network

Results 1 - 25 of 5347Sort Results By: Published Date | Title | Company Name
Published By: TCR Agenda     Published Date: Sep 28, 2016
The Northern Powerhouse Rail Conference (NPRC) is the new companion event to the established and successful TransCityRail North networking dinner.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Sep 29, 2016
Leaders from across the region responsible for devolution, infrastructure investment, supply chain engagement and Northern programmes will use this lively and engaging networking dinner and panel discussion to network with new clients and learn if the strategy for the North from HS2, Network Rail, Operators and more.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Nov 03, 2016
TransCityRail North once again brings together the leaders responsible for delivering the Northern Powerhouse Rail for a lively and engaging conference and networking dinner which focuses on ‘Supply Chain Engagement’. The event has been developed in partnership with Network Rail and Transport for the North (TfN) to engage with suppliers early on about the significant contracts which will become available for the region. During the daytime conference TfN will outline its rail transport strategy for the North of England, and senior managers from Network Rail will be presenting their strategy for procurement and supply chain engagement. Network Rail’s National Supply Chain are using this conference to explain to suppliers how contracts with the infrastructure owner are going to become more accessible, and what’s expected in a post-Brexit world. For more information on the conference download the agenda here or contact the team 0161 833 6320.
Tags : 
    
TCR Agenda
Published By: TCR Agenda     Published Date: Mar 08, 2017
TransCityRail North explains how you can engage with major contractors and the wider supply chain whilst gaining clear, concise and business-critical information on how organisations can do business with the region’s stakeholders and Network Rail.
Tags : 
    
TCR Agenda
Published By: Veeam APAC     Published Date: Apr 26, 2020
"Microsoft Active Directory is the basis for every Microsoft?oriented networking environment. However, it’s not always a solid basis. With thousands of network environments under their belts, Sander Berkouwer (Microsoft MVP) and Veeam’s® Andrey Zhelezko know their Active Directory. Join this webinar to benefit from their best practices, including: - Protecting and (automatically) expiring passwords - Leveraging the Protected Users group and other protections - Using the Active Directory Recycle Bin - Putting Veeam Backup & Replication™ to good use"
Tags : 
    
Veeam APAC
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Jun 25, 2020
The unprecedented expansion of the Industrial IOT network poses grave security concerns with Gartner suggesting that there may be as many as 20 billion devices by 2020. Is your Organization Cyber Resilient to these Security Challenges. Read more on LTI’s Cyber Threat Assessment & Vulnerability Management Approach helped improve Organization Cyber Security Posture for an Oil & Gas Major.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: Intel     Published Date: Jun 01, 2020
The Intel vPro® platform, which spans Intel® Core™ vPro® processors and Intel® Xeon® E3 and E5 processors, includes Intel® Active Management Technology (Intel® AMT). Platforms equipped with Intel® AMT can be managed remotely, regardless of power state or whether an operating system (OS) is functioning. Intel® Endpoint Management Assistant (Intel® EMA) is software that eases the configuration of Intel® AMT and provides a portal for cloud-based management of Intel vPro® platform–based devices on the network. Engineers at Prowess Consulting undertook installation and testing of Intel® Endpoint Management Assistant to validate its functionality and evaluate its ease of use in managing Intel® Core™ vPro® processor–based endpoint devices. We configured an environment to test various use-case scenarios with laptop and desktop machines on wired and wireless routers and public hot spots. We conducted two kinds of testing: • Installing Intel® Endpoint Management Assistant in the test environmen
Tags : 
    
Intel
Published By: Fortinet EMEA     Published Date: May 14, 2020
Corporate DevOps teams are leading the way to the cloud, but many are overlooking the full security implications of the move. If they simply accept the security offerings of their cloud platform, they are likely to leave gaps that attackers can exploit to steal data or infiltrate other areas of the corporate network. There are at least five security areas that security architects need to ensure they have covered when building and managing security in the cloud. Fortinet offers a critical layer of security that integrates with the broader security architecture. It includes solutions for cloud platform security management, native integration of purpose-built security into the cloud platform, as well as web application and application programming interface (API) protection. It also provides integrations that help DevOps teams to automate security tasks in their cloud environments. All these help organizations achieve a consistent security posture and an effective security life-cycle manag
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 14, 2020
Organizations are increasingly deploying a variety of workloads across multiple clouds. In turn, business-critical data and services are increasingly scattered across this distributed infrastructure. Using the shared responsibility model as a guiding principle, enterprises rely on cloud providers to protect the network, storage, and computing layers, while enterprises (end-users) own the security for everything that is built, deployed, or stored in the cloud. Due to multi-cloud adoption, most enterprises maintain heterogenous environments, with tools from each cloud platform differing signi?cantly. For organizations, this results in a complex, nonuniform network security infrastructure. The only viable answer is a uni?ed security solution that runs across multiple cloud platforms. Organizations seeking to deploy applications in the cloud must deploy security solutions that embody three key attributes: 1) native integration with all major cloud providers, 2) a broad suite of security
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 14, 2020
Cloud computing has transformed how we consume and deploy IT solutions. Compute power is rapidly evolving to a utility model, with shared infrastructure at its core. This shared infrastructure underpinning the cloud revolution has also driven a fundamental shift in how we design and deploy technology within the data center. Servers, storage, networks, even the data center itself has moved beyond physical limits to become virtualized services residing on physical hardware. With this new virtual shared infrastructure model, comes new risks. According to IDC, 75% of organizations are implementing or considering the implementation of public cloud. Further, they predict that 50% of enterprise workloads will migrate to public cloud by 2018. At the same time, the threat environment is only expanding, and it is no longer the traditional hacker breaching the network perimeter that drives those who manage network security. Eastwest traffic, traffic between systems inside the network, now dominat
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 14, 2020
Most organizations are in the midst of some form of digital innovation (DI) - leveraging technology to achieve specific goals—and ultimately deliver greater value to their customers. But DI also brings disruption. Disruption in the form of an expanded attack surface and the introduction of a more sophisticated threat landscape. Disruption can also lead to increased complexity as organizations try to counter these new threats with a range of new security solutions. Finally, maintaining compliance with relevant industy and regulatory standards such as the General Data Protection Regulation (GDPR) becomes even more of a challenge. However, despite these issues, one key DI has rapidly going mainstream - software-defined wide-area network (SD-WAN). Unfortunately, SD-WAN is a prime example of the paradox of DI: a transformative technology that can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk.
Tags : 
    
Fortinet EMEA
Published By: Fortinet EMEA     Published Date: May 15, 2020
IT infrastructure modernization is well underway as healthcare organizations need to be more agile in their response to digital transformation initiatives. Legacy architectures simply cannot keep up with the pace of change associated with value-based health and rapidly evolving technical requirements. Constrained IT resources require solutions that improve operational efficiencies and optimize resources. This IDC InfoBrief presents a case study that describes how a customer deployed Fortinet Secure SD-WAN to improve network and application performance while reducing total cost of ownership (TCO).
Tags : 
    
Fortinet EMEA
Published By: Limelight Network     Published Date: Jun 18, 2020
Can your business aff ord to lose $9,000 per minute? According to the Ponemon Institute $9,000 is the average cost of an unplanned outage1 . In some cases the costs are much higher2. The catalogue of cloud outages over recent years is well publicized and reads like a “who’s who” of the technology industry – Amazon3, Google4, Apple5, Microsoft6 – to name a few. No one is immune it would seem. But when it comes to delivering digital content, downtime isn’t the only concern. Today a poor user experience can be just as damaging as an outage. According to Limelight research, 78% of people will stop watching an online video after it buff ers three times7 , and the majority of people will not wait more than 5 seconds for a website to load8.
Tags : 
    
Limelight Network
Published By: Menlo Security     Published Date: Apr 30, 2020
Cloud applications, such as Office 365 and G Suite, offer improved productivity but leave users susceptible to new forms of attacks. Network architectures not configured for direct-to-Internet connectivity cannot adapt to meet these security concerns that arise from greater SaaS adoption. Cloud-delivered security offers many advantages to meet the demands of SaaS and move beyond accepting network security as “almost safe.” A critical component of this modern security architecture is web isolation—the practice of moving the threat of attack away from the endpoint and into the cloud.
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
Zero Trust Internet is the solution for 100% email and web security because it considers all traffic to be potentially dangerous and isolates it, instead of trying to classify email and websites as either "safe" or "dangerous." Menlo Security’s Isolation Core™ embodies the principles of Zero Trust Internet to create a technical milestone in cybersecurity. The Isolation Core™ rewrites incoming web code, removes active content, and safely projects inactive content to end-user devices without lag. All content goes through the same process to ensure full, proactive protection. Download this whitepaper to understand: • How the Zero Trust Internet paradigm creates a safe browsing and email experience • The weakness of traditional network architectures to safeguard the end-user experience • How Menlo Security helped a Fortune 100 company achieve zero malware attacks in six months while adhering to Zero Trust Internet practices with our Isolation Core™
Tags : 
    
Menlo Security
Published By: Menlo Security     Published Date: Apr 30, 2020
In-office employees have always experienced direct connections to a highly secure, highly controlled data center architecture, while a small subset of employees—on average around 10 percent of the workforce—worked remotely through secure virtual private network (VPN) connections. As we transform digitally, remote working becomes a ubiquitous reality, but how does this new way of working alter security and the current IT landscape? Delivering security through the cloud allows organizations to offload Internet traffic from legacy network security architectures such as VPNs and firewalls, while ensuring that security policies are applied consistently to all traffic originating from any user. The Menlo Security Global Cloud Proxy platform with an Isolation Core™ provides this new approach—enabling more robust security for the direct-to-cloud connectivity needed by your new remote workforce. Read this whitepaper to learn: • The inadequacies of traditional VPN architectures • The promise of
Tags : 
    
Menlo Security
Published By: Fortinet     Published Date: Jul 02, 2020
"As digital innovations such as widespread adoption of public clouds transform the very nature of our business, the impacts of these changes on the corporate network are rapidly escalating. To adapt to these changes, many organizations are embracing SD-WAN with its promise to deliver direct cloud access, better application performance, greater agility and lower cost. But while these benefits are achievable, they can all too easily be negated by a failure to consider the inherent security implications of an expanded attack surface, and increased vulnerability to sophisticated, targeted attacks. This White Paper expands on the various benefits and challenges and shows how to navigate a path to successful implementation. Read more."
Tags : 
    
Fortinet
Published By: Fortinet     Published Date: Jul 02, 2020
Behind overall shifts in work culture accelerated by the COVID-19 pandemic, more companies are realizing that their remote work employees have different requirements. Some workers have basic networking needs, while others require more robust solutions. Beyond basic connectivity and security, many organizations are looking to provide the highest level of security and connectivity for certain employees due to either the sensitive nature of their jobs or the connectivity requirements. To meet the needs of those identified as Super Users, organizations should adopt reliable SD-WAN solutions to deliver necessary networking and security capabilities as a unified offering. Read more.
Tags : 
    
Fortinet
Published By: Fortinet     Published Date: Jul 02, 2020
The COVID-19 pandemic has forced organizations to press remote worker programs into action, often with hard lessons learned along the way. All organizations in today’s world must be able to adapt to changing business conditions with little advance notice, and ensure secure remote work is part of a robust business continuity plan. This is not so easy. Organizations wrestling with a remote workforce are learning the limits of outdated integrated firewall and virtual private network (VPN) solutions when it comes to performance and scalability. Many have already seen firsthand that traditional firewalls simply cannot scale across multiple applications required for secure telework—putting further burden on IT teams to upgrade firewalls or install completely separate appliances to keep pace. Read more.
Tags : 
    
Fortinet
Published By: Fortinet     Published Date: Jul 02, 2020
"Segmentation of networks, devices, users, and applications has long been a best practice for supplementing edge security and breaking up flat internal networks. However, for network engineering and operations leaders who prioritize risk mitigation, achieving compliance and effective security posture management, current segmentation approaches fall short. Read more. As multi-cloud, mobile-first, Internet-of-Things (IoT), and other digital transformation initiatives bloat attack surfaces, Internal Segmentation offers a vital new approach. It addresses segmentation’s current shortcomings and is applicable to a wide range of access-control scenarios."
Tags : 
    
Fortinet
Published By: Healthgrades     Published Date: May 12, 2020
19.7 million clinically inappropriate network referrals occur each year. Hospitals are referring out-of-network and to the same provider for any given specialty. Download this infographic to learn the shortcomings of the current healthcare referral system and opportunities to solve these obstacles.
Tags : 
    
Healthgrades
Published By: Healthgrades     Published Date: May 12, 2020
19.7 million clinically inappropriate network referrals occurring each year, contradictions in referral behavior remain a concern. Further, even clinically appropriate referrals can be directed out-of-network for a variety of reasons. Strong physician relationships, supported by successful outreach efforts, keep patients within network for better care coordination. The eBook pinpoints shortcomings of the current healthcare referral system and highlights opportunities to solve these obstacles.
Tags : 
    
Healthgrades
Published By: O2     Published Date: Jun 18, 2020
Even with the best will in the world, IT security set ups often have invisible gaps in their network. That’s because the threat landscape, network, IT infrastructure, and the way people work are all changing so quickly. Find out how you can fill the gaps in our eBook, Closing the Gaps. alongside the abstract.
Tags : 
    
O2
Published By: Zinier APAC     Published Date: Mar 05, 2020
Smart machines are everywhere – in our homes, our driveways, even our power grids and assembly lines. Over the last three years, the number of connected devices has almost doubled, from 15 billion in 2015 to more than 25 billion today. By 2025, that number is expected to eclipse 75 billion. At the same time, wireless data traffic has seen explosive growth. In the United States, mobile data usage increased 54% over the last decade (Mobility Report. Ericsson, 2018). The rise of IoT-connected devices and increasing customer expectations around mobile broadband performance is putting tremendous pressure on existing infrastructure. In response, telecom companies are making massive capex investments in small cell networks.
Tags : 
    
Zinier APAC
Published By: HashiCorp Q1-20     Published Date: Jan 17, 2020
To unlock the fastest path to value in the cloud, enterprises must consider how to industrialize the application delivery process across each layer of the cloud: embracing the cloud operating model, and tuning people, process, and tools to it. In this white paper, we look at the implications of the cloud operating model, and present solutions for IT teams to adopt this model across infrastructure, security, networking, and application delivery.
Tags : 
    
HashiCorp Q1-20
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.