ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Infrastructure Research

  • Cisco Nexus Data Broker

    Sponsored by: Cisco Systems, Inc.

    Network traffic monitoring has become more challenging as network and application traffic volume has increased. This document explains how Cisco Nexus Data Broker along with Cisco Nexus 9000 Series Switches combines with Cisco Application Centric Infrastructure to provide fabric traffic visibility for security, monitoring, and operations purposes.

  • eBook : Your Guide to Advanced Evasion Techniques

    Sponsored by: Forcepoint

    Learn the current state of cyber-criminality and why the security landscape looks so rosy from their perspective. Come to understand not only the shortcomings of traditional approaches but also how patching can lead to further problems and the issues with current network security devices countering advanced evasion techniques.

  • The Top 3 Reasons Your Network Matters in the Cloud Era

    Sponsored by: Juniper Networks, Inc.

    Because of trends in more mobility, cloud applications, and connectivity in the enterprise, teams need to think more strategically about what their networks need to support the cloud. Discoer details on how these three IT trends impact your cloud strategy -- and how you can build a network that's ready for the cloud.

  • Enterprise Campus Network Comparison Guide

    Sponsored by: Juniper Networks, Inc.

    This resource examines four key aspects of campus networks and the key points of comparison for each one. Get a new perspective on how the various options stack up on the most important features and capabilities.

  • Intelligent WAN Is the Foundation for the Software-DefinedWAN

    Sponsored by: Cisco Systems, Inc.

    This resource offers the software-defined WAN as the solution to the problems facing traditional WAN. Access now to see how cloud computing is complicating the ability for existing WANs to keep up with bandwidth demands.

  • Get Point-and-Click Fabric Lifecycle Management

    Sponsored by: Cisco Systems, Inc.

    IT departments need tools that can help them accelerate infrastructure changes as they also simplify the lifecycle management of data center fabrics. This solution overview highlights one fabric manager that provides the tools that your IT department needs to build and manage your data center fabric lifecycle.

  • Buying Criteria for Next-Generation Network Security

    Sponsored by: Cisco Systems, Inc.

    Discover an in-depth explanation of the factors that compel organizations to look at next-generation solutions. This buyer's guide offers an analysis of the most important capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need to be an educated buyer.

  • Beyond Application Visibility and Control: What an NGFW Must Be

    Sponsored by: Cisco Systems, Inc.

    Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.

  • Next-Generation Firewalls: An Investment Checklist

    Sponsored by: Cisco Systems, Inc.

    What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.

  • Intelligent WAN Design Guide and Summary

    Sponsored by: Cisco Systems, Inc.

    This design guide summary provides you with an overview of an intelligent WAN the key technology, the use cases it provides, and additional and related resources.

  • Why Now Is the Time to Re-Architect the Enterprise Network

    Sponsored by: Juniper Networks, Inc.

    IT professionals continue to embrace new technologies, but are they thinking about the infrastructure across which they're to delivering these technologies? Learn how to re-architect the enterprise network and data center infrastructure, in light of the momentum towards cloud, mobility, bandwidth-hungry apps, and advanced security threats.

  • Structuring Your Wireless Enterprise Network

    Sponsored by: Optus

    Has the day of the wireless enterprise dawned? This e-guide addresses this question, as well as the challenges facing enterprise IT as it considers moving towards a wireless network. Access now, and also dive into a Q&A with a senior IT engineer on how he adapted his wireless network design to overcome today's challenges.

  • IDC: Rethinking the Network as a Security Sensor and Enforcer

    Sponsored by: Cisco Systems, Inc.

    Given the amount of sensitive data traveling across enterprise networks, cybercriminals will look to use networks to accomplish their goal of data breach. This IDC technology spotlight details how to embed security tools in your network by way of a network security platform.

  • Comparing Enterprise Data Center Cable Types and Their Effects

    Sponsored by: CommScope

    This expert e-guide compares fiber and copper cables and takes a close look at where each type of cable might be used in today's complex data centers. Access now to ensure you're using the right cable for your network. Additionally, further explore fiber optic cable types and their effects on the data center.

  • Simplifying Security Engineering With Effective Network Segmentation

    Sponsored by: Cisco Systems, Inc.

    Forrester Consulting conducted a Total Economic Impact (TEI) study and examined the potential return on investment enterprises may realize by deploying Cisco TrustSec. Access this report to explore and evaluate the potential financial impact of Cisco TrustSec on your organization.

  • The Evolution of Fabric Technologies

    Sponsored by: Juniper Networks, Inc.

    Fabric technologies can deliver the high performance that modern applications need, and the business agility that comes with network management simplicity. Read on to learn more about this cost-effective approach to data center networking.

  • IS YOUR INFRASTRUCTURE DEVOPS-READY?

    Sponsored by: Turbonomic

    This white paper explores the organizational challenges that have traditionally divided Application Owners and Infrastructure Managers. Learn about the trends that have made this rift untenable for good business and some best practices on how to empower both sides to embrace the new Development Operations era.

  • How a School District Swiftly Detects and Remediates Internal and External Threats

    Sponsored by: Cisco Systems, Inc.

    Learn how the Council Rock School District approached their massive network security blind spot and reduced their threat reaction time from months to detect and resolve to mere minutes. Discover what did and what did not work for them, how they also improved their capacity planning, and more.

  • Rethinking Network Architecture

    Sponsored by: Juniper Networks, Inc.

    To meet the demands of application environments prevalent in today's data centers, IT leaders need to rethink their approach to network architecture. Access this white paper that explains the need for a new approach to network architectures and how you can enable a simple, open and smart data center.

  • Transform Your Network. Transform Your Business

    Sponsored by: Juniper Networks, Inc.

    Carefully planning your journey to the cloud is essential to your enterprise's continued success. This white paper details how 5 organizations used one unified network platform to easily construct an agile, secure, and cloud-enabled enterprise. Access now to learn about this platform and how it ensures a successful move to the cloud.

  • The Best Ways to Manage Shadow IT

    Sponsored by: Juniper Networks, Inc.

    Shadow IT raises challenges, namely security, integration, and operational ones. This essential guide looks at the trends that are driving the rise of shadow IT, explores the drawbacks and benefits it offers and explains how to design the right network for your preferred shadow IT strategy.

  • Ringing Endorsement: Which IP Phone Fits Your Needs?

    Sponsored by: SearchNetworking.com

    Despite the rise of smartphones and tablets, many organizations still depend on the IP telephone, because of its reliability and functionality.But with hundreds of models on the market and a plethora of available features, how do you choose the right one for your business? This issue of Network Evolution dials in on that question and more.

  • Outperform Your Expectations with Passive Optical LAN

    Sponsored by: Nokia

    Passive optical LAN (POL) technology eliminates the networking limitations of Traditional LAN. This resource offers a side by side comparison of POL and traditional LAN and details the key features of POL. Access now to learn about these features.

  • Passive Optical LAN, Explained

    Sponsored by: Nokia

    This paper outlines the key elements of an enterprise POL. Access now and discover why POL is an optimal enterprise network option for today's digital world.

  • SD-WAN Bill of Rights

    Sponsored by: Cisco Systems, Inc.

    This infographic lays out the 10 things you can expect of future SD-WAN tools. If you can't secure every one of these freedoms, it's time to reevaluate your infrastructure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.