology  >   Business Management  >   Best Practices  >  

Network Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Network Best Practices Reports
151 - 175 of 560 Matches Previous Page  |  Next Page
10 Critical Requirements for Optimizing Application Delivery
sponsored by A10 Networks
WHITE PAPER: Learn the 10 capabilities that should be a critical component of your selection criteria when evaluating application delivery controllers, including intelligent traffic management, global load balancing, and more.
Posted: 19 Oct 2016 | Published: 19 Oct 2016

A10 Networks

Is Passive Optical Networking Good For Enterprises?
sponsored by Nokia
EGUIDE: This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Nokia

Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring
sponsored by AppNeta
CASE STUDY: "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

NSS Labs NGFW Test Report
sponsored by Forcepoint
ANALYST REPORT: In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Forcepoint

Advanced Evasion Techniques for Dummies
sponsored by Forcepoint
EBOOK: Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.
Posted: 12 Sep 2016 | Published: 31 Dec 2015

Forcepoint

How does SDN automation work?
sponsored by Juniper Networks, Inc.
EGUIDE: In this expert e-guide by principal analyst Lee Doyle, learn how SDN allows organizations to automatically scale and provision their networks, and gives them the opportunity to run large, complex applications flawlessly.
Posted: 10 Nov 2016 | Published: 10 Nov 2016

Juniper Networks, Inc.

Laying The Foundation for a Virtualized Network Infrastructure
sponsored by VMware
EGUIDE: SDN, NFV and VNF: Don't get bogged down with these hot-topic terms. This expert guide discusses how and whether you should implement virtualized functions in your enterprise.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

VMware

Understanding SDN Components and Where They're Being Implemented
sponsored by VMware
EGUIDE: Download this expert e-guide for IT expert Andrew Froehlich's guidance on what SDN is, how the approach differs from NFV, and where SDN components are being implemented in current enterprise networks.
Posted: 07 Nov 2016 | Published: 01 Nov 2016

VMware

How DNS Information Can Help Cut Millions from Your Infrastructure Costs
sponsored by Dyn
EGUIDE: This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

The Anatomy of DDoS Attacks And Best Practices for Preventing Them
sponsored by Arbor Networks
EGUIDE: This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Picking Your Best Path to VoIP
sponsored by Avaya CenturyLink
RESOURCE: Changing voice systems is not a trivial matter. Determine which is the right VoIP migration path your organization—cloud-based hosted VoIP or premises-based SIP trunking. Read on to learn when to consider SIP trunking over hosted VoIP (and vice versa) based on your long-term plans.
Posted: 07 Jul 2016 | Published: 07 Mar 2016

Avaya CenturyLink

Making the Financial Case for Hosted VoIP
sponsored by Avaya CenturyLink
RESOURCE: Discover in this post how to evaluate the costs of maintaining your legacy phone service—in terms of CapEx and OpEx—and estimate the financial impact of hosted VoIP to determine if you should adopt. Additionally, access a hosted VoIP TCO tool to build your implementation business case.
Posted: 07 Jul 2016 | Published: 05 Apr 2016

Avaya CenturyLink

Don't Run A 21st Century Business With 20th Century Phones
sponsored by Avaya CenturyLink
RESOURCE: Explore the top 5 business benefits you will receive by making the switch to VoIP from PBX—fulfilling the need for higher performance standards, simpler network operations, and seamless incorporation of new communications apps. Read on to see why you should consider VoIP.
Posted: 07 Jul 2016 | Published: 22 Apr 2016

Avaya CenturyLink

The Cost of Change: A Network Perspective on How Rigidity Limits Agility
sponsored by Avaya TSG
ANALYST REPORT: For most organizations, the network is now the single biggest inhibitor to achieving business agility. Access this exclusive report to examine the challenges associated with achieving total network agility, and in it, Zeus Kerravala of ZK Research demonstrates the challenge with legacy change management models.
Posted: 06 Jul 2016 | Published: 30 Apr 2015

Avaya TSG

New Rules of Engagement: Dispelling 3 Myths of Communications
sponsored by Avaya TSG
WHITE PAPER: Take a closer look at the pros and cons of adopting a consumer-like approach to business communications. Explore 3 enterprise communication myths, and how you can selectively leverage components of these misconceptions to foster a culture of engagement.
Posted: 06 Jul 2016 | Published: 31 Dec 2015

Avaya TSG

Utah State University Realizes Big Savings by Upgrading to VoIP
sponsored by Avaya CenturyLink
CASE STUDY: Learn how to save your organization thousands of dollars by upgrading older TDM systems to VoIP—recovering productive hours from IT staff to put toward new initiatives. Integrate VoIP into your modern digital infrastructure to unify communications and mobilize your workforce for even greater productivity.
Posted: 05 Jul 2016 | Published: 16 May 2016

Avaya CenturyLink

Why Moving to VoIP Makes Business Sense (and Produces Cents)
sponsored by Avaya CenturyLink
RESOURCE: Discover the top 3 things you need to know to succeed with VoIP today—including how to avoid the money drain of legacy PBXs—as well as the risks and rewards VoIP affords. Access this post to improve employee productivity and reduce communications costs by increasing network capacity.
Posted: 05 Jul 2016 | Published: 24 May 2016

Avaya CenturyLink

The Pros and Cons of Microsegmentation for your Virtualized Environments
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.
Posted: 28 Jun 2016 | Published: 24 Jun 2016

NTT Com Security (UK) Ltd

Picking the Right Spots for SDN
sponsored by SearchSDN.com
EBOOK: This 3 part guide covers the top misconceptions that plague SDN, its importance to horizontal scaling and virtues of two SDN technologies: SD-WAN and NFV. In addition, discover how Microsoft aims to be a top contender in the SDN enterprise market.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

SearchSDN.com

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.
151 - 175 of 560 Matches Previous Page    5 6 7 8 9 10    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement