network applications

Results 1 - 25 of 285Sort Results By: Published Date | Title | Company Name
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : 
signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
    
Rohde & Schwarz Cybersecurity
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 30, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Oftentimes, these applications span both personal and work-related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting a job.
Tags : 
firewall, optimization, security risks, business, devices, employees, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
Your network is more complex than ever before. Your employees are accessing any application they want, using work or personal devices. Often times, these applications span both personal and work related usage, but the business and security risks are often ignored. Prospective employees are asking about application usage policies before accepting their new job. Adding another layer of complexity is the concern about the effectiveness of your cybersecurity posture. Is your business a target for a cyberattack Is it a question of when, as opposed to if? And are you as prepared as you could be? The complexity of your network and your security infrastructure may limit or slow your ability to respond to these and other cybersecurity challenges.
Tags : 
firewall, customer, optimization, employees, devices, cyber security, technology
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Nov 15, 2017
In today’s complex network environments, applications, infrastructure and threats are dynamic. As such, relying upon various, single-purpose security devices that don’t integrate with each other results in dangerous security gaps. These devices are poorly coordinated and unable to provide comprehensive security and threat prevention. To protect against today’s advanced attacks requires a natively integrated, next-generation approach to security – an approach that can keep up with the latest application and infrastructure trends and recognize and stop today’s most advanced threats.
Tags : 
firewall, optimization, network, environments, applications, infrastructure, security, palo alto
    
Palo Alto Networks
Published By: Context Optional     Published Date: Mar 09, 2010
If you're a brand marketer or digital agency looking to amplify your social marketing initiatives this year, this document will guide you through the growing world of Facebook apps. Today, there are more than 500,000 active applications on Facebook, but of these only 250 applications have more than one million monthly active users. You've downloaded this guide because you recognize that marketing today means creating a two-way dialogue with your customers.
Tags : 
context optional, social media, facebook, social networking, social applications, social marketing, email newsletters
    
Context Optional
Published By: Group M_IBM Q1'18     Published Date: Dec 20, 2017
Despite the business-transforming upsides of data from the Internet of things (IoT), there’s a downside: security. Porous networks and lax users offer tantalizing access for hackers. Although most security spending is at the enterprise level, a shift is needed to secure IoT applications and provide improved governance and accountability. Electronics companies must create secure environments that safely collect, consume, share and store data on their networks. But they also must go beyond devices and consumers to close holes to factory, ecosystem and partner networks.
Tags : 
planet scale security, iot, security, iot application, application security, partner networks
    
Group M_IBM Q1'18
Published By: Cisco EMEA Tier 3 ABM     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : 
malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
    
Cisco EMEA Tier 3 ABM
Published By: Hewlett Packard Enterprise     Published Date: Jul 12, 2016
Technology enables business transformation To thrive in today’s idea economy, small and midsize companies like yours are using technology to transform their business. Like your peers, you know that mobile applications, cloud-based solutions, and advanced analytics can help you increase productivity, reduce costs, and grow your business. Older servers, storage, and networking products weren’t built to handle the exploding amount of data that is being shared today. In order to take advantage of these modern applications, many companies have found that they need to close the gap between what their business demands and what their IT systems can deliver.
Tags : 
best practices, business optimization, business management, application management, enterprise application, business intelligence, transformation
    
Hewlett Packard Enterprise
Published By: Pega     Published Date: May 25, 2016
Organizations are constantly turning to IT solutions to streamline their operations and processes and gain efficiencies. Business Process Management solutions is one area gaining traction inside enterprises as they look to making their workflow more effective and more capable to an ever changing business environment. According to Gartner, BPM-platform-based case management frameworks are configurable "apps" meant to help solution architects accelerate the delivery of unique and flexible case management solutions. Gartner evaluated 11 providers in this growing market segment including Pegasystems. Download this Gartner Magic Quadrant analysis for BPM platform-based case management frameworks and gain a better understanding of the solutions offered by each BPM vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions
    
Pega
Published By: Pega     Published Date: May 25, 2016
Adapting to changing market dynamics is not easy for any enterprise-class organization. To stay competitive, companies not only must adapt different go to market and customer service strategies but also embrace internal business process and workflow changes, which in many cases can be more difficult. Enter Intelligent Business Process Management Suites (iBPMS). According to Gartner, iBPMS compress the observation-to-action-to-outcome cycle, and help business transformation leaders, business process directors and solution architects establish a fluid capability to handle big change. Gartner evaluated 15 iBPMS vendors including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding evolving iBPMS market and the solutions offered by each iBPMS vendor.
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, enterprise management
    
Pega
Published By: Pega     Published Date: May 25, 2016
Case management frameworks built on business process management platforms help IT solutions architects deploy case-handling applications and offer an alternative to specialized case management applications and custom coding. According to Gartner, the complex architecture required to support case management has relegated it to the status of a niche application, typically addressed by specialist, commercial off-the-shelf application providers and system integrators. Case management as a process style is being applied in many sectors beyond government, legal and insurance, including healthcare, banking, higher education and retail. Industry and cross-industry case management frameworks are now available. "Adaptive case management" hype exceeds the reality of what buyers need. Gartner evaluated 12 vendors including Pegasystems against nine critical capabilities in four use cases. Download this Gartner analysis and gain a better understanding of the case management frameworks solutions offe
Tags : 
business optimization, business strategy, network management, business applications, best practices, business process management, solutions, case management
    
Pega
Published By: Oracle CX     Published Date: Oct 20, 2017
Security has become top of mind for CIOs, and CEOs. Encryption at rest is a piece of the solution, but not a big piece. Encryption over the network is another piece, but only a small piece. These and other pieces do not fit together well; they need to unencrypt and reencrypt the data when they move through the layers, leaving clear versions that create complex operational issues to monitor and detect intrusion. Larger-scale high-value applications requiring high security often use Oracle middleware, including Java and Oracle database. Traditional security models give the data to the processors to encrypt and unencrypt, often many times. The overhead is large, and as a result encryption is used sparingly on only a few applications. The risk to enterprises is that they may have created an illusion of security, which in reality is ripe for exploitation. The modern best-practice security model is an end-to-end encryption architecture. The application deploys application-led encryption s
Tags : 
    
Oracle CX
Published By: HPE     Published Date: Dec 05, 2014
The HP Flex-Bundles for Exchange 2013 are right-sized solutions including servers, storage, networking and services that have been optimized for Microsoft Exchange. There are two HP Flex-Bundles for Exchange. One has been configured for customers who have 200–499 mailboxes and another one for customers with 500-1000 mailboxes. These solutions are low risk investments because HP understands how to build infrastructures for Microsoft environments and applications. HP and Microsoft have the longest standing relationship in the IT industry spanning 30 years. During this time, HP has gained a deep and comprehensive understanding of Microsoft products. HP has more than 34,000 trained Microsoft specialists, with over 13,000 of them attaining Microsoft-certification. HP has been named Microsoft Enterprise Partner of the Year five times and is Microsoft’s largest Gold Certified partner.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors
    
HPE
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance
    
Cisco
Published By: EMC Converged Platforms     Published Date: Jan 12, 2016
In order for enterprises and IT organizations to truly innovate and offer differentiated value to customers, you need an IT infrastructure based on the latest advancements in computing, networking, and storage. Considering an investment in flash storage or converged infrastructure? Read this brochure to learn more about the Vblock® System 540, the industry’s first all-flash Converged Infrastructure System for high-performance mixed workloads and emerging 3rd platform applications—built on best of breed technology components including EMC XtremIO all-flash storage. All of this with the VCE™ Experience of unmatched management and one-call support.
Tags : 
vce, it infrastructure, all flash storage, vblock system 540, 3rd platform applications, networking
    
EMC Converged Platforms
Published By: Cisco     Published Date: Mar 17, 2017
We evaluate enterprise LAN vendors providing wired and wireless access layer connectivity. Network leaders should evaluate vendors based on their ability to offer the same network applications across both the wired and wireless infrastructure and address new IoT challenges.
Tags : 
connectivity, wireless, infrastructure, iot, internet of things, network applications, wireless infrastructure
    
Cisco
Published By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : 
network, bandwidth, saas, application, optimize traffic, performance, technology, cloud
    
Blue Coat Systems
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : 
cloud, applications, network, bandwith, saas, infrastructure, network performance management, cloud computing
    
Blue Coat Systems
Published By: Oracle     Published Date: Aug 08, 2013
Oracle Fusion Tap, a native iPad application, allows access to CRM data anytime and anywhere. Learn how Fusion Tap enables collaboration with colleagues and customers, usage of mapping and social networking applications, and more, all from your iPad.
Tags : 
oracle tap, oracle, crm, oracle fusion, ipad, crm
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
Oracle Fusion Tap, a native iPad application, allows access to CRM data anytime and anywhere. Learn how Fusion Tap enables collaboration with colleagues and customers, usage of mapping and social networking applications, and more, all from your iPad.
Tags : 
oracle tap, oracle, crm, oracle fusion, ipad, crm
    
Oracle
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Privileged Access Manager (PAM) is a well-integrated suite that provides a comprehensive solution for privileged identity management in physical and virtual environments. CA PAM enables centralized control and management of privileged user access to a broad range of servers, network devices and applications.
Tags : 
security information, security management, event management, system security, system management, risk management, security infrastructure, it infrastructure
    
CA Technologies
Published By: Juniper APAC DWA Cloud Leads July 2017     Published Date: Oct 25, 2017
The broad adoption of the next generation of cloud, mobile, M2M, and big data applications is having profound impacts on IT and network infrastructures. Compared to traditional applications, these applications have much shorter life cycles. You must be able to spin them up, spin them down, and grow and shrink them on demand. Furthermore, you must be able to move these application workloads within a data center or across geographically distributed data centers, resulting in increased management complexities.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection
    
Juniper APAC DWA Cloud Leads July 2017
Published By: Riverbed     Published Date: Jul 17, 2013
In recent years Boston College has experienced rapid growth in data center network complexity. This complexity was driven by the need to provide a high level of fault tolerance to new, multi-tiered applications that had large bandwidth requirements. Read the case study to learn how the university deployed Riverbed Cascade™ to improve application performance management and increase network uptime.
Tags : 
boston, boston college, riverbed cascade, riverbed, cascade, application performance management, network uptime, bandwidth management
    
Riverbed
Published By: Riverbed     Published Date: Jul 17, 2013
To deliver IT performance, you need complete visibility. Riverbed Cascade offers a superior network performance management solution for discovering, monitoring and troubleshooting your network and your critical applications. Now you can resolve performance problems before they impact the business, while lowering your IT management costs. Cascade has an elegant and simple design that deploys easily in complex environments and provides true integration across the Cascade family. This cleaner architecture means superior visibility, management and troubleshooting, saving our customers both capex and opex. According to IDC, Cascade customers typically experience an 83% reduction in mean time to resolution (MTTR)
Tags : 
it performance, cascade, riverbed cascade, riverbed, it management, mttr, idc, infrastructure
    
Riverbed
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.