Standards  >   Network Protocols  >  

CCIS

RSS Feed   
CCIS Reports
 
4 Dimensions of Network Monitoring
sponsored by AppNeta
RESOURCE: Your network spans multiple cloud providers, third-party services, and an always-growing web of remote locations. Does your team have the comprehensive visibility to tie it all together? Download this quick checklist to ensure that you have all the data and insights you need to manage your network effectively.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

Focus: Network security
sponsored by ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

ComputerWeekly.com

Border Gateway Protocol: The Roadmap to the Internet
sponsored by AppNeta
WHITE PAPER: Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.
Posted: 05 Nov 2019 | Published: 04 Nov 2019

AppNeta

Software-Defined Networks are Creating New Challenges for Enterprise Security
sponsored by Palo Alto Networks
ANALYST REPORT: A panel of 300 North American respondents was asked about how they use SD-WAN and what drives their security concerns in those deployments. What were the main drivers for adopting SD-WAN? What benefits have been recognized? How do they plan to consolidate functions with respect to SD-WAN? Read this report to get these answers and more.
Posted: 31 Aug 2020 | Published: 30 Jun 2020

Palo Alto Networks

How Distributed Enterprise Networks are being Re-Architected in the Age of Cloud
sponsored by Apcela
ANALYST REPORT: The mainstream adoption of cloud-based services has caused enterprises to reconsider how their networks are architected. Legacy designs that focused on the data center no longer reflect the distributed nature of enterprise applications and services. Read this IDC report to learn how distributed enterprise networks are being re-architected.
Posted: 23 Oct 2020 | Published: 31 Jul 2020

Apcela

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

CradlePoint

A Computer Weekly buyer's guide to perimeterless network security
sponsored by ComputerWeekly.com
EGUIDE: Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

What to Look for in Secure Sockets Layer
sponsored by SearchSecurity.com
EBOOK: This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.
Posted: 04 May 2016 | Published: 04 May 2016

SearchSecurity.com

Seven Steps to Achieving Better Requirements Engineering in Your Organization
sponsored by IBM
WHITE PAPER: Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.
Posted: 13 May 2009 | Published: 31 Mar 2009

IBM

One Click Away: Where Does the Data Come From?
sponsored by LANSA
WHITE PAPER: Thirty-five percent of consumers say they would never use a mobile app again if it contained incorrect product data. This brief resource explores how the global standards body GS1 established the Global Data Synchronization Network (GDSN) as a means of combatting outdated, inconsistent product information.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

LANSA
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info