ComputerWeekly.com Research Library

Powered by Bitpipe.com

Networking White Papers

  • How To Improve Guest Experience and Hotel Staff Productivity With Unified Communications

    Sponsored by: Spectrum Enterprise

    To enable a connected workforce, many hotels still rely on legacy technology, using two-way radios. Unfortunately, these devices are not secure and are often unreliable. In this white paper, learn how to improve communication and collaboration among hotel staff to increase efficiency in addressing guest and operation issues.

  • Why 56% of Large Businesses are Turning to SDN for Cybersecurity

    Sponsored by: Verizon

    Cybersecurity is a critically important issue for companies. In this resource, learn how software-defined networking (SDN) can enable organizations to virtualize and automate their network operations which, offers businesses a valuable new means to enhance their security.

  • What the union of IoT and edge computing means for IT pros

    Sponsored by: IoTAgenda

    Cloud computing is not allowing IoT projects to live up to their full potential, especially when it comes to real-time analytics, monitoring and management. That's why IoT and edge computing are joining forces. In this handbook, explore the potential benefits of combining IoT and edge computing.

  • What You Need to Know About Edge Computing Architecture

    Sponsored by: SearchNetworking.com

    Work is more distributed than ever. Remote end users and branch offices routinely ping data back and forth, and that's a lot of activity happening away from the network core. In this handbook, learn how networking professionals can take advantage of an edge computing architecture by decentralizing data centers and locating them closer to end users.

  • Shake the Box: How to Get Encrypted Traffic Insights Without Decryption

    Sponsored by: Corelight

    The most advanced security teams rely on network traffic as a fundamental data source for security investigations, but encryption has made that increasingly difficult. In this white paper, learn how the open-source Zeek framework (formerly called 'Bro') was purpose-built for network security monitoring.

  • Why 1 Company Replaced their VPN with a Software Defined Perimeter

    Sponsored by: Cyxtera

    Verdant is a consulting, hosting, and software solutions firm. They wanted to replace their VPN and achieve 2 main goals: Get granular control of remote network access across offices and get support for remote employees' work while at customer sites or travelling. Find out how they did that with Cyxtera in this case study.

  • The Future Mode of DDoS Attack Mitigation

    Sponsored by: Nokia

    Download this white paper to learn about a new tool designed to protect your network from DDoS attacks no matter what, and find out how leveraging peering routers equipped with Nokia's FP4 routing silicon helps mitigate volumetric attacks.

  • Open Source Network Security Tools for Beginners

    Sponsored by: AT&T Cybersecurity

    In this white paper, get an overview of some of the leading open source tools as well as tips on how to use them for network security.

  • The Basics of Auditing and Securing Your Network Perimeter with SIEM

    Sponsored by: ManageEngine

    To thwart network attacks, you first need to be on top of critical security events occurring in your network. But due to the high volume of events, auditing these events in real time can be challenging, if not impossible. In this white paper, learn about the basics of auditing and securing your network perimeter by leveraging SIEM.

  • The Road to Modern SD-WAN Management: An Answer for an Internet-Connected World

    Sponsored by: Open Systems Technologies

    SD-WAN is the modern WAN management answer to an Internet-connected world. It provides the agility, simplicity, scalability, and security to enable digital growth anytime, anywhere. In this interactive resource, explore the benefits of a secure SD-WAN.

  • The Combination of Security and Agility: Managed Secure SD-WAN

    Sponsored by: Open Systems Technologies

    Managed SD-WANs make it easy for global companies to set up global communication infrastructures. However, SD-WANs need to be protected against cyberattacks, and security risks caused by operating errors need to be reduced. In this article, learn how companies can achieve this by using managed SD-WAN with integrated security services.

  • Using SD-WAN to Enhance your Security Posture

    Sponsored by: Open Systems Technologies

    The use of SD-WAN is dramatically increasing, and in many cases, it is a means of reducing network complexity that can create vulnerabilities. However, SD-WAN is just the starting point for reducing risk. Download this white paper to learn more about the benefits of secure SD-WAN today.

  • SD-WAN: A Lower Cost, Higher Performance, Agile Network

    Sponsored by: Mosaic Networx

    In this white paper, learn about Mosaic NetworX's Managed SD-WAN and how it pairs with VMware VeloCloud to deliver enterprise-grade WAN connectivity.

  • Direct Internet Access (DIA): Rethinking WAN for the Cloud Era

    Sponsored by: AppNeta

    This white paper examines Direct Internet Access (DIA) as a fast, secure alternative to MPLS that pairs well with SD-WAN deployments. Learn about the pivotal considerations that come into play when deciding to move forward with DIA so that you can maintain network security and performance.

  • 3 Essential Pillars of Comprehensive Network Performance Monitoring

    Sponsored by: AppNeta

    In this white paper, learn about the 3 essential pillars of comprehensive performance monitoring so that you can drive deeper visibility into your network and measure the user experience that it creates.

  • Combine DDoS and TIG Functionality for Insider Threat Protection

    Sponsored by: NetScout Systems, Inc.

    As the architecture of enterprise networks changes, so too do the increasingly sophisticated and persistent techniques of attackers. So how can you protect yourself? Learn about a tool that combines DDoS attack protection and a threat intelligence gateway (TIG) to help protect you from all types of threats.

  • Secure SD-WAN: Helping CIOs Meet their Goals

    Sponsored by: Open Systems Technologies

    A recent study shows that 85% of organizations are considering implementing SD-WAN, but moving too fast to deploy can invite unwanted risks so it's best to move ahead a clear plan in place. In this white paper, find out what CEOs and boards are talking about with CIOs when it comes to their most pressing concerns for getting SD-WAN-ready.

  • SD-WAN Simplified: What is SD-WAN?

    Sponsored by: Mosaic Networx

    In this resource, look beyond the buzzword and get the facts about what SD-WAN is and how it's rapidly growing across enterprises the world over. Find out how to control network costs while improving upon MPLS connectivity, centralizing network management, and promoting network agility.

  • DNS Monitoring and What it Means for the Enterprise

    Sponsored by: AppNeta

    DNS is part of your network's backbone, and as a result, it's inherently tied to your network's performance, its security, and – ultimately – the user experience that it delivers. Find out how you can effectively monitor DNS performance across all of your locations so that you can identify and resolve issues before they negatively impact end users.

  • Why a SaaS Approach to Network Performance Monitoring Fits in the Cloud Era

    Sponsored by: AppNeta

    This white paper explores how to prepare and optimize your network so that you can drive visibility into and take control of SaaS app performance. Learn about cost-effective network performance management designed to monitor all of your SaaS resources, even if they're spread across 10,000 locations or more.

  • 5 Ways Extreme Networks Delivers Digital-First Networking for Retail

    Sponsored by: Extreme Networks

    Creating meaningful connections with your customers can be incredibly difficult – both in-store and online. Discover 5 ways that Extreme Networks is trying to help retailers overcome their unique IT pain points and achieve digital transformation goals.

  • Building on Digital Foundations to Enhance the Changing Workplace

    Sponsored by: Aruba Networks

    Learn how Aruba Networks allowed the Finnish Institute of Occupational Health (FIOH) to ensure seamless mobility throughout all office environments, maintain network security and GDPR compliance, and more.

  • Extreme Virtual SLX Software

    Sponsored by: Extreme Networks

    In this solution brief, learn about Extreme Networks' Virtual SLX (vSLX) that provides a virtualized instance for their switching & routing product line with support for MPLS, BGP, EVPN, and VXLAN.

  • MicroScope - May 2019: Packaged services – the global shift towards virtual distribution

    Sponsored by: MicroScope

    In this month's issue, we cover changes in distribution and the challenges being faced by those aiming to add value.

  • Unified Aruba Network Architecture Underpins Mobile Innovation at City of London

    Sponsored by: Aruba Networks

    This case study explores how the City of London facilitated remote working and greater collaboration by rolling out Office 365 for 4,000 employees across 120 locations. Find out how they supported the intense networking demands of the cloud app to enable greater workforce productivity.

Browse by Report Type: Networking White Papers | Networking Multimedia | Networking IT Downloads

See more topics related to: Networking

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.