Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Mar 2014

    A new standard for security leaders. Insights from the 2013 IBM Chief Information Security Officer Assessment

    Building on the 2012 Finding a Strategic Voice IBM study, CAI interviewed 41 executives with information security responsibilities to identify behavior and practices that could strengthen the role and influence of security leaders.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Mar 2014

    Managing security risks and vulnerabilities

    With integrated security intelligence solutions from IBM, organizations can use labor-saving automation to proactively identify security weaknesses, prioritize remediation tasks and take quick corrective action to minimize potential risks across a dynamic infrastructure.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Security intelligence solution from IBM help organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution enables security analysts to extend analysis well beyond typical security data using real-time correlation for continuous insight, custom analytics, and forensic capabilities for evidence gathering.

    Sponsored By IBM

  • Analyst Briefings // Feb 2014

    EMA report: A Provocative New Approach to Integrated Security Intelligence: IBM Introduces QRadar Vulnerability Manager

    This EMA report explores the values of the newest product of the QRadar platform, IBM Security QRadar Vulnerability Manager, the need for better integrated security architecture expressed by enterprises worldwide, and example use cases that highlight the value of the IBM approach. Download this analyst report to discover how...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure&#8482 Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility (RACF®) through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events...

    Sponsored By IBM

  • White Papers // Mar 2014

    When Millions need access: Identity Management in an interconnected world

    For organizations opening their systems to large numbers of internal and external users, IBM solutions meet the scalable identity management, security and compliance needs of both the business and its end users with control over permissions and other user access functions.

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • Webcasts // Mar 2014

    Live Webinar - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Do you want a unified view of IT systems performance, availability and capacity across all server platforms, network devices, applications, and IT business services? In only 40-minutes, learn how up.time can make IT monitoring and reporting easier: Unified, enterprise-level monitoring, alerting and reporting across all Servers, Networks, Applications,...

    Sponsored By Uptime Software

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Do you want a unified view of IT systems performance, availability and capacity across all server platforms, network devices, applications, and IT business services? Unified, enterprise-level monitoring, alerting and reporting across all Servers, Networks, Applications, and IT services. Easy to use and quick to deploy. up.time can...

    Sponsored By Uptime Software

  • White Papers // Oct 2013

    Comparing Data Center Power Distribution Architectures

    Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2014

    High Efficiency Indirect Air Economized-based Cooling for Data Centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jan 2013

    Introducing Social Business for the Mid-Market.

    Aberdeen has studied the business practices of 229 mid-sized companies surveyed for the 2011 Aberdeen Business Review and 61 mid-sized companies profiled in Aberdeen's 2011 Social Collaboration Research. Mid-market organization can achieve strategic benefits from optimizing their Social Business deployments and achieving Best-in-Class status. This report provides directional guidance for...

    Sponsored By IBM

  • White Papers // Apr 2014

    Enabling devices and device management for your mobility/BYOD program

    Which mobile devices will best meet your business goals while satisfying employee preferences? This white paper explores how to maximize your mobility/BYOD program by selecting the right devices for your organization and managing them efficiently, flexibly and securely — using Dell Enterprise Mobility Management and a range of Dell mobile devices.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Securing the enterprise workspace: protect your organization while supporting mobility and BYOD

    Is your mobile workforce contributing to vulnerabilities that could lead to a security breach? This white paper explains how Dell Mobility Solutions for security can help protect your organization’s information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating...

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Maximizing mobile efficiency and productivity

    BYOD programs help employees be more productive, but how is your mobile strategy affecting your IT department? Read this new white paper to learn how Dell Mobility Solution Sets can help you optimize your IT infrastructure, maintain data security, streamline administration, and develop and modernize apps for your mobile workforce.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Dell Mobility Solutions: A powerful portfolio

    How do you balance security, efficiency and freedom of access when rolling out a BYOD strategy? Read this new white paper to see how Dell Mobility Solutions can help. Custom BYOD solutions offer the flexibility of anytime, anywhere access while boosting productivity, enhancing security and streamlining complex IT management.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Enhance and optimize your mobility/BYOD infrastructure

    Wondering how to meet the needs of your growing mobile workforce without increasing security risks or administrative complexity? This new white paper outlines how Dell Mobility Solutions can help you increase mobile performance and capacity for mobility/BYOD initiatives while protecting company resources and streamlining IT management.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    Cisco UCS with Intel Xeon Processors: Built for Virtualization and Consolidation

    Although virtualization technology has made server consolidation possible, it has also created many challenges. Infrastructure is complex, difficult, and time consuming to scale. Network ownership is split between network and server administrators. Security is managed by least-common-denominator approaches. And the massive number of virtual machines these environments spawn taxes server,...

    Sponsored By Cisco

  • Downloads // Apr 2014

    Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

    Sponsored By Webroot Software

  • White Papers // Mar 2014

    HP Proliant Gen8 Servers Positioning Guide

    HP ProActive Insight architecture fundamentally redefines how administration is performed across the entire server lifecycle. Powerful new capabilities automate and simplify system provisioning, troubleshooting, and software updates. Read about the four discint pillars that the HP ProLiant Gen8 Servers and HP Active Insight architecture were built around and what it...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Sponsored By Nlyte Software

  • Case Studies // Mar 2014

    Retail Industry Data Center Case Study

    One of the world’s largest home improvement retailers operating four data centers with over 1,500 servers across a national footprint needed to see detailed information on asset location, age, utilization, power requirements and connections at disparate data centers on one screen.

    Sponsored By Nlyte Software

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • White Papers // Oct 2013

    The Great Debate: One Integrated Business System VS. Siloed Applications

    This white paper covers the types of inefficiencies caused by running disparate business solutions and systems for different departments and how a software platform that unifies critical business processes helps companies grow more rapidly and profitably. This paper reviews numerous case studies of companies that switched from disparate software systems...

    Sponsored By NetSuite

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • White Papers // Feb 2014

    Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime

    To save money, many companies are migrating to less expensive hardware and operation systems, and away from older versions of Oracle. In this white paper, learn about these types of migrations – and how to conquer their challenges. Then, learn about a data replication solution that reduces downtime and failure...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Managing Data through Replication: Avoiding Errors, Improving Access

    CIOs and IT entities looking to secure data and ensure its availability during times of emergency could benefit from employing a data replication tool. Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it...

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Information Governance is Good Business

    It’s no secret that the volume of information is growing significantly, continuing on an exponential growth path. For the enterprise, there is obvious growth of content within the firewall in email, file systems, corporate systems of all types, and even on paper. At the same time, there is also an...

    Sponsored By OpenText

  • White Papers // Apr 2014

    Forrester: Build A Better Business Case for Unified Communications

    This report outlines Forrester's solution for IT infrastructure and operations professionals who are building out communications and collaboration infrastructure. Download this report now to learn how Shoretel helps you define and build the business case for Unified Communications.

    Sponsored By ShoreTel

  • White Papers // Apr 2014

    Assessing IP Telephony Total Cost of Ownership

    Total cost of ownership is a key metric for assessing costs, benefits and risks of implementing Unified Communications - enabling organisations to properly evaluate competing solutions. Learn more about how organisations can align their decision making process with business needs, while understanding the effects of future requirements and functionality.

    Sponsored By ShoreTel

  • White Papers // Apr 2014

    Port Kembla Coal Terminal improves performance in six months with Quintiq

    This case study shows how the Australian company Port Kembala Coal Terminal improved their performance in just six months by implementing Quintiq’s solution.

    Sponsored By Quintiq