Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Apr 2014

    Webroot® Threat Brief

    New viruses, and updated versions of existing viruses, are released daily, even hourly. Because of this, signature-based threat detection cannot be effective. Instead, Internet security solutions such as Webroot's SecureAnywhere solutions that use behavioural detection are necessary. Read this Whitepaper to find out why.

    Sponsored By Webroot Software

  • White Papers // Apr 2014

    PassMark Software®: Webroot SecureAnywhere Business Endpoint Protection vs. Seven Competitors

    PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the...

    Sponsored By Webroot Software

  • Podcasts // Apr 2014

    Basics of Hardware Snapshots

    CommVault’s Phil Philip Curran (@PhilJPhilip Curran) discusses how integrated snapshots and data replication technologies can quickly create multiple recovery-ready copies of production data without impacting server performance. In addition, CommVault’s deep integration with VMware vStorage APIs for data protection (VADP) helps customers protect their virtual machines as they come online.Learn...

    Sponsored By CommVault Systems

  • Webcasts // Apr 2014

    Efficient Data Management Methodologies for the Modern Data Center

    Enterprise information technology is at a crossroads. Cloud computing is overhauling the way IT is built, used and delivered to your customers. Big Data is overwhelming legacy infrastructures, compounding an already untenable management challenge. And mobility is changing everything about how data is accessed and used. Forward-thinking companies realize that...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    CIO Game Changer: Unlocking Employee Access to Information

    Data management poses a serious dilemma for today’s hard-pressed IT managers. Not only must they give end users anytime access to information from desktops, notebooks, smartphones and tablets, but they must also do so without compromising security. To make matters worse, both data and data silos are accumulating in ever-greater...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Balancing Cost, Risk and Complexity in Your Disaster Recovery Strategy

    In the face of more frequent disaster situations and higher reliance on technology, Disaster Recovery and Business Continuity have become absolutely vital for maintaining an edge in todays competitive business environment. This whitepaper explores how to balance cost vs risk using a multi-tiered catalog of recovery technologies.

    Sponsored By CommVault Systems

  • Case Studies // Apr 2014

    Acxiom Case Study

    This case study, which focuses on Acxiom, explores how the company was able to secure employee data, reduce migration costs and boost productivity with the CommVault Edge software.

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    6 Questions to Ask About Your Data Storage-Emily Wojcik byline for ILTA Peer to Peer Magazine

    Commvault's Emily Wojcik discusses the six questions businesses should ask when deciding which data gets kept and which data is expendable in a storage policy.

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Protect 500 VMs in 17 Minutes Using Simpana IntelliSnap® Technology

    Data Centers continue to evolve from an environment based on physical servers and storage to one based on virtualization platforms, and data management solutions need to keep pace and adapt to these shifts as they happen. Read this whitepaper to learn how Simpana software offers a completely fresh approach to...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Protecting Data at the Edge More Effectively

    Drive efficiency and productivity by centralizing protection, expediting recovery and enhancing access for remote/branch office and laptop/desktop data. This whitepaper describes how Simpana software is the best solution to make that happen.

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Exponentially Accelerate Data Protection and Recovery with Simpana 10 IntelliSnap® Snapshot Management Technology

    Are you making the best use of your storage array snapshot functionality? CommVault Simpana 10 IntelliSnap technology manages hardware-based snapshots across multiple vendor storage arrays. This whitepaper covers trends and challenges in snapshot adoption, and key features and benefits of IntelliSnap technology including snapshot indexing and catalog-based recovery, script elimination,...

    Sponsored By CommVault Systems

  • Videos // Apr 2014

    Webinar: Modernized Disaster Recovery with Simpana 10 On Demand

    Learn about capabilities in Simpana software that allow you to accelerate DR operations to meet ever-shrinking SLAs while optimizing storage. We'll discuss deduplication-aware replication, VM encapsulation, on-the-fly P2V migration and much more.

    Sponsored By CommVault Systems

  • Case Studies // Apr 2014

    Texas Tech University

    The Texas Tech University System was utilizing a decentralized backup and recovery approach that badly needed to be replaced with a consolidated infrastructure. Find out how Simpana software’s embedded deduplication cost up to 70 percent less than competing hardware solutions and enabled Texas Tech to reduce backup media and storage...

    Sponsored By CommVault Systems

  • Videos // Apr 2014

    Testimonial: Cystic Fibrosis Trust

    Peter Hawkins, the Head of IT for Cystic Fibrosis Trust, discusses the role CommVault’s Simpana software platform plays in improving the company’s information governance as well as compliance requirements and managing millions of archived files.

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management

    Massive data growth and shrinking application recovery windows are creating a huge challenge for IT administrators. Legacy backup models can’t cope with multi-terabyte applications. However, by leveraging a modern approach to data protection that uses your current disk array snapshot technology, you can leave your recovery problems behind.  This CommVault...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    ESG: How to Build a Strategic Archive

    This paper discusses the reasons ESG believes CommVault Simpana software, a data management platform that delivers backup, archive, search, and analytics capabilities, could be a viable cornerstone of an organization’s information retention strategy. ESG specifically examines Simpana archiving capabilities that organizations may not believe they need now, but given current...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Protect & Manage HyperV Environment Datasheet

    Datasheet: Simpana Software Data Management for Microsoft Hyper-V Deployments

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Cutting the Cost of Application Security

    Web application attacks can result in devastating data breaches and application downtime, costing companies millions of dollars in fines, brand damage and customer turnover. This white paper illustrates how the Imperva SecureSphere Web Application Firewall provides a Return on Security Investment of 2090% by preventing data breaches and website downtime....

    Sponsored By Imperva

  • White Papers // Apr 2014

    Protect the Mobile Enterprise with Smarter Security

    Mobile security, and ensuring users do the right thing, is one of the highest priorities of today’s CIOs. Although mobile employees can be more productive by working anytime and anywhere, they are now accessing corporate data and applications from outside the traditional network perimeter. This means traditional access and authentication...

    Sponsored By IBM

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • White Papers // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

    Sponsored By F5

  • eBooks // Apr 2014

    Liberate Your Commerce Platform without Selling the Family Farm

    This ebook offers a possible solution to businesses that already have made big investments in enterprise commerce platforms, but that also struggle to keep up with the quickly changing landscape of shopping experiences and business models. Drupal’s flexibility, scalability, and rapid deployment capability make it possible to build shiny...

    Sponsored By Acquia

  • White Papers // Apr 2014

    Using DaaS to Create the Ideal Desktop User Experience Without a PC

    With the ubiquity of end-user computing long established, organizations now are grappling with a tough dilemma: Users want enterprise-class performance and availability, but they demand the flexibility to use familiar devices and applications—anywhere, and at any time. Download this whitepaper to learn why Desktops as a service (DaaS) can be...

    Sponsored By Desktone

  • White Papers // Apr 2014

    Enterprise Mobility Management: Embracing BYOD Through Secure App & Data Delivery

    Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

    Sponsored By Citrix

  • White Papers // Apr 2014

    The 10 Must Haves for Secure Enterprise Mobility Management

    While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Taking Your Enterprise Mobile: An Executive Checklist

    According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise...

    Sponsored By Citrix

  • White Papers // Apr 2014

    Guidelines for deploying Citrix BYOD solutions

    Read this white paper to learn how Citrix can help you design, implement, deploy, maintain and support a BYOD infrastructure that will enable your environment for BYOD transformation and success.

    Sponsored By Citrix

  • White Papers // Apr 2014

    How to Select the Right Remote Support Tool

    Today’s customer support and IT service organizations are charged with supporting ever-more complex environments that include multiple channels of communication to a seemingly limitless number of devices and systems—all while keeping support costs down. To meet these conflicting demands, service organizations are turning to remote support solutions. But as these...

    Sponsored By LogMeIn

  • White Papers // Apr 2014

    IBM: The Evolution of Business Reliliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency services....

    Sponsored By IBM

  • White Papers // Apr 2014

    Build your scalable storage environment upon a dynamic IBM Storwize family foundation

    The IBM Storwize family delivers sophisticated capabilities that are proven, efficient and dependable, in a wide range of storage systems designed to meet the differing needs of organizations, all built on a common platform. Shared technologies and common management features make the Storwize family the right system to meet today's...

    Sponsored By IBM

  • Videos // Apr 2014

    Engage, Empower and WIN customers by Making First the Mile Smarter with Kofax

    A video that will give you insights on how Kofax helps organisations to increase their responsiveness to customers and put emphasis on the need for a mobile application strategy. Watch this short video now to see how Kofax helped organisations grow their businesses while reducing operating costs.

    Sponsored By Kofax

  • White Papers // Apr 2014

    Forrester: Enterprises Shift To Smart Process Apps To Engage Customers

    This report will give you insights on how organisations can bridge the gap between systems that engage customers, using the latest mobile, social, analytics technology and systems of record. Download this Forrester report to learn how Kofax helped organisations improve their efficiencies and service qualities.

    Sponsored By Kofax

  • White Papers // Apr 2014

    Preparing your network for the mobile onslaught.

    Building a mobile collaboration or bring-your-own-device solution requires three things: mobile applications, the mobile devices themselves and the network that underpins them both. Often, the network and its capabilities take a back seat to applications and devices—which can ultimately lead to poor performance or an inflexible infrastructure. Find out how...

    Sponsored By IBM

  • White Papers // Apr 2014

    Bring ROI to your BYOD - Forrester documents benefits of managed mobility.

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program.

    Sponsored By IBM

  • White Papers // Apr 2014

    Security Services Reference Guide

    From a communications equipment manufacturer optimizing investments with a security scan to a mutual insurance company reducing spam and threats with hosted web and email services, IBM security consultants have helped many companies evaluate their existing security practices against their business requirements and objectives. Read these customer references to learn...

    Sponsored By IBM

  • White Papers // Apr 2014

    Leveraging the Network for Your Virtualization and Cloud Initiatives.

    More organizations are turning to cloud, virtualization and consolidation to realize benefits like lower operating costs and higher efficiency in network IT management, but many are not considering the impact those initiatives will place on the data center network.

    Sponsored By IBM

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • Presentations // Apr 2014

    Five Myths of DIY Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing

    Sponsored By IBM

  • Case Studies // Apr 2014

    A broadband company streamlines its recovery processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM