IT Systems  >   Communications Networks  >   LAN  >  

Virtual Bridged Local Area Networks

RSS Feed    Add to Google    Add to My Yahoo!
Virtual Bridged Local Area Networks Reports
 
How We Define a Network is About to Change, Again
sponsored by Global Knowledge
WHITE PAPER: In this white paper, you'll learn how VMware NSX changes the way that you build, manage, and secure your network.
Posted: 06 Oct 2014 | Published: 25 Sep 2014

Global Knowledge

Bringing iPads in the classroom – New requirements to consider
sponsored by SearchSecurity.com
EGUIDE: Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

SearchSecurity.com

The ECHO™ - Cisco Connection: ECHO™, and How It Interacts with Cisco's CallManager
sponsored by Teleformix
WHITE PAPER: Read this white paper and learn how ECHO's direct digital integration with Cisco's VoIP network enables the pooling of voice VLAN ports through SPAN or RSPAN.
Posted: 11 Jul 2008 | Published: 01 Jul 2007

Teleformix

Securing Enterprise Networks with a Sharp Eye and a Clear Plan
sponsored by SearchSecurity.com
EGUIDE: Enterprise networks are increasing in size and complexity, creating a larger attack surface for hackers. This TechGuide walks you through gaining visibility into your network and devising an effective security strategy.
Posted: 14 Aug 2014 | Published: 11 Aug 2014

SearchSecurity.com

Eliminating Security Trade-Offs with Cross-Platform Server Isolation
sponsored by Apani
WHITE PAPER: This paper will examine the challenges of using network firewalls and VLANs for security within the corporate network and introduce the many advantages of cross-platform server isolation as an alternative in protecting servers.
Posted: 18 Feb 2008 | Published: 01 Feb 2008

Apani

How Enterprise-Class Services Integrate with Real Companies
sponsored by Comcast
PODCAST: Discover why one of your peers chose Enterprise Services from Comcast to fulfill their need for a high-speed connection between their primary site and disaster recovery site.
Posted: 06 Mar 2013 | Premiered: Dec 31, 2012

Comcast

BGMX Retail Solutions Case Study
sponsored by SonicWALL
CASE STUDY: BGMX's primary challenge is having the proper bandwidth to adhere to all VLAN specifications in PCI compliance standards. Desko also must meet even tighter SAS-70 regulations, as well as his bank's internal security guidelines.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SonicWALL

Improving the Experience and Economics of the Campus Network
sponsored by Juniper Networks, Inc.
WHITE PAPER: Most companies today are implementing mobility applications to establish closer relationships with their employees, suppliers and customers. Mobility applications enable the sales force to be extremely reactive, stay connected to their customers, and act on new opportunities in literally seconds.
Posted: 02 Sep 2011 | Published: 02 Sep 2011

Juniper Networks, Inc.

Increase Visibility Into Virtual Infrastructures With a Layered Security Strategy
sponsored by CA Technologies.
EGUIDE: Brought to you by SearchNetworking.com, this expert E-Guide unveils how you can increase your visibility with a layered security strategy.
Posted: 30 Mar 2012 | Published: 30 Mar 2012

CA Technologies.

Solution brief: Exceed the Limits with Extreme Networks SDN Solutions
sponsored by Extreme Networks
WHITE PAPER: Explore a portfolio of products that will help you accelerate the adoption of software-defined networking (SDN) within your enterprise.
Posted: 14 May 2013 | Published: 30 Apr 2013

Extreme Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement