Sort results by: Published date | Company name
Showing items 1-25

10 Best Practices for URL Filtering [ Source: McAfee ]

July 2014- URL filtering, which blocks users from accessing websites that are malicious or erode productivity, is an essential security best practice. Discover 10 ways to make this easier and more effective to implement.

Seven Key Features to Help You Stop Advanced Evasion Techniques at the Firewall [ Source: McAfee ]

July 2014- Computer networks are built to facilitate the flow of communication, not stop it. Unfortunately, data packets can be manipulated to look normal yet contain an exploit. These techniques evade standard security measures and, in most cases, can deliver a malicious payload without detection. Often, these advanced evasion techniques (AETs) take advantage of rarely used protocol properties in unexpected combinations.

Most network security devices are not capable of detecting them. While many pass industry ...

SteelHead Hybrid Networking [ Source: Riverbed ]

July 2014- Global enterprises are rapidly adopting cloud infrastructure and SaaS applications broadly, and the Internet is now a part of their business critical infrastructure. With combined public and private resources, the network itself needs to go hybrid, combining the strengths of the highly reliable MPLS with the ubiquity, price, and speed of the Internet. The hybrid networking model from Riverbed Technology enables organizations to adopt hybrid networks to maximize the performance of applications, increase network availability, ...

Optimizing VDI Success: The Network Factor [ Source: Riverbed ]

July 2014- As organizations seek to continue leveraging the advantages of virtualization technologies, many are embracing virtualization of end user desktops via approaches such as Virtual Desktop Infrastructure (VDI). But while VDI solutions promise significant security and operational efficiency improvements, they also bring with them unique deployment challenges. If organizations hope to reap the full benefit of a VDI deployment, they must assure the best possible end-user experience, or adoption will stall and the project will fail. ...

What's Stealing Your Business Performance [ Source: Riverbed ]

July 2014- This inographic describes the simple steps to an effective SharePoint deployment and user acceptance

Transforming Business Performance with Hybrid Network [ Source: Riverbed ]

July 2014- In a world combining public and private resources, the network itself needs to get hybrid, combining the strengths of the highly reliable Multiprotocol Label Switching (MPLS) networks with the ubiquity and lower cost of Internet infrastructure.

Real time endpoint compliance for Continuous Diagnostics and Mitigation [ Source: IBM ]

July 2014- The United States is fighting a continuous cyber war against adversaries of all types, including nation states, terrorist groups, criminal organizations, and other nefarious actors. The US is faced with an ever-increasing multitude and sophistication of cybersecurity threats, which was demonstrated when foreign adversaries compromised US Federal Weapons System programs during 2013. Federal departments and agencies, along with elements of the national critical infrastructure, must take a proactive approach to information and network security.

Critical Network Capabilities for Cloud-Based DDoS Mitigation [ Source: Verisign ]

July 2014- Due to the evolving DDoS threat, companies are turning to cloud based DDoS mitigation providers, who have built out massive amounts of network bandwidth and DDoS mitigation capacity. Just as important as network capacity is the flexibility and diversity of the provider's network. This paper describes how Verisign DDoS Protection Services relies upon a fully redundant network backbone, purpose-built on multiple diverse 10 Gbps optical infrastructures.

DDoS Mitigation And DNS Availability Should Be Key Components Of Your Resiliency Strategy [ Source: Verisign ]

July 2014- DDoS attacks continue to grow in size, frequency and complexity, forcing network-dependent companies to implement a plan for protection. However, the results of a recent research project by Forrester and Verisign show that many companies are experiencing a disconnect between the growing awareness of DDoS attacks and a protection strategy. Additionally, many organizations overlook the connection between DDoS protection and other infrastructure support, such as DNS hosting and management. This report provides an overview of ...

Better Decision Support for Product Management [ Source: IBM ]

July 2014- Make the right decisions to define the right features and functions to build into your products for reaching the right market at the right time. Learn about making better product decisions with a Rational Focal Point solution for product portfolio management.

Controlling In-Vehicle Innovation with IVI Design [ Source: IBM ]

July 2014- In-vehicle infotainment (IVI) systems continues to bear greater influence on consumers' in-car experiences and purchasing decisions. The pressure on OEMs, however, to adequately adapt their solutions is exposing antiquated platforms and straining incumbent processes. In order to keep pace with this accelerating rate of evolution, OEMs are turning to a broadening suite of third-party and open source platforms and looking to the successful, post-deployment software content models from the mobile domain. As the software supply ...

Smarter automotive development: Five key areas for accelerating automotive innovation [ Source: IBM ]

July 2014- Bringing an automotive product or component to the marketplace can involve complex requirements that must be addressed by numerous teams spread across different departments, companies and geographies. This white paper explores some key challenges that automotive companies face in creating smarter, more sophisticated automobiles that are made up of many systems of systems and how a holistic approach can help address them.

Optimizing Cloud and Virtualized Applications: A collection of articles from the Compuware APM Center of Best Practices [ Source: Compuware ]

July 2014- This collection of articles substantiates growing concerns over application performance in cloud and/or virtualized environments. While cost reduction is a primary reason enterprises move from traditional datacenter infrastructure to distributed computing, the economics don't pan out if application performance and, subsequently, user adoption suffer. However, a good understanding of performance in the cloud or in virtualized environments demands a wholly different approach to monitoring, as explained in the following articles authored by technology strategists ...

Take Back Control of Your Cloud Apps: Which SLAs Really Protect Your Bottom Line? [ Source: Compuware ]

July 2014- In December 2013, Compuware commissioned Research in Action to conduct a global, independent survey of 740 senior IT professionals' attitudes and concerns relating to cloud computing. The results revealed that businesses worry that the reduced visibility and control that accompanies their move to the cloud hampers their ability to deliver a high quality end-user experience with applications. The study shows that the Service Level Agreements (SLAs) offered by cloud providers are failing to address the needs of ...

Optimizing Hadoop: A collection of articles from the Compuware APM Center of Best Practices [ Source: Compuware ]

July 2014- This collection discusses the common performance issues encountered when managing jobs in a Hadoop environment. Whether you are running Hadoop on-premise or utilizing a cloud-hosted MapReduce environment, or a combination of the two, this collection will give you real-world examples of how to improve the distribution and utilization of your big data deployment.

Some of the key challenges we have seen include:

• Jobs running slow or failing without a clear ...

Capstone Compliance Using Symantec Archiving and eDiscovery Solutions [ Source: Thundercat Technology, Symantec ]

July 2014- Government agencies' email volume has outstripped the capabilities of paper-based records management. The "Capstone" process addresses this issue by providing for electronic capture and management of email records. National Archives and Records Administration (NARA) Bulletin 2013-02 outlines the process and provides guidance for agencies considering whether and how to implement it.

4 Ways DNS Can Accelerate Business Growth [ Source: Neustar ]

July 2014- This DNS ebook describes how DNS has developed over the years to support business growth as new needs have emerged, for example, advanced traffic management and protection from cyber threats.

Ovum Decision Matrix: Selecting an Application Performance Management Solution, 2014-15 [ Source: IBM ]

July 2014- IBM is rated #1 in this Ovum Decision Matrix - Application Performance Management (APM) report. To help IT decision-makers choose the right solution, this Ovum Decision Matrix evaluates and compares 10 of the leading APM solutions in the market.

APM SaaS and Analytics Step Up to Meet the Needs of Modern Applications, Mobile Users, and Hybrid Cloud Architectures [ Source: IBM ]

July 2014- This IDC Technology Spotlight report examines the critical role that SaaS and analytics are playing in the transformation of the APM market. The paper also considers the impact that IBM's recently introduced Performance Management (SaaS) and IT Operations Analytics offerings will have on the APM market.

Automated Life-Cycle Management: A Critical Enabler for Cloud-Ready Datacenters [ Source: IBM ]

July 2014- This whitepaper discusses how IBM's automation and orchestration solutions for cloud can help IT data center operations teams effectively manage increasingly complex, multi-hypervisor computing environments.

Simplifying cloud management and data center automation [ Source: IBM ]

July 2014- This white paper explores the value of standardizing and automating cloud services with a flexible platform, such as IBM Cloud Orchestrator. Learn how to orchestrate the development, deployment and management of cloud services - helping to reduce IT costs and accelerate service delivery.

Gartner Magic Quadrant for Cloud-Enabled Managed Hosting, North America [ Source: Datapipe ]

July 2014- Cloud-enabled managed hosting brings cloudlike consumption and provisioning attributes to the traditional managed hosting market. It represents an evolution of a mature market in which the wide variety of offerings and capabilities means vendors must be chosen carefully.

Rethinking IT Operations in the Cloud [ Source: Datapipe ]

July 2014- This paper breaks down the challenges that often prevent the cloud from delivering the fast, flexible and affordable infrastructure companies seek - and then details the secret to achieving success with cloud solutions.

Accelerating Cloud Deployment and Operations with Managed Services [ Source: Datapipe ]

July 2014- Companies that do not have sufficient in-house expertise to either deploy or maintain an IaaS cloud should turn to Managed Service Providers (MSPs) to accelerate the planning, deployment and maintenance of their corporate cloud.

Build for Growth: Master the ICM Advantage in High Technology [ Source: IBM ]

July 2014- Success in high technology is contingent on the talent within organizations that innovate ways to manage product cycles, channels and delivery of services. By creating rewards based on clear milestones, variable compensation programs help make high technology businesses built for growth.

Sales Analytics - The Path to Improving Sales Effectiveness [ Source: IBM ]

July 2014- When applying analytics to the sales process, it is important to understand what analytics can do for your business. There are three distinct levels in the analytics maturity model. Each successive level signifies that a company is more effectively integrating analytics into their operations.

Download this whitepaper to learn more about applying analytics to the sales process.

Next 25