ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Management Protocols Research

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • The Touch-Free Future and Current Adoption Trends of SDN

    Sponsored by: Juniper Networks, Inc.

    There's a significant amount of work needed prior to reaching a future in which no-touch technology is in wide use and SDN security is common. Learn why experts say it's time to transform network change management and security to what is suitable for today's business climate and discover the status of SDN adoption and deployment in the enterprise.

  • Explore the Evolving DDoS Threat Landscape

    Sponsored by: Radware

    Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.

  • Using DNS Monitoring to Detect Network Breaches

    Sponsored by: Dyn

    Numerous DNS monitoring methods exist, but 3 stand above the rest. Access this e-guide for our IT security expert's take on DNS monitoring to detect network breaches.

  • How DNS Information Can Help Cut Millions from Your Infrastructure Costs

    Sponsored by: Dyn

    This expert e-guide explains why DNS intelligence is the key to better network capacity planning and dynamic resourcing. Access now to begin planning to cut your infrastructure costs dramatically in the coming years.

  • Software-Defined Network Security: A 'No-Touch' Approach

    Sponsored by: VMware

    Despite its difficult-to-define nature, SDN security is an achievable goal if you can extend SDN's role beyond enhanced network capability. But to do this, a new touchless configuration policy may be necessary. In this expert e-guide, we discuss what it takes to make this "no-touch" approach a reality.

  • The Path to Network Performance Nirvana

    Sponsored by: Riverbed Technology, Inc.

    This exclusive infographic will show you why you need to enable better visibility into your network performance.

  • Riverbed Advances Visibility into Virtual Data Centers

    Sponsored by: Riverbed Technology, Inc.

    This exclusive whitepaper looks at an upgraded tool that can enhance your visibility into your network.

  • Howe Robinson - Multi-Protocol Label Switched Network

    Sponsored by: Telstra Global

    This exclusive case study examines how one of the largest ship broking companies uses a multi-protocol label switched (MPLS) network solution to provide their global offices with the resources they need to improve productivity, boost operational efficiency, and drive innovation.

  • MarketScope for Unified Communications for the SMB Market, North America

    Sponsored by: Cisco Systems, Inc.

    This exclusive resource examines the current state of the UC market for SMBs, detailing which providers can give your organization the tools and solutions you need to thrive in today's business environment.

  • Turn Inc – Global Communications

    Sponsored by: Telstra Global

    This informative case study examines how a global business was able to extend their high-performance infrastructure to deliver online responses in less than ten milliseconds, regardless of location.

  • Robert Walters - Global IP VPN

    Sponsored by: Telstra Global

    This exclusive case study discusses how a global recruitment firm was able to use a VPN solution to provide branch offices and mobile workers with reliable and high-performing network resources, allowing them to stay connected, productive, and efficient.

  • Network Project of the Year 2014

    Sponsored by: Talari_DON'T USE

    This exclusive resource details how a leading railcar manufacturer utilized a networking tool to maximize availability and prevent costly network downtime. Read on to find out more.

  • Talari Case Study: American Railcar Industries

    Sponsored by: Talari_DON'T USE

    This exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.

  • Live Webinar: Strategies That Work for Advanced Persistent Threat Prevention

    Sponsored by: Palo Alto Networks

    Join this exclusive live webcast on July 10, at 11 AM GMT to take an in-depth look at the state of ATP prevention today and find out how your organization can keep your sensitive data and applications safe.

  • Getting on the Road to SDN

    Sponsored by: NEC Corporation of America

    This exclusive resource discusses how software-defined networking (SDN) can turn your network into an enabler of modern IT environments while eliminating manual processes, configuration inflexibility, and latency challenges associated with device-centric networking.

  • Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Sponsored by: DellEMC and Intel®

    Discover why employing the right intrusion protection solution (IPS) is the critical first – and most important – step to secure your network. Read this paper to learn what features to look for when selecting a next-generation firewall to secure your network and its associated systems.

  • Case Study - Psomas

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study discusses how a consulting engineering firm utilized a network optimization solution to enable their employees to share work and leverage resources wherever they happen to be.

  • Top 5 IT Benefits of the Next-Generation Workplace

    Sponsored by: Aruba Networks

    This guide explores 5 top IT benefits of the next-generation workplace and how with the right network tools in place, you can reap the maximum benefits of mobility.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • Virtualizing the Edge

    Sponsored by: Netsocket

    This exclusive resource discusses an cloud-managed virtual network solution designed specifically for edge deployments that can provide top-notch network performance to distributed environments.

  • A Practical Guide for Moving to 10GbE

    Sponsored by: DellEMC and Intel®

    The data center landscape for many organizations is constantly changing, leading to challenges for IT professionals. This brief guide highlights how 10 gigabit Ethernet (10GbE) technology can be a solution for some of your IT concerns.

  • Netsocket Virtual Network White Paper

    Sponsored by: Netsocket

    This exclusive paper examines how a completely virtualized network infrastructure, combined with powerful SDN-based applications, can help your organization achieve network automation, interoperability with legacy systems, and real business benefits.

  • Delivering on the Promise of SDN & Network Virtualization Today

    Sponsored by: Netsocket

    This informative resource takes a look at both network virtualization and SDN, examining current pain points, technological advances and how you can reduce capex/opex, automate networks and generate new revenue streams.

  • Avaya Fabric Connect Makes Multicast Simple (Really)

    Sponsored by: Avaya

    This podcast introduces an interesting solution to address the concern of legitimate use cases that haven't made multicast routing any less cumbersome to implement. Find out how you can deploy multicast routing a lot simpler using this innovative technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.