ComputerWeekly.com Research Library

Powered by Bitpipe.com

NetworkingWhite Papers

  • The Need to Rethink the WAN

    Sponsored by: VeloCloud

    This white paper explores some WAN characteristics, limitations and some new approachesbetter suited to supporting fast-changing business and technology environments. Read on to learn more.

  • Customer Use Case: JMAC Lending

    Sponsored by: Quest Systems

    Explore how desktop-as-a-service enabled an organization to align all of its virtualization efforts in order to support a flexible work environment from anywhere, on any device while keeping applications and data secure.

  • Mobility in Financial Services

    Sponsored by: BlackBerry

    This exclusive white paper takes an in-depth look at enterprise mobility for financial services companies, and how taking control of the benefits of mobility today can pay off big time tomorrow. Read on to learn more.

  • Mobility in Government Services

    Sponsored by: BlackBerry

    This exclusive white paper takes an in-depth look at enterprise mobility for organizations with strict regulatory compliance. Read on to learn more.

  • The New Office: A Moving Story

    Sponsored by: Sprint

    This exclusive white paper dives into the hopes and fears that come with an office move and offers up six must-have technologies for making the move easier.

  • A powerful defense against denial of service attacks

    Sponsored by: Citrix

    As cybercrime continues to grow, denial of service (DoS) attacks have become far more prevalent. This guide explores the current landscape of DoS attacks and what you can do to protect your network.

  • SDN 101: An Introduction to Software Defined Networking

    Sponsored by: Citrix

    This white paper highlights the key opportunities that SDN can address for your business, as well as the relationship between SDN and NV.

  • Protect Your Sensitive Data Without Weighting Down Your Networks

    Sponsored by: SafeNet, Inc.

    This white paper introduces SafeNet's Network Encryption and Isolation solutions, which ensure data confidentiality and infrastructure isolation for your networks without impacting day-to-day operations, whether in traditional data centers or in the cloud.

  • Staying Secure in the Cloud: Considerations for Migrating Communications Solutions to Cloud Services

    Sponsored by: ShoreTel

    This white paper examines security considerations for migrating communication solutions into the cloud and offers insight into how a cloud service protects your valuable data. Read on to learn more.

  • The Rise of the Super-User

    Sponsored by: Telstra Global

    This exclusive research report takes an in-depth look at what users in the unified communications network find the most helpful, and more. Read on to take the first step towards a better understanding of the future for UC.

  • How SDN Will Enable Automated Network Security

    Sponsored by: Hewlett-Packard Company

    In this expert guide, Dave Shackleford explains how the centralized control enabled by SDN will ultimately result in security-defined routing and other SDN security strategies that could forever change how we defend the network and the applications or data running across it.

  • SDN Security Strategies for Network Attack Prevention

    Sponsored by: Hewlett-Packard Company

    In this expert guide, Dave Shackleford discusses the rise of software-defined monitoring; using SDN for security monitoring and packet analysis; how SDN security strategies tackle network attack prevention; and more.

  • Using Network Flow Analysis To Improve Network Security Visibility

    Sponsored by: Hewlett-Packard Company

    In this expert guide, Michael Gregg explains how security professionals are turning to network flow analysis to gain improved network security visibility.

  • Enterprises Seek Greater Security Through Network Transparency

    Sponsored by: Hewlett-Packard Company

    In this expert guide, Kevin Beaver lists 3 major ways that you can better know and secure your enterprise networks as they grow larger and more complex than ever before.

  • Unlock New Pathways to Network Security Architecture

    Sponsored by: Hewlett-Packard Company

    In this expert guide, Dave Shackleford offers advice on how your organization can make the right network security architecture decisions when it comes to network isolation and segmentation to create a multi-layer attack surface.

  • ESG Lab Video Summary

    Sponsored by: Vectra Networks

    In this lab report from Enterprise Strategy Group, analysts study how the Vectra X-series platform - an inside-the-network cyber attack detection and reporting platform. Read on to learn more.

  • Network Security Redefined

    Sponsored by: Vectra Networks

    Access this white paper to learn how a new solution empowers you with insights to stop attacks, even while they're happening. You'll learn how this platform instantly identifies cyberattack and learns typical network traffic patterns and behaviors while remembering and correlating anomalous behaviors seen over hours, days and weeks.

  • Get the Most From Mobility for Individuals and Workgroups

    Sponsored by: Dell, Inc. and Intel®

    This exclusive white paper explains how mobile computing has made people more aware, agile, and responsive in their personal lives - and how raised expectations in the workplace have real implications for the enterprise. Read on to learn more.

  • Examining the converged architecture solutions

    Sponsored by: Presidio Network Solutions

    Access this white paper to explore why converged infrastructures are gaining popularity and a comparison of different converged infrastructure options and the benefits they can provide.

  • Battle of the Ethernet Switches: Cisco vs. NETGEAR

    Sponsored by: IT Central Station

    Have you ever wondered exactly how many options there are for purchasing enterprise level Ethernet switches? Take a look at this comprehensive list of all enterprise Ethernet switches in this expert report which includes real user reviews from IT professionals, like you.

  • Product vs. Product: Everything you need to know before you buy

    Sponsored by: IT Central Station

    When making a buying decision for Application Performance Management, it can be challenging to know which product is the best fit for you and your organization. To make your decision easier, IT Central Station is offering you a comprehensive, unbiased guide of the most popular APM products on the market today.

  • Product Comparison: Network Performance Monitoring

    Sponsored by: IT Central Station

    With the number of network performance monitoring products on the market, searching for the right one for your organization can be a challenge. With IT Central Station's comprehensive report, you will find IT Professionals' honest opinions about the most popular vendors and products in network performance management today.

  • Take Meeting Collaboration to the Next Level with Microsoft Lync Room System

    Sponsored by: Polycom, Inc.

    Learn how the Polycom® CX8000 and Polycom® CX5100, the 360-degree panoramic room view camera with HD active speaker tracking for Lync 2013, are designed to extend the familiar desktop Lync collaboration experience into the conference room making meetings more effective and engaging

  • Top 10 Ways to Maximize your Lync Investment

    Sponsored by: Polycom, Inc.

    This exclusive white paper takes an in-depth look at 10 ways to maximize your Lync investment.  Read on to learn more.

  • Polycom Solutions for Microsoft UC Environments

    Sponsored by: Polycom, Inc.

    You need a communication solution that anchors fast-moving teams and enables communication from any device, anywhere; and communication tools that integrate with applications you use daily that are managed through a single interface to streamline deployment and speed your return on investment (ROI). Read on to learn more.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics

ComputerWeekly.com Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.