HR Hero Your Employment Law Resource
 

enterprise network

Results 1 - 25 of 602Sort Results By: Published Date | Title | Company Name
Published By: ForeScout     Published Date: Aug 14, 2012
The What, Why and How to Employ NAC to Apply Guest Networking, BYOD (Bring Your Own Device) and Endpoint Security Policies. Many of today's endpoints are neither known nor protected. According to Gartner, enterprises are only aware of 80 percent of the devices on their network. Those 20 percent of unknown devices are inside the perimeter of the network, are unmanaged and provide users with access. They are small, varied and highly mobile, and they are loaded with their own applications, can act as WAPs, and often contain outdated firmware or are jailbroken. Even as the devices are accessing personal applications on the web, they are also accessing corporate resources such as e-mail-all from the very same unmanaged devices, which have not been vetted by the security organization. Smartphones, notebooks, netbooks, iPads, e-readers, gaming consoles and more-the list of personal devices attempting access to employer networks seems to grow every day in what's come to be known as the BYOD (Bring Your Own Device) era in networking.
Tags : 
pad, mine, enabling, secure, personal, mobile, device, use, your, network, nac, guest, networking, byod, bring, your, own, device, endpoint, security
    
ForeScout
Published By: IBM     Published Date: Apr 20, 2017
Protecting confidential data while keeping mobile users productive. The terms Data Leak Prevention (DLP) and Container are beginning to dominate the mobile management conversation. Over the past few years great strides have been made in providing the tools and solutions that offer management and security for mobile devices; both for devices the enterprise owns and those that employees own. While these solutions generally meet the need to secure the device, they have been lacking in some of the more sophisticated security aspects that are commonplace in laptop and distributed network deployments. Specifically lacking are the robust DLP controls common in laptop management solutions.
Tags : 
    
IBM
Published By: BLADE Network Technologies     Published Date: Nov 18, 2008
This Technology Brief is divided into two parts. The first part discusses the evolution of Ethernet, and then focuses on 10 Gigabit Ethernet and related transceiver and cabling technologies. The second part examines BLADE’s RackSwitch product line, including 10 GbE applications within enterprise networks and data centers.
Tags : 
enterprise data centers, blade’s rackswitch, 10gbe applications, enterprise networks, blade network technologies, evolution of ethernet, cabling technologies
    
BLADE Network Technologies
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets
    
CDW
Published By: McAfee     Published Date: Aug 14, 2014
What factors should you consider before investing in a next-generation firewall? Discover these 10 features that are essential for enterprise network security.
Tags : 
next generation firewall, firewall features, firewall checklist, firewall rfp, ngfw
    
McAfee
Published By: Riverbed     Published Date: Jan 28, 2014
Riverbed Cascade provides enterprise-wide network and application visibility with a full set of application-centric, site-centric, and business-centric views. While Cascade can coexist or integrate with a variety of other IT management solutions, it will likely become your first line of defense against application performance problems.
Tags : 
application performance management, application performance monitoring, big data apm, network performance management, network performance monitoring, network performance troubleshooting
    
Riverbed
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
While the next-generation firewall (NGFW) is well defined by Gartner as something new, enterprise-focused, and distinct, many network security vendors are claiming NGFW is a subset of other functions.
Tags : 
    
Palo Alto Networks
Published By: Emulex Corporation     Published Date: Nov 07, 2013
Flying blind at 100G It might go something like this: Your company is a voracious consumer of bandwidth – perhaps a very large enterprise, a research lab, or a service or content provider of some description. Today you are running multiple 10Gbps network connections in the core of your network, but these links are rapidly approaching capacity. An upgrade in the not-too-distant future to 40/100G ultra-high-speed links now looks inevitable.
Tags : 
network monitoring, network visibility, technology, endace, best practices
    
Emulex Corporation
Published By: Palo Alto Networks     Published Date: Jul 05, 2012
The threats that enterprise network and security teams face are evolving rapidly, and the security products that they implement play a major role in the success or failure of the organization's overall security strategy.
Tags : 
firewall, 2011-2012, enterprise, network, security
    
Palo Alto Networks
Published By: Smarsh     Published Date: Feb 27, 2014
Financial Services firms are moving into a new phase in the evolution of communications oversight and face challenges ranging from new and changing regulations to employee privacy. Learn how legal, compliance and IT professionals are managing compliance and e-discovery for email, Web, IM, social media, enterprise social networks, corporate issued mobile devices and the bring your own device (BYOD) trend.
Tags : 
compliance, e-discovery, archiving, enterprise, communications compliance, email archiving, social media archiving, byod, email retention, email encryption, cloud-based archiving
    
Smarsh
Published By: Aerohive     Published Date: Jun 01, 2015
This guide reveals how to evaluate enterprise WiFi Network.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks
    
Aerohive
Published By: LiveAction     Published Date: Jan 22, 2019
In December of 2018, Sirkin Research was commissioned by LiveAction to identify the top network challenges faced by enterprise-level organizations in complex, hybrid networks. The survey was sent to network and IT professionals predominantly in large mid-market and enterprise companies with at least 1000 employees. The results are based on perspectives from 204 survey respondents, and provide rich insights into the network performance challenges large organizations encounter daily.
Tags : 
network performance, hybrid networks, networking
    
LiveAction
Published By: Viavi Solutions     Published Date: Apr 01, 2015
Big data projects are becoming reality for nearly every major enterprise. According to a recent survey, 49 percent of respondents say they are implementing, or likely to implement big data projects in the future. Twelve percent already have. With big data comes surprising impacts to your network. The 4 Steps to Surviving Big Data white paper will help you identify problems before they start.
Tags : 
big data, data projects, network performance, data management, network impact
    
Viavi Solutions
Published By: Social Text     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging, twitter, facebook, adoption rate, adoption, ldap, email integration, mobile, budget
    
Social Text
Published By: Social Text.     Published Date: Jul 21, 2009
Read this paper to learn 5 practices that ensure the collaboration solution you choose will give you the significant business results you are seeking. Collaboration solutions can accelerate cycle times by 30% across virtually every business function. These results may be critical to survival in difficult economic times, and the right collaboration solution is the single most effective way to get them.
Tags : 
social text, enterprise collaboration, collaboration, enterprise, tco, total cost of ownership, social networking, blogging, twitter, facebook, adoption rate, adoption, ldap, email integration, mobile, budget
    
Social Text.
Published By: Great Bay Software     Published Date: Feb 04, 2015
The majority of companies have a difficult time deploying NAC across the enterprise. No existing NAC solution provides access control for all endpoints and operating systems – leaving vulnerable blind spots on the network. Some company leaders spend hundreds of thousands – even millions – of dollars on a NAC solution only to spend years trying to implement the technology. As a result, this can turn into a very frustrating process. However, the solution intended to help you better secure and manage your network shouldn’t wind up creating greater risk and chaos. There are ways to set your network and your team up for success. Here are some tips to help you when considering deploying a NAC solution.
Tags : 
great bay, software, network, access, control, implementation, nac, enterprise, technology, security, software, deployment, process, attacks, visibility, security, policies, beacon, functionality
    
Great Bay Software
Published By: Clearvale by BroadVision     Published Date: Dec 26, 2012
After the swift and ubiquitous adoption of social networking sites like Facebook and Twitter among consumers,many businesses have been moving to recreate some of that success within their enterprise. Enterprise Social Networks are the result.
Tags : 
social network, broadvision, enterprise social network, facebook, twitter
    
Clearvale by BroadVision
Published By: Clearvale by BroadVision     Published Date: Oct 22, 2012
When implemented correctly, Enterprise Social Networks increase collaboration and productivity with customers, partners and more. For those deploying ESN in their enterprise, this guide gives an adoption process that will increase chances of success.
Tags : 
business social network, business social networking, collaboration software, collaboration tools, enterprise 2.0, enterprise collaboration, enterprise social, enterprise social network, enterprise social networking, social crm, social enterprise, social network software, social networking for business, social networking in business, social networking platform, team collaboration, team collaboration software, social enterprise software, social intranet, social business
    
Clearvale by BroadVision
Published By: Citrix Systems     Published Date: Feb 18, 2012
This white paper discusses eight important areas where Citrix NetScaler beats F5 in making enterprise networks cloud ready.
Tags : 
virtualization, data center, datacenters, consolidate, network, network resources, citrix, netscaler, adc, application delivery controller, infrastructure, consolidation, networking, networking resources
    
Citrix Systems
Published By: uberVU via HootSuite     Published Date: Oct 10, 2012
HootSuite's latest whitepaper, 8 Tips for Social Business, will illuminate the correct process by which organizations can successfully implement a successful and scalable social media strategy.
Tags : 
social media management, social media strategy, social media strategies, social strategy, social business, social enterprise, enterprise social networks
    
uberVU via HootSuite
Published By: Extreme Networks     Published Date: Aug 30, 2016
Discover the information you need to help you make better decisions before purchasing and deploying 802.11ac Wave 2.
Tags : 
extreme networks, 802.11ac wave 2, 802.11ac, networking, wireless, wireless wlan, wireless lan network, wifi standards, enterprise wireless network, wireless infrastructure, wireless network design
    
Extreme Networks
Published By: Citrix     Published Date: Nov 09, 2012
Cloud is a rapidly emerging necessity in IT. Relied upon the world's largest enterprise data centers and cloud networks, NetScaler is universally recognized as an outstanding application delivery controller. Learn how NetScaler beats the competition.
Tags : 
citrix, adc, application delivery controllers, citrix netscaler, cloud, cloud computing
    
Citrix
Published By: Butler Technologies     Published Date: Jul 02, 2018
As enterprises become more distributed and migrate applications to the cloud, they will need to diversify their network performance management solutions. In particular, the network operations team will need to complement its packet-based monitoring tools with active test monitoring solutions to enhance visibility into the cloud and help enterprises scale monitoring gracefully and cost-effectively.
Tags : 
    
Butler Technologies
Published By: HP     Published Date: Aug 26, 2014
More and more enterprises are adopting “bring your own device” (BYOD) initiatives to let employees choose the device they use. The HP BYOD solution, based on the HP Intelligent Management Center (IMC), offers a single-pane-of-glass network and user management solution for your entire network. With an HP BYOD solution, you can efficiently manage your entire infrastructure, secure personally owned devices, and monitor BYOD traffic. HP IMC also goes beyond the unified BYOD essentials by delivering converged management across various networks—physical and virtual, wired and wireless, and Software-Defined Networking (SDN). Discover how.
Tags : 
byod, holistic, data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving
    
HP
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Social Networks:
Employers Forum
facebook
Twitter
YouTube
© 2019 BLR®—Business & Legal Resources. All rights reserved. 800-274-6774


Infinite Menus, Copyright 2006, OpenCube Inc. All Rights Reserved.