network

Results 1 - 25 of 5055Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Tech advances like the cloud, mobile technology, and the app-based software model have changed the way today’s modern business operates. They’ve also changed the way criminals attack and steal from businesses. Criminals strive to be agile in much the same way that companies do. Spreading malware is a favorite technique among attackers. According to the 2019 Data Breach Investigations Report, 28% of data breaches included malware.¹ While malware’s pervasiveness may not come as a surprise to many people, what’s not always so well understood is that automating app attacks—by means of malicious bots —is the most common way cybercriminals commit their crimes and spread malware. It helps them achieve scale.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.¹ As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 09, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed breach world.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: SAP EMEA Global     Published Date: Aug 23, 2019
A network of digital twins visually communicates information about products, manufacturing, supply chain, service, and customers for program, scenario, and role-based analysis, and ultimately better collaboration across your business network.
Tags : 
    
SAP EMEA Global
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Achieving long-term profitability for 5G will require a major shift in thinking for many operators. Given the investments and capacity upgrades involved, simply treating 5G as just “another G” is a doomed strategy. Instead, 5G must be seen as an opportunity to re-energize the Telco business model and to move away from traditional commoditized network offerings. Download the discussion paper to learn: Five key questions the Telco C-suite should be asking to drive sustained 5G profitability Why 5G will require a major change in business strategy and IT delivery models How 5G can re-energize the Telco business model
Tags : 
    
Matrixx Software - Kingpin
Published By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
As 5G is becoming a commercial reality in multiple lead markets, the question of how it should be positioned, packaged and priced will be critical in building competitive 5G propositions. Download the Strategy Analytics report to discover the results from end-user study groups and operator interviews, undertaken to answer a fundamental question: Are Telcos getting 5G right? Learn: How to build a 5G proposition to drive uptake, demand and profitability What consumers want from 5G services Where the opportunities and challenges are for operators, including content, unlimited data, enterprise offerings, network slicing, digital engagement, IoT etc.
Tags : 
    
Matrixx Software - Kingpin
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Security analysts have a tougher job than ever. New vulnerabilities and security attacks used to be a monthly occurrence, but now they make the headlines almost every day. It’s become much more difficult to effectively monitor and protect all the data passing through your systems. Automated attacks from bad bots that mimic human behavior have raised the stakes, allowing criminals to have machines do the work for them. Not only that, these bots leave an overwhelming number of alert bells, false positives, and inherent stress in their wake for security practitioners to sift through. Today, you really need a significant edge when combating automated threats launched from all parts of the world. Where to start? With spending less time investigating all that noise in your logs."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Every kind of online interaction—website visits, API calls to mobile apps, and others—is being attacked by bots. Whether it's fraud, scraping, spam, DDoS, espionage, shilling, or simply altering your SEO ranking, bots are wreaking havoc on websites as well as mobile and business applications. But that’s not all: they’re also messing with your business intelligence (BI). They can skew audience metrics, customer journeys and even ad buys, making business decisions questionable and costly. According to Forrester, ad fraud alone was set to exceed $3.3 billion in 2018. Not all bots are bad. In fact, your business depends on them. Search engine bots, for example, give your web presence visibility and authority online. Other good bots help you deliver better customer experiences—perhaps a chatbot provides instant customer assistance on your site. What’s important is enabling the good bots and blocking the bad ones."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"The fast pace of innovation demanded by today’s digital businesses challenges traditional processes for the deployment and governance of application delivery and supporting infrastructure. To address the increased pace of change, many organizations are transforming by adopting DevOps: a set of practices which employs continuous integration processes, breaking down the silos between development and operations teams. As cycle times accelerate, and development teams adopt more Agile delivery methodologies, the traditional model for application security can be a drag on the speed and agility inherent in a continuous integration process. This creates a natural friction. Security teams can be perceived as slowing down or blocking delivery. At the same time, however, the apps are exposed to significant threats. The goal of continuous integration is to deliver more frequent releases with more new capabilities to market, faster. It’s all about speed."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed- breach world. Over 6,500 publicly disclosed data breaches occurred in 2018 alone, exposing over 5 billion records—a large majority of which included usernames and passwords.1 This wasn’t new to 2018 though, as evidenced by the existence of an online, searchable database of 8 billion username and password combinations that have been stolen over the years (https://haveibeenpwned.com/), keeping in mind there are only 4.3 billion people worldwide that have internet access. These credentials aren’t stolen just for fun—they are the leading attack type for causing a data breach. And the driving force behind the majority of credential attacks are bots—malicious ones—because they enable cybercriminals to achieve scale. That’s why prioritizing secure access and bot protection needs to be part of every organ
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Sep 19, 2019
"Have you ever wished for an army of clones to do all your thankless tasks and chores? Well, that fantasy is becoming a reality—at least on the Internet. And while they may not be actual clones, bots have begun doing lots of digital dirty work. Managing your relationship with bots—good and bad—has become an inherent part of doing business in a connected world. With more than half of online traffic initiated by autonomous programs, it’s clear that bots are a driving force of technological change, and they’re here to stay.1 As bot technology, machine learning, and AI continue to evolve, so will the threats they pose. And while some bots are good, many are malicious—and the cybercriminals behind them are targeting your apps. Preparing your organization to deal with the impact of bots on your business is essential to developing a sustainable strategy that will enable you to grow as you adapt to the new bot-enabled world."
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Anwendungsperformance und Bereitstellung haben sich geändert. Sollten Sie Ihr Netzwerk anpassen? Mit der Cloud ändert sich grundsätzlich die Art, wie IT-Teams Anwendungen bereitstellen und deren Performance managen. Anwendungen werden immer häufiger an Standorten fernab der Nutzer installiert. Bei der Übertragung werden häufig Netzwerke durchquert, die nicht direkt von der IT kontrolliert werden können. Statt in Unternehmensrechenzentren befinden sich viele Anwendungen nun in Public und Hybrid Clouds. Es gibt sogar eine ganz neue Art von Anwendungen: solche, die auf Microservices und Containern basieren.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Mithilfe der Kombination aus Citrix Networking und Google Cloud kann die IT verschiedene Herausforderungen in den Bereichen Anwendungsbereitstellung und -management meistern.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: SES     Published Date: Aug 01, 2019
Descubra cómo una empresa de comunicaciones está llevando conectividad a las zonas más remotas de Perú. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avión, Axesat está entregando soluciones por satélite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cómo, en asociación con SES Networks, la empresa puede aumentar el comercio y la conectividad en Perú.
Tags : 
    
SES
Published By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicações está levando conectividade às áreas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessível apenas por avião, a Axesat está levando soluções de satélite e cobertura de rede 4G a áreas que eram impossíveis de alcançar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comércio e a conectividade no Peru
Tags : 
    
SES
Published By: Intel     Published Date: Sep 25, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
While NFV remains both technically and business relevant today, many communications service providers (CoSPs) have found implementation very complex. NFV implementation will require further evolution in order to fully address operational and business requirements. This white paper reviews factors currently driving the network virtualization evolution and examines the impact of adopting an innovative model based on software and hardware disaggregation.
Tags : 
    
Intel
Published By: Intel     Published Date: Sep 25, 2019
5G services will place greater demands on the network in terms of peak data rates, connection density, and more. Learn how CoSPs are getting ready for 5G and how Intel® architecture is helping accelerate network transformation.
Tags : 
    
Intel
Published By: Juniper Networks     Published Date: Sep 26, 2019
Businesses in the Asia-Pacific (APAC) region manage many disparate security tools, frequently without a centralized information management platform. They also suffer a deluge of threat alerts, although only a small percentage of these require further investigation.
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"Enterprises throughout the world are rapidly digitizing their operations and adopting a multicloud environment. Unfortunately, legacy WAN architecture models often do not provide the scale, flexibility or agility required to support this transition. Enter SD-WAN. No single platform will be able to deliver every piece in the jigsaw for every type of enterprise and every application-specific set of requirements. The key is to select vendor partners whose platforms are sufficiently open, modular and comprehensive in their functionality and components that they will be able to adapt to enterprises’ increasingly varied, flexible and exacting networking and compute requirements going forward. Only by doing so will they secure the ability to stay ahead in a multicloud future."
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. That’s because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. It’s neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
    
Juniper Networks
Published By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
    
Juniper Networks
Published By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UK’s biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: • how data and analytics can transform operational performance • the benefits of using decision-support tools in the middle office • key lessons for getting your plans for digital transformation right.
Tags : 
    
KPMG
Published By: Cisco and NVIDIA Corporation     Published Date: Sep 09, 2019
The combination of Citrix Networking and Google Cloud helps IT overcome several challenges for application delivery and management.
Tags : 
    
Cisco and NVIDIA Corporation
Published By: Cisco and NVIDIA Corporation     Published Date: Oct 25, 2019
La combinaison de Citrix Networking et de Google Cloud aide le service informatique à relever plusieurs défis pour la fourniture et la gestion des applications. Voici comment: Gérer un cloud hybride Déplacer les charges de travail sur site et héritées Fournir une mise en réseau native sur le cloud pour les microservices et les applications de conteneur Améliorer les performances pour l'accès à distance aux ressources du cloud Fournir un accès utilisateur intégré
Tags : 
    
Cisco and NVIDIA Corporation
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.