ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Architectures Research

  • eCommerce in the Cloud: Bringing Elasticity to Ecommerce

    Sponsored by: Catchpoint Systems Inc.

    Learn about the rise of electronic commerce, how enterprises deliver content to their customers, and what sort of hybrid cloud network these delivery schemes require.

  • Enterprise File, Sync and Share on the Cloud

    Sponsored by: TeraGo Networks

    Discover a corporate file sync-and-share system that can displace the need to use consumer grade technology.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • The Packet Train Difference

    Sponsored by: AppNeta

    Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture

    Sponsored by: EfficientIP

    Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.

  • White paper: Network management and operational efficiency

    Sponsored by: Forcepoint

    Learn how to make a NGFW work for your enterprise, both in the sense of security and the bottom line. Discover the intricacies of these firewalls, and what your enterprise might or might not need to manage one towards its potential.

  • Report: NGFW security effectiveness and TCO

    Sponsored by: Forcepoint

    In this lab report from NSS Labs, discover how a Next-Generation Firewall measures up to its boasts on the market. Learn what's important to NGFWs, how they come up short, how they surpass expectations, and everything in-between.

  • Boost Your Cloud Infrastructure Agility With Integrated DDI

    Sponsored by: EfficientIP

    Learn how to avoid the slog of trying to untangle your infrastructure in the cloud with IP address assignment and DNS registration to boost visibility. Learn the requirements and pitfalls of cloud infrastructure, and what tools to use to negotiate the maze of it all.

  • The DNS Global Threat: Your In-Depth Report

    Sponsored by: EfficientIP

    Within this report come to understand not only the technical and business impacts of DNS security, but also why they are underestimated, how businesses should counter them, and how most DNS security solutions are not adapted.

  • Case Study: Universities Embrace Wireless in the Smart Mobile Era

    Sponsored by: Cisco Systems, Inc.

    The Wi-Fi needs of one major university grew significantly, due to the rise of smart mobile devices and the introduction of various mobile apps. This case study details how the university was able to meet their increased Wi-Fi needs by choosing a vendor that provided a comprehensive wireless network and signal coverage for the entire campus.

  • Gain Complete Control of Your Digital Ecosystem

    Sponsored by: Entrust, Inc.

    Learn how to move beyond the vulnerability of passwords and tokens to deliver frictionless experiences to all of your users, without having to invest in hardware, software, or any large infrastructure deployment.

  • Is the Enterprise Ready for Network Functions Virtualization?

    Sponsored by: Cisco Systems, Inc.

    Today, virtualization and the cloud enable businesses to have compute agility. However, the network remains relatively inflexible. This ZK Research report explains why deploying network functions virtualization must be one of your top priorities, because doing so can align your network with your business goals in the digital era.

  • Case study: Protecting high-profile clients with resilient network security

    Sponsored by: Forcepoint

    Learn what NETprotocol did to ensure that it provided the most resilient, scalable network security solution on the market. Discover how it helped its clients maximize efficiency and improve ROI from their IT budgets responded to the exact needs of each client, and more.

  • Protecting Web Services for Grand Slam Roland-Garros

    Sponsored by: EfficientIP

    Learn how to strengthen your network foundation to support critical business imperatives—as well as improve business continuity—by unifying network management and bolstering defenses against debilitating DNS attacks. Access now to analyze real-time network traffic to gain global visibility.

  • Cisco Nexus Data Broker

    Sponsored by: Cisco Systems, Inc.

    Network traffic monitoring has become more challenging as network and application traffic volume has increased. This document explains how Cisco Nexus Data Broker along with Cisco Nexus 9000 Series Switches combines with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.

  • eBook : Your Guide to Advanced Evasion Techniques

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • The Top 3 Reasons Your Network Matters in the Cloud Era

    Sponsored by: Juniper Networks, Inc.

    Because of trends in more mobility, cloud applications, and connectivity in the enterprise, teams need to think more strategically about what their networks need to support the cloud. Discoer details on how these three IT trends impact your cloud strategy -- and how you can build a network that's ready for the cloud.

  • Enterprise Campus Network Comparison Guide

    Sponsored by: Juniper Networks, Inc.

    This resource examines four key aspects of campus networks and the key points of comparison for each one. Get a new perspective on how the various options stack up on the most important features and capabilities.

  • Get Point-and-Click Fabric Lifecycle Management

    Sponsored by: Cisco Systems, Inc.

    IT departments need tools that can help them accelerate infrastructure changes as they also simplify the lifecycle management of data center fabrics. This solution overview highlights one fabric manager that provides the tools that your IT department needs to build and manage your data center fabric lifecycle.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.

  • Why Now Is the Time to Re-Architect the Enterprise Network

    Sponsored by: Juniper Networks, Inc.

    IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.

  • SD-WAN Bill of Rights

    Sponsored by: Cisco Systems, Inc.

    This infographic lays out the 10 things you can expect of future SD-WAN tools. If you can't secure every one of these freedoms, it's time to reevaluate your infrastructure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.