ip addresses

Results 1 - 25 of 30Sort Results By: Published Date | Title | Company Name
Published By: Akamai Technologies     Published Date: Sep 11, 2017
There are many reasons why bots pose the most complicated threat to your online business - access to pools of IP addresses, ability to stay under the radar, highly persistent. Read what you need to know to stay in the know.
Tags : 
credential stuffing, ip security, threat protection
    
Akamai Technologies
Published By: RCN Business     Published Date: Nov 11, 2014
In a changing business climate, you're only productive as the technology that supports you. In fact, having the right services can mean the difference between one more happy sale or one less customer. Don’t settle for "one less" - get the right solution for your business with RCN Business Services. RCN Business Services offers a full suite of communications products and services to businesses of all sizes, including Internet, voice, video and network solutions. We are a facilities-based provider that offers extensive fiber density with redundancy and superior performance. Spanning over 6,000 miles, the advanced fiber-rich network is completely diverse from other communications providers, enabling businesses to experience exceptional customer service, quicker installation and issue resolution. RCN Business operates on three fundamental tenets: Partnership, Choice and Technology. These fundamental tenets guide how RCN Business approaches the sales process, addresses its customers, and supports its products and services. Partnership: The process starts with a dedicated RCN Business account representative actively listening and learning the needs, goals and challenges of a business. The trained and experienced RCN Business staff then delivers a customized solution. Choice: RCN Business understands that one size does not fit all. The goal is to create a reliable, customized technology solution that contributes to a business’s success and growth. Technology: Technology and customer support are critical to any business. With RCN Business owning and having full control of its network, businesses get local U.S. based operations, faster response times and a continuous monitoring for superior uptime.
Tags : 
lan, voip, business communication, wan, pbx, networking, wireless, business technology, telecom
    
RCN Business
Published By: VMware     Published Date: Jul 01, 2016
Higher education is in the midst of fundamental changes that are reshaping the future of both the mission and the business. As technology helps campuses better reach beyond their traditional physical borders, decision-makers expect IT to offer the solutions and leadership needed to deliver better services to students, staff, and researchers while simplifying IT costs and responsibilities. This solution brief addresses how vCloud Air built on the popular vSphere virtualization platform, is helping higher education IT respond to today’s performance, manageability, and security challenges.
Tags : 
vmware data center, vcloud air, vsphere, hybrid cloud, public cloud, private cloud, disaster recovery, data center extension, data center replacement, date center modernization, virtual private cloud
    
VMware
Published By: Tellabs     Published Date: Mar 23, 2012
Tellabs' white paper explains how IPsec addresses the security issues inherent in LTE networks. It also reviews the end-to-end protection solutions available in the IETF IPsec standard.
Tags : 
deploy, tellabs, network migration, migration, synchronization, ethernet, backhaul, backhaul network, scalability, revenues, networking, security
    
Tellabs
Published By: Oracle ODA     Published Date: Dec 06, 2016
It’s no secret that data-driven business strategies have resulted in unprecedented data growth and management of more complex database structures. Not only that, but IT leadership continues to play a strategic role in the direction of the business, especially as these disruptive business strategies come into play. This white paper addresses some of the key considerations IT management should have as they evaluate their IT roadmap and infrastructure to meet these dynamic enterprise needs.
Tags : 
    
Oracle ODA
Published By: Oracle     Published Date: Jul 05, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
advanced traffic steering, global internet visibility, open programming interfaces, risk management tools, secondary dns
    
Oracle
Published By: Oracle     Published Date: Nov 30, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle
Published By: Oracle Dyn     Published Date: Dec 06, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System (DNS) is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct website when entering a URL. DNS mappings are maintained in special-purpose servers called DNS nameservers. When a user enters your company’s URL, a DNS query is routed to a DNS nameserver containing the address mappings for your company’s internet domain.
Tags : 
traffic, dns, internet, visibility, programming, interfaces, optimization, routing
    
Oracle Dyn
Published By: CA Technologies EMEA     Published Date: Aug 07, 2017
A big part of GDPR compliance will focus on how data is collected going forward. But a substantial emphasis will fall on the data businesses already hold. With many mainframes containing generations-old data, a manual data audit is completely unrealistic. That’s where CA comes in. CA Data Content Discovery enables organizations to find, classify and protect mission essential mainframe data—three valuable steps toward achieving GDPR compliance.
Tags : 
gdpr, personal data, social information, ip addresses, ca technologies, mainframe security, anonymize data, privacy projects
    
CA Technologies EMEA
Published By: Amazon Web Services     Published Date: Oct 09, 2017
Today’s organizations are tasked with managing multiple data types, coming from a wide variety of sources. Faced with massive volumes and heterogeneous types of data, organizations are finding that in order to deliver insights in a timely manner, they need a data storage and analytics solution that offers more agility and flexibility than traditional data management systems. Data Lakes are a new and increasingly popular way to store and analyse data that addresses many of these challenges. Data Lakes allow an organization to store all of their data, structured and unstructured, in one, centralized repository.
Tags : 
cost effective, data storage, data collection, security, compliance, platform, big data, it resources
    
Amazon Web Services
Published By: Oracle + Dyn     Published Date: Jun 29, 2017
Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: Anycast vs. Unicast networks CNAME DDoS and Hijacking Load Balancing and GSLB
Tags : 
    
Oracle + Dyn
Published By: Oracle + Dyn     Published Date: Jun 27, 2017
"Every user’s first interaction with your website begins with a series of DNS queries. The Domain Name System or DNS is a distributed internet database that maps human-readable names to IP addresses, ensuring users reach the correct online asset (website, application, etc) efficiently. Knowing the complexities and best practices of this layer of your online infrastructure will help your organization build redundancy, improve end-user performance and establish a top notch DR plan. Download this guide to DNS top terms and actionable concepts including: • Anycast vs. Unicast networks • CNAME • DDoS and Hijacking • Load Balancing and GSLB Learn more! "
Tags : 
    
Oracle + Dyn
Published By: Entrust Datacard     Published Date: Jan 24, 2014
The Deprecation of Internal Server Names and Reserved IP Addresses
Tags : 
entrust, fqdn's, security, internal server, reserved ip addresses
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: May 15, 2014
On November 22, 2011, the CA/Browser Forum adopted “Baseline Requirements for the Issuance and Management of Publicly-Trusted Certificates, Version 1.0” (hereafter referred to as the “BR 1.0”) to take effect on July 1, 2012. This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
entrust, non fqdns, certificates, forum changes, publicly trusted certificates, networking, it management
    
Entrust Datacard
Published By: Entrust Datacard     Published Date: Jul 21, 2014
This document explains the differences between non-qualified and Fully-Qualified Domain Names (FQDN), the reasons behind the CA/Browser Forum’s change and suggests alternatives for affected subscribers.
Tags : 
non-fqdns, depreciation, internal server names, reserved ip addresses
    
Entrust Datacard
Published By: Citrix Systems     Published Date: Nov 10, 2014
Attend this webinar to learn how SDN helps address the challenges of virtualization. You will learn practical tips that can help you get started immediately. Agenda: • How virtualization impacts the underlying network infrastructure • Why and how SDN addresses the challenge of virtualization • How SDN enables “Just in Time” networks for L4-7 services
Tags : 
application, deployment, research, enterprise, data center, controller, network, security, cloud, virtualization, platform, performance, scalability, data management
    
Citrix Systems
Published By: Aberdeen - youSENDit     Published Date: Sep 14, 2011
YouSendIt is a Web-based secure digital file delivery company, which lets users securely send, receive and track files on demand. It is an alternative to sending large e-mail attachments, using FTP, and sending CDs or DVDs or tape or USB flash drive via Sneakernet. The sender can enter the recipients' e-mail addresses, attach the file and send it; the recipients receive an e-mail notification with a URL that lets them download the file.
Tags : 
yousendit, dortch, large content, file sending, marketing, technology, data management, email security
    
Aberdeen - youSENDit
Published By: HP     Published Date: May 30, 2008
Storage virtualization has been around for several decades. While technologies have advanced and capabilities have become more sophisticated over time, the motivations for virtualizing resources and the anticipated benefits have remained relatively stable. Storage virtualization continues to be an important topic because it addresses a number of significant challenges.
Tags : 
storage management, storage virtualization, virtualization, storageworks, storage, hp eva 4400, hp eva 4000
    
HP
Published By: LockLizard     Published Date: Dec 08, 2008
In any enterprise there is information that has to be kept secret, but must be distributed, and therefore has to be identified with any recipient in the event that it is ‘leaked.’  This white paper addresses two examples of this requirement (boardroom secrets and mergers and acquisitions), and shows how to identify solutions that meet business needs for document protection and secure file sharing.
Tags : 
drm solutions, locklizard, document protection, secure file sharing, security
    
LockLizard
Published By: CenturyLink     Published Date: Nov 18, 2011
There are more people on earth than total IPv4 addresses, and they're expected to run out by the end of 2011. Preparing for the transition now can help you maintain business continuity during the changeover while taking advantage of immediate business benefits.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, ipv6, future, addresses, transition, data center design and management
    
CenturyLink
Published By: Dyn     Published Date: Jan 14, 2015
Whether you are a seasoned expert or just beginning to look into how DNS can improve the performance of your businesses’ services, let this quick guide to DNS terminology be your comprehensive one-stop shop.
Tags : 
dns, domain name system, ip addresses, terminology, denial of service, query, cache, dns client
    
Dyn
Published By: Webroot Inc     Published Date: Aug 27, 2015
In the past year, Webroot encountered tens of millions of instances of malware and potentially unwanted applications (PUAs), monitored billions of IP addresses and URLs, analyzed millions of new and updated mobile apps for malicious behavior, and studied major malware trends based on data from millions of endpoints. This report contains insights, analysis, and information on how collective threat intelligence can protect organizations from sophisticated attacks.
Tags : 
malware, unwanted applications, malicious behavior, threat intelligence, security
    
Webroot Inc
Published By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : 
endpoints, employees, security landscape, security leaders, it security, unified endpoint management
    
IBM
Published By: Astrocom     Published Date: Apr 23, 2008
The Domain Name System (DNS) is a hierarchical system that provides the IP addresses that correspond to a given Fully Qualified Domain Name (FQDN, often called a hostname or domain name). At the top of the tree structure are thirteen “root” Domain Name Servers that have the primary and secondary IP addresses of the DNS Authorities for all domains on the Internet.
Tags : 
dns, ip networks, networking, network management, powerlink, astrocom
    
Astrocom
Previous   1 2    Next    
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com