Whitepaper Library
 

enterprise networks

Results 1 - 25 of 178Sort Results By: Published Date | Title | Company Name
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking
    
Sangoma
Published By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
    
Entrust Datacard
Published By: Cisco     Published Date: Jul 30, 2015
Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco engaged Miercom to conduct a competitive analysis of its Catalyst 2960-X switch versus two comparable Hewlett-Packard switches from the 2920 and 5120 product families. Miercom executed comprehensive hands-on testing and evaluated the performance of some widely deployed features that are critical for reliable functioning of enterprise networks. The test methodology focused on specific areas in which Cisco believed there were key competitive differentiators between the products. Test results validated include throughput, latency, energy efficiency, stacking, LACP load balancing and Quality of Services (QoS) performance. Miercom found that the Cisco Catalyst 2960-X demonstrated superior performances against the competitive switches in the tests featured in this report.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 08, 2016
When evaluating a next-generation firewall (NGFW) to determine whether the solution can give you comprehensive protection for your entire enterprise, you need to look for seven must-have capabilities. The NGFW should: 1. Integrate security functions tightly to provide effective threat and advanced malware protection 2. Provide complete and unified management 3. Provide actionable indications of compromise to identify malicious activity across networks and endpoints 4. Offer comprehensive network visibility 5. Help reduce complexity and costs 6. Integrate and interface with third-party security solutions 7. Provide investment protection This white paper explains this checklist in depth and provides examples of the benefits a truly effective NGFW solution can deliver.
Tags : 
    
Cisco
Published By: Equinix     Published Date: May 28, 2015
This infographic provides information on how Performance Hub is designed to improve the performance of your entire network while simplifying your infrastructure and lowering your Total Cost of Ownership.
Tags : 
equinix performance hub, networks, data growth, network architecture, connectivity, network services, cloud, devices, equinix solutions, performance hub, infrastructure, network management, network performance, network security, virtualization, cloud computing
    
Equinix
Published By: Juniper Networks     Published Date: Mar 27, 2018
In our 40-criteria evaluation of data center hardware platforms for software-defined networking (SDN), we identified the nine most significant players — Alcatel-Lucent Enterprise, Arista Networks, Extreme Networks (which recently acquired Brocade Communications System’s data center networking business), Cisco Systems, Cumulus Networks, Dell, Huawei, Juniper Networks, and Pluribus Networks — and researched, analyzed, and scored them. This report shows how each provider measures up and helps infrastructure and operations professionals (I&O) make the right choice.
Tags : 
    
Juniper Networks
Published By: Riverbed     Published Date: Jan 25, 2018
This Enterprise Management Associates® (EMA™) research summary, sponsored by Riverbed®, highlights some of the key findings of EMA’s landmark report, “Network Management Megatrends 2016: Managing Networks in the Era of the Internet of Things, Hybrid Cloud, and Advanced Network Analytics.” It examines several major areas of change and evolution affecting network management. These “megatrends” include hybrid cloud networking, the Internet of Things (IoT), advanced network analytics, network management outsourcing, and network management tool consolidation.
Tags : 
    
Riverbed
Published By: HPE     Published Date: Mar 23, 2015
This Porter Consulting report analyzes enterprise campus networking solutions from Aruba Networks, Cisco, HP and Ruckus Wireless. The paper examines key business and technology trends affecting enterprises with 500-5000 employees. We identify fundamental requirements IT decision makers should consider when evaluating campus networking solutions including: • Ensuring simple, secure and cost-effective user access • Supplying adequate bandwidth and quality of service • Streamlining deployment and operations • Supporting emerging standards and technology requirements Our goal is to provide business and technical decision makers with a guide to the key players and their strengths.
Tags : 
    
HPE
Published By: Adobe     Published Date: Nov 25, 2013
In this paper, we explore the IT management environment. How can you integrate document solutions across desktops, mobile apps, and the cloud to better meet business demands, without creating so much complexity that it causes IT to suffer? Please download to learn more.
Tags : 
it management environment, document integration, document security, mobile, mobile apps, personal devices, define data, mobile workforce, enterprise networks, sensitive documents, productivity ecosystem, lockdown, document solutions, cloud, cloud-based, hybrid it, enterprise mobility, networking, virtualization, cloud computing
    
Adobe
Published By: Oracle     Published Date: Aug 08, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Oracle     Published Date: Aug 15, 2013
The era of social networking clearly has arrived, creating significant implications for enterprises. Today, there are compelling rewards for embracing social networks—and potentially severe penalties for putting it off any longer. This white paper outlines four key ground rules for engaging with social networks in order to maximize their potential for improving customer service.
Tags : 
social, customer experience, oralce, social networking, customer service
    
Oracle
Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
enterprise networks, aerohive, network structure, wi-fi and networking, networking
    
Aerohive
Published By: Microsoft     Published Date: Jul 07, 2016
Before you transform your business with mobility services, you need to consider both the management and security challenges you’ll face from the combination of mobile devices and cloud-based apps. In this IDC report, you’ll examine enterprise mobility management technology—offered through solutions such as the Microsoft Enterprise Mobility Suite—and how it helps manage the security risks of your mobility strategy. Learn about these critical benefits: • Provisioning and configuration devices and users—across platforms • Ensuring only authorized users access data with identity system integration • Ensuring only compliant devices access the corporate network through conditional access policies • Allowing mobile applications to deploy in a more secure, streamline manner with enterprise app stores • Providing security for data at rest, within workflows or over wireless networks, using granular policies around applications
Tags : 
mobile, cloud, best practices, productivity, technology
    
Microsoft
Published By: IBM     Published Date: Jun 16, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
cloud computing, mobility, big data, business analytics, it security landscape, enterprise networks, cloud integration, virtualization, infrastructure, data center design and management
    
IBM
Published By: IBM     Published Date: Jul 07, 2015
This paper explores the implications of cloud, big data and analytics, mobile, social business and the evolving IT security landscape on data center and enterprise networks and the changes that organizations will need to make in order to capitalize on these technology force.
Tags : 
the cloud, mobile, mobility, social, analytics, networks, enterprise network, big data, network infrastructure, infrastructure, data center
    
IBM
Published By: Intel     Published Date: May 19, 2017
For today’s service providers and enterprises, bandwidth demands continue to increase and evolve. The introduction of Internet of Things (IoT) solutions, such as smart homes, smart cities, connected cars, and connected medical devices, is forcing organizations to change existing business models and to build more cost-effective networks.
Tags : 
nfv, enterprises, service providers, internet of things, network performance, virtualization, infrastructure
    
Intel
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Published By: Aerohive     Published Date: Jun 01, 2015
This guide reveals how to evaluate enterprise WiFi Network.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks, network architecture, network management
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Ce document apporte des conseils permettant d’évaluer les réseaux Wi-Fi d’entreprise grâce à l’étude des exigences clés, des considérations de l’architecture, des 10 éléments inhérents à un réseau Wi-Fi et de l’utilisation du processus DDP pour sélectionner un fournisseur.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks, network architecture, network management
    
Aerohive
Published By: Aerohive     Published Date: Jun 15, 2015
Dieses Dokument enthält Ratschläge für die Bewertung eines WiFi-Netzes im Unternehmen und analysiert die wichtigsten Anforderungen, architekturbezogene Erwägungen, 10 Sachen, die ein WiFi-Netz imstande zu tun sein muss, und benutzt das RFP Verfahren, um einen Zulieferer auszuwählen.
Tags : 
wi-fi, wlan, wlan networks, networks, technology, wlan architectures, wlan traffic, enterprise wlan networks, evaluate enterprise wlan networks, network architecture, network management
    
Aerohive
Published By: ServiceNow     Published Date: Nov 22, 2013
As technology continues to advance and the new reality is based on an infrastructure that includes physical, virtual and cloud resources, IT departments need to find new ways of managing and securing this vastly different technology ecosystem.
Tags : 
servicenow, enterprise it, it department, cloud generation, social networks, mobile workforce, virtualization, cloud computing, collaborative, service-oriented, cloud platform, drive down expenses, increase efficiency, cloud-driven technology, streamlines operations, fluid systems manageable
    
ServiceNow
Published By: McAfee     Published Date: Sep 15, 2014
URL filtering is a type of content filtering that allows or blocks users from accessing specific websites. The practice has become an essential one on enterprise networks, with the goal of blocking employees from accessing content that would be a detriment to their productivity or the company as a whole. Blocked sites may include those that threaten the security of the organization, have objectionable content, or are bandwidth-intensive enough to strain company resources.
Tags : 
best practices, url filtering, network security, blocked sites, security management
    
McAfee
Start   Previous   1 2 3 4 5 6 7 8    Next    End
Search Whitepaper Library      

Add Whitepapers

Get your company's whitepapers in the hands of targeted business professionals.