Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • Case Studies // Apr 2014

    Forrester Report: Surviving the Technical Security Crisis

    As new threats emerge every day, the need for qualified security staff is growing. But there aren't enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security leaders...

    Sponsored By IBM

  • White Papers // Apr 2014

    APM Mobility Case Study

    Most of the organisations wanted to have an effective and efficient communications to their clients. This study gives you an idea on how to simplify smartphone integration and capitalise on Shoretel Unified Communications features and cost-saving call capabilities. Read this case study today to learn how Shoretel gives you...

    Sponsored By ShoreTel

  • White Papers // Jul 2012

    Bring Your Own Device Policy Guidebook

    Since 2008, Aberdeen research has been tracking a radical transformation taking place in the enterprise: more and more organizations are permitting, even encouraging employees to bring their own mobile devices into the workplace to be used for work purposes. While at first appearing to radically lower the cost of enterprise...

    Sponsored By SAP

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • eBooks // Feb 2014

    Remote Monitoring and Management: The Key to Proactive, Efficient IT Departments

    For IT professionals to succeed, they need to implement low-cost and high-productivity practices that allow them to have a positive impact on their organizations’ bottom line. Remote monitoring and management (RMM) delivers an arsenal of IT management tools that help IT professionals proactively monitor and remotely manage and resolve IT...

    Sponsored By LabTech Software

  • White Papers // Jul 2013

    File Sharing: Risk or Remedy?

    Ever-increasing file sizes. Document-centric, complex collaboration needs. Two big reasons organizations are turning to cloud file sharing (CFS) as a lightweight but effective solution. Read this complimentary report and learn more about: Document-centric collaboration and how to complement your existing ECM ecosystem with CFM applications Feature...

    Sponsored By Box

  • White Papers // Jan 2014

    Improving Engagement with Multi-Channel Service

    Abstract: Best-in-Class organizations execute on a strategy that supports the multi-channel nature of customer requests. These leading organizations do not just open up their service infrastructures to accommodate new channels, but also empower their teams to deliver an effective and consistent experience regardless of the channel selected by the customer....

    Sponsored By LogMeIn BoldChat

  • White Papers // Apr 2014

    Forrester: Enterprises Shift To Smart Process Apps To Engage Customers

    This report will give you insights on how organisations can bridge the gap between systems that engage customers, using the latest mobile, social, analytics technology and systems of record. Download this Forrester report to learn how Kofax helped organisations improve their efficiencies and service qualities.

    Sponsored By Kofax

  • White Papers // Apr 2014

    IBM: Surviving the Technical Security Skills Crisis

    As new threats emerge every day, the need for qualified security staff is growing - but there aren’t enough people with technical security skills to go around. That gap is leaving organizations exposed. In fact, in a recent survey conducted by Forrester Consulting and commissioned by IBM, 92% of security...

    Sponsored By IBM

  • White Papers // Feb 2014

    3 Key Guidelines To Help Increase Energy Efficiency In The Data Center

    Nobody needs to tell you that energy efficiency is at the top of the data center’s to-do list. Every data center is looking to cut power consumption while maintaining the highest level of service. But achieving real energy efficiency is easier said than done. Sprawling and convoluted infrastructures make it...

    Sponsored By Emerson Network Power

  • White Papers // Jan 2014

    Bring ROI to Your BYOD - Forrester Documents Benefits of Managed Mobility

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this study, you’ll learn how to improve workplace flexibility, reduce overhead and admin costs and increase productivity.

    Sponsored By IBM

  • White Papers // Jan 2014

    Gartner Report "Emergence of Ethernet Fabric"

    The rapid development of Ethernet fabric offers users new choices to modernize their data center physical switch networks to support software-defined network and cloud computing. Networking professionals should start on the road to greater efficiency and automation in their data center networks.

    Sponsored By Brocade

  • White Papers // Jan 2014

    Demand More - Get the most from the move to a Next-Generation Firewall

    The precious opportunity to overhaul your firewall doesn't happen very often. This McAfee White Paper lists the requirements you need to ensure network integrity as threats evolve and usage grows. It will help network and cyber-security teams understand the requirements they can and should demand from next-generation firewalls.

    Sponsored By McAfee

  • White Papers // Jan 2014

    Cisco UCS with Intel Xeon Processors: Built for Virtualization and Consolidation

    Although virtualization technology has made server consolidation possible, it has also created many challenges. Infrastructure is complex, difficult, and time consuming to scale. Network ownership is split between network and server administrators. Security is managed by least-common-denominator approaches. And the massive number of virtual machines these environments spawn taxes server,...

    Sponsored By Cisco

  • White Papers // Jan 2013

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

    Sponsored By IBM

  • Podcasts // Mar 2013

    Expenses Product Preview

    When it's simple for workers to enter their expenses, the results are impressive -- lower costs, more accurate accounting, and more timely reimbursements. Watch the video to discover how Workday Expenses allows you to effectively engage your employees and improve the accuracy and timeliness of expense reporting.

    Sponsored By Workday

  • Downloads // Oct 2013

    Intel® Composer XE 2013

    Now it’s simpler to recompile for greater improvements by using pre-optimized, pre-threaded performance libraries. This performance-oriented developer tool includes Intel C++ and Fortran compilers, and threading and math, multimedia, and signal processing performance libraries. It’s compatible with leading development environments and compilers on Windows, Linux, and Mac OS X and...

    Sponsored By Intel Software

  • White Papers // Mar 2014

    Top 10 Advantages of Unified Storage: Hitachi VM All Flash System

    IDC says it best: “For enterprise customers, flash storage changes everything.”1 Driven by the need to provide better storage performance and efficiency at a lower cost, more enterprises are turning to flash solutions, which now include Hitachi Unified Storage VM (HUS VM) all flash system. This unified system integrates Hitachi...

    Sponsored By Hitachi Data Systems

  • Case Studies // Mar 2014

    Modern Data Centre Strategy: Equinix

    What makes Equinix the leading data centre provider? It starts by looking at your data centre as something much more: a strategic asset. We provide solutions that address not only your immediate, logistical needs for IT infrastructure but also how those needs impact your long-term business goals. It’s a big-picture...

    Sponsored By Equinix

  • White Papers // Mar 2014

    Advanced Malware Protection: Buying Criteria

    In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Buyer's Criteria for Next-Generation Network Security

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Addressing the Malware Challenge - Strategies at Work: An IANS Custom Report

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

    Sponsored By Sourcefire, Inc.

  • Videos // Mar 2014

    Product Preview: Business Driven Insights

    Finance leaders are under pressure to provide insights beyond the numbers. They need to help their organizations make strategic decisions better, faster, and with more predictable outcomes. Unfortunately, traditional ERP is incapable of getting you there. Watch the video to discover how Workday can—and all in the cloud.

    Sponsored By Workday

  • eBooks // Mar 2014

    The Outside-in Approach to Order Fulfillment: Providing a Seamless Customer Experience eBook

    This report, based on several Aberdeen surveys, will identify best practices and potential improvements in revenue and profit margins.

    Sponsored By IBM

  • White Papers // Feb 2014

    FTP vs MFT: Why it’s time to make the change

    Get the facts you need to make the case for managed file transfer. Read the report to get head-to-head comparisons of cost, reliability, visibility, security & management and get the information you need to make a compelling case for moving to MFT.

    Sponsored By IBM

  • Live Event // Feb 2014

    IBM PureSystems: IT Efficency

    Integrated systems, such as the IBM PureSystems family, combine compute, storage, network and management software into preconfigured platforms optimized for the needs of specific workloads and customer environments. Many customers are using these integrated systems to simplify the data center environment and improve the efficiency of IT operations.IDC's interviewed nine...

    Sponsored By IBM

  • White Papers // Feb 2014

    IBM PureFlex System Ready for Cloud

    The experiences of IBM's customers and partners indicate the benefits can be significant if organizations recognize and embrace the transformational nature of the IBM PureFlex System and Flex System integrated, unified architectures.

    Sponsored By IBM

  • Analyst Briefings // Feb 2014

    Accelerating Solution Deployment with IBM PureFlex and IBM FlexSystem

    IDC interviewed 10 IBM customers and partners that are using IBM PureFlex System or IBM Flex System to optimize the deployment and operation of critical business applications.

    Sponsored By IBM

  • White Papers // Feb 2014

    IBM PureSystems Brochure: A family of expert integrated systems

    Consolidate workloads to reduce the total cost of ownership for your IT infrastructure with IBM PureSystems offerings. These expert integrated systems help simplify your IT infrastructure, deliver new services more rapidly and add capacity cost-effectively.

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" "scenarios"

    Sponsored By IBM

  • White Papers // Feb 2014

    ICSA Labs Network IPS Certification Testing Report

    Learn how IBM Security became certified, by overcoming 5 criteria violations, including logging functions & coverage protection.

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Mar 2014

    Combat the latest security attacks with global threat intelligence

    The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations

    Sponsored By IBM

  • White Papers // Mar 2014

    IBM X-Force Threat Intelligence Quarterly - 1Q 2014

    In this first issue of a new, more nimble quarterly format, IBM X-Force examines methods and motivations of security incidents in the second half of 2013 which Chief Information Security Officers (CISOs) and other security executives can use to stay informed on the latest threats. Since late 2010, IBM X-Force...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure&#8482 Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events...

    Sponsored By IBM

  • White Papers // Mar 2014

    When Millions need access: Identity Management in an interconnected world

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • Webcasts // Feb 2013

    The new frontier. Securing mobile apps

    Smartphones, tablets, and other app-enabled devices are overtaking PCs as the dominant collaboration devices in enterprises. Many organizations are struggling with understanding the implications of developing and deploying apps to new mobile platforms such as iOS and Android. Which risks should app developers be concerned with? What are the new...

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking down silos of protection: An integrated approach to managing application security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM