cisco

Results 1376 - 1400 of 1491Sort Results By: Published Date | Title | Company Name
Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits, computing, security, local
    
CDW Vmware
Published By: Logicalis     Published Date: Sep 22, 2014
Video solutions eliminate geographic boundaries and allow you to sit across a conference table from fellow participants, regardless of where they are in the world. By using unified video collaboration solutions for a virtually unlimited number of applications, you can boost productivity and communication throughout your organization, even across the largest of enterprises—allowing you to become more agile and responsive to changing needs. Download this white paper to learn how.
Tags : 
logicalis, cisco, cisco systems, video communication, video solutions, enterprise video technologies, enterprise applications, employee collaboration
    
Logicalis
Published By: Cisco     Published Date: May 14, 2013
Not long ago, if you asked an IT executive about transformation, there was a good chance you’d get a technology-centric response. You’d hear about consolidation and virtualization, power and cooling, security and availability. Today, the responses are different. This edition of Unleashing IT is all about transformation. Not technology change, but business change through the use of technology.
Tags : 
innovation, change management, cost reduction, cloud, virtualization
    
Cisco
Published By: Cisco     Published Date: Jul 19, 2013
Betting on the cloud Jeff Brooks, CIO of Muscogee (Creek) Nation Casinos, is using the cloud to unify operations and create new business opportunities.
Tags : 
cisco, cloud, cloud computing, proprietary data, unify operations
    
Cisco
Published By: Cisco Systems     Published Date: Oct 16, 2013
Collaboration is the biggest opportunity of the next decade. In The Collaboration Imperative, learn how to unleash hidden assets in your company and build a world-class organization that can tackle market opportunities with lightning speed. Read Now
Tags : 
collaboration, cisco, best practices, technology, ebook, knowledge management
    
Cisco Systems
Published By: IBM     Published Date: Sep 27, 2013
Customers require flexible, agile and easy to consume IT solutions to succeed in business. With those requirements in mind, IBM recently announced PureSystems. Harvard Research Group (HRG) has taken a closer look at PureSystems and and how it compares to Cisco UCS.
Tags : 
ibm, ibm puresystems, it services, expert integrated systems, it solutions, software, hardware, networking
    
IBM
Published By: Cisco     Published Date: Jan 14, 2014
17-page Principled Technologies Report from 7/13. Side by side test migrating blade server ID to a rack server vs HP.
Tags : 
cisco, ucs vs. hp, blade server id, principled technologies report
    
Cisco
Published By: Cisco     Published Date: Jan 14, 2014
Beginning in 2010, Cisco commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises can realize by investing in and leveraging Cisco SMARTnet® Service. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco SMARTnet Service on their organizations.
Tags : 
cisco, smartnet service, cisco smartnet
    
Cisco
Published By: Cisco     Published Date: Jan 16, 2014
With maturity comes clarity, and the choice between public, private or hybrid cloud deployments is a prime example. According to a recent IDG Research Survey, private and hybrid cloud adoption is gaining strength at organizations of all sizes, and has the power to serve as a competitive advantage. However IT leaders must address certain barriers to fulfilling the promise of a private or hybrid cloud initiative.
Tags : 
cisco, private cloud, idg research survey, hybrid cloud, networking
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
The latest Gartner Magic Quadrant Reports are available, covering Secure Web Gateway (SWG) and Secure Email Gateway vendors. Published in May and July 2013, you’ll get insights on the current state of security threats and solutions. Find out why Gartner says, “The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention, capability encryption, and better protection from targeted phishing attacks.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the revival of distributed denial-of-service (DDoS) attacks.
Tags : 
security report, internet criminals, concerns, malware, denial-of-service, attacks, ddos, network
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Are you looking to maximize the productivity of the workforce by shifting to the cloud? Do you have a robust Collaboration platform in place to enable the new world of work? See for yourself all the reasons companies are shifting to the cloud and lowering total cost of ownership. Gain an edge by upgrading to Cisco Unified CM Version 9.0 or higher.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Are you thinking of implementing collaboration features? 80% of businesses have deployed unified communications and collaboration from VoIP to collaboration platforms and even WebRTC clients. Download this commissioned study conducted by Forrester Consulting on behalf of Cisco. Discover how UC and Collaboration technologies have delivered real business benefits today.
Tags : 
research, collaboration, new world, work, cloud, platform, ownership, cost
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Do communications really lead to a competitive advantage? Can a best-in-class unified communications platform lead to increased workforce and customer engagement? Get details in the “Unlocking the Full Potential of Collaboration with Cisco Unified Communications Manager Release 9” white paper.
Tags : 
research, customer engagement, communications, migrate, collaboration, new world, work, cloud
    
Cisco
Published By: Cisco     Published Date: Oct 07, 2014
Malware has changed considerably since the early PC viruses appeared more than 25 years ago. Today, it evolves so quickly that many customers find staying ahead of the latest threat nearly impossible. If the explosion in malware variants weren’t enough, sophisticated client-side attacks and advanced persistent threats (APTs) target victims in ways that evade traditional security measures. The question isn’t whether your network will be attacked with advanced malware. The question is when it will happen and how you will respond. Advanced malware is changing the way security is managed.
Tags : 
email, malware, web security, quadrant, solutions, threats, data loss, phishing attacks
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Get CIO perspectives on the changing roles and relevance of IT teams in this report.
Tags : 
cloud computing, security, compliance vulnerabilities, visibility, service level agreements, cloud technologies, data management, data center
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2015
Get the Cisco Validated Design Guide that helps you deploy personal, corporate, and guest devices on a highly secure network. Complete the form to get the design guide now.
Tags : 
design guide, deploy devices, securely deploy, byod, infrastructure, devices, device managers, configuration foundations
    
Cisco
Published By: Cisco     Published Date: Mar 03, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking. At the same time, the Internet of Everything (IoE) is accelerating. Opportunities are opening up for businesses and attackers alike as more things come online, along with the people, processes, and data that interact with them.
Tags : 
security, detection, blocking, data, data management
    
Cisco
Published By: Cisco     Published Date: Mar 04, 2015
When it comes to game-changing infrastructure technologies, private clouds are leading the way toward new IT efficiencies and a simplified means of consumption. Building on their roots as virtualized data centers, private clouds are rapidly moving up the list of must-have technologies to become an architectural standard for IT organizations around the world.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Mar 25, 2015
Offices aren’t productivity factories anymore—they’re collaboration centers where individuals and groups can develop their best ideas. That means building out an office takes a whole new approach, and it isn’t just about using aesthetics and shiny toys to attract top talent (although that is part of it). Successful offices are functional tools that bring technology and people together so they can do their best work. Cisco® Collaboration tools bring people together to speed the decision-making process and help you execute on your most innovative ideas while cutting operational waste. Bring Cisco Collaboration to your workplace and create a workplace that works.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
This document will identify the essential capabilities you should seek in an advanced malware protection solution, the key questions you should ask your advanced malware protection vendor, and shows you how Cisco combats today’s advanced malware attacks using a combination of four techniques: ? Big data analytics ? Collective global security intelligence ? Enforcement across multiple form factors (networks, endpoints, mobile devices, secure gateways, and virtual systems) ? Continuous analysis and retrospective security
Tags : 
protection, analytics, global security, intelligence, virtual, gateway, attacks, malware
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5585-X SSP60 v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall methodology v5.4 available on nsslabs.com.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, cisco, firewall
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco ASA 5525---X v5.3.1. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation. For additional information on NGFW technology, refer to the NSS Analysis Brief entitled “What Do CIOs Need to Know About Next Generation Firewalls?”
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Published By: Cisco     Published Date: May 15, 2015
The SVM depicts the value of a deployment of twenty NGFW devices and the appropriate central management console for each vendor.
Tags : 
security, vulnerability management, analytics, threat prevention, cyber attacks, firewall, cisco
    
Cisco
Start   Previous    46 47 48 49 50 51 52 53 54 55 56 57 58 59 60    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com