• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Network
  • /
  • Network Security
flow-image
VMware

How to Achieve Cloud Success with Hybrid Cloud Operations

A hybrid cloud operating model can provide significant benefits for traditional and modernized IT. However, inconsistencies in operations management tools and processes put enterprises at risk. With VMware Cloud Foundation™, organizations build consistency across all layers of their infrastructure with a consistent...

Published: Jan 14, 2021
View More
flow-image
VMware

3 Ways to Make Cloud your Business eBook

The role of IT infrastructure and operations leaders has dramatically changed, and cloud evolution continues to accelerate. Learn how you can keep up by adopting an intelligent cloud management solution without compromising your current activities.  Cloud management software helps you accelerate innovation, gain...

Published: Jan 14, 2021
View More
flow-image
Extreme Networks

How To Turn your Network into a Strategic Business Asset

No matter what industry you serve – education, healthcare, hospitality, government or manufacturing – Extreme Networks Purview has the power to improve business performance with network-powered application analytics. Purview provides more context and insight into what, when, where, and how to ensure the...

Published: Sep 26, 2014
View More
flow-image
Alert Logic

Cloud Security for Amazon Web Services

The AWS Activate Program, designed by Amazon Web Services specifically for startups, provides companies with the resources needed to get started on AWS, including support, training, a startup forum and special offers. 

Published: Sep 03, 2014
View More
flow-image
Sonus

The Learner's Guide to the Sonus SBC 5200™

Some familiarity with basic networking concepts like IP (Internet Protocol) and Internet security are presumed, but the guide is generally intended for non-technical audiences and delivers a fundamental understanding of the role of Session Border Controllers in general and the characteristics of the Sonus SBC 5200 in particular....

Published: Apr 18, 2014
View More
flow-image
Cisco

Building Supplies Distributor Shifts Web Security to Cloud MacArthur

MacArthur Corporation is a distributor of roofing, siding, HVAC, and other building materials for residential and commercial construction. With a basic hub-and-spoke architecture, MacArthur’s network connects the remote sites to the company’s data center in St. Paul for access to all enterprise resource...

Published: Jun 16, 2014
View More
flow-image
Cisco

Key Considerations when Evaluating an Enterprise Collaboration Solution

Collaboration is increasingly becoming recognized as a critical investment for organizations looking for new sources of productivity and innovation. Cost cutting and efficiency measures can achieve only so much; the next breakthrough levels of business performance will come from the ability to tap into the collective knowledge...

Published: Jul 15, 2013
View More
flow-image
Arbor Networks

Cloud Computing: Ensuring Availability for One and All

With cloud computing's paradigm of shared infrastructure, DDoS attacks on a specific target can quickly affect many or all tenants. In this Arbor Insight, we explain why availability should be the top priority for cloud operators, and outlines best current practices for preventing and mitigating attacks.

Published: Mar 13, 2014
View More
flow-image
Riverbed

Virtual Cascade Shark - Enabling Ubiquitous Visibility in Virtualized Enterprises

This paper discusses the lack of visibility in the context of monitoring and troubleshooting end-to-end application performance.

Published: Sep 05, 2014
View More
flow-image
Cisco

Wi-Fi: New Business Models Create Real Value for Service Providers

We truly live in a mobile world. The ITU estimates that there will be close to 7 billion mobile subscribers in the world this year - the equivalent of almost one device for every person on the planet.  Recent research from Cisco revealed that entertainment has shifted to the palms of our hands - almost half of...

Published: Jun 02, 2013
View More
flow-image
Dell

Achieve Deeper Network Security and Application Control (eBook)

Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

Published: Aug 27, 2014
View More
flow-image
Sonus

Creating the 'It Just Works' Video Network

KelCor has been compensated by Sonus Networks to prepare this position document, but the thoughts and opinions are those of the author alone, and KelCor has maintained full editorial control throughout. Sonus specifically sought KelCor’s unbiased views on key challenges organizations face when using video and...

Published: Apr 18, 2014
View More
flow-image
Cisco

Delivering Next-Generation Virtual Workspaces

The traditional approach to managing desktops in a global enterprise has become untenable. Increasingly, geographically dispersed user endpoints, in the form of desktop and laptop computers and personal devices, are making “desktop” management and security nearly impossible. Download this white paper...

Published: Jan 24, 2014
View More
flow-image
AppSense

What are your Options when Performing a Windows Migration?

Support for Windows XP ends on 8 April 2014. Those still using XP have three options; do nothing, purchase custom support, or migrate to Windows 7 or 8. Here we consider the three options and their implications.

Published: Aug 13, 2013
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • ...
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x