Business of Information Technology  >   Business Management  >   Best Practices  >  

Network Best Practices

RSS Feed    Add to Google    Add to My Yahoo!
Network Best Practices Reports
51 - 75 of 487 Matches Previous Page  |  Next Page
Reinventing Your Data Center Network
sponsored by TechTarget
RESOURCE: What does the growing need to manage, store and direct huge amounts of application traffic and data flowing through today's data center networks mean for your network? Find out inside our new guide: Breathe New Life Into Your Data Center Network. Uncover how you can use SDN, network virt, switches, and more strategies to meet these new demands.
Posted: 28 Oct 2016 | Published: 28 Oct 2016

TechTarget

High Availability DNS Reduces Downtime Risk and Improves End-User Experience
sponsored by Dyn
WHITE PAPER: This white paper reviews the business advantages of implementing a high availability DNS architecture. You'll learn the critical role DNS plays in the user experience, the risks of relying on a single DNS solution, and the added performance benefits of a high availability DNS architecture.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Dyn

DNS For Hybrid Cloud Success
sponsored by Dyn
WEBCAST: This webcast addresses industry concerns about applications hosted in a hybrid cloud, as well as explores various strategies for implementing cloud services in your business. Learn some successful cloud adoption tactics like using traditional technologies to assist cloud migration and focusing on a 3-part migration life-cycle.
Posted: 21 Oct 2016 | Premiered: Oct 21, 2016

Dyn

How DNS Information Can Help Cut Millions from Your Infrastructure Costs
sponsored by Dyn
EGUIDE: This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.
Posted: 18 Oct 2016 | Published: 17 Oct 2016

Dyn

If External DNS Fails, So Does Your Digital Business
sponsored by Dyn
RESEARCH CONTENT: Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance.
Posted: 14 Oct 2016 | Published: 15 Sep 2016

Dyn

The Anatomy of DDoS Attacks And Best Practices for Preventing Them
sponsored by Arbor Networks
EGUIDE: This expert e-guide explores how a DDoS attack functions, from discovering targets to infiltrating your servers - costing you time, money, and possibly even your public image. Next discover how the 3 major types of DDoS attacks differ, and what you can do to prevent them from gaining access to your information.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Arbor Networks

Is Passive Optical Networking Good For Enterprises?
sponsored by Nokia
EGUIDE: This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.
Posted: 10 Oct 2016 | Published: 10 Oct 2016

Nokia

Bridging the Innovation Gap: Meeting Enterprise Customer Expectations in a Constantly Evolving Network Services Marketplace
sponsored by Cisco Systems, Inc.
EBOOK: How can you bridge the gap between what your customers expect and what you can deliver? This e-book takes a look at virtual managed services in the cloud, and why you may want to capitalize on the $156 billion ITaaS opportunity for managed services forecast by 2018.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

Cisco Systems, Inc.

Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring
sponsored by AppNeta
CASE STUDY: "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.
Posted: 16 Sep 2016 | Published: 16 Sep 2016

AppNeta

The Global DNS Threat Report
sponsored by EfficientIP
ANALYST REPORT: Within this report come to understand not only the technical and business impacts of DNS security, but also why they are underestimated, how businesses should counter them, and how most DNS security solutions are not adapted.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

EfficientIP

Gain Complete Control of Your Digital Ecosystem with PKI
sponsored by Entrust, Inc.
WHITE PAPER: Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.
Posted: 14 Sep 2016 | Published: 14 Sep 2016

Entrust, Inc.

Protecting Web Services for the French Tennis Federation
sponsored by EfficientIP
CASE STUDY: Learn how the French Tennis Federation (FFT) chose to tackle the task of ensuring seamless coverage for the French Open by unifying network management, protecting against DNS attacks, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

EfficientIP

The Top 3 Reasons Your Network Matters in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Because of trends in more mobility, cloud applications, and connectivity in the enterprise, teams need to think more strategically about what their networks need to support the cloud. Discover details on how these three IT trends impact your cloud strategy -- and how you can build a network that's ready for the cloud.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Juniper Networks, Inc.

Enterprise Campus Network Comparison Guide
sponsored by Juniper Networks, Inc.
WHITE PAPER: This resource examines four key aspects of campus networks and the key points of comparison for each one. Get a new perspective on how the various options stack up on the most important features and capabilities.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Juniper Networks, Inc.

Enable Your Network and Data Center for Digital Transformation: Five Considerations to Build a Future-Proof Platform
sponsored by Juniper Networks, Inc.
WHITE PAPER: To succeed in the cloud, big data, mobile, and social era, agility is key. Access the following report and learn 5 considerations for building a future-proof IT platform.
Posted: 07 Sep 2016 | Published: 31 Aug 2015

Juniper Networks, Inc.

Enable Your Network and Data Center for Digital Transformation
sponsored by Juniper Networks, Inc.
WHITE PAPER: Fabric technologies can deliver the high performance that modern applications need, and the business agility that comes with network management simplicity. Read on to learn more about this cost-effective approach to data center networking.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Juniper Networks, Inc.

How a School District Swiftly Detects and Remediates Internal and External Threats
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.
Posted: 07 Sep 2016 | Published: 07 Sep 2016

Cisco Systems, Inc.

Incident Response with NetFlow for Dummies
sponsored by Cisco Systems, Inc.
EBOOK: Security incidents are critical times for information security pros, with the time period after the first identifications having a big impact on the incident's severity. Access this e-book to learn how to align your incident response processes with industry-standard practices and how to enhance your technical capabilities.
Posted: 15 Aug 2016 | Published: 31 Dec 2014

Cisco Systems, Inc.

Deciphering the Tactics of the Enemy: APT-Style Attacks
sponsored by Dimension Data
EGUIDE: In this e-guide learn one of the most nefarious tactics cybercriminals are deploying in today's threat landscape: the Advanced Persistent Threat-style attack.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

Is FDE Enough to Thwart "Evil Maid" Attacks?
sponsored by Dimension Data
EGUIDE: In this e-guide learn why the traditionally accepted full disk encryption (FDE) isn't enough to protect enterprise data in case an attacker steals your device.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Dimension Data

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016

VMware

Picking Your Best Path to VoIP
sponsored by Avaya CenturyLink
RESOURCE: Changing voice systems is not a trivial matter. Determine which is the right VoIP migration path your organization—cloud-based hosted VoIP or premises-based SIP trunking. Read on to learn when to consider SIP trunking over hosted VoIP (and vice versa) based on your long-term plans.
Posted: 07 Jul 2016 | Published: 07 Mar 2016

Avaya CenturyLink

Making the Financial Case for Hosted VoIP
sponsored by Avaya CenturyLink
RESOURCE: Discover in this post how to evaluate the costs of maintaining your legacy phone service—in terms of CapEx and OpEx—and estimate the financial impact of hosted VoIP to determine if you should adopt. Additionally, access a hosted VoIP TCO tool to build your implementation business case.
Posted: 07 Jul 2016 | Published: 05 Apr 2016

Avaya CenturyLink
51 - 75 of 487 Matches Previous Page    1 2 3 4 5 6    Next Page
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement