HR Hero Your Employment Law Resource
 

cisco

Results 76 - 100 of 1549Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Mar 10, 2011
Find out how deploying a company-wide voice over Internet protocol (VoIP) solution is one of the best ways to realize cost reduction across the organization.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication
    
Cisco
Published By: Cisco     Published Date: Mar 10, 2011
Read here to know the five ways businesses are taking advantage of new VoIP technology to save money.
Tags : 
cisco, business phone system, voip, voice over internet protocol, voice communication
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
This whitepaper informs you on what you should know in order to protect your networks.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors, malware
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
This document will identify the key questions you should ask your advanced malware protection vendor, and show you how Cisco combats today’s advanced malware attacks using a combination of four techniques.
Tags : 
sourcefire, antimalware protection, network protection, evolving threats, antimalware vendors, malware, cisco, collective intelligence, big data, traditional defenses
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks, encapsulation, encrypted traffic
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Traditional static approaches can’t provide the security you need. They often miss the insight and automation necessary to fully protect your infrastructure.
Tags : 
sourcefire, firesight, management center, context aware, adaptive security, monitoring, automation, critical security, defenses, management center
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
Published By: Cisco     Published Date: Feb 17, 2015
Analyst brief brought to you by NSS Labs. Where the goal of cyberprevention has been to reduce the probability of an attack against the organization, cyber resilience looks to reduce the impact of these attacks through cyber risk management. A cyber resilience program still considers detection and prevention techniques, but it also assumes that a breach is likely. This stance emphasizes anticipation, agility, and adaptation. Not every attack can be prevented, but with a cyber resilience program, damage can be mitigated or avoided altogether.
Tags : 
cisco, nss, cyber, prevention, risk management, resilience, firewall, security, protection, epp, breach, cyberattack, operations, network
    
Cisco
Published By: Cisco     Published Date: Feb 17, 2015
The Cisco 2015 Annual Security Report, which presents the research, insights, and perspectives provided by Cisco® Security Research and other security experts within Cisco, explores the ongoing race between attackers and defenders, and how users are becoming everweaker links in the security chain.
Tags : 
cisco, security, report, 2015, threat, intelligence, capabilities, benchmark, trends, cyber security, geopolitical, corporate, vulnerabilities, risk, spam, cybercrime, data, encryption, privacy, compatibility
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
This EMA White Paper examines in more detail the building blocks for private cloud computing - automation, virtualization, and cloud service management - and provides EMA's recommendations for a phased approach to cloud computing, based on EMA's maturity model, research data, and enterprise activities, with prescriptive approach and some sample use cases to help get started.
Tags : 
cisco, automization, service catalog, self-service, virtualization, private cloud, building blocks, infrastructure, ema, newscale
    
Cisco
Published By: Cisco     Published Date: Jul 27, 2011
Read this white paper to learn how IT organizations can implement an effective Service Catalog that will enable them to reap the full benefits of self-service in virtualized and cloud computing environments.
Tags : 
cisco, automization, service catalog, self-service, datacenter, virtualization, private cloud, infrastructure, newscale
    
Cisco
Published By: Cisco     Published Date: Feb 05, 2013
Whether being considered to support an organization's initial private cloud deployment or help an organization recover from a false start, an entry-level private cloud automation solution can enable IT teams to quickly demonstrate the value of IaaS.
Tags : 
private cloud, automation, cloud, entry level, roi, server, network
    
Cisco
Published By: Cisco     Published Date: Feb 05, 2013
Read this whitepaper to better understand a migration to the cloud, how to get started, and what the next steps are for your organization.
Tags : 
private cloud, roi, network, server, virtualization
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper provides migration steps that can save your business time and money - and answers to the two most burning questions about IPv6.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
Read how Internetwork Engineering's customer, NCCAR, a NC based automotive research facility relies on Cisco Borderless Network to keep engineers connected to data and services anywhere, anytime.
Tags : 
cisco, engineering nccar, north carolina, borderless network, data, services, networking, auto, development
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
Discover how Virtual Radiologic uses Cisco Borderless Networks to secure electronic patient information transmitted between hospitals and doctors
Tags : 
cisco, radiology, healthcare, hospitals, sercure, information, virtual, borderless networks, patient information
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
In this whitepaper, Cisco provides recommendations on a building strategic network to address business needs for today and tomorrow.
Tags : 
ipv6, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
This white paper discusses 10 important tips your organization can use to secure employees' mobile devices. Read on!
Tags : 
mobile devices, smart phones, cybercrime, mobile, policy, cisco, transition, communication, migration, security, performance, version 6, internet protocol, ipv4, ipv6, security, video traffic, cloud infrastructure, network performance
    
Cisco
Published By: Cisco     Published Date: Jan 20, 2012
Download this white paper to learn which questions you need to ask your reseller so they can find the best solution for your business.
Tags : 
cisco, resellers, questions, smb, enterprise, networking, ucs, certifaction, organization
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
This white paper addresses technical professionals who want to increase the efficiency and flexibility of their data center and are considering deployment of private cloud or delivery of IT as a service (ITaaS).
Tags : 
business agility, data center, unified data centers, cloud computing, cisco, virtualization, automation, itaas
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
Download this whitepaper to learn more about the Cisco® Unified Data Center platform, designed specifically to overcome the current data center constraints and provide agile, simplified, and efficient IT service delivery and cloud computing.
Tags : 
unified data center, cloud infrastructure, cloud computing, unified management, cisco
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
This document discusses the importance of the network to cloud computing, why the network must change, and what Cisco is doing to lead these changes.
Tags : 
networking, cloud, it infrastructure, deployment, cloud infrastructure, cisco
    
Cisco
Published By: Cisco     Published Date: Nov 08, 2012
Forrester Consulting delivers a 2012 summary of trends and survey results from organizations with 100-1500 employees.
Tags : 
byod, bring your own device, cisco, mobility, workplace mobility, byod deployment
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.