ComputerWeekly.com Research Library

Powered by Bitpipe.com

Synchronous Digital Hierarchy Research

  • SD-WAN Benchmarking Best Practices for QoS

    Sponsored by: Infovista

    Read this white paper to review key capabilities of QoS systems and find out why it's considered a critical component of smart SD-WAN. Also, learn how to properly compare different QoS products prior to implementation to help determine if they can meet your needs.

  • Security Without Compromise

    Sponsored by: Remediant

    As a result of a mandate, a major U.S. government contractor was in search of a highly-scalable solution that could couple multi-factor authentication and dynamic privileged access – and it had to be efficient and compliant. As it turned out, they were able to get what they needed and more. Take a look at this case study to learn the specifics.

  • Software-Defined Networks are Creating New Challenges for Enterprise Security

    Sponsored by: Palo Alto Networks

    A panel of 300 North American respondents was asked about how they use SD-WAN and what drives their security concerns in those deployments. What were the main drivers for adopting SD-WAN? What benefits have been recognized? How do they plan to consolidate functions with respect to SD-WAN? Read this report to get these answers and more.

  • Thou Shalt Not Pass… I Think?!

    Sponsored by: SolarWinds, Inc.

    Monitoring and managing VPN concentrators and the combined technology within devices like Cisco ASAs, can be challenging. However, organizations are starting to have a better handle on their networks because they can control them with adaptive devices. In this white paper, learn about breakthroughs for monitoring and managing these technologies.

  • Tunnel-Based versus Tunnel-Free SD-WAN

    Sponsored by: Juniper Networks

    SD-WAN enables the kind of connectivity needed in today’s cloud era. However, overlay-based SD-WAN comes with one big caveat: dependence on tunnels. Although these tunnels can make the creation of overlays easier, there are issues. In this research report, learn about the benefits and the option of tunnel-free SD-WAN.

  • Understanding Network TAPs

    Sponsored by: Gigamon

    Network security depends not only on common communication protocols but also on the ability to decipher what’s actually in those packets. There’s a simple solution to this that provides visibility into networked traffic: network TAPs. Read the white paper to gain a full understanding of why TAPs are the most effective way to copy network traffic.

  • Video conferencing standards and interoperability considerations

    Sponsored by: SearchSecurity.com

    Before you can successfully implement a video conferencing system into your enterprise, you must first understand the standards involved to ensure your solution will work with others on your network.  This e-guide uncovers standards and interoperability considerations while also providing migration planning tips.

  • Router Essentials

    Sponsored by: Global Knowledge

    Build a basic foundation of knowledge about routers, the devices that allow you to move packets between networks, by reading this white paper.

  • Seven Steps to Achieving Better Requirements Engineering in Your Organization

    Sponsored by: IBM

    Requirements engineering is about more than just analyzing documenting requirements. It is an important and multifaceted part of systems engineering that broadens the product development process. Companies that successfully introduce a new requirements engineering process don't just change their process and technology; they change their thinking.

  • SIP trunking services close cost gaps around mobility

    Sponsored by: Cox Communications, Inc.

    Most often those evaluating SIP trunking are looking to reduce PSTN access costs. This expert e-guide discusses how and what SIP trunking pros are doing with their network to reduce costs and run an efficient network.

  • SOA Best Practices: The BPEL Cookbook

    Sponsored by: Oracle Corporation

    The Business Process Execution Language (BPEL) Cookbook highlights SOA best practices and challenges, detailing the importance of BPEL and other standards-based technologies in accelerating the adoption of an SOA.

  • SOA Platforms - Evolving to Meet Stringent Market Realities

    Sponsored by: Fiorano Software, Inc.

    This white paper details the evolution of SOA platforms from point products to second-generation architectures such as the enterprise service grid.

  • Solving the Scalability Problem with Big Data

    Sponsored by: WANdisco

    A centralized computing strategy can keep your organization from realizing the value of big data. In this expert e-guide, learn how embracing a more distributed architecture can solve traditional scalability problems and lead to big data success. Also inside, discover the value of NoSQL options.

  • The Swiss Army Knife for the Network Analyst

    Sponsored by: Riverbed Technology, Inc.

    This exclusive case study covers a tool that helped one company with their network and protocol analysis.

  • Virtualization Roadmap: Twists, Turns, and Key Considerations

    Sponsored by: Dell, Inc. and Intel®

    This expert presentation transcript explores key management factors you should consider as you navigate your virtualization initiative, including licensing, memory capabilities, and more. Hear about one company's virtualization roadmap and determine whether it aligns with your own virtualization plans.

  • What Enterprises Should Do About IPv6 in 2011

    Sponsored by: Cisco Systems, Inc.

    The purpose of this white paper is to provide enterprises with guidance, based on a three- to five-year outlook, on how IPv6 should be included in their network design, planning, and operations starting today. The intended audience is enterprise network administrators.

  • What to Look for in Secure Sockets Layer

    Sponsored by: SearchSecurity.com

    This Buyer's Guide helps enterprise security pros get up to date on SSL encryption and aids them in determining what SSL certificate is best for their enterprise security strategy.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences