HR Hero Your Employment Law Resource
 

enterprise network

Results 601 - 625 of 628Sort Results By: Published Date | Title | Company Name
Published By: Aerohive     Published Date: Feb 17, 2015
This video reveals how using enterprise wireless networks improves classroom efficiency by giving teachers the tools needed to communicate and teach students.
Tags : 
enterprise wi-fi for education, benefits of using wireless networks, aerohive networks for education, benefits of using wi-fi in classrooms, wireless networks
    
Aerohive
Published By: Aerohive     Published Date: Feb 17, 2015
This video reveals how using enterprise wireless networks improves classroom efficiency by giving teachers the tools needed to communicate and teach students.
Tags : 
enterprise wi-fi for education, benefits of using wireless networks, aerohive networks for education, benefits of using wi-fi in classrooms, wireless networks
    
Aerohive
Published By: Aerohive     Published Date: Feb 06, 2015
This video reveals how using enterprise wireless networks improves classroom efficiency by giving teachers the tools needed to communicate and teach students.
Tags : 
enterprise wi-fi for education, benefits of using wireless networks, aerohive networks for education, benefits of using wi-fi in classrooms, wireless networks
    
Aerohive
Published By: Intel Security     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection, advanced evasion techniques, aet, apt, advanced persistent threats
    
Intel Security
Published By: Great Bay Software     Published Date: Jan 04, 2018
IoT device capabilities are constantly evolving and enterprise adoption is increasing at a rapid pace. As adoption grows, these connected devices provide additional entry points for external threats, thus broadening the organizations' attack surface. The enterprise must now look for solutions to address an increasingly complex problem: how to detect, monitor and control unmanaged devices that are connecting to the network and may lack consistent security protocols, putting critical business data at risk.
Tags : 
iot, iot security, iot endpoint security
    
Great Bay Software
Published By: ArborNetworks     Published Date: Feb 12, 2016
DDoS prevention appliances are the first line of defense for most service providers and large enterprises around the globe looking to protect themselves from brute-force attacks on network or resource availability, and with the unprecedented number, size, and coverage of DDoS attacks since the floodgates opens in 2008, vendors who build DDoS prevention solutions have seen and continue to see a significant increase in demand. This report covers actuals for 4Q14 and 1Q15.
Tags : 
arbor network, ddos, service provider, biannual report
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
Ask any cybersecurity professional and she’ll tell you that her job is getting increasingly difficult. Why? Most will point to a combination of the dangerous threat landscape, IT complexity, and their overwhelming workload. These issues are driving a major transition in enterprise security. Large organizations must move beyond a threat prevention mentality to become proactive cyber-¬-attack “hunters” that constantly monitor their networks for signs of trouble. This shift to proactive hunting will require new technologies that collect, process, and analyze massive amounts of security data, offer intelligent security analytics for real-¬-time incident detection, integrate threat intelligence to align suspicious internal activities with external threats, and provide analysts with the right data analytics features to query and manipulate data for historical investigations.
Tags : 
arbor networks, enterprise, cyber attack, network, data
    
ArborNetworks
Published By: ArborNetworks     Published Date: Feb 12, 2016
The modern enterprise is dependent upon connectivity at every level. Every business initiative, whether driven by sales, marketing, manufacturing, finance, R&D or HR, is dependent upon reliable network availability and continuity. Disrupting that continuity is what Distributed Denial of Service (DDoS) attacks are all about.
Tags : 
arbor network, ddos, enterprise, attack, network
    
ArborNetworks
Published By: Mitel     Published Date: Jan 26, 2016
Mitel and Mavenir have combined to pursue the same vision of communications industry convergence and to provide business critical voice and high value business collaboration services across Mobile and Enterprise networks.
Tags : 
real time communications, enterprise communication, cloud, high value business collaboration, mobile and enterprise networks
    
Mitel
Published By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
    
Avi Networks
Published By: Avi Networks     Published Date: May 14, 2018
Microsoft Azure is the cloud platform of choice for many enterprises to run their applications. Migrating applications to Azure requires specific strategies for application networking services such as load balancing, visibility, and performance monitoring. We have developed a step-by-step guide to setting up scalable application networking services in Microsoft Azure based on the application migration experiences of Fortune 500 enterprises. In this webinar, you'll learn: Best practices for load balancing in Microsoft Azure Analyzing application performance How to elastically scale applications on demand Ways to optimize deployments across hybrid clouds
Tags : 
    
Avi Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
"Next generation" capability has been achieved by the products in the network firewall market, and vendors differentiate on feature strengths. Buyers must consider the trade-offs between best-of-breed function and costs.
Tags : 
palo alto, firewall, check point software technologies, gartner
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Palo Alto Networks is leading a new era in cybersecurity by securing thousands of enterprise, government, and service provider network from cyber threats and protecting our digital way of life.
Tags : 
palo alto, firewall, cyber security, automation, cybersecurity for dummies
    
Palo Alto Networks
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
How to protect against mobile malware. Mobility is transforming enterprises at an unprecedented rate with the continued proliferation of smart devices, explosive development of mobile apps and increased access to work files. Employees are empowered by their organizations to be more productive at virtually any time and from anywhere, adopting policies for Bring Your Own Device (BYOD) and even allowing the use of personal apps for work-related activities. However, organizations have not kept pace with this mobility explosion by deploying the enterprise-grade security needed to protect their sensitive information. Hackers and thieves are seizing on this opportunity to penetrate networks and acquire sensitive work data from mobile endpoints. IT and Security leaders need a modern and robust security solution to proactively detect, analyze and remediate these mobile threats.
Tags : 
(delete)mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
mobile management, system solutions, data security, software management, personal data management, device management
    
IBM
Published By: IBM     Published Date: Jun 08, 2017
Digital transformation initiatives and the need for innovation are causing enterprises to rethink their IT landscapes including business-to-business (B2B) integration. Modern B2B integration is critical for enabling enterprises to achieve goals like increasing revenue, speeding up time to market, and improving efficiencies because these outcomes are dependent on having a successful business network. B2B practitioners have two goals — enable critical business initiatives and control costs — and cloud-based B2B services have been successful in helping enterprises achieve both goals. IDC interviewed eight IBM clients to understand how their use of IBM Sterling B2B Integration Services, part of the IBM B2B Cloud Services portfolio, has impacted their operations and businesses. These organizations reported achieving strong value with IBM Sterling B2B Integration Services, and IDC projects that their investment will yield an average three-year return on investment (ROI) of 308%, or more th
Tags : 
digital transformation, b2b integration, idc, ibm
    
IBM
Published By: Spectrum Enterprise     Published Date: Feb 07, 2018
Partnering with Spectrum Enterprise sustains client loyalty by instilling confidence in how the bank operates, provides superior network service level agreements that ensure minimal downtime and assures smoother state and FDIC audits thanks to cybersecurity safeguards such as built-in redundancy and private network service.
Tags : 
    
Spectrum Enterprise
Published By: Juniper Networks     Published Date: Aug 10, 2017
Facing the future requires enterprises to embark on a digital transformation, employing new technologies such as AI, big data, IoT, and the cloud. Enterprises need a long-term, trusted partner who will support them on their journey and understand their vision. Switch to Juniper Networks and align your enterprise with an innovation leader that places scalable solutions, high availability, productivity, security, and R&D at the forefront, all while keeping simplicity and savings in mind.
Tags : 
security, switching, routing, operating system, secure network, sdsn, solutions
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
As networks scale, they become difficult to manage. A different command line interface (CLI) or operating system (OS) is required for every device type in your network, such as routers, switches, and firewalls. Learning a new OS for every device is a complex task for your operations team and can slow them down—not a very efficient way to run a network.
Tags : 
r&d, drive innovation, automation delivery, critical networks, solutions, lifetime warranty, juniper networks
    
Juniper Networks
Published By: Juniper Networks     Published Date: Aug 10, 2017
The impact of cloud computing and software-defined networking (SDN), including network virtualization, has convinced large enterprises and customers building private, public, and hybrid cloud networks to consider new approaches to help them meet their current and future data center switching needs. Data center switching platforms are constantly evolving, delivering increasingly better performance while simplifying network operations.
Tags : 
scaling, memory, asic platforms, broadcom, tomahawk platforms, juniper networks, multivector scaling, memory architecture
    
Juniper Networks
Published By: Forcepoint     Published Date: Jun 06, 2019
Forcepoint recognized as a Visionary for 2nd year in a row, in the Gartner 2018 Magic Quadrant for NGFW Gartner has named Forcepoint sole Visionary in their 2018 Magic Quadrant for NGFW, for ability to execute and completeness of vision. According to Gartner, “In this mature market, vendors differentiate on feature strengths. Security and risk management leaders must consider the trade-offs between best-of-breed enterprise network firewall functions and risk tolerance.”*
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jul 30, 2019
Financial institutions are facing increasing network security challenges as their organizations become more distributed, applications move to the cloud, and threats rapidly evolve. But legacy solutions are fragmented, labor intensive, and inconsistent. You need a better way. Forcepoint Next Generation Firewall (NGFW) leads the industry with #1 security, manageability, and availability. Download our whitepaper to learn about: Senior IT executives’ perspectives on the current network security landscape Forcepoint NGFW’s centrally managed solution combining enterprise-grade SD-WAN and network security Success stories from companies like Sword Apak, Avency, and Carglass
Tags : 
    
Forcepoint
Published By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When Barracuda first engaged with Rohde & Schwarz Cybersecurity in 2007, enterprises were more concerned about the unauthorized use of Skype, other P2P applications and instant messaging. Although the need for application control and awareness remains, enterprise concerns are shifting to securing enterprise applications hosted in private and public clouds, protecting east-west data center traffic and preventing unwanted traffic and malware on the corporate network.
Tags : 
firewall, r&s, visibility, application, network, secure, cloud, business applications
    
Rohde & Schwarz Cybersecurity
Published By: Group M_IBM Q2'19     Published Date: Apr 10, 2019
An opportunity for Chief Procurement Officers (CPOs): As business models evolve and technology advances, CPOs can elevate their value across enterprises and extended supplier networks with Cognitive Procurement capabilities that can sense and act.
Tags : 
    
Group M_IBM Q2'19
Start   Previous    12 13 14 15 16 17 18 19 20 21 22 23 24 25 26    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.