> Technology > Networking
 

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 51 - 75 of 1766Sort Results By: Published Date | Title | Company Name
White Paper Published By: IBM     Published Date: Oct 14, 2016
This ebook presents six reasons why you should consider a database change, including opinions from industry analysts and real-world customer experiences. Read on to learn more.
Tags : 
ibm, database, database change, analytics, networking
    
IBM
White Paper Published By: F5 Networks Inc     Published Date: Oct 12, 2016
Access this report now to see how Gartner evaluates vendors based on ability to execute and completeness of vision.
Tags : 
gartner, magic quadrant, application delivery, adc, cloud
    
F5 Networks Inc
White Paper Published By: IBM     Published Date: Oct 12, 2016
Read this IDC analyst report to see how you can meet your digital business requirements with IBM Digital Experience on Cloud.
Tags : 
ibm, commerce, digital experience, idc, business value
    
IBM
White Paper Published By: IBM     Published Date: Oct 12, 2016
Read this online report that can aid your horizontal portal selection decisions and help you identify key differentiators among products.
Tags : 
ibm, commerce, digital experience, digital, horizontal portals
    
IBM
White Paper Published By: IBM     Published Date: Oct 11, 2016
View this ebook to learn how leading organizations are managing, deploying, designing or planning cloud-based B2B integration alternatives to future-proof their B2B trading operations. Discover the benefits that clients of IBM Sterling B2B Cloud Services cite, including: -Reduced risk and total cost of ownership (TCO) in B2B integration - Enhanced visibility and control over business processes shared with partners - Faster partner onboarding and faster, more reliable data exchange - Greater collaboration across IT, business managers and external partners
Tags : 
ibm, commerce, b2b, b2b integration, cloud
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
IBM has just launched two new offerings that will help you to achieve your hybrid integration strategy. IBM Application Integration Suite and IBM App Connect enable you to integrate across on-premise and cloud environments, take advantage of the API economy and leverage existing IT investments to achieve digital transformation.
Tags : 
ibm, cloud, middleware, application services, api
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
In this session, we will talk about the latest release of DataPower V7.5. This release delivers enhanced cloud and API capabilities, in an updated modernized user experience.
Tags : 
ibm, cloud, api, ibm datapower v7.5, ibm datapower
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
The world of IT is rapidly transforming — from back office process automation to front line engagement. Put another way, IT no longer supports the business, it *is* the business. The challenge is, the application architectures and processes of existing applications are inadequate to support the requirements of tomorrow’s IT. This presentation will discuss the changing nature of business and customer engagement and discuss what capabilities IT must put in place to deliver the next generation of enterprise applications.
Tags : 
ibm, cloud, middleware, infrastructure, enterprise applications
    
IBM
Webinar Published By: IBM     Published Date: Oct 07, 2016
The new capabilities of WebSphere Application Server Liberty profile, based on Java EE 7 standards, are designed for enhanced developer productivity, dynamic scale, resilient production deployments and ease of integration into modern DevOps workflows. These new production ready capabilities of Liberty profile enable development and delivery of engaging and responsive applications by providing the application infrastructure that meets expectations for speed, agility and user friendliness.
Tags : 
ibm, middleware, cloud, platform services, websphere application server
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Working with ESM Technology, Infirmary Health System deployed a comprehensive security solution from IBM that has enabled it to meet data security requirements for meaningful use, qualify for meaningful use dollars, and reduced security incidents significantly.
Tags : 
ibm, security. big fix, infirmary health system, case study, esm technology
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, security, big fix, advanced threats, security
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
"According to the 2016 State of Endpoint Security Survey released by the SANS™ Institute 44% of respondents report that one or more of their endpoints have been breached in the past 24 months. - Desktops, laptops and servers are the most compromised endpoints - Login and access credentials are the most commonly exfiltrated information - 55% of respondents spend 3 or more hours per compromised endpoint - Over 70% of respondents find it difficult or impossible to determine when an incident is fully remediated These statistics encompass a wide set of industries, from financial services to education. So while each network is uniquely built to support your particular business, none is immune from being breached."
Tags : 
ibm, security, big fix, endpoint security, sans report
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Understand the growing need for next-generation network protection—and how IBM Security Network Protection provides the critical insight, visibility and control you need to protect against emerging threats and targeted attacks.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM Security as a leader in providing Intrusion Prevention Systems (IPS) appliances in the newly published Gartner Magic Quadrant for IPS technology.
Tags : 
ibm, security, network protection, ibm security network protection, intrusion prevention systems
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Read this Forrester report to learn how to: 1) Increase network security, performance, and availability, 2) Reduce costs and protect your investment with Flexible Performance Licensing, 3) Evaluate the potential return on investment (ROI) your organization may realize with XGS.
Tags : 
ibm, security, network protection, ibm security network protection, cyber threats
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
Gartner, Inc. has positioned IBM as a leader in providing Security Information and Event Management (SIEM) software in the newly published Gartner Magic Quadrant for SIEM Technology. Read the Gartner report to learn why IBM is positioned as a leader, the strenghts of IBM QRadar for security intelligence & analytics and market trends and vendor evaluation criteria.
Tags : 
ibm, security, security intelligence, gartner, magic quadrant
    
IBM
White Paper Published By: IBM     Published Date: Sep 30, 2016
In this exclusive report, Nucleus Research cites findings from interviews with IBM QRadar on Cloud customers who have adopted a cloud subscription model to access security intelligence & analytics capabilities. Download the report to read about the reported benefits, including better flexibility and agility to address a rapidly changing threat environment, increased IT productivity and access to a growing range of additional security services in the cloud.
Tags : 
nucleus, research guidebook, ibm qradar, cloud, networking
    
IBM
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
On June 20, Akamai Technologies mitigated one the largest confirmed Distributed Denial-of-Service (DDoS) attacks of the year. Read the case study to learn more about the attack, including payload samples and sources.
Tags : 
akamai, cybersecurity, security, ddos, ddos attack
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Akamai’s Threat Research team analyzed a week of cross-site scripting (xss) alert triggers to gain clarity on the nature of xss attacks. Read this case study to learn which vectors are vulnerable and specific techniques that were employed during remote resource injection exploitation attempts versus simple probing requests.
Tags : 
akamai, xss, xxs exploration, threat research, analytics
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Read this guide to learn the key security capabilities that a web application firewall (WAF) can deliver to defend your web applications and to get ideas for extending your existing WAF and improving web application security.
Tags : 
akamai, security, cybersecurity, web application security, web application firewall
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
This infographic will walk you through a few key questions around your web applications.
Tags : 
akamai, attackers, cyber attacks, cybersecurity, web applications
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
In this Akamai brief, we reveal the hidden burden bots and scrapers place on your website. You will know what bots and site scrapers are used for, and why blocking bot traffic is not the best solution.
Tags : 
akamai, bots, scrapers, bot traffic, security
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
How do you choose the best cloud security solution? Denial of service, data breaches, and SQL injection attacks are growing faster than on-premises firewalls can scale—you need a cloud-based security solution to meet the threat. Learn about the various solutions and techniques for web, DNS, and infrastructure security.
Tags : 
akamai, web, dns, infrastructure security, sql
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Sep 27, 2016
Learn about the origins, tactics, types, and targets of cyber- attacks and emerging threats and trends from post-attack analysis and intelligence by cybersecurity and DDoS mitigation experts. Includes quarter-over-quarter and year-over-year trends, plus spotlights on recent DDoS and web application attacks and review of the past quarter’s hot-topic issues in cybersecurity.
Tags : 
akamai, state of the internet, security, security report, cybersecurity
    
Akamai Technologies
White Paper Published By: IBM MaaS360     Published Date: Sep 27, 2016
Protecting confidential data while keeping mobile users productive.
Tags : 
ibm, mobile, mobilize, mobile data security, security
    
IBM MaaS360
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Data Center Design and Management

Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com