Verizon

Displaying 1-40 of 80 results

  • White Papers // Jan 2014

    Dynamic Cloud and Intelligent Networking: What they Mean for the Future of Business

    The most cutting-edge organizations are leveraging dynamic cloud and intelligent networking solutions to improve operations from top to bottom. These dynamic tools help optimize everything from sourcing to production to logistics to sales. However, implementing a dynamic cloud and an intelligent network isn’t an out-of-the-box fix. Organizations must have a...

    Provided By Verizon

  • White Papers // Dec 2013

    BYOD: Challenges, Opportunities and How to Make it Work

    CBS Interactive recently assembled a group of senior IT executives for a Verizon-sponsored roundtable to discuss BYOD and its impact on the businesses and the IT landscape. The group discussed the opportunities associated with BYOD, including increased collaboration, the ability to telecommute, and ease-of-use for employees. They also discussed the...

    Provided By Verizon

  • eBooks // Nov 2013

    E-Guide: Intelligent Networking: reliable, robust, resilient, redundant, and really, really fast

    The numbers are truly breathtaking. Verizon estimates that by 2016, there will be three devices for every person connected to the Internet. By 2020, there will be 50 billion (with a “B”) connected devices. With data sources including video, audio, photographs, live fitness data, all that mobile data, and machine-to-machine...

    Provided By Verizon

  • Case Studies // Sep 2013

    Machine-to-Machine Technology Roundtable: The CIO Perspective

    Objects connected directly to the Internet, dubbed machine-to-machine, or M2M, technology provide a plethora of possibilities for organizations. Machines communicating directly with other machines with minimal human intervention poses exciting possibilities that will change the technology landscape significantly over time. The most interesting thing about M2M technology is that...

    Provided By Verizon

  • eBooks // Jul 2013

    E-Guide: 4G LTE: transforming the mobile workforce

    4G LTE technology has been around for less than four years and has already made a huge impact on mobile computing. Just imagine the innovations that will be possible in the next four years. This isn't just about making you more competitive, it's about opening new vistas and new opportunities....

    Provided By Verizon

  • eBooks // Jun 2013

    eGuide: M2M: Changing the way we live and do business

    Machine-to-machine communication (M2M) is all about protecting people, making services more responsive, business offerings more profitable, and ensuring that money, gasoline, and time can be conserved rather than wasted. By leveraging a massive, secure wireless network, machines across disparate locations (from the middle of a city to a remote...

    Provided By Verizon

  • White Papers // Jan 2011

    Network 2020: Connecting Everyone to Everything

    It's unimaginable that just 10 years ago, mobile phones and Internet access were limited to the privileged few. In fact, the percentage of users worldwide who had a mobile phone or access to the Internet was near the single digits. Being relatively new technologies to consumers, mobile phones and the...

    Provided By Verizon

  • White Papers // Dec 2010

    Data-Centric Vulnerability Management

    The "Security" of an application means different things to different audiences. Were secure coding techniques used? Was the application deployed on appropriately hardened servers? Do network or other infrastructure flaws allow users to bypass application controls? Does the application expose sensitive information without appropriate safeguards? Great questions, but they really...

    Provided By Verizon

  • White Papers // Dec 2010

    Navigating the Road to Smart Grid: Modernizing the Critical Communication Infrastructure

    Every day, utility industry employees deal with a frustrating, double reality. On the one hand, they work in an industry that powers the digital age. On the other hand, many utility operations and systems are dependent on old-fashioned, largely analog technologies. Of course, much of this situation has been influenced...

    Provided By Verizon

  • White Papers // Nov 2010

    Escaping from Microsoft's Protected Mode Internet Explorer

    The level of protection offered by Protected Mode Internet Explorer is not well understood and there are common misconceptions about its status as a security feature. This research set out to discover the full extent of how Protected Mode can protect users from zero-day memory corruption vulnerabilities in Internet Explorer...

    Provided By Verizon

  • White Papers // Nov 2010

    Computing as a Service - Securing our Enterprise Class Cloud

    Cloud computing is fast becoming a viable option for companies searching to run their IT organizations more efficiently and for good reason. With it, companies can gain potential competitive advantages that could make a real difference: shorter time to market, services that can be quickly turned up or down, and...

    Provided By Verizon

  • White Papers // Oct 2010

    Mobile Devices And Organizational Security Risk

    Mobile devices are ubiquitous - almost everyone has one (or more). Mobile device usage is steadily growing as the technology in mobile devices becomes increasingly more powerful and universal. Mobile phones are continually adding storage capacity, processing power, battery lifetime, and display abilities while consistently reducing the size of the...

    Provided By Verizon

  • White Papers // Oct 2010

    Interoperability for Emergency Services

    A major rush hour accident on a suspension bridge involves an oil tanker truck and numerous civilian vehicles. The firefighters are first on the scene and notice that the bridge is structurally damaged, but because the police are using a disparate communication system, there is no way for these groups...

    Provided By Verizon

  • White Papers // Sep 2010

    There Is No SMART in Smart Grid Without Secure and Reliable Communications

    One of the smart grid's vulnerabilities stems from its reliance on wireless two-way communication among an increasing number of intelligent, connected devices, including smart meters and, eventually, smart appliances. Smart interfaces help utilities use this data to integrate distributed energy and demand response resources. But to maintain the security i.e.,...

    Provided By Verizon

  • White Papers // Sep 2010

    A Proliferation of Data. Complex Storage Needs

    The growing amount of digital information available to support decision making has made data management more challenging than ever. The volume of media and content organizations generate is growing exponentially. Like any other asset, if it is to continue to deliver business value, data must be well managed. Consequently, enterprises...

    Provided By Verizon

  • White Papers // Sep 2010

    Business Optimization And Resiliency: Improving Business Performance And Managing Operational Cost And Risk

    The world, and certainly the world of business, is an increasingly riskier place. In an ever-changing business environment, risk exposures have been increased on both a global and regional basis, leading to the potential of heightened impact in the case of a business disruption. The company has to be ready...

    Provided By Verizon

  • White Papers // Sep 2010

    Parting the Clouds, Demystifying Cloud Computing Options

    Cloud computing promises to be the driving force behind the next wave of technology innovation. But it's more than that; it's also a sound business strategy that helps organizations practice better financial management and creates a more sustainable, cost-efficient model for supporting IT services.

    Provided By Verizon

  • White Papers // Sep 2010

    International Retailer Contains Security Breach with Verizon Business Computer Forensic Services

    "Relying on a combination of sophisticated investigative tools and experienced analysts, Verizon Business forensic experts were able to locate the security breach, determine the scope, and locate the hacker responsible. But equally important was the forensic team's skill in coordinating with law enforcement to properly gather and preserve the evidence...

    Provided By Verizon

  • White Papers // Sep 2010

    Verizon Point of View The Business of Risk Management

    "The Business of Risk Management" is one in a series of Verizon perspective papers focusing on critical business issues confronting CIOs and other executives. The authors of this perspective note how "enterprises are recognizing the importance of managing all forms of risk?and their interactions?in a structured way across the organization."...

    Provided By Verizon

  • White Papers // Sep 2010

    Exponential Growth Challenged Modevity's IT Capacity

    For Modevity, the move to the CaaS platform has been transformational. Taking more of their business into the cloud has served as a catalyst for changing their business model. Going forward, Modevity will be looking at seamless integration of their encryptions and rights management service alongside content management, which could...

    Provided By Verizon

  • White Papers // Sep 2010

    2010 Data Breach Investigations Report

    2010 report with new findings from Verizon and the US Secret Service in this joint study and analysis of over 900 data breaches involving over 900 million compromised records.

    Provided By Verizon

  • White Papers // Sep 2010

    Cloud Computing - Marketing Hype or Sound Business Strategy?

    Our Computing as a Service (CaaS) model addresses many of the issues that have been holding enterprise organizations back from fully exploiting the potential of cloud computing as a viable IT solution. Security, networking, and redundancy are automatically built into the environment. As of June 1, 2009, the Verizon CaaS...

    Provided By Verizon

  • White Papers // Aug 2010

    Open Up Some Space in Your Server Room, and Do More With Less

    Through virtualization of the applications one can consolidate the hardware. In turn, this can help conserve data center space and electricity, gives one a more efficient and greener way to do business. Virtualization then helps one to do more with the reduced amount of hardware one will have. The improved...

    Provided By Verizon

  • White Papers // Aug 2010

    Protect Your Information, Systems, People, and Reputation

    Sophisticated systems, high-value data, and powerful networks. When these advanced enterprise assets aren't protected at the physical level, they can be rendered powerless - or worse, a detriment. In an age where increasing security threats are the norm, and where the crooks only seem to get more cunning, security is...

    Provided By Verizon

  • White Papers // Aug 2010

    Under the Hood of the IT Security Risk Dashboard: Status Lights Signal Green But Are You Really Safe?

    Large amounts of information are stored in management dashboards which the authors rely on for feedback before deciding on what events need to be fixed immediately and what can wait for remediation. Instead of looking for unusual signs and signals indicating risk, the dashboard becomes the system of record by...

    Provided By Verizon

  • White Papers // Aug 2010

    The Need for Standards in Retail IT

    In Europe in the early 1990s, a cell phone was a true status symbol; by the mid 1990s, widespread adoption had made owning such a device less than a novelty. What made cell phones so wildly popular was the evolution from analog, first-generation communications to the 2G GSM standard in...

    Provided By Verizon

  • Case Studies // Aug 2010

    Improving The Virtual Padlock At A Leading University

    Whenever you make a purchase online, pay a bill or check your account balance, do you ever notice the "Padlock" icon at the bottom right-hand side of your browser? It signifies that the page is secure, and if you double click on it, you'll be able to view the site's...

    Provided By Verizon

  • White Papers // Aug 2010

    Benefits of IPv6 for Enterprises

    This paper describes the benefits of IPv6 for enterprise businesses and highlights the implementation issues and challenges a company must consider when transitioning to the new addressing technology. The historical driver for IPv6 transition has been IPv4 address depletion, which is accelerating due to global expansion of Internet connectivity particularly...

    Provided By Verizon

  • White Papers // Jul 2010

    Top Trends In Financial Services

    Financial Services is a business solutions and technology advisory services practice within this paper focused on helping banking and financial institutions, insurance companies and the broader financial ecosystem improve business agility, increase business performance, manage risk, and drive innovation in an increasingly complex and fast changing digital market place. This...

    Provided By Verizon

  • White Papers // Jul 2010

    Verizon Enterprise Risk and Incident Sharing Metrics Framework

    As you may know, Verizon Business publishes the Data Breach Investigations Report (DBIR), which presents aggregated case statistics collected by the Investigative Response (IR) team. What you may not know is that the reports are based upon a set of metrics developed internally for the purpose of capturing key details...

    Provided By Verizon

  • White Papers // Jun 2010

    Make the Right Choices for Your Smart Grid Communications Network

    It's no secret that the utility industry is moving to a smart grid. Most utilities have built pilots to test the capabilities of smart metering systems. Some have deployed it throughout their service areas, while still others are in the assessment stages. A fundamental requirement for a smart grid is...

    Provided By Verizon

  • White Papers // Jun 2010

    Verizon EBonding Services

    Many companies today look to drive business process improvement and automate their IT and Telecom Services' record keeping through the use of workflow systems. When these business processes include collaboration with service providers and vendor partners, automating the end-to-end workflow from the enterprise to the service provider requires the integration...

    Provided By Verizon

  • White Papers // Jun 2010

    How to Select a Network Intrusion Prevention System

    You are in the market for a network Intrusion Prevention System (IPS). To date you followed the steps outlined in the white paper entitled, "How to Select the Right Computer or Network Security Product". You have reached the point in your search where it is now time to evaluate the...

    Provided By Verizon

  • White Papers // Jun 2010

    Developing A Comprehensive Mobility Strategy For Financial Applications

    Fortune, if not a fortune, favors the brave. Or the innovative. If the industry is confronted with one of the worst crises in its history, the safe thing to do would be to put the launch of new services on hold, no matter how innovative. Historically though, great companies have...

    Provided By Verizon

  • White Papers // Jun 2010

    Next-Generation Identity Management for Cloud-Enabled Ecosystems

    Today's extended enterprises face the challenge of providing anytime, anywhere access to business-critical applications and resources - not just to employees but to customers, partners, and suppliers. Many of these resources are available via web-based applications or network applications accessed through a virtual private network. The task of managing which...

    Provided By Verizon

  • White Papers // May 2010

    Parting the Clouds: Demystifying Cloud Computing Options

    It's not hard to understand why this model appeals to CEOs and senior executives alike. They know that business agility is increasingly key to commercial success. With money in tight supply, anything that can cut their capital requirements looks extremely desirable. Equally, there are good reasons why traditional IT hasn't...

    Provided By Verizon

  • White Papers // Apr 2010

    The Untapped Treasure

    It's one of the heaviest holiday shopping days of the season, and a major online bookseller experiences a spike in failed payments as its credit card transaction application falters. Each minute of downtime costs the company revenue dollars, as well as lost transactions and repeat customers. All levels of the...

    Provided By Verizon

  • White Papers // Apr 2010

    The Identity and Access Management Imperative: Securing the Extended Enterprise

    The digital world is creating shifts in the way business gets done, resulting in both exciting but often troubling times for executives. What was once an intimate corporate network is now a globally connected web of people and devices. More employees work remotely, carrying sensitive data on notebooks and PDAs....

    Provided By Verizon

  • Case Studies // Apr 2010

    Verizon Business SOC Solutions Help Identify Federal Cyber Threats Before They Become Data Breaches

    When a major federal agency faced yet another cyber attack from outside the country, it looked to the security experts at Verizon to deploy a state-of-the-art, turnkey Security Operations Center (SOC). Unhappy with its incumbent provider's limited technology and inability to provide visibility into complex departmental systems, the agency was...

    Provided By Verizon

  • White Papers // Apr 2010

    Secure Gateway Universal Port Extensible Architecture: Secure and Redundant

    Most organizations fear opening up their networks to the public Internet, and rightly so. Much can be lost or compromised in the process. But there is a way to help make that connection secure and reliable with Verizon's Secure Gateway Extensible Architecture (SGEA). The author demonstrates this by giving you...

    Provided By Verizon

  • White Papers // Nov 2010

    Escaping from Microsoft's Protected Mode Internet Explorer

    The level of protection offered by Protected Mode Internet Explorer is not well understood and there are common misconceptions about its status as a security feature. This research set out to discover the full extent of how Protected Mode can protect users from zero-day memory corruption vulnerabilities in Internet Explorer...

    Provided By Verizon

  • White Papers // Oct 2010

    Interoperability for Emergency Services

    A major rush hour accident on a suspension bridge involves an oil tanker truck and numerous civilian vehicles. The firefighters are first on the scene and notice that the bridge is structurally damaged, but because the police are using a disparate communication system, there is no way for these groups...

    Provided By Verizon

  • White Papers // Sep 2010

    There Is No SMART in Smart Grid Without Secure and Reliable Communications

    One of the smart grid's vulnerabilities stems from its reliance on wireless two-way communication among an increasing number of intelligent, connected devices, including smart meters and, eventually, smart appliances. Smart interfaces help utilities use this data to integrate distributed energy and demand response resources. But to maintain the security i.e.,...

    Provided By Verizon

  • White Papers // Aug 2010

    Benefits of IPv6 for Enterprises

    This paper describes the benefits of IPv6 for enterprise businesses and highlights the implementation issues and challenges a company must consider when transitioning to the new addressing technology. The historical driver for IPv6 transition has been IPv4 address depletion, which is accelerating due to global expansion of Internet connectivity particularly...

    Provided By Verizon

  • White Papers // Jun 2010

    Verizon EBonding Services

    Many companies today look to drive business process improvement and automate their IT and Telecom Services' record keeping through the use of workflow systems. When these business processes include collaboration with service providers and vendor partners, automating the end-to-end workflow from the enterprise to the service provider requires the integration...

    Provided By Verizon

  • White Papers // Jun 2010

    How to Select a Network Intrusion Prevention System

    You are in the market for a network Intrusion Prevention System (IPS). To date you followed the steps outlined in the white paper entitled, "How to Select the Right Computer or Network Security Product". You have reached the point in your search where it is now time to evaluate the...

    Provided By Verizon

  • White Papers // Apr 2010

    The Untapped Treasure

    It's one of the heaviest holiday shopping days of the season, and a major online bookseller experiences a spike in failed payments as its credit card transaction application falters. Each minute of downtime costs the company revenue dollars, as well as lost transactions and repeat customers. All levels of the...

    Provided By Verizon

  • White Papers // Apr 2010

    The Identity and Access Management Imperative: Securing the Extended Enterprise

    The digital world is creating shifts in the way business gets done, resulting in both exciting but often troubling times for executives. What was once an intimate corporate network is now a globally connected web of people and devices. More employees work remotely, carrying sensitive data on notebooks and PDAs....

    Provided By Verizon

  • White Papers // Apr 2010

    Secure Gateway Universal Port Extensible Architecture: Secure and Redundant

    Most organizations fear opening up their networks to the public Internet, and rightly so. Much can be lost or compromised in the process. But there is a way to help make that connection secure and reliable with Verizon's Secure Gateway Extensible Architecture (SGEA). The author demonstrates this by giving you...

    Provided By Verizon

  • White Papers // Dec 2010

    Navigating the Road to Smart Grid: Modernizing the Critical Communication Infrastructure

    Every day, utility industry employees deal with a frustrating, double reality. On the one hand, they work in an industry that powers the digital age. On the other hand, many utility operations and systems are dependent on old-fashioned, largely analog technologies. Of course, much of this situation has been influenced...

    Provided By Verizon

  • White Papers // Jul 2010

    Verizon Enterprise Risk and Incident Sharing Metrics Framework

    As you may know, Verizon Business publishes the Data Breach Investigations Report (DBIR), which presents aggregated case statistics collected by the Investigative Response (IR) team. What you may not know is that the reports are based upon a set of metrics developed internally for the purpose of capturing key details...

    Provided By Verizon

  • White Papers // Dec 2009

    Securely Extending the Enterprise With Private MPLS Networks

    Globalization has had a profound, lasting effect on the world economy. With the rise of globalization many companies have, therefore, recognized the need to change how they organize themselves - that is, supporting an increasing amount of home and flexible workers as well as how they organize and manage their...

    Provided By Verizon

  • White Papers // Nov 2009

    Data Center Transformations: Gaining Agility and Reining in Escalating IT Costs in Education and Government Agencies

    As organizations grow and evolve, their data centers can quickly multiply to serve a myriad of needs. With computer rooms being established and managed by diverse groups across the organization, it can be difficult to manage costs and quickly respond to individual user needs. This segmented approach to IT management...

    Provided By Verizon

  • White Papers // Jun 2009

    The Case for Cloud Computing is Becoming More Clear

    Cloud computing has been a hot topic lately, and for good reason. With it, companies can gain potential competitive advantages that could make a real difference: shorter time to market, services that can be quickly turned up or down, and reduced upfront IT costs just to name a few. Yet...

    Provided By Verizon

  • White Papers // Mar 2009

    Data Centers and Server Farms Enter a Virtual Reality

    Virtualization uncouples operating systems and applications from the physical hardware to allow a server, networking or storage device to run multiple, isolated and diverse virtual environments. In practice, the technology enables businesses to consolidate multiple IT resources, such as operating systems and software applications, on a single server. These resources...

    Provided By Verizon

  • White Papers // Apr 2010

    Cyber Security Protecting Our Federal Government From Cyber Attacks

    Today's federal cyber attacks are coming from other nations, cyber-criminal organizations, and individuals seeking military, economic and financial gains. To address these growing threats, the White House's Cyberspace Policy Review report released in 2009 focuses on the risks that cyber threats pose to economic and national security, and the growing...

    Provided By Verizon

  • White Papers // Jun 2010

    Next-Generation Identity Management for Cloud-Enabled Ecosystems

    Today's extended enterprises face the challenge of providing anytime, anywhere access to business-critical applications and resources - not just to employees but to customers, partners, and suppliers. Many of these resources are available via web-based applications or network applications accessed through a virtual private network. The task of managing which...

    Provided By Verizon

  • White Papers // Apr 2010

    Security in the New Information Age: Striking a Balance Between Risk and Opportunity

    Collaborative projects like the Human Genome Project (HGP) would not have been possible without the Internet and distributed computing systems. Innovations like these blur all types of boundaries: physical, social, and even competitive. Like the HGP, companies now reap the same rewards that come from collaboration by sharing systems and...

    Provided By Verizon

  • White Papers // Jan 2011

    Network 2020: Connecting Everyone to Everything

    It's unimaginable that just 10 years ago, mobile phones and Internet access were limited to the privileged few. In fact, the percentage of users worldwide who had a mobile phone or access to the Internet was near the single digits. Being relatively new technologies to consumers, mobile phones and the...

    Provided By Verizon

  • White Papers // Mar 2010

    Free Up Some Space in Your Data Centers and Your Budget

    When it comes to data center operations, less is unquestionably more. Fewer servers required to maintain business applications means an opportunity to invest IT capital in areas that move business forward. Fewer physical resources to power and cool means increased capabilities to consolidate and streamline both technology and cost. Fewer...

    Provided By Verizon

  • White Papers // Jun 2009

    Looking to Do More With Less? We'll Show You the Way

    As application demands increase, servers can become like suburbs spread out, overgrown, and hard to manage. Such server sprawl combined with the challenge of managing platform dependencies can overwhelm the IT resources. And that doesn't make for efficient use of assets or enhance the ability to quickly implement the tools...

    Provided By Verizon

  • White Papers // May 2009

    Virtually a Better Data Center

    Virtualization is the chance to reduce costs and increase productivity. When a business migrates to a virtual IT environment, fewer servers are required to maintain their business applications. This consolidation can lead to cost savings in hardware (fewer servers to purchase and maintain), data center space, and the energy required...

    Provided By Verizon

  • White Papers // Aug 2010

    Open Up Some Space in Your Server Room, and Do More With Less

    Through virtualization of the applications one can consolidate the hardware. In turn, this can help conserve data center space and electricity, gives one a more efficient and greener way to do business. Virtualization then helps one to do more with the reduced amount of hardware one will have. The improved...

    Provided By Verizon

  • White Papers // Dec 2010

    Data-Centric Vulnerability Management

    The "Security" of an application means different things to different audiences. Were secure coding techniques used? Was the application deployed on appropriately hardened servers? Do network or other infrastructure flaws allow users to bypass application controls? Does the application expose sensitive information without appropriate safeguards? Great questions, but they really...

    Provided By Verizon

  • White Papers // Sep 2010

    A Proliferation of Data. Complex Storage Needs

    The growing amount of digital information available to support decision making has made data management more challenging than ever. The volume of media and content organizations generate is growing exponentially. Like any other asset, if it is to continue to deliver business value, data must be well managed. Consequently, enterprises...

    Provided By Verizon

  • White Papers // Aug 2010

    Protect Your Information, Systems, People, and Reputation

    Sophisticated systems, high-value data, and powerful networks. When these advanced enterprise assets aren't protected at the physical level, they can be rendered powerless - or worse, a detriment. In an age where increasing security threats are the norm, and where the crooks only seem to get more cunning, security is...

    Provided By Verizon

  • White Papers // Apr 2010

    Think Peripherals Can't Compromise Your Security?

    By exploiting software vulnerabilities, Code Red also affected other devices running web servers, including some printers. These printers treated the attack as a document to be printed, but since they could not interpret the "Document," they were stuck, unable to print the legitimate jobs queued up behind Code Red. Detecting...

    Provided By Verizon

  • eBooks // Jun 2013

    eGuide: M2M: Changing the way we live and do business

    Machine-to-machine communication (M2M) is all about protecting people, making services more responsive, business offerings more profitable, and ensuring that money, gasoline, and time can be conserved rather than wasted. By leveraging a massive, secure wireless network, machines across disparate locations (from the middle of a city to a remote...

    Provided By Verizon

  • eBooks // Jul 2013

    E-Guide: 4G LTE: transforming the mobile workforce

    4G LTE technology has been around for less than four years and has already made a huge impact on mobile computing. Just imagine the innovations that will be possible in the next four years. This isn't just about making you more competitive, it's about opening new vistas and new opportunities....

    Provided By Verizon

  • Case Studies // Sep 2013

    Machine-to-Machine Technology Roundtable: The CIO Perspective

    Objects connected directly to the Internet, dubbed machine-to-machine, or M2M, technology provide a plethora of possibilities for organizations. Machines communicating directly with other machines with minimal human intervention poses exciting possibilities that will change the technology landscape significantly over time. The most interesting thing about M2M technology is that...

    Provided By Verizon

  • eBooks // Nov 2013

    E-Guide: Intelligent Networking: reliable, robust, resilient, redundant, and really, really fast

    The numbers are truly breathtaking. Verizon estimates that by 2016, there will be three devices for every person connected to the Internet. By 2020, there will be 50 billion (with a “B”) connected devices. With data sources including video, audio, photographs, live fitness data, all that mobile data, and machine-to-machine...

    Provided By Verizon

  • White Papers // Dec 2013

    BYOD: Challenges, Opportunities and How to Make it Work

    CBS Interactive recently assembled a group of senior IT executives for a Verizon-sponsored roundtable to discuss BYOD and its impact on the businesses and the IT landscape. The group discussed the opportunities associated with BYOD, including increased collaboration, the ability to telecommute, and ease-of-use for employees. They also discussed the...

    Provided By Verizon

  • White Papers // Jan 2014

    Dynamic Cloud and Intelligent Networking: What they Mean for the Future of Business

    The most cutting-edge organizations are leveraging dynamic cloud and intelligent networking solutions to improve operations from top to bottom. These dynamic tools help optimize everything from sourcing to production to logistics to sales. However, implementing a dynamic cloud and an intelligent network isn’t an out-of-the-box fix. Organizations must have a...

    Provided By Verizon

  • White Papers // Jan 2009

    A Business Process Approach to Assets and Risks

    This paper discuses a business process approach toward IT assets and risks. They described the top-down and bottom-up approach on how to assign criticality values to business processes and IT assets, and explained this concept by means of an example. They also discussed the advantages of the business process approach....

    Provided By Verizon

  • White Papers // May 2009

    New Challenges, New Opportunities

    With today's Internet community reaching over 824 Million users worldwide, up 10.4% from 20071 and emerging countries such as India and China seeing growth rates of 26.8% and 13.8% respectively, few would disagree that the Internet is getting busier by the day. The opportunity to communicate and ultimately do business...

    Provided By Verizon

  • White Papers // Mar 2009

    Data Centers and Server Farms Enter a Virtual Reality: Verizon Consolidates, Virtualizes Servers to Help Improve Efficiency and Conserve Energy

    Virtualization uncouples operating systems and applications from the physical hardware to allow a server, networking or storage device to run multiple, isolated and diverse virtual environments. In practice, the technology enables businesses to consolidate multiple IT resources, such as operating systems and software applications, on a single server. These resources...

    Provided By Verizon

  • White Papers // Dec 2008

    Building a Unified Communications and Collaboration Environment That Supports Virtual Teams

    Unified Communications is giving businesses today that kind of advantage. Corporations are moving to Voice over IP (VoIP) telecommunications, presence-enabled applications, and converged fixed-mobile communications, making it possible to find people in virtually any location, on almost any device. Businesses are also using team collaborative tools such as online whiteboarding,...

    Provided By Verizon

  • White Papers // Jan 2009

    Green Business: How Technology Can Make a Difference

    Global business trends are driving enterprises toward greener business practices. Sustainability, energy efficiency, conservation, and innovation are fast becoming the watchwords of the 21st century. And how that translates into the evolution of the enterprise will affect all facets of an organization. IT can help lead the charge via a...

    Provided By Verizon

  • Webcasts // Jan 2010

    Better Security Through Scanning

    Millions of records are compromised every year. Chances are - some breaches could have been prevented by a very simple solution - Vulnerability Management. The attendee will learn how to get the most out of the vulnerability management.

    Provided By Verizon

  • White Papers // Jun 2009

    Next Generation LAN Solutions From Verizon Business

    Verizon Business' Optical LAN Solutions (OLS) is a converged fiber-to-the-desktop solution, which provides secure, layer 2 transport capabilities via single mode fiber that delivers converged voice, data and video at gigabit speeds to the desktop. The solution is ideal for campus environments and also buildings - including new facilities or...

    Provided By Verizon