network traffic

Results 1 - 25 of 171Sort Results By: Published Date | Title | Company Name
By: Intel     Published Date: Aug 26, 2019
Distributed cloud architectures will play an important role in Communication Service Providers’ network transformations. The distributed cloud will be made of numerous edge locations, from the customer premises to mobile base stations to central offices, each of which has its benefits and constraints. CSPs will need to consider attributes such as performance, availability, security, integration, and data and traffic volume to optimize the infrastructure for a myriad of workloads. Learn more about Heavy Reading’s survey results on CSPs adopting a distributed cloud strategy and delivering new services in this white paper.
Tags : 
     Intel
By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that today’s cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff don’t get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with “blind spots” in data collection. Read this business brief in local language to find out how
Tags : 
     Gigamon
By: Gigamon     Published Date: Sep 03, 2019
Your organization depends on all kinds of inline tools to keep your network up and running, but those same tools can fail, leaving you vulnerable. Moreover, as network speeds increase, slower tools can bottleneck network traffic, making organizations purchase more and more tools, which then introduce complexity and cost. There is a better way to increase network resiliency while reducing security issues, and that’s inline bypass.
Tags : 
     Gigamon
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
As networks become decentralized and users connect directly to SaaS applications, backhauling traffic to apply security policies just isn’t efficient. Plus, backhauling internet bound traffic is expensive, and it adds latency. More and more branch offices are migrating to direct internet access (DIA). Find out how to quickly and easily secure this traffic.
Tags : 
     Cisco Umbrella EMEA
By: Cisco Umbrella EMEA     Published Date: Sep 02, 2019
Users are working off-hours, off-network, and off-VPN. Are you up on all the ways DNS can be used to secure them? If not, maybe it’s time to brush up. More than 91% of malware uses DNS to gain command and control, exfiltrate data, or redirect web traffic. Because DNS is a protocol used by all devices that connect to the internet, security at the DNS layer is critical for achieving the visibility and protection you need for any users accessing the internet. Learn how DNS-layer security can help you block threats before they reach your network or endpoints.
Tags : 
     Cisco Umbrella EMEA
By: Flexential     Published Date: Jul 17, 2019
In a data environment that’s become increasingly centralized by public cloud services, the “edge” is emerging as a critical solution for reducing latency for network-based services. Consumption habits of services and the need for analytics are shifting beyond core population centers, becoming local and even hyper-local within a region or city. As the online population continues to grow and new services emerge, the ability to handle data traffic securely – close to the customer or application – will become a common pattern for the new service evolution.
Tags : 
     Flexential
By: Coyote Point Systems     Published Date: Sep 02, 2010
The idea of load balancing is well defined in the IT world: A network device accepts traffic on behalf ofa group of servers, and distributes that traffic according to load balancing algorithms and the availabilityof the services that the servers provide. From network administrators to server administrators to applicationdevelopers, this is a generally well understood concept.
Tags : coyote point, adc, buyer's guide, web applications, server load, server hardware, networking, virtualized network, vlb advanced, load balancing, network architecture, servers, traffic management, cloud computing, data center design and management
     Coyote Point Systems
By: Apstra     Published Date: Aug 19, 2019
Yahoo Japan Corporation, one of Japan’s largest Internet service providers, is deploying Clos fabric networks for efficiently addressing their ever-growing data center traffic. Apstra® was selected for streamlining the design, build, and operations of these networks.
Tags : 
     Apstra
By: Cisco     Published Date: Dec 11, 2018
The Cisco SD-WAN solution is a cloud-delivered overlay WAN architecture that enables digital and cloud transformation at enterprises. It significantly reduces WAN costs and time to deploy new services, and, builds a robust security architecture crucial for hybrid networks. Enterprises today face major user experience problems for SaaS applications on account of networking problems. The centralized Internet exit architecture is inefficient and results in poor SaaS performance. And branch sites are running out of capacity to handle Internet traffic which is a concern because more than 50% of branch traffic is destined to the cloud. More importantly there are many dynamic changes in Internet gateways and the SaaS hosting servers that lead to unpredictability in performance. The Cisco SD-WAN solution solves these problems by creating multiple Internet exit points, adding high bandwidth at branch locations, and dynamically steering around problems in real-time, resulting is an optimal SaaS
Tags : 
     Cisco
By: HERE Technologies     Published Date: Jan 22, 2019
Rising urbanization has brought unprecedented levels of traffic and congestion to our major towns and cities. Departments of transport are battling to ensure their regions aren’t negatively impacted by increased pressure on their road networks. On the frontline are traffic operators and planners. Every day, they face complex challenges as they attempt to improve traffic flow, minimize incidents, and unearth solutions to network issues. This eBook explains how traffic planners and operators can use data to help overcome some of the challenges they face.
Tags : public sector, urbanization, traffic management
     HERE Technologies
By: HERE Technologies     Published Date: Jan 22, 2019
To improve safety and mobility across its 5,600km road network, the City of Toronto forged a partnered with HERE Technologies for the provision of traffic, incident, and historical traffic data. Access to this data allows the city authority to see exactly what’s happening on its roads and more easily and affectively run studies on improvement projects. This case study details how HERE Technologies enabled the City of Toronto’s transportation team to: Work smarter with comprehensive network coverage and accurate data to aid analysis Examine the impact of city projects without significant forward planning or expenditure Ensure travel volume models used to drive decision making are calibrated to represent real-world truths
Tags : public sector, urbanization, traffic management
     HERE Technologies
By: Cisco EMEA     Published Date: Nov 13, 2017
In the not so distant past, the way we worked looked very different. Most work was done in an office, on desktops that were always connected to the corporate network. The applications and infrastructure that we used sat behind a firewall. Branch offices would backhaul traffic to headquarters, so they would get the same security protection. The focus from a security perspective was to secure the network perimeter. Today, that picture has changed a great deal.
Tags : malware, ransomware, compromised accounts, malicious insiders, visibility, coverage, data breaches, compliance
     Cisco EMEA
By: Cisco     Published Date: Jul 08, 2016
This white paper can help you confirm that your small business or distributed enterprise needs to invest in an effective next-generation firewalls (NGFW) solution. For small businesses, the NGFW should provide an affordable and manageable entrée to advanced threat protection. In branch offices and the distributed enterprise, NGFWs should provide a detection and enforcement point, analyzing real-time threats and network traffic at scale and benefiting from an integrated and holistic view of the network of which it is a part. In both use scenarios, the NGFW should help your organization defend against targeted and persistent malware attacks, including emerging threats.
Tags : 
     Cisco
By: Gigamon     Published Date: Oct 19, 2017
Download the Forrester Total Economic Impact™ of Gigamon: Cost Savings and Business Benefits Enabled by Gigamon to see how customers benefit from comprehensive and scalable visibility across their networks. This study delves into a cost-benefit analysis of the Gigamon security delivery platform, network visibility and traffic monitoring solutions that enable companies to see what matters in order to meet their security objectives, increase productivity and keep hardware, software and personnel costs in check without affecting performance.
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 19, 2017
Read SC Magazine’s original research article Double Vision to learn how visibility deep into network activity and analysis of network traffic can show breaches before serious damage is done. While monitoring network traffic is hardly a new or unique technology, it is an excellent example of how visibility works. Constant vigilance of network activity is simply the best way to determine if any semblance of an attack still resides on your network. Download now!
Tags : 
     Gigamon
By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
     Gigamon
By: Limelight Networks     Published Date: Mar 02, 2018
In the increasingly competitive OTT market, competition for viewers is high. Providers must find ways to not just deliver compelling content, but to deliver compelling viewing experiences. In this whitepaper, you’ll learn about the critical challenges facing OTT providers today and how they can be overcome to provide the broadcast quality experiences viewers expect, regardless of the device in use or the viewers location in the world. Are you ready to keep your subscribers happy and away from your competition? Download this free white paper OTT 3.0: How to Build a Better Mousetrap and learn: Why personalized content discovery is so important to viewers – and to the success of your business How to avoid internet congestion by leveraging technologies like a CDN The importance of global network scale to meet spikes in consumer traffic The impact of advertising on viewer abandonment
Tags : content delivery network, cdn, digital content delivery, mobile delivery, global content delivery, live streaming, video on demand, video delivery, ott, over the top content delivery, ott subscription, ott channels, ott service
     Limelight Networks
By: Fortinet EMEA     Published Date: Nov 26, 2018
Enterprises currently face challenges regarding the price, performance, and flexibility of traditional wide area networks (WANs). Aggressive growth in the adoption of public cloud services (a projected 86% spike between 2014 and 2018)1 is forcing organizations to look elsewhere for a more effective network solution to address distributed traffic across remote sites and branch offices. Some of the specific issues organizations face with their traditional WANs include: - High total cost of ownership (TCO) - Lengthy provisioning cycles - Performance degradation with the growth of cloud traffic - Inadequate redundancy and resiliency - Lack of application-aware connectivity To better manage WAN investments, enterprises are adopting a new approach for their distributed branch office networks. Software-defined WAN (SD-WAN) offers improved performance, agility, and operational flexibility plus significant cost savings. But not all SDWAN solutions are created equal.
Tags : 
     Fortinet EMEA
By: Websense     Published Date: Apr 09, 2013
Most security effectiveness tests take a sample of known malicious content, and see how many threats each solution can catch. Unfortunately, stopping known threats — those with a known signature, reputation or destination — isn't enough to protect real-world networks. So we designed a new test, along with leading independent test laboratory Miercom*, that simulates a typical day on a network like yours. We put a large sample of web traffic of unknown nature through our TRITON-powered Websense® Web Security Gateway solution, along with competing web gateways and firewalls. Each solution had a fair and equal chance to analyze, classify and block threats as it would on your network.
Tags : miercom, security, effectiveness, report, protect, network, threats, solutions
     Websense
By: Nokia     Published Date: Mar 03, 2016
This white paper reveals how extensive deployment of video surveillance places heavy demands on network resources. The mission-critical network must therefore be able to support the high-bandwidth required by video traffic efficiently, with multiple stringent QoS levels.
Tags : ip cctv, nokia, ip video cameras, video, video management, video management system, ip video traffic, ip cctv system architecture, network, cctv, mission-critical network, video streams, mobile video stream, bandwidth management, ethernet networking, ip networks, ip telephony, network architecture, network management, mobile computing
     Nokia
By: Blue Coat Systems     Published Date: Jun 26, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.
Tags : network, bandwidth, saas, application, optimize traffic, performance, technology, cloud, networking, security, enterprise applications, data management
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Jul 18, 2013
Does your network bandwidth usage align with business goals?  This white paper highlights the challenges of ensuring SaaS application access and performance. It discusses the pros and cons of popular approaches and explains how you can control, prioritize and optimize traffic so that business-critical applications have the performance users need.     
Tags : cloud, applications, network, bandwith, saas, infrastructure, network performance management
     Blue Coat Systems
By: Blue Coat Systems     Published Date: Aug 12, 2013
The use of SSL encryption for all enterprise Internet traffic is growing steadily. Applications that make use of SSL – such as SharePoint, Exchange, WebEx, Salesforce.com and Google Apps – are commonplace. Even email applications like Gmail, Yahoo, and Zimbra are being used in workplace environments as hosted email or BYOD apps. It’s clear that organizations now need complete visibility into the SSL traffic coming across the WAN. They need the ability to preserve complete network and web histories from encrypted network and web traffic for compliance, regulatory and logging requirements. Blue Coat has solutions today to address the SSL dilemma.
Tags : blue coat, ssl, ssl visibility, server hardware, servers, small business networks, service management
     Blue Coat Systems
By: Venafi     Published Date: Mar 26, 2015
Gartner expects that by 2017, more than 50% of network attacks will use SSL/TLS. Yet most organizations lack the ability to decrypt and inspect SSL communications to detect threats. The ability to quickly decrypt and inspect SSL traffic in real time to detect threats is imperative. Download this Solution Brief: Eliminate Blind Spots in SSL Encrypted Traffic to learn how.
Tags : blind spots, ssl encrypted traffic, network attacks, tls, decryption, security threats
     Venafi
By: Rohde & Schwarz Cybersecurity     Published Date: Nov 28, 2017
When your solution needs deep packet inspection (DPI) application awareness as a key enabling feature, highly reliable and accurate identification of network traffic and applications - in real time - is an expected requirement. Whether it’s for software defined networks to enable policy control and critical traffic steering or to protect corporate networks, IoT devices, and cloud platforms from malicious attacks, it’s crucial to choose the right DPI solution.
Tags : signatures, cybersecurity, dpi, frameworks, automated, application, customers, benefits
     Rohde & Schwarz Cybersecurity
Start   Previous   1 2 3 4 5 6 7    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.