Sort results by: Published date | Company name
Showing items 1-25

Why a New Business Model is Needed for SSL Certificates [ Source: Trend Micro ]

September 2014- This white paper discusses the current problems with SSL, provides an overview of the technology, and offers suggestions on ways to improve the acquisition and management of SSL certificates

Network Transformation eBook [ Source: Neustar ]

September 2014- Network transformation involves much more than replacing TDM-based equipment with IP-based equipment. Transformation is a holistic process that typically happens in phases, depending on the unique business drivers that a CSP is facing.

Maximizing Performance and Security in Cloud Networking [ Source: Level 3 Communications ]

August 2014- Cloud computing - public, private, hybrid - has moved into the enterprise IT mainstream. Cloud services, combined with high-speed, private network connectivity, have matured and proven to be extremely reliable, rapidly scalable, and priced so customers reap the savings from the economies of scale of these shared resources. As a result, enterprises are moving IT - everything from websites and mobile apps to back-office applications such as dev and test, business continuity and disaster recovery, ...

5 Ways to Prepare Your Infrastructure for Disaster [ Source: Dyn ]

August 2014- The term "disaster recovery" assumes that you wait until something terrible happens to take action. While it's great to know how to recover when disaster strikes, wouldn't you rather prevent it from happening in the first place? Of course, there are no guarantees when it comes to preventing outages and downtime, but if you follow these key areas of preparation, you can greatly reduce your risk.

Dell Dense Compute Solutions: Overcoming Limitations of Traditional Data Center Operations [ Source: Dell / Intel® ]

August 2014- Explore this resource to learn about a strategy that can help you overcome the limitations of the traditional data center design and help you realize the benefits of:

• Smaller IT footprint and deployment time without sacrificing computing power or memory

• Highly efficient power and cooling options

• Streamlined management... and more

Charting a Path from the Network to the Multi-Cloud [ Source: XO Communications ]

August 2014- Enterprise technology expert David Linthicum takes the mystery out of improving your network to enable cloud-based resources in multiple clouds. Beyond the basics, you'll gain a step-by-step approach to consider as you integrate your networking requirements with cloud-based resources. You will also chart a clear path to the right network solutions, and learn how to pick the right network partner to successfully and securely connect people with access to multiple clouds. Leading technology publications frequently ...

Building a Cloud-Enabled Network with MPLS IP-VPN [ Source: XO Communications ]

August 2014- One of the leading ways that today's organizations are providing secure, reliable and scalable answers for their networking needs is through MPLS IP-VPN network usage. However, businesses are also looking to create Intelligent WAN that integrates security, application performance management, and cloud services in order to create more intelligent wide area networks. This paper examines how to use the attributes of MPLS-based VPNs to enable enterprises to create a truly intelligent WAN, discussing key planning, ...

Research: The State of Data Center Networking [ Source: Comcast ]

July 2014- With business applications moving to the cloud, most companies now provide access to enterprise software applications via the Internet and through mobile devices. But concerns about security, reliability, performance, and control are driving enterprise IT departments to evaluate the network infrastructure and services that connect their company locations to data centers. New UBM Tech research explores the options they're exploring.

SteelHead Hybrid Networking [ Source: Riverbed ]

July 2014- Global enterprises are rapidly adopting cloud infrastructure and SaaS applications broadly, and the Internet is now a part of their business critical infrastructure. With combined public and private resources, the network itself needs to go hybrid, combining the strengths of the highly reliable MPLS with the ubiquity, price, and speed of the Internet. The hybrid networking model from Riverbed Technology enables organizations to adopt hybrid networks to maximize the performance of applications, increase network availability, ...

Optimizing VDI Success: The Network Factor [ Source: Riverbed ]

July 2014- As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges. If organizations hope to reap the full benefit of a VDI deployment, they must assure the best possible end-user experience, or adoption will stall and the project will fail. ...

Transforming Business Performance with Hybrid Network [ Source: Riverbed ]

July 2014- In a world combining public and private resources, the network itself needs to get hybrid, combining the strengths of the highly reliable Multiprotocol Label Switching (MPLS) networks with the ubiquity and lower cost of Internet infrastructure.

Critical Network Capabilities for Cloud-Based DDoS Mitigation [ Source: Verisign ]

July 2014- Due to the evolving DDoS threat, companies are turning to cloud based DDoS mitigation providers, who have built out massive amounts of network bandwidth and DDoS mitigation capacity. Just as important as network capacity is the flexibility and diversity of the provider's network. This paper describes how Verisign DDoS Protection Services relies upon a fully redundant network backbone, purpose-built on multiple diverse 10 Gbps optical infrastructures.

DDoS Mitigation And DNS Availability Should Be Key Components Of Your Resiliency Strategy [ Source: Verisign ]

July 2014- DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, the results of a recent research project by Forrester and Verisign show that many companies are experiencing a disconnect between the growing awareness of DDoS attacks and a protection strategy. Additionally, many organizations overlook the connection between DDoS protection and other infrastructure support, such as DNS hosting and management. This report provides an overview of ...

Three Guiding Principles for Data Security and Compliance [ Source: IBM ]

July 2014- The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target - as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data.

Because data is a critical component of daily business operations, it is essential to ensure privacy ...

Top 3 Myths about Big Data Security: Debunking Common Misconceptions about Big Data Security [ Source: IBM ]

July 2014- Data volumes are growing rapidly with no end in sight. Big data represents massive business possibilities and competitive advantage for organizations that are able to harness and use that information. But how are they protecting that data? This eBook addresses three myths of big data security.

Top Tips for Securing Big Data Environments: Why Big Data doesn't have to mean Big Security Challenges [ Source: IBM ]

July 2014- Big data environments create significant opportunities. However, organizations must come to terms with the security challenges they introduce, for example big data environments allow organizations to aggregate more and more data - much of which is financial, personal, intellectual property or other types of sensitive data - most of the data is subject to compliance regulations.

As big data environments ingest more data, organizations will face significant risks and threats to the repositories ...

Integrating and Governing Big Data [ Source: IBM ]

July 2014- While the term "big data" has only recently come into vogue, IBM has designed solutions capable of handling very large quantities of data for decades, leading the way with data integration, management, security and analytics solutions known for their reliability, flexibility and scalability. The end-to-end information integration capabilities of IBM InfoSphere Information Server are designed to help organizations understand, cleanse, monitor, transform and deliver data - as well as collaborate to bridge the gap between ...

Intelligent Compliance - Establishing Trust in the Datacenter [ Source: BMC Software ]

July 2014- With the average cost of a data breach reaching $3.5 million, the pressure is intense to maintain the security and compliance of your data center. It only takes one breach and the cost to your organization can spiral out of control.

In this whitepaper, you will discover how your organization may be at risk and how you can protect your data center from costly and highly visible breaches. Through the Intelligent Compliance process, you ...

DDoS Report High Tech Brief [ Source: Neustar ]

July 2014- DDoS attacks against high-tech firms have started to take a dangerous turn. It's called DDoS smokescreening - attackers using DDoS as a distraction while they insert malware or viruses to pilfer money, data and intellectual property.

Application Release Automation with Zero Touch Deployment [ Source: CA Technologies ]

July 2014- Today's agile organizations pose operations teams with a tremendous challenge: to deploy new releases to production immediately after development and testing is completed. To ensure that applications are deployed successfully, an automatic and transparent process is required. We refer to this process as Zero Touch Deployment. This article reviews two approaches to Zero Touch Deployment-a script-based solution and a release automation platform.

The article discusses how each can solve the key technological and ...

Requirements for an Application Release Automation Platform [ Source: CA Technologies ]

July 2014- Why do we need an Application Release Deployment solution? The IT world is evolving at a rapid pace. Data center and homegrown applications are increasingly complex, application changes are rising in volume and frequency, and operations are deploying across multiple environments and infrastructure models (physical, virtual and cloud). In order to keep up with increasing business demands, development teams are adopting agile methodologies, and QA is employing automated testing.

This white paper discusses ...

IBM SmartCloud Desktop Infrastructure [ Source: IBM & Intel® ]

July 2014- Today, employees expect the workplace to come with them wherever they go and on whatever device they use. This anytime, anywhere "bring-your-own-device" (BYOD) mindset poses a dilemma for organizations. If these challenges sound familiar to you, read this solution brief to learn how IBM® SmartCloud® Desktop Infrastructure, built on pay-as-you-grow IBM System x® servers and powered by the latest Intel® Xeon® processors, can provide more cost-effective and manageable virtual desktop capabilities to help increase business ...

Private Clouds: Easing Deployment and Management [ Source: IBM & Intel® ]

July 2014- What are the key drivers of private cloud, and the requirements for effective deployment? This paper from IDC describes how IBM® System x® cloud solutions, featuring the latest Intel® Xeon® processors, offer a wide range of entry points to each individual customer, from those new to cloud computing and just getting started, to experienced users seeking higher-level capabilities.

Intel and the Intel logo, Xeon and Xeon Inside are trademarks or registered trademarks of ...

Demystifying Software-Defined Networking (SDN) [ Source: Allied Telesis ]

June 2014- Software Defined Networking (SDN) has recently hit the headlines with claims of better network utilization and easier management and many see it as the 'silver bullet' for every networking challenge. Unfortunately, most SDN solutions are targeted at large data centres and is unlikely to overcome the challenges being experienced by most enterprise technology managers and executives. To learn more about SDN and the challenges it will help you overcome (along with what it won't), download ...

The Top 3 Network Management Challenges (Balancing acts in the Enterprise network) [ Source: Allied Telesis ]

June 2014- Organisations rely heavily on their data network, yet the network goes unnoticed most of the time. Network infrastructure is an essential component of any business operation, but it is generally not appreciated or understood by the majority of staff or management. While users are very aware of any network failures that occur, nobody wants to invest too much to proactively prevent these failures. To learn more about how you can improve security, reduce downtime and ...

Reducing The Burden of Network Management [ Source: Allied Telesis ]

June 2014- Software Defined Networking (SDN) has attracted a great deal of attention for its claims of solving a number of common networking problems associated with flexibility and performance. At the same time, many enterprise organisations are paying big dollars for skilled specialist staff to maintain their network or are outsourcing this function? Even if the network configuration is kept simple, maintenance tasks on large networks can be time-consuming and error-prone. What if there was a better ...

Next 25