Research Library

Powered by

Networking White Papers

  • Enterprise Mobility Management: Mobile Device Management's Expansion to Devices, Apps and Content

    Sponsored by: IBM

    This white paper uncovers key considerations for a unified mobile enterprise policy. Discover how to gain visibility into every device entering your network, as well as ways to ensure corporate data security and productivity simultaneously.

  • What Increased Powered-Device Wattages Means For The Future of Cabling

    Sponsored by: Panduit

    Use this whitepaper to gain an insight into the current cutting-edge of power cable design, but also a glimpse into the direction this industry is heading, and how enterprises can adjust their practices to become early adopters.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • How the Cloud Stretches Enterprise Networks

    Sponsored by: SolarWinds, Inc.

    This white paper explores how to provide your IT pros with real-time cloud diagnostics to make sure that your network is always running smoothly. Inside learn how you can gain insight into slowdowns and errors in critical elements of your cloud network, discover the contact information of problem nodes, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Suspicious DNS traffic is a telltale sign that a device on your network has been coopted into a botnet. Therefore, monitoring DNS data is an excellent way to determine if a network has actually been breached. Learn here the top three DNS monitoring methods that SearchSecurity suggests.

  • A Golden Age Dawns for Network Services

    Sponsored by:

    Advanced network technology options have expanded, offering enterprises better, but cheaper, options for network services.

  • If External DNS Fails, So Does Your Digital Business

    Sponsored by: Dyn

    Without properly functioning external DNS, Internet-based resources may "disappear" or become unavailable without warning. To boost DNS management, this Gartner research report explores the concept of externally sourced and managed DNS as a service. Access now to uncover their key findings and learn best practices for improved DNS performance.

  • Is Passive Optical Networking Good For Enterprises?

    Sponsored by: Nokia

    This expert e-guide explores the possibilities a passive optical network or PON offers to both service providers as well as personal users. Access now to discover the key benefits PON could potentially offer to enterprises and the top factors IT managers must consider before choosing PON.

  • Endpoint Monitoring and Forensics

    Sponsored by: LogRhythm, Inc.

    Defending against advanced threats, compliance violations, and operational issues is an ongoing battle. A key part of winning the fight is your ability to correlate what's happening at the endpoint level to event data throughout the network. Find out how to unlock visibility and protection with fully integrated endpoint monitoring and forensics.

  • Computer Weekly – 11 October 2016: Leadership bonus – analysing our UK salary survey

    Sponsored by:

    In this week's Computer Weekly, our UK salary survey shows that IT leaders are benefiting from generous bonuses as tech becomes part of mainstream business. We find out how the internet of things is transforming the railway industry. And the CIO of the Williams F1 team explains how data analytics is boosting race performance. Read the issue now.

  • Modernizing the Industrial Ethernet Network with Increased Visibility

    Sponsored by: Panduit

    This technical resource discusses how you can implement an Ethernet network that can tie your whole manufacturing operation together. This connected strategy has the ability to deliver unprecedented levels of monitoring, management, and efficiency.

  • Automation World Tactical Brief - IIoT EcoSystem

    Sponsored by: Panduit

    This multi-article briefing discusses many aspects of the Internet of Things, and how it is shaping networks and enterprise operations. From manufacturing to modeling, the IoT is going to radically change how all enterprises do business, but how will it affect you?

  • A Roadmap for Transport Network Modernization

    Sponsored by: Cisco Systems, Inc.

    Today's transport network is suffering somewhat of an identity crisis. In this e-book discover the background and current state of metro transport networks and the challenges you're facing today and tomorrow as providers.

  • If External DNS Fails, So Does Your Digital Business

    Sponsored by: Dyn

    For enterprises with Web and cloud-based applications and content, external DNS solutions offer reliability, performance and traffic management beyond that of traditional open-source-based solutions. This Gartner Report explains the importance of DNS and seven key advantages of sourcing DNS externally from a managed DNS provider.

  • Why Your Company’s CDN Needs To Be Paired With Managed DNS

    Sponsored by: Dyn

    This paper explains the advantages of leveraging a dedicated service provider that specializes in DNS. It also describes the unique value an independent DNS service provider can bring to both single and multi-CDN environments.

  • A reference architecture for the IoE

    Sponsored by:

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).

  • 5 Ways To Reduce Network Latency

    Sponsored by: Dyn

    Learn 5 ways to reduce network latency and ensure that customers are not kept waiting. By improving your DNS you can prevent 79% of from avoiding your website next time.

  • Raspberry PI with Java: programming the internet of things

    Sponsored by:

    In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi.

  • Disruption Defined: What Your Business Needs to Know About Moving to the Cloud

    Sponsored by: TeraGo Networks

    Moving to the cloud is a business decision – not a technology decision. In order to become an enduring business, the benefits of the cloud have to be leveraged. Access this e-book to discover how you can remain ahead of the potential pitfalls.

  • The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

    Sponsored by: Palo Alto Networks

    This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more.

  • Case Study: Optimizing the In-Store, Retail Experience with Application and Network Monitoring

    Sponsored by: AppNeta

    "Is it the app or the network?" Discover how to pinpoint whether your network or a certain app is causing latency or service outages within minutes. Read on to enable your app teams to constructively diagnose and troubleshoot the precise issues, freeing up resources to focus on more strategic initiatives.

  • Infographic: Simplify Your IT

    Sponsored by: IBM

    This short infographic asks a simple question: Are you amongst the 93% of CIOs who believe IT has become too complex? Learn how you can bring simplicity to your enterprise.

  • How VersaStack can Impact Your Business: A TCO Calculator

    Sponsored by: IBM

    This simple tool is designed to help you discover how much money can be saved by implementing a converged infrastructure, rather than sticking with the traditional network model.

  • Mitigating DNS Zero-Day Exploits With Hybrid Network Architecture

    Sponsored by: EfficientIP

    Discover the key benefits of hybrid DNS, and learn how to leverage DNS to mitigate zero-day exploits by eliminating single point of failure (SPoF) and enhancing upgrade agility. Read on to deploy a reliable hybrid DNS architecture that gives network admins the ability to enact rapid vulnerability remediation.

  • The Insider Threats: Be Protected with Advanced DNS Security

    Sponsored by: EfficientIP

    See first-hand how to implement a secure DNS architecture—such as high performance cache and real time DNS traffic analysis tools capable of adaptive countermeasures—to enhance your organization's ability to stand against internal attacks, and ensure continuity of mission-critical DNS services.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2016 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.