secure network

Results 76 - 100 of 232Sort Results By: Published Date | Title | Company Name
Published By: Mimecast     Published Date: Apr 18, 2017
"To tackle today’s cyber threats, IT security leaders must rethink traditional security strategies. Email security in particular has become a victim of its own success and requires a radical rethink, having played a key role in several high-profile security breaches. Today’s threats, like spear-phishing, are designed to bypass traditional Secure Email Gateway defenses, often taking advantage of end users who are considered the weakest link in business email security armor. A zero-trust approach to email security is needed. This white paper discusses how: - CISO’s should carefully assess email security as part of a strategic security review - IT Managers can evaluate the state of current email defenses and take tactical action to strengthen them - Security Administrators can deliver best-practice defense in depth for email - Organizations can remove a reliance on trust to more effectively protect information, their network and employees. "
Tags : 
email security, cyber threats, it security, phishing
    
Mimecast
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Using strategic points of control to aggregate and dynamically provision IT resources can help organizations meet network-related challenges and move past the hype to successfully build, deploy, and secure private clouds. By using strategic points of control to aggregate and dynamically provision resources, organizations can meet network-related challenges and successfully build, deploy, and secure private clouds.
Tags : 
cloud implementation, secure, private cloud, self-sevice it, automation and orchestration, transitioning to a hybrid model, virtualization of the network, virtualization, cloud computing, infrastructure
    
F5 Networks Inc
Published By: F5 Networks Inc     Published Date: Aug 13, 2013
Applications running across networks encounter a wide range of performance, security, and availability challenges as IT department strive to deliver fast, secure access from anywhere, at any time, on any device. Read this paper to learn why applications fail, why network load balancing alone offers little protection, and why context-aware application delivery is so critical to making mission-critical applications highly available, fast and secure.
Tags : 
network, load balancing, application awareness, resource, context-aware application delivery
    
F5 Networks Inc
Published By: Intel Corp.     Published Date: Jul 09, 2012
Use local virtual desktops to secure and control information no matter where-or whether-users connect to the network.
Tags : 
intel, virtual desktop, citrix xenclient
    
Intel Corp.
Published By: Tripwire     Published Date: Nov 07, 2012
Properly configuring security parameters on servers, workstations and network infrastructure platforms has been a mandatory of best practices in information security. Read this white paper to learn how secure configurations can reduce overall attack.
Tags : 
secure configuration, tripwire, information security, data security, network infrastructure platforms
    
Tripwire
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync is not only changing the cost structure of enterprise telephony, but also ushering in a new user experience in which every communication is transformed into a more collaborative, engaging interaction.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
L’application Microsoft Lync modifie en profondeur la structure des coûts de la téléphonie d’entreprise et plonge l’utilisateur dans une nouvelle expérience où chaque communication devient plus captivante et plus conviviale. Voici 10 conseils pour garantir le bon fonctionnement de Lync sur les appareils mobiles de votre réseau.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync optimiert nicht nur die Kostenstruktur für die Unternehmenstelefonie, sondern schafft auch ein völlig neues Benutzererlebnis, fördert den Austausch und stärkt die Zusammenarbeit im Unternehmen. Um die Vorteile von Lync umfassend ausschöpfen zu können, muss die zugrunde liegende Infrastruktur optimal genutzt werden. Da die Zahl an Laptops, Smartphones und Tablets langfristig die Zahl der Desktops übertreffen wird, benötigen Unternehmen sichere und zuverlässige Wireless-Infrastrukturen. Mit nur geringem Aufwand können Sie die Qualität und die Zuverlässigkeit multimedialer Kommunikation in Ihrem WiFi-Netzwerk verbessern. Wir haben die Top-10-Tipps für Sie, wie Sie von den Vorteilen von Lync auf mobilen Endgeräten in Ihrem Netzwerk profitieren können…
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync está cambiando la estructura de costes en la telefonía empresarial y está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva. Aquí tiene 10 consejos para asegurarse de que Lync funciona bien en los dispositivos móviles en la red. Microsoft Lync no sólo está cambiando la estructura de costes en la telefonía empresarial sino que, además, está marcando una nueva experiencia para sus usuarios en la cual cada comunicación se convierte en una interacción cada vez más colaborativa y atractiva.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Aruba Networks     Published Date: Nov 15, 2013
Microsoft Lync cambia la struttura dei costi della telefonia aziendale e apre la strada ad una nuova esperienza per il cliente, in cui ogni comunicazione si trasforma in un'interazione più collaborativa e coinvolgente. Ecco 10 consigli per garantire il corretto funzionamento di Lync sui dispositivi mobili della vostra rete.
Tags : 
just media, aruba networks, deploying lync, mobile devices, microsoft lync, cost structure, user experience, engaging interaction, wireless infrastructure, lync traffic, prioritize lync, wifi, window of visibility, access points, integrated spectrum analyzers, network engineers, secure network, call admission control, wireless vendors, end-to-end visibility
    
Aruba Networks
Published By: Amazon Web Services     Published Date: Aug 23, 2018
AWS supports healthcare organizations with HIPAA Eligible Services and the AWS Healthcare Compliance program. AWS products and services are being used by many customers that handle electronic patient health information (PHI) to build solutions that meet HIPAA and HITRUST regulatory requirements for cloud-based workloads. In this webinar, you’ll learn how AWS HIPAA Eligible Services can help you build secure workloads to handle PHI in compliance with HIPAA and HITRUST standards. AWS Healthcare experts will be joined in this webinar by AWS Partner Network (APN) Partners ClearDATA and Cloudticity.
Tags : 
    
Amazon Web Services
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
    
Ciena
Published By: Motorola Solutions     Published Date: Jul 02, 2018
We all want our nation’s schools to be safe, secure learning environments where students can realize their full potential. This requires reliable, continuous communication among school personnel, both onsite and district-wide, plus the ability to instantly connect with first responders in an emergency. This seamless communication must be delivered over any network, from any location, using any device. Team Communications from Motorola Solutions provides this seamless integration, helping schools preserve the all-important safety of their students. Team Communications empowers educational institutions to transform how they communicate, enabling individuals to share real-time information to make schools safer and staff more productive. Schools across the U.S. use Team Communications from Motorola Solutions to deliver unified voice and data to administrators, teachers, maintenance, security, coaches, and other personnel, improving decision making, increasing visibility into school activit
Tags : 
    
Motorola Solutions
Published By: Brocade     Published Date: Nov 25, 2015
The New IP is enabling open, agile networks that unlock new possibilities for your organization. And you can make it happen on your own terms. This white paper explains how the Brocade Virtualized Application Delivery Controller provides a strategic way to reduce TCO.
Tags : 
brocade, networking, network infrastructure, vacd, vrouter, virtual solutions
    
Brocade
Published By: Entrust Datacard     Published Date: Jul 21, 2014
The proliferation of mobile devices presents tremendous opportunities for organizations to empower employees and increase business efficiency.
Tags : 
identity guard, cloud services, secure, mobile devices, business efficiency, corporate networks, secure email, security
    
Entrust Datacard
Published By: F5 Networks Inc     Published Date: Jan 22, 2009
SAP®, the world’s largest business software company, provides a comprehensive range of enterprise software applications and business solutions to empower every aspect of business. Organizations deploying SAP have invested a significant amount of time and money in these powerful applications. By taking advantage of F5’s Application Ready infrastructure for SAP, tested and validated at SAP, organizations can achieve a secure, fast and available network infrastructure that reduces the total cost of operation and increases ROI. And F5’s FirePass SSL VPN, BIG-IP Local Traffi c Manager and WANJet appliance have been certified by SAP for integration with SAP ERP 6.0 based on NetWeaver 7.0.
Tags : 
application ready network guide, sap, enterprise software applications, network infrastructure, sap, netweaver, soa, application, portal, big-ip, infrastructure
    
F5 Networks Inc
Published By: Jive Software     Published Date: Oct 08, 2009
Learn how the Air Force Medical Service connects 20,000 Department of Defense medical personnel on a highly-secure online community -- in hospitals, in remote stations, and on the battlefield.
Tags : 
highly-secure online community, social business software, jive
    
Jive Software
Published By: Citrix Systems     Published Date: Nov 10, 2014
Citrix NetScaler helps your organization fully optimize, secure and control the delivery of all enterprise and cloud services. NetScaler Insight Center and ActionAnalytics deliver unprecedented visibility and enables real-time control in response to network traffic from a variety of services such as native web and mobile apps and virtual desktops.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, storage
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, security, data center
    
Citrix Systems
Published By: ForeScout     Published Date: Aug 14, 2012
In a BYOD world, companies can choose to secure and manage the entire mobile device user pool or secure portions of that community. Either way, steps must be taken to prevent unauthorized access to network resources and data loss. Enterprises should consider solutions that allow policies to be applied based on user, device, network, application, and data leakage risks.
Tags : 
archetecting, flexible, strategy, for securing, enterprise, bring, device, byod, data, loss, prevention, mobile, security, landscape, data, access, device, mobility, risks, augmenting
    
ForeScout
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: CDW     Published Date: Oct 10, 2013
Increasing staff productivity while lowering costs tied to this growing enterprise resource. A productive mobile program starts with holistic research and planning. Approaching mobility from a lifecycle standpoint will help an organization focus on optimizing each stage of the process. Having some guidance on what to expect at the different points of the mobility lifecycle is valuable for planning purposes.
Tags : 
mobile solutions, byod, mobile safety, mobile strategies, data access, secure foundation, applications, mobile app, app security, secure network
    
CDW
Start   Previous    1 2 3 4 5 6 7 8 9 10    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.