ComputerWeekly.com Research Library

Powered by Bitpipe.com

Network Protocols Research

  • 2021 Top Sd-Wan Edge Trends

    Sponsored by: Silver Peak

    SASE, IoT, 5G, AI – these are all important terms to know as they evolve in conjunction with network architecture. The real question is: How will SD-WAN and the edge play their role in enterprise embarkment on these new technologies? What will drive adoption, and why? Immerse yourself in this e-book to learn 8 SD-WAN edge trends.

  • 10 Network Automation Use Cases

    Sponsored by: Gluware

    When organizations begin automating their enterprise networks, top of mind are enhancing network security, increasing agility and ensuring business continuity. Explore this collection of network automation use-cases explores to see how these challenges can be solved by the Gluware Intelligent Network Automation code-free software platform.

  • Automating the Mastercard Network to Increase Security and Agility

    Sponsored by: Gluware

    Mastercard’s former network infrastructure was reliable, but not agile. Because of their large vendor profile, management was a real challenge, as was maintaining a consistent quality of experience. In this webinar, examine how Mastercard found increased security, agility and compliance through network automation.

  • HOW IT DECISION-MAKERS ARE RESPONDING TO COVID-19

    Sponsored by: Aruba Networks

    As the world moves toward a hybrid workplace (employees in between office and remote), IT investments and therefore IT consumption are set to change drastically on a global scale across all industries. Want to see the numbers? View this in-depth report.

  • Cloud-Managed, Distributed Enterprise Networking Is Simpler, More Efficient

    Sponsored by: Infoblox

    The adoption of SD-WAN and SaaS applications by enterprises is driving demand for simpler, more efficient connectivity between distributed locations and applications. But reliance on legacy DDI solutions limits the ability of these locations to fully leverage cloud services. In this white paper, learn how cloud-managed DDI can help.

  • Tunnel-Based versus Tunnel-Free SD-WAN

    Sponsored by: Juniper Networks

    SD-WAN enables the kind of connectivity needed in today’s cloud era. However, overlay-based SD-WAN comes with one big caveat: dependence on tunnels. Although these tunnels can make the creation of overlays easier, there are issues. In this research report, learn about the benefits and the option of tunnel-free SD-WAN.

  • Network Management for IP-based Networks

    Sponsored by: Beta Systems

    In this white paper, explore a high-level introduction to network management in the Auconent Business Infrastructure Control Solution (BICS) for office and industrial networks.

  • A Computer Weekly buyer’s guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Thou Shalt Not Pass… I Think?!

    Sponsored by: SolarWinds, Inc.

    Monitoring and managing VPN concentrators and the combined technology within devices like Cisco ASAs, can be challenging. However, organizations are starting to have a better handle on their networks because they can control them with adaptive devices. In this white paper, learn about breakthroughs for monitoring and managing these technologies.

  • Four Dimensions of Network Monitoring

    Sponsored by: AppNeta

    Your network spans multiple cloud providers, third-party services, and an always-growing web of remote locations. Does your team have the comprehensive visibility to tie it all together? Download this quick checklist to ensure that you have all the data and insights you need to manage your network effectively.

  • Border Gateway Protocol: The Roadmap to the Internet

    Sponsored by: AppNeta

    Monitoring BGP data gives enterprise IT visibility into the high-level networks and Autonomous Systems that an app may traverse on its path to delivery. In this white paper, learn how AppNeta helps teams put this data to use.

  • SD-WAN Benchmarking Best Practices for QoS

    Sponsored by: Infovista

    Read this white paper to review key capabilities of QoS systems and find out why it's considered a critical component of smart SD-WAN. Also, learn how to properly compare different QoS products prior to implementation to help determine if they can meet your needs.

  • A Computer Weekly buyer's guide to perimeterless network security

    Sponsored by: ComputerWeekly.com

    Perimeterless network security is expanding the horizons of businesses looking to protect their data. In this buyer's guide, we look at how a secure perimeterless digital workplace is best achieved, explore the previous barriers perimeterless security can overcome and assess how traditional network security can be banished to the past.

  • Focus: Network security

    Sponsored by: ComputerWeekly.com

    During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.

  • How to enhance your network for the future

    Sponsored by: ComputerWeekly.com

    The world of networking is broad in its scope, and touches on almost every other aspect of enterprise IT.

  • How SSL-Encrypted Web Connections are Intercepted

    Sponsored by: SearchSecurity.com

    In this expert e-guide, uncover 4 key strategies for defending against illegal TLS/SSL-encrypted Web connection interception. Learn how these cyber-attacks work, the challenges of digital certificates, SSL-interception tools, and more by reading on now.

  • Improve BYOD with the Bonjour Protocol

    Sponsored by: Aerohive Networks

    This E-Guide from SearchNetworking.com explores how the Bonjour protocol can help you handle the Apple devices wishing to access your enterprise networks and systems. In addition, uncover the importance of defining a proper BYOD policy.

  • What to Look for in Secure Sockets Layer

    Sponsored by: SearchSecurity.com

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

  • The Swiss Army Knife for the Network Analyst

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study covers a tool that helped one company with their network and protocol analysis.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • Adaptive Packet Filtering

    Sponsored by: Gigamon

    This white paper explores many technical processes of adaptive packet filtering, including filtering on FCoE traffic, mutli-encap filtering, and much more.

  • Extreme Networks Solution with NEC

    Sponsored by: Extreme Networks

    Explore how using a 1 GbE, 10 GbE, or 40 GbE hardware plane is critical to achieving the interoperability and multi-site capabilities needed for a successful software-defined networking (SDN) initiative.

  • OpenFlow and SDN: What's in Store?

    Sponsored by: Big Switch Networks

    This expert e-guide explores the top factors driving the adoption of OpenFlow and software-defined networking (SDN) technology in the campus network, as well as the benefits you can realize with this strategy – including improved security, effective BYOD management, and more.

  • IPv6 Addressing Plan Basics

    Sponsored by: Infoblox

    Creating an IPv6 addressing plan is one of the most important pre-adoption tasks you have. This white paper details the technical and business requirements of deploying IPv6 and also provides a sample plan. View now to learn more!

  • Computer Weekly – 19 March 2013: Delivering software development success

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we talk to IT leaders about successful software development, and how they combine the best of agile and waterfall methods. Drugs giant AstraZeneca talks about how it changed its outsourcing approach to eliminate past mistakes. And we look at a new social media bank that is shaking up the sector. Read the issue now.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences