Home > Research Library > Technology > Networking

Networking

Networking involves at least two devices capable of being networked with at least one usually being a computer. The devices can be separated by a few meters (e.g. via Bluetooth) or thousands of kilometers (e.g. via the Internet).
Results 176 - 200 of 3460Sort Results By: Published Date | Title | Company Name
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Recent changes in hacking combined with the emergence of the Internet of Everything have profoundly changed how we protect our systems, driving us to think about a new approach to cybersecurity. In this paper, learn about the challenges that created the need for a new threat-centric security model spanning the full attack continuum: before, during and after an attack.
Tags : 
spyware, rootkits, hacking, cisco, advanced threat protection
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Today’s malware authors continue to increase their capabilities faster than security solutions can adapt to them. Whether it’s changing their attacks or hiding malicious code within web pages, it’s more difficult to identify legitimate network traffic. With first-generation network security devices, it is nearly impossible to defend against today’s threats. The situation will get worse before it gets better. Adversaries now utilize agile development and testing methods to develop their malware, they test new malware against the latest security software to increase effectiveness. Next-generation network security devices are emerging that provide the visibility and situational context required to meet today’s threats. These solutions use security automation to provide a sophisticated solution that is both lightweight and agile
Tags : 
malware, cisco, command and control evasion, port hopping, zero-day attacks
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
Modern data centers have and continue to undergo transformation. Driven by familiar trends, green IT, endpoint growth, externalization, and increased resource requirements, modern data centers support more services, users, and data than ever before. The potential of new risks to the modern data center demands renewed attention to data center security. Data center architects must build in proper security controls, and policies and processes to address and mitigate these new risks.
Tags : 
endpoint proliferation, ids, ips, externalization, cisco
    
Cisco
White Paper Published By: Cisco     Published Date: Nov 17, 2014
The desire to invest in antimalware software can be stated simply: avoid malware infection. Malware can create back doors into your network; puts your information, assets, and sensitive intellectual property in peril; and ultimately jeopardizes your business operations, resulting in unspecified collateral damage to your brand. This paper discusses Large-scale data mining technologies, Cloud computing platforms and Deep-seated knowledge of threats facing enterprises.
Tags : 
cloud-computing, malware, cisco, malware infection, amp
    
Cisco
White Paper Published By: Kaspersky     Published Date: Nov 12, 2014
Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.
Tags : 
kaspersky, cybersecurity, cyberattack, hackers, it security
    
Kaspersky
White Paper Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
enterprise networks, aerohive, network structure, wi-fi and networking, networking
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 23, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, networking
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 23, 2014
Unifying cloud and distributed network intelligence creates a completely practical, cost-effective approach to mobility. At Aerohive®, we’ve always done it this way.
Tags : 
wireless networks, controller-less networks, the new mobility, network infrastructures, infrastructure
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : 
creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 23, 2014
Understanding Network Design Considerations for High-Speed Wi-Fi in a Mobile-First Network.
Tags : 
creating a mobile first environment, high speed wi-fi, aerohive 802.11 ac, infrastructure, network architecture
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod, infrastructure, network architecture
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware
    
Aerohive
White Paper Published By: Server Technology     Published Date: Oct 15, 2014
This white paper will “follow the money” and show where the power is being used within your data center facility, along with the effects of changes like increasing the overall temperature within your data center.
Tags : 
server technology, data center power, data center costs, reduce energy, it budget
    
Server Technology
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, it management, mobile data systems
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.
Tags : 
which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This paper aims to facilitate understanding and addressing IT’s dilemma in a bring your own device (BYOD) world.
Tags : 
mobile computing, the increase in mobile workers, byod policy implications for it, mobile data systems, mobile workers
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This paper evaluates the advantages and disadvantages of both the private and public cloud to help you make a more informed decision.
Tags : 
which cloud type is best, public or private cloud, comparing the public and private cloud, mobile computing, mobile data systems
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 14, 2014
This data sheet outlines the main features of Aerohive Networks AP230 Enterprise access points.
Tags : 
aerohive ap230, network infrastructure, aerohive networks, wi-fi security and mobility packages, security
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 14, 2014
A whitepaper on how to enable modern classrooms to deliver immersive, personalised learning experiences, enhance campus productivity, and adopt new curriculum standards.
Tags : 
cloud for education, personalised learning, mobility adoption in schools, mobile computing, mobile data systems
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 14, 2014
Elle permet aux salles de classe d’aujourd’hui d’offrir une expérience d’apprentissage personnalisée et en immersion, d’améliorer la productivité du campus et d’adopter de nouvelles normes en matière de programme d’études.
Tags : 
cloud for education, personalised learning, mobility adoption in schools, mobile computing, cloud computing
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 14, 2014
Moderne Klassenzimmer für immersive, personalisierte Lernerfahrung, bessere Produktivität am Campus und für die Einführung neuer Lehrplanstandards.
Tags : 
cloud for education, personalised learning, mobility adoption in schools, mobile computing, cloud computing
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 14, 2014
A paper on how to make the shopping experience personal, relevant and profitable.
Tags : 
mobile shopping, mobile retail, retail technology, shopping experience, improving the retail experience
    
Aerohive
White Paper Published By: Damballa     Published Date: Oct 03, 2014
Analyst firm Frost & Sullivan advise that enterprises can’t take their eye off network-based threats like bots – the go-to tactic for criminals. Bot detection is essential yet popular technologies like sandboxing can miss advanced threats altogether. This paper reviews: • The importance of detecting and correlating multiple indicators in an automatic, investigative manner • Bot detection methodologies – which are most effective • How Damballa Failsafe, an advanced threat detection system, determines bot intention and nature with certainty
Tags : 
damballa, frost and sullivan, network based threats, detection, advanced threats
    
Damballa
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End


Sub-Categories: Active Directory, Bandwidth Management, Cloud Computing, Colocation and Web Hosting, Convergence, Data Center Design and Management, Distributed Computing, Ethernet Networking, Fibre Channel, Gigabit Networking, Governance, Green Computing, Grid Computing, Infrastructure, Internetworking Hardware, Interoperability, IP Networks, IP Telephony, Load Balancing, Local Area Networking, Migration, Monitoring, Network Architecture, Network Management, Network Performance, Network Performance Management, Network Provisioning, Network Security, OLAP, Optical Networking, Power and Cooling, Quality Of Service, Remote Access, Remote Network Management, Server Hardware, Servers, Small Business Networks, TCP/IP Protocol, Test And Measurement, Traffic Management, Tunneling, Utility Computing, VPN, Wide Area Networks

Search Research Library      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.