net

Results 1 - 25 of 7799Sort Results By: Published Date | Title | Company Name
By: MessageLabs Australia     Published Date: Aug 04, 2008
Organised crime is joining athletes across the globe in training for the Games. And it's your corporate secrets that are up for grabs. In the past 6 months MessageLabs has intercepted 13 separate Olympic-themed Targeted Trojan attacks across several data-rich industries. With Targeted Trojans on the rise and able to evade conventional security mechanisms, MessageLabs is currently intercepting attacks that exploit the Olympics to appear authentic and attractive, but contain dangerous malware designed to steal corporate secrets.
Tags : messagelabs, olympics, secrets, spyware, virus, trojan, trojans, security, internet security, web security, anti spyware, anti virus, email security
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
The rise of online social networking poses new risks for businesses and new challenges for IT Management. As sites such as Facebook, Myspace and Bebo become evermore popular with end-users, businesses must consider risks such as employee cyber-slacking, reputation damage, broken privacy, identity theft and the threat of virus and spyware infections. This guide will help you reduce the risks of uncontrolled social networking use within the workplace and prescribes seven simple steps for both you and your end-users.
Tags : web security, internet security, social networking, facebook, myspace, my space, social, messagelabs, employee, it management, anti spyware, anti virus, employee performance, productivity
     MessageLabs Australia
By: MessageLabs Australia     Published Date: Aug 04, 2008
At MessageLabs, we understand that deploying best practices in security means working with the people around you - and we'd like to help! Download this free pack of resources to help educate your employees about the latest threats and best practices around email and web security.
Tags : threats, threat, email security, web security, internet security, messagelabs, security, best practices
     MessageLabs Australia
By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Do you have a plan for turning 5G excitement into revenue? Will your 4G pricing strategies still work, or will the market switch to speed tiers, hyper-segmented offers and other new monetization techniques. Download our latest eBook to learn about: The most promising Consumer, Enterprise and IoT use cases The Customer Proposition for each use case How Service Providers can turn new opportunity into revenue
Tags : 
     Matrixx Software - Kingpin
By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
Achieving long-term profitability for 5G will require a major shift in thinking for many operators. Given the investments and capacity upgrades involved, simply treating 5G as just another G is a doomed strategy. Instead, 5G must be seen as an opportunity to re-energize the Telco business model and to move away from traditional commoditized network offerings. Download the discussion paper to learn: Five key questions the Telco C-suite should be asking to drive sustained 5G profitability Why 5G will require a major change in business strategy and IT delivery models How 5G can re-energize the Telco business model
Tags : 
     Matrixx Software - Kingpin
By: Matrixx Software - Kingpin     Published Date: Nov 07, 2019
As 5G is becoming a commercial reality in multiple lead markets, the question of how it should be positioned, packaged and priced will be critical in building competitive 5G propositions. Download the Strategy Analytics report to discover the results from end-user study groups and operator interviews, undertaken to answer a fundamental question: Are Telcos getting 5G right? Learn: How to build a 5G proposition to drive uptake, demand and profitability What consumers want from 5G services Where the opportunities and challenges are for operators, including content, unlimited data, enterprise offerings, network slicing, digital engagement, IoT etc.
Tags : 
     Matrixx Software - Kingpin
By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Anwendungsperformance und Bereitstellung haben sich gendert. Sollten Sie Ihr Netzwerk anpassen? Mit der Cloud ndert sich grundstzlich die Art, wie IT-Teams Anwendungen bereitstellen und deren Performance managen. Anwendungen werden immer hufiger an Standorten fernab der Nutzer installiert. Bei der bertragung werden hufig Netzwerke durchquert, die nicht direkt von der IT kontrolliert werden knnen. Statt in Unternehmensrechenzentren befinden sich viele Anwendungen nun in Public und Hybrid Clouds. Es gibt sogar eine ganz neue Art von Anwendungen: solche, die auf Microservices und Containern basieren.
Tags : 
     Cisco and NVIDIA Corporation
By: Cisco and NVIDIA Corporation     Published Date: Oct 28, 2019
Mithilfe der Kombination aus Citrix Networking und Google Cloud kann die IT verschiedene Herausforderungen in den Bereichen Anwendungsbereitstellung und -management meistern.
Tags : 
     Cisco and NVIDIA Corporation
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
Organizations constantly struggle between embracing technological changes to open up new business opportunities and protecting the business from new challenges and risks. In this paper, well examine containerization and how the adoption of this technology in F5 products affects IT professionals, architects, and business decision makers.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 13, 2019
"The practices of continuous integration, continuous delivery, and continuous deployment offer the promise of safer, faster, and more efficient software development. Critical to realizing this promise is the integration of application delivery and security services into the development and deployment workflows. F5 offers the platform, the integration, and the training to insert industry-leading application protection and optimization services into workflows so that software can be built, tested, and deployed with the services it needs to be secure, fast, and available. Download the solution guide to get all the details. "
Tags : 
     F5 Networks Singapore Pte Ltd
By: SES     Published Date: Aug 01, 2019
Descubra cmo una empresa de comunicaciones est llevando conectividad a las zonas ms remotas de Per. Desde una flota de pesca costera hasta un poblado al que solo se puede acceder en avin, Axesat est entregando soluciones por satlite y cubertura 4G a zonas a las que antes era imposible llegar. El CEO de Axesat describe cmo, en asociacin con SES Networks, la empresa puede aumentar el comercio y la conectividad en Per.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
A diviso digital impede o aproveitamento de todo o potencial das regies carentes do planeta. Neste artigo, o autor mostra como uma rede 5G pode reduzir drasticamente a diviso digital e melhorar as condies econmicas em todo o mundo. Veja como a tecnologia de satlite pode aumentar a conectividade em regies carentes e beneficiar a telemedicina, o emprego remoto e as oportunidades em educao.
Tags : 
     SES
By: SES     Published Date: Aug 01, 2019
Descubra como uma empresa de comunicaes est levando conectividade s reas mais remotas do Peru. De uma frota de pesca offshore a uma vila acessvel apenas por avio, a Axesat est levando solues de satlite e cobertura de rede 4G a reas que eram impossveis de alcanar antes. O CEO da Axesat descreve como a empresa, em parceria com a SES Networks, consegue ampliar o comrcio e a conectividade no Peru
Tags : 
     SES
By: Intel     Published Date: Nov 13, 2019
Intel Select Solutions for BigDL on Apache Spark* accelerates and simplifies deep learning development and deployment on an optimized, verified infrastructure based on Apache Spark*. Intel Select Solutions for BigDL on Apache Spark* combine Intel Xeon Gold processors, Intel SSDs, and Intel Ethernet Network Adapters to empower enterprises to quickly harness a reliable, comprehensive solution that delivers excellent total cost of ownership (TCO) and accelerated time to market.
Tags : 
     Intel
By: Intel     Published Date: Nov 13, 2019
A modern network typically extends from the core data center out to the edge and across multiple public, private, and hybrid clouds. This reality is changing how networks are architected, deployed, and managed. Modern, future-ready networks must bring the scale, reliability, and efficiency associated with the cloud into the enterprise network. This can be done through server-based network virtualization and orchestrated virtual network functions (VNFs) that allow network infrastructures to deliver innovative services with efficiency and ease
Tags : 
     Intel
By: BehavioSec     Published Date: Oct 04, 2019
In this case study, a large enterprise with an increasing amount of off-site work from both work-related travel and a fast-growing remote workforce, is faced with a unique challenge to ensure their data security is scalable and impenetrable. Their data access policies rely on physical access management provided at the company offices and do not always provide off-site employees with the ability to complete work-critical tasks. Legacy security solutions only add burden to productivity, sometimes causing employees to ignore security protocols in order to simply complete their work. Upon evaluating security vendors for a frictionless solution, they selected BehavioSec for its enterprise-grade capabilities with on-premise deployment and integration with existing legacy risk management systems.
Tags : 
     BehavioSec
By: BehavioSec     Published Date: Oct 04, 2019
A well-known global bank was evaluating new ways of strengthening authentication for their High-Net-Worth Individuals (HNWI) to protect their high value accounts. These accounts are under constant attack by sophisticated, targeted fraud attempts. In evaluating behavioral biometric vendors, the bank selected BehavioSec, because of its accuracy and enterprise grade capabilities, to be deployed on-premise and to integrate with its existing security and risk management systems.
Tags : 
     BehavioSec
By: Juniper Networks     Published Date: Sep 26, 2019
Businesses in the Asia-Pacific (APAC) region manage many disparate security tools, frequently without a centralized information management platform. They also suffer a deluge of threat alerts, although only a small percentage of these require further investigation.
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Sep 26, 2019
"Enterprises throughout the world are rapidly digitizing their operations and adopting a multicloud environment. Unfortunately, legacy WAN architecture models often do not provide the scale, flexibility or agility required to support this transition. Enter SD-WAN. No single platform will be able to deliver every piece in the jigsaw for every type of enterprise and every application-specific set of requirements. The key is to select vendor partners whose platforms are sufficiently open, modular and comprehensive in their functionality and components that they will be able to adapt to enterprises increasingly varied, flexible and exacting networking and compute requirements going forward. Only by doing so will they secure the ability to stay ahead in a multicloud future."
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Sep 26, 2019
"SD-WAN largely exists today to support two key enterprise transformations: multicloud and the software-defined branch (SD-Branch). Multicloud has changed the center of gravity for enterprise applications, and with that, has changed traffic patterns too. No longer does traffic need to flow to enterprise data center sites or central internet peering points and breakouts. Thats because most traffic from users and devices in the enterprise campus and branch today goes to cloud-based applications scattered across a host of clouds. Its neither economical nor efficient to haul traffic over WAN-dedicated links to a central enterprise site. So to optimize the cost and performance of multicloud-bound traffic, modern WAN edge routers, often called customer premises equipment (CPE), are now equipped with hybrid WAN links and routing. Hybrid WAN interfaces may include WAN provider-dedicated links such as MPLS, as well as direct internet links over xDSL, broadband and 4G/LTE wireless."
Tags : 
     Juniper Networks
By: Juniper Networks     Published Date: Sep 26, 2019
"This Ovum white paper is sponsored by Juniper Networks. It reveals that organisations need to update and upgrade their cybersecurity postures to defend themselves against today's threats. More than 80% of organisations in Asia are not protected against today's threats. Many of them depend on security investments made years ago, which cannot defend against new and emerging threats. The arrival of new technologies including cloud computing, the Internet of Things, mobility, bring your own device (BYOD), and social media have massively increased attack surfaces and expanded the threat landscape. Over the past two years, there has been a global infestation of ransomware attacks, which have wrought destruction across a growing number of businesses. Crypto-jacking, attacks on critical infrastructure, and data exfiltration are now commonly affecting businesses and consumers alike. The financial impact of these attacks is increasing rapidly and has already cost some organisations hundreds o
Tags : 
     Juniper Networks
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
     F5 Networks Singapore Pte Ltd
By: F5 Networks Singapore Pte Ltd     Published Date: Nov 05, 2019
Please note that this piece of content is in local language.
Tags : 
     F5 Networks Singapore Pte Ltd
By: KPMG     Published Date: Jun 10, 2019
Getting complex decisions right across complicated operational networks is the key to optimum performance. Find out how one of the UKs biggest bus operators is using data and analytics to make better decisions and optimise the use of resources across their network. Read this story to discover: how data and analytics can transform operational performance the benefits of using decision-support tools in the middle office key lessons for getting your plans for digital transformation right.
Tags : 
     KPMG
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.