network management

Results 151 - 175 of 809Sort Results By: Published Date | Title | Company Name
Published By: Aerohive     Published Date: May 13, 2015
HiveManager NG is a cloud-based, enterprise-class Wi-Fi management solution and is a breakthrough in management simplicity, flexibility, and redundancy.
Tags : 
hivemanager ng, aerohive, wi-fi solutions, network management system, network, how to simplify your wi-fi, wi-fi solutions, network simplification, aps, network security, branch controllers
    
Aerohive
Published By: Aerohive     Published Date: May 19, 2015
The Rimi chain of supermarkets started out in Norway in 1977 as ”RIMI 500”, and was acquired by the Swedish ICA supermarket chain in 1992.
Tags : 
wireless network, network management system, workforce mobility, improvements in stock management, retail, aerohive networks solution, stores with aerohive networks, mobility, aerohive hivemanager
    
Aerohive
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Oracle     Published Date: Jan 28, 2019
Oracle Private Cloud Appliance is a converged infrastructure system designed for rapid and simple deployment of private cloud at an industry-leading price point. Whether customers are running Linux, Microsoft Windows or Oracle Solaris applications, Oracle Private Cloud Appliance supports consolidation for a wide range of mixed workloads in medium-to-large sized data centers. High-performance, low-latency Oracle Fabric Interconnect and Oracle SDN allow automated configuration of the server and storage networks. The embedded controller software automates the installation, configuration, and management of all infrastructure components at the push of a button. Customers need to enter only basic configuration parameters and create virtual machines (VMs) manually or by using Oracle VM Templates to get a full application up and running in a few hours. With Oracle Enterprise Manager, the Oracle Private Cloud Appliance is transformed into a powerful private cloud infrastructure that integrates
Tags : 
    
Oracle
Published By: Laser 2000     Published Date: Mar 12, 2019
Network
Tags : 
    
Laser 2000
Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning, network security, access control, application security, authentication, security management, cloud computing
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security, mobile, cloud computing, social media, mobility, security management, access mangement, identity perimeter, network provisioning, network security, access control, authentication, internet security, web service security, mobile device management
    
CA Technologies
Published By: CA WA     Published Date: Aug 15, 2008
One of the most dramatic innovations in the infrastructure management marketplace in the last five years is the rise of Network Change and Configuration Management (NCCM) as a strategic requirement. This white paper will focus on the strong values that NCCM can bring to reliability, risk and cost management, as well as some of its powerful operational and lifecycle asset values. This report will also introduce the CA SPECTRUM Network Configuration Manager as a distinctive leadership offering.
Tags : 
configuration management, configuration, change management, change, network management, ca wa, computer associates, workload automation, networking
    
CA WA
Published By: CA WA 2     Published Date: Oct 01, 2008
CA's vision is to unify and simplify the management of enterprise-wide IT. The rapidly growing use of virtualization and clustering in enterprise infrastructures provides a rich environment for increasing complexity. Unlike physically bounded infrastructures, the logical entities in virtualized and clustered environments are not visually apparent. Nevertheless, one needs to know what resources one has and if one is using those resources to their fullest capacity.
Tags : 
virtual, virtualization, network management, ca wa, ca wa 2, networking
    
CA WA 2
Published By: CA WA 2     Published Date: Oct 01, 2008
Given the increased complexities and requirements thrust onto data center management environments over time, a more holistic management approach is necessary for efficient and cost effective delivery of IT services. Authors and analysts Judith Hurwitz and Robin Bloor bring their research and extensive experience to light in respect to the state of data center management by building the case for automation as a key strategy for efficient and cost effective management.
Tags : 
datacenter automation, data center automation, network management, ca wa, ca wa 2, it management
    
CA WA 2
Published By: ServiceNow     Published Date: Feb 07, 2012
Download the white paper to find out more about next-gen IT solutions - and how IT in the cloud will help your organization not only keep up with today's complex IT ecosystem, but manage it more efficiently than ever before!
Tags : 
powering, transformation, cloud, investments, integration, access data, performance, revolution, ecosystem, manage, next-gen it, social media, build relationships, improve service, collaboration, post it, tag it, tweet it, like it, facebook
    
ServiceNow
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
As many network administrators initiate their IPv6 migration projects, other IT professionals do not know where to begin. This white paper first describes the importance of securing the network against IPv6 threats well before the introduction of any IPv6 traffic. It then outlines the steps involved to begin securing a transitional IPv4/IPv6 network.
Tags : 
fortinet, fortigatet, ipv6 migration, network security, ipv6 transition, ipv6 translation, performance management, threat management
    
Fortinet, Inc.
Published By: Fortinet, Inc.     Published Date: Jul 27, 2011
Tighter security requirements and ever-faster networks are placing extraordinary demands on UTM platforms. In order to accelerate network traffic while blocking new threats, enterprises must deploy specialized hardware/software security devices.
Tags : 
fortinet, utm platform, unified threat management, network security, ssl vpn, ipv6, network performance management, security content, threat protection, traffic inspection, traffic monitoring
    
Fortinet, Inc.
Published By: IBM     Published Date: Jul 13, 2012
Supporting a dynamic business and resilient IT environment requires effective management of your server infrastructure and network devices. Read this white paper to learn the challenges and solutions for effective management of your server infrastructures and network devices.
Tags : 
ibm, technology, management, infrastructure, white paper, software, business, server, business technology
    
IBM
Published By: Limelight     Published Date: Jul 31, 2012
There are a wide variety of video platforms available, each offering a plethora of features. How do you decide which features you need and the features you don't need? In this paper you will receive ten tips and suggestions on how to make the correct choice for all of your online video platform needs.
Tags : 
limelight networks, limelight, networks, online video platform, video platform, content management, analytics, business technology
    
Limelight
Published By: Riverbed     Published Date: Apr 14, 2017
Whether you’re new to the Amazon Web Services (AWS) Cloud or a long-time user, it is safe to assume what you’re hoping to benefit from - elasticity, reduced time-to-market, and cost effectiveness. Like the many networking folk before you however, you’ll soon discover that the complexity of legacy network management solutions can hold you and the cloud back from delivering what was expected. Rather than leverage router-based systems that can take days to be con?gured and deployed, you want utilize modern solutions that match or enhance the bene?ts ts that the cloud can deliver.
Tags : 
    
Riverbed
Published By: Box     Published Date: Nov 14, 2014
According to the American Community Survey, tele-commuting jumped 79 percent between 2005 and 2012. More than 9 million American workers did their jobs exclusively from home in 2010, according to the U.S. Census, and 30 million work from home at least once a week. And TechCast at George Washington University estimates as many as 30 percent of U.S. private sector workers could be working from home by 2019. For sales professionals, that proportion is certainly higher. The Telework Research Network found in 2011 that 70 percent of those working from home are in management, professional, sales and office jobs. If you’re in sales, you probably spend a considerable amount of time on the go. And why shouldn’t you? Smartphones offer constant, pocket-sized connectivity. Ubiquitous Wifi threatens to render the cubicle obsolete, and the right social networking strategy can sup-plant a hundred individual pitch meetings.
Tags : 
sales, connectivity, smartphones, social networking strategy
    
Box
Published By: Extreme Networks     Published Date: Aug 30, 2016
Organizations looking to deliver a flexible infrastructure that supports new methods of engagement, including customer-facing applications, are turning to cloud for the management of their wired and wireless networks. Discover how to tailor your arguments along a variety of business-aligned pain points and motivations to help you get the backing of key constituents within your organization.
Tags : 
extreme networks, wireless, cloud, cloud networks, networking, network, cloud managed networking, cloud based network, cloud network infrastructure, cloud network architecture, private cloud network, cloud network management, hybrid cloud networking, cloud networking, cloud network solutions, business technology
    
Extreme Networks
Published By: Extreme Networks     Published Date: Aug 30, 2016
The goal of a Cloud-Managed Network is to make deployment, management and control over network infrastructure devices very easy, offset the need for trained IT staff at remote locations or for geographically dispersed organizations, and it provides both OpEx and CapEx savings. This comprehensive white paper provides you with information needed to successfully guide you through the decision-making process of determining the right network for your business.
Tags : 
extreme networks, networking, network, cloud, cloud networks, wireless, cloud managed networking, cloud based network, cloud network infrastructure, cloud network architecture, private cloud network, cloud network management, hybrid cloud networking, cloud networking, cloud network solutions, business technology
    
Extreme Networks
Published By: athenahealth     Published Date: Jun 08, 2015
No matter how these issues are resolved, the new health care reality demands that providers deliver quality care while controlling costs. Use these six steps to bring success to your organization in the new reimbursement landscape: 1. Understand Your Costs 2. Reduce Out-Migration from Your Network 3. Maximize Pay-for-Performance Reimbursement 4. Identify Early Opportunities for Utilization Reductions 5. Support Chronic Care and Disease Management 6. Predict Who Will Develop Issues
Tags : 
aco, accountable care organization, out-migration, pay-for-performance reimbursement
    
athenahealth
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.