network deployment

Results 1 - 25 of 141Sort Results By: Published Date | Title | Company Name
Published By: Gigamon     Published Date: Dec 13, 2018
"Security Delivery Platforms for Dummies" shows IT professionals how to transform the network deployment of security and monitoring tools for better efficiency and effectiveness. Learn how to detect threats faster by removing network blind spots, monitor what's happening across the global enterprise and optimize your security tools’ performance and efficacy. If you are responsible for protecting corporate networks or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Dec 13, 2018
Download the Gigamon white paper, "Addressing the Threat Within: Rethinking Network Security Deployment," to learn how evolving cybersecurity threat conditions are changing the trust model for security. See how a structured and architectural approach to network security gives security solutions better access to network traffic while enabling them to scale cost effectively. Learn how a security delivery platform can be the foundational building block for deploying adaptable security solutions. Read now.
Tags : 
    
Gigamon
Published By: Cisco     Published Date: Dec 11, 2018
WAN edge infrastructure is changing rapidly as I&O leaders responsible for networking face dynamic business requirements, including new application architectures and on-premises and cloud-based deployment models. I&O leaders can use this research to identify vendors that best fit their requirements. By year-end 2023, more than 90% of WAN edge infrastructure refresh initiatives will be based on virtualized customer premises equipment (vCPE) platforms or software-defined WAN (SD-WAN) software/appliances versus traditional routers (up from less than 40% today).
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 30, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
The Cisco® Hyperlocation Solution is the industry’s first Wi-Fi network-based location system that can help businesses and users pinpoint a user’s location to within one to three meters, depending on the deployment. Combining innovative RF antenna and module design, faster and more frequent data processing, and a powerful platform for customer engagement, it can help businesses create more personalized and profitable customer experiences.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2015
There are numerous ways to enable a BYOD solution based on the unique business requirements of a specific organization. While some organizations may take a more open approach and rely on basic authentication, other organizations will prefer more secure ways to identify, authenticate, and authorize devices. A robust network infrastructure with the capabilities to manage and enforce these policies is critical to a successful BYOD deployment.
Tags : 
mobility, business solutions, cisco, mobile applications, secure mobile
    
Cisco
Published By: Gigamon     Published Date: Oct 19, 2017
Security Delivery Platforms for Dummies introduces IT professionals to a class of technology that transforms how security and monitoring tools are deployed on the network to provide pervasive visibility. Learn how to detect threats faster by removing network blind spots, see what matters across the global enterprise and optimize your security tools’ performance and efficacy. If you’re responsible for protecting a corporate network or managing the deployment of security tools, this book is for you!
Tags : 
    
Gigamon
Published By: Gigamon     Published Date: Oct 19, 2017
Download the Gigamon white paper, Addressing the Threat Within: Rethinking Network Security Deployment, to learn how evolving cyber security threat conditions are changing the trust model for security and how a structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. See how the benefits of increased security and cost effectiveness are making the Security Delivery Platform a foundational building block to deploying security solutions. Read now!
Tags : 
    
Gigamon
Published By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
    
Fortinet EMEA
Published By: HPE     Published Date: Mar 23, 2015
This Porter Consulting report analyzes enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless. The paper examines key business and technology trends affecting enterprises with 500-5000 employees. We identify fundamental requirements IT decision makers should consider when evaluating campus networking solutions including: • Ensuring simple, secure and cost-effective user access • Supplying adequate bandwidth and quality of service • Streamlining deployment and operations • Supporting emerging standards and technology requirements Our goal is to provide business and technical decision makers with a guide to the key players and their strengths.
Tags : 
    
HPE
Published By: Cisco     Published Date: Oct 08, 2015
This document consolidates the enterprise campus network design and deployment guidelines with various best practices from multiple deeply focused Cisco Validated Design Guides. The best practices conclusions are derived from thorough solution-level end-to-end characterization of various levels of system types, network design alternatives, and enterprise applications.
Tags : 
cisco infrastructure, enterprise network, network design, infrastructure, migration, network architecture, network management, network performance, network performance management, quality of service, remote access, remote network management
    
Cisco
Published By: Butler Technologies     Published Date: Jul 02, 2018
The Tenth Annual State of the Network Global Study focuses a lens on the network team’s role in security investigations. Results indicate that 88 percent of network teams are now spending time on security issues. In fact, out of 1,035 respondents, nearly 3 out of 4 spend up to 10 hours per week working exclusively on these types of problems - in addition to managing network upgrades, SDN, cloud, and big data initiatives. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60 percent and software-defined networking (SDN) is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. With growth comes change and some trends identified in this year’s survey include a rise in email and browser-based malware attacks (63 percent) and an increase in sophistication (52 percent). Nearly 1 in 3 also report a surge in DDoS attacks, signaling a ne
Tags : 
    
Butler Technologies
Published By: Juniper Networks     Published Date: Sep 10, 2014
To find out how a simple, open and smart network accelerates the deployment and delivery of applications, read the Whitepaper on network virtualization best practices. Find out how to transform and bridge the virtual and physical network.
Tags : 
network virtualization, best practices, overcoming challenges, network acceleration, deployment, delivery of applications
    
Juniper Networks
Published By: IBM     Published Date: Jun 16, 2015
For a network that better supports your cloud and brings the most value possible to your business, its design has to be considered in the early stages of cloud planning. Read the white paper "Networking for cloud computing" to discover specific networking considerations for public, private and hybrid clouds.
Tags : 
cloud computing, cloud design, network ramifications, cloud deployment, hybrid cloud, public cloud infrastructure, private cloud infrastructure, infrastructure, best practices, business analytics, business integration, business intelligence, server virtualization, data center design and management, virtualization, infrastructure management
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
Read this white paper to learn about the potential networking ramifications of various cloud deployment models and learn how to meet these challenges head on.
Tags : 
cloud computing, data center, network performance, network ramifications, applications, infrastructure, business intelligence
    
IBM
Published By: Viavi Solutions     Published Date: Jul 21, 2017
The Tenth Annual State of the Network Global Study focuses on a lens on the network team's role in security investigations. When it comes to technology adoption, both cloud and 100 GbE deployment continue to grow aggressively. VoIP adoption is closing in on 60% and software-defined networking is projected to cross the halfway mark, indicating compounding network complexity amidst the ongoing struggle to ID security threats. Study questions were designed based on interviews with network professionals and IT analysts. Results were compiled from the insights of 1,035 respondents, including network engineers, IT directors and CIOs around the world.
Tags : 
security investigation, security, sdn, cloud, data initiative, technology adoption, security trends, network performance monitoring, security threats
    
Viavi Solutions
Published By: Lenovo     Published Date: Jul 07, 2015
Lenovo® Flex System™ — powered by Intel® Xeon® processors — is the newest blade infrastructure design with the attributes that support soft ware-defi ned infrastructure and virtualization better than any competitor. It delivers key benefits better than any competitor: • Reduces capital and operational costs with consistent hardware/software deployment and the ability to simply scale workloads with the highest VM capacity and performance. • Increases agility with simplified rapid deployment and ongoing management to add, change, or move workloads with their associated resources. • Improves efficiency and increases space, power, and cooling with the leading compute, storage, and network density. Download Now! Sponsored by Lenovo® and Intel®"
Tags : 
lenovo, flex system, network density, operational costs, software deployment, software development, it management, knowledge management, enterprise applications
    
Lenovo
Published By: Palo Alto Networks     Published Date: Feb 24, 2016
This webinar, hosted by Palo Alto Networks, focuses on deployment of 'Zero Trust Network Segmentation' in industrial control systems in large scale, mult-plant environments. We begin with an explanation of the concepts behind 'Zero Trust', scalability, the best ways to adapt existing networking and segmentation without needing to reconfigure infrastructure, and how Palo Alto's platform adresses these needs. Speakers Lionel Jacobs is the Sr. ICS Security Architect at Palo Alto Netowrks Jonathan S. is an Information Security Architect at a Global F&B Manufacturer Del Rodillas (Moderator) is the Sr. Manager of ICS Initiative at Palo Alto Networks
Tags : 
zero trust, networking, network segmentation, ics, scale, infrastructure, enterprise
    
Palo Alto Networks
Published By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : 
network services, sdn, nfv, network, infrastructure, network management, network performance, virtualization
    
Intel
Published By: Intel     Published Date: May 19, 2017
Software-Defined Networking (SDN) and Network Functions Virtualization (NFV) deployments are challenged by a lack of broadly accepted industry benchmarks to drive conformance to carrier-grade requirements.
Tags : 
nfv, network services, virtualization, sdn, infrastructure, network architecture, network management, network performance
    
Intel
Published By: Splunk     Published Date: Aug 17, 2018
IT organizations using machine data platforms like Splunk recognize the importance of consolidating disparate data types for top-down visibility, and to quickly respond to critical business needs. Machine data is often underused and undervalued, and is particularly useful when managing infrastructure data coming from AWS, sensors and server logs. Download “The Essential Guide to Infrastructure Machine Data” for: The benefits of machine data for network, remote, web, cloud and server monitoring IT infrastructure monitoring data sources to include in your machine data platform Machine data best practices
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Zscaler     Published Date: Oct 26, 2018
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them. Download this whitepaper today to find out more.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Oct 30, 2018
A Microsoft Office 365 deployment can be daunting. From a fast user experience, to a cost-cutting productivity platform, your users and CIO are expecting amazing things from Office 365. While it’s your job to deliver on the promise, you’re not going to get very far unless your network has been properly set up for the experience. To learn more about how Zscaler can enable your Office 365 deployment with a fast user experience, download this whitepaper today!
Tags : 
    
Zscaler
Published By: Splunk     Published Date: Sep 10, 2018
The financial services industry has unique challenges that often prevent it from achieving its strategic goals. The keys to solving these issues are hidden in machine data—the largest category of big data—which is both untapped and full of potential. Download this white paper to learn: *How organizations can answer critical questions that have been impeding business success *How the financial services industry can make great strides in security, compliance and IT *Common machine data sources in financial services firms
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Published By: Splunk     Published Date: Sep 10, 2018
One of the biggest challenges IT ops teams face is the lack of visibility across its infrastructure — physical, virtual and in the cloud. Making things even more complex, any infrastructure monitoring solution needs to not only meet the IT team’s needs, but also the needs of other stakeholders including line of business (LOB) owners and application developers. For companies already using a monitoring platform like Splunk, monitoring blindspots arise from the need to prioritize across multiple departments. This report outlines a four-step approach for an effective IT operations monitoring (ITOM) strategy. Download this report to learn: How to reduce monitoring blind spots when creating an ITOM strategy How to address ITOM requirements across IT and non-IT groups Distinct layers across ITOM Potential functionality gaps with domain-specific products
Tags : 
cloud monitoring, aws, azure, gcp, cloud, aws monitoring, hybrid infrastructure, distributed cloud infrastructures, reduce mttr/mtti, cloud monitoring free, cloud monitoring tools, cloud monitoring service, cloud billing monitoring, cloud monitoring architecture, cloud data monitoring, host monitoring, *nix, unix, linux, servers
    
Splunk
Start   Previous   1 2 3 4 5 6    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.