Business of Information Technology  >   Business Management  >   Best Practices  >  

Network Best Practices

RSS Feed   
Network Best Practices Reports
151 - 175 of 547 Matches Previous Page  |  Next Page
How to enhance your network for the future
sponsored by
EGUIDE: The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.
Posted: 21 Apr 2016 | Published: 15 Aug 2016

IoT: What it Takes to Run a Wireless, Secure, Mobile Strategy
sponsored by Aruba Networks
EGUIDE: The Internet of Things is here and the knowledge of how to run it effectively is vital. Without a plan and without a vision, the IoT can fall apart catastrophically. In this e-guide, learn what it takes to run an IoT wireless network, how BYOD and IoT device onboarding can improve security, and what your mobile security strategy should look like.
Posted: 09 Sep 2016 | Published: 07 Sep 2016

Aruba Networks

Software-Defined Network Security: A 'No-Touch' Approach
sponsored by VMware
EGUIDE: Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.
Posted: 02 Aug 2016 | Published: 01 Aug 2016


Microsegmentation Strategies for Smarter Security
sponsored by VMware
EGUIDE: In this expert e-guide, we discuss the potential benefits of the microsegmentation approach to virtual networking. Discover why this security method is driving deployment momentum across enterprises and find out what questions you should be asking before you get started on your own transformation.
Posted: 02 Aug 2016 | Published: 01 Aug 2016


Picking Your Best Path to VoIP
sponsored by Avaya CenturyLink
RESOURCE: Changing voice systems is not a trivial matter. Determine which is the right VoIP migration path your organization—cloud-based hosted VoIP or premises-based SIP trunking. Read on to learn when to consider SIP trunking over hosted VoIP (and vice versa) based on your long-term plans.
Posted: 07 Jul 2016 | Published: 07 Mar 2016

Avaya CenturyLink

Making the Financial Case for Hosted VoIP
sponsored by Avaya CenturyLink
RESOURCE: Discover in this post how to evaluate the costs of maintaining your legacy phone service—in terms of CapEx and OpEx—and estimate the financial impact of hosted VoIP to determine if you should adopt. Additionally, access a hosted VoIP TCO tool to build your implementation business case.
Posted: 07 Jul 2016 | Published: 05 Apr 2016

Avaya CenturyLink

Don't Run A 21st Century Business With 20th Century Phones
sponsored by Avaya CenturyLink
RESOURCE: Explore the top 5 business benefits you will receive by making the switch to VoIP from PBX—fulfilling the need for higher performance standards, simpler network operations, and seamless incorporation of new communications apps. Read on to see why you should consider VoIP.
Posted: 07 Jul 2016 | Published: 22 Apr 2016

Avaya CenturyLink

The Cost of Change: A Network Perspective on How Rigidity Limits Agility
sponsored by Avaya TSG
ANALYST REPORT: For most organizations, the network is now the single biggest inhibitor to achieving business agility. Access this exclusive report to examine the challenges associated with achieving total network agility, and in it, Zeus Kerravala of ZK Research demonstrates the challenge with legacy change management models.
Posted: 06 Jul 2016 | Published: 30 Apr 2015

Avaya TSG

New Rules of Engagement: Dispelling 3 Myths of Communications
sponsored by Avaya TSG
WHITE PAPER: Take a closer look at the pros and cons of adopting a consumer-like approach to business communications. Explore 3 enterprise communication myths, and how you can selectively leverage components of these misconceptions to foster a culture of engagement.
Posted: 06 Jul 2016 | Published: 31 Dec 2015

Avaya TSG

Utah State University Realizes Big Savings by Upgrading to VoIP
sponsored by Avaya CenturyLink
CASE STUDY: Learn how to save your organization thousands of dollars by upgrading older TDM systems to VoIP—recovering productive hours from IT staff to put toward new initiatives. Integrate VoIP into your modern digital infrastructure to unify communications and mobilize your workforce for even greater productivity.
Posted: 05 Jul 2016 | Published: 16 May 2016

Avaya CenturyLink

Why Moving to VoIP Makes Business Sense (and Produces Cents)
sponsored by Avaya CenturyLink
RESOURCE: Discover the top 3 things you need to know to succeed with VoIP today—including how to avoid the money drain of legacy PBXs—as well as the risks and rewards VoIP affords. Access this post to improve employee productivity and reduce communications costs by increasing network capacity.
Posted: 05 Jul 2016 | Published: 24 May 2016

Avaya CenturyLink

The Pros and Cons of Microsegmentation for your Virtualized Environments
sponsored by NTT Com Security (UK) Ltd
EGUIDE: Microsegmentation is said to improve usability and security by establishing "zero trust" zones where more granular access controls can be enforced. In this e-guide learn from information security expert, Kevin Beaver, as he dives into the pros and cons of microsgmentation to determine if it can help your virtualization security needs.
Posted: 28 Jun 2016 | Published: 24 Jun 2016

NTT Com Security (UK) Ltd

Picking the Right Spots for SDN
sponsored by
EBOOK: This 3 part guide covers the top misconceptions that plague SDN, its importance to horizontal scaling and virtues of two SDN technologies: SD-WAN and NFV. In addition, discover how Microsoft aims to be a top contender in the SDN enterprise market.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Why It's Important to Have a Mobile Enterprise Strategy
sponsored by VMware, Inc.
EGUIDE: We sat down with the general manager of VMware's end-user computing group to learn about the vendor's EMM evolution. Explore additional expert resources that detail ways to integrate EMM into a broader mobile enterprise strategy, and what it means to have a mobile-first strategy.
Posted: 20 Jun 2016 | Published: 15 Jun 2016

VMware, Inc.

sponsored by IBM
WHITE PAPER: Protecting today's complex networks against malicious activities is a never-ending task. Learn how you can boost threat protection and compliance by developing security intelligence.
Posted: 15 Jun 2016 | Published: 20 Dec 2013


How Cloud Computing Changes the Role of IT
sponsored by MASERGY
RESOURCE: Optimize the performance of your SaaS-based apps by examining network traffic to determine how much of your bandwidth they consume. Discover how to work with end users to improve their cloud-based app experience, and ensure your network is in top shape to accommodate all workloads.
Posted: 25 May 2016 | Published: 15 Jan 2015


Obey these 10 BYOD golden rules
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Network Strategies that Will Help You Eliminate, Embrace, or Coexist with Shadow IT
sponsored by Juniper Networks, Inc.
WHITE PAPER: Shadow IT is here. Access this e-guide for the current trends driving the rise of shadow IT, explore the drawbacks and benefits it offers, and learn how designing and building the right network is essential for your preferred shadow IT strategy.
Posted: 05 May 2016 | Published: 05 May 2016

Juniper Networks, Inc.

Top 3 Reasons Your Enterprise Network Matters More in the Cloud Era
sponsored by Juniper Networks, Inc.
WHITE PAPER: Traditional networks simply can't handle all the implications of the cloud. Explore the top 3 IT trends that will impact your cloud networking strategy, and learn how to build a network that's 100% cloud-ready.
Posted: 04 May 2016 | Published: 31 Dec 2015

Juniper Networks, Inc.

The Enterprise Guide to Data Centers
sponsored by Comcast
WHITE PAPER: Industry-leading vendors and IT professionals weigh in on proven tactics to accommodate the expansion of your data center, and when you should consider outsourcing, in this e-book. Read on to hone in on 7 tactics to reduce your data center's power draw, and more.
Posted: 28 Mar 2016 | Published: 28 Mar 2016


Load Balancer Decision-Making: Hard versus Soft
sponsored by Citrix
EGUIDE: In this e-guide, experts break down the differences and similarities between hardware and software load balancers. Learn when it's right to opt for virtual appliances, and what you need if you're aiming for their hardware counterpart.
Posted: 24 Mar 2016 | Published: 18 Mar 2016


How to Choose an EMM Solution That’s Right for You
sponsored by vmware airwatch
WHITE PAPER: Providing a seamless mobile experience for users starts with gaining control over the spread of devices. Discover how the right EMM solution provides the security and management capabilities you need and learn the 6 main questions to address during the buying phase.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

vmware airwatch

Five Mobility Trends Making an Impact in the Modern Workplace
sponsored by vmware airwatch
WHITE PAPER: Mobile device management (MDM) lets IT enforce security while granting employees the freedom of mobility. Access this trend brief and uncover ways five ways MDM is transforming the enterprise.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

vmware airwatch

Does SDN Negate ADCs? Not if Innovators in Virtualization Have Their Way
sponsored by Citrix
WHITE PAPER: This e-guide reveals the advent of virtual application delivery controllers (ADCs) in response to the growth of virtualized systems. Access now to learn about innovative features that enable virtual ADCs on a software-defined (SDN) network.
Posted: 23 Mar 2016 | Published: 18 Mar 2016


How Application Performance Depends on your Network
sponsored by Citrix
EGUIDE: In this e-guide, experts unveil ways application performance can vary depending on your decisions. Read on and learn how the network, I/O, memory, and CPU all need to be carefully considered when it comes to virtualized application performance.
Posted: 21 Mar 2016 | Published: 17 Mar 2016

151 - 175 of 547 Matches Previous Page    5 6 7 8 9 10    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement