Networking

As cloud computing grows, how will it impact the network and communications technologies and management?

  • White Papers // Jan 2015

    Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your company’s remote support technology. The report will discuss how to maintain flexibility, simplicity and lower costs while ensuring that your remote support solution allows your support agents to perform advance support tasks quickly...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    A Guide to Selecting the Right Remote Support Solution Tool for your company

    This provides an overview of all the questions that need to be asked when looking at your company’s remote support technology. The report will discuss how to maintain flexibility, simplicity and lower costs while ensuring that your remote support solution allows your support agents to perform advance support tasks quickly...

    Sponsored By LogMeIn Australia

  • White Papers // Jan 2015

    Grow your small or midsize business with a scalable network

    Small and midsize businesses need a robust, scalable network capable of handling any workload securely and reliably. It's critical to select network switches, routers, and wireless access points with the capabilities needed for today's traffic and tomorrow's growth, including mobile and BYOD computing. As part of HP’s Just Right IT...

    Sponsored By HP

  • White Papers // Jan 2015

    Re-architect your network for BYOD

    This whitepaper describes the limitations of legacy networks, especially for supporting BYOD. Understanding these limitations can pave the way for a successful BYOD management policy for campus and branch networks. Download now and find out how a re-architected network- flexible and scalable- makes BYOD easier to secure and manage, yet...

    Sponsored By HP

  • Downloads // Jan 2015

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages occur Tracking response...

    Sponsored By Solarwinds APAC

  • White Papers // Jan 2015

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By Solarwinds APAC

  • White Papers // Dec 2014

    2014 ZDNet Report - Reducing Infrastructure Cost and Complexity Through Colocation

    The growing complexity of managing datacentres is forcing organisations to take a hard look at co-location as a viable alternative to maintaining their in-house datacentre needs. Co-location will allow organisations to have the facilities they need, with provided space, power, cooling, and physical security for the server, storage, and networking...

    Sponsored By M1

  • Videos // Nov 2014

    Video - HP LiveVault

    This video is a demonstration of how LiveVault, a cloud-based server data protection solution from HP Autonomy, can be used to protect critical file data stored on a HP StoreEasy Storage appliance.

    Sponsored By HP

  • White Papers // Nov 2014

    Basic Components and Considerations for Deploying Video Conferencing Solutions

    Video Conferencing as a fundamental tool for businesses to enhance communication and collaboration between employees, partners and customers. With video conferencing becoming a core component of IT infrastructure that enables communication and collaboration, businesses are looking to providers of telephony, business applications and network infrastructure services to include this capability...

    Sponsored By Polycom

  • eBooks // Nov 2014

    Analyzing the Neverquest Malware Threat

    Learn from the F5 Security Operations Center's analysis of the Neverquest malware threat. The team analyzes the programming techniques and methodologies used to develop malware in order to keep F5 security services up to date and effective against any threat. Read this summary report to better understand how it works...

    Sponsored By F5

  • White Papers // Nov 2014

    Operationalizing the Network with SDN

    The focus of SDN is on transforming the network to support applications and meet the expectations of users and businesses that rely on them. Scaling modern networks is challenging due to the explosive growth of compute, network, and application resources─combined with increased mobility of apps migrating to the cloud and...

    Sponsored By F5

  • White Papers // Nov 2014

    EMC’s Comprehensive Flash Strategy

    How fast is fast enough!? Discover how EMC is demonstrating, once again, its core competency for dramatic—and necessary—change within the flash storage space.

    Sponsored By EMC

  • Downloads // Oct 2014

    Find the Root Cause of Your Toughest SQL Server Performance Issues in 4 Clicks!

    Slow SQL Server performance? Server health dashboards keep you guessing. Get to the root cause of performance problems in just four clicks. Only SolarWinds® Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint the root cause of slow SQL...

    Sponsored By SolarWinds

  • Downloads // Sep 2014

    Code faster. Create faster code.

    Intel VTune Amplifier XE 2015 is the premier performance profiler for C, C++, C#, Fortran, Assembly, and Java. Collect rich performance data to tune for hotspots, threading, locks and waits, DirectX, bandwidth, and more. Gain fast insight into performance bottlenecks. Automate regression tests. Intel VTune Amplifier XE 2015...

    Sponsored By Intel Software

  • Downloads // Aug 2014

    Reliable & Secure File Transfer with Serv-U MFT Server

    Serv-U® Managed File Transfer (MFT) Server is a secure alternative to cloud-based and free FTP services. Deployed within your own data center, Serv-U gives you full control of file transfer security and administration. Serv-U allows you to upload and download files from anywhere via Web and mobile clients. Whether it...

    Sponsored By SolarWinds

  • White Papers // Aug 2014

    IBM Threat Protection System

    IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

    Sponsored By IBM

  • White Papers // Aug 2014

    2014 Gartner Magic Quadrant for SIEM

    IBM Security QRadar has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for SIEM. In addition to providing a technology that is a good match to current customer requirements, Leaders also show evidence of superior vision and execution for anticipated requirements. Gartner reveals that customers' greatest...

    Sponsored By IBM

  • White Papers // Aug 2014

    The Total Ecocomic Impact of IBM PureApplication System

    IBM PureApplication System converges computer, storage, networking components, and software into a preconfigured and pretested system. This Forrester Whitepaper will help you to better understand the benefits, costs, and risks associated with the IBM PureApplication System.

    Sponsored By IBM

  • White Papers // Aug 2014

    Quick Guide: SSL VPN Technical Primer

    More users are accessing applications remotely from a range of devices and environments, including personal mobile devices, home PCs, 3G/4G connections and wireless hotspots. So how can you provide remote access without increasing risks arising from unmanaged access points? Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Forrester Report: Build a Better Business Case for UC

    This report details Forrester Research, Inc.’s recommendation for IT professionals building out a Unified Communications and Collaboration infrastructure within their business. The key to success of a UC deployment is delivering benefits to both users and business units. This report guides IT professionals through the key needs, drivers, and likely...

    Sponsored By ShoreTel

  • White Papers // Aug 2014

    Unified Communications Buyers Guide: The Top Ten Requirements for a UC Solution

    This document offers an overview of the current top ten requirements to consider for a premise-based UC solution, with features called out as well as a ShoreTel case study.

    Sponsored By ShoreTel

  • Case Studies // Jul 2014

    A Forrester Total Economic Impact Case Study

    Forrester Research conducted a Total Economic Impact™ (TEI) study to examine the potential return on investment (ROI) enterprises may realize by deploying Polycom voice solutions for Microsoft Lync. Download this case study to understand the framework for evaluating the potential financial impact of Polycom voice solutions within their organizations....

    Sponsored By Polycom

  • White Papers // Jul 2014

    2014 Survey Report - Remote Collaboration Challenges & Strategies to Overcome

    Polycom surveyed 5,000 business professionals from all job levels around the world that focused on collaboration challenges to support a mobile and flexible working environment. Download this survey to learn what these Senior IT professionals say are their biggest remote collaboration challenges and discover the strategies they deploy to...

    Sponsored By Polycom

  • White Papers // May 2014

    The Complete Guide to Disaster Recovery Planning

    Whether man made or naturally occurring, disasters can be a real threat to a company’s survival. Some common disasters include : Catastrophic security compromise Fire Flood Earthquake Power failure This comprehensive guide will help you understand what a disaster recovery plan is and how to effectively implement one for your...

    Sponsored By Macquarie Telecom Australia

  • White Papers // May 2014

    IDC Product Flash: IBM Releases Threat-Aware Identity and Access Management for Cloud, Mobile and Enterprise Security

    Industry analyst firm IDC reviews the latest release of IBM Security identity and access management (IAM) solutions.

    Sponsored By IBM

  • Case Studies // Apr 2014

    Cisco Case Study

    Using IBM Security AppScan Enterprise, Cisco empowered its developers and QA personnel to find and fix application security issues before deployment. It’s helped drive a 33 percent decrease in security issues and reduced post-deployment remediation costs significantly.

    Sponsored By IBM

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • Downloads // Apr 2014

    Simplify remote IT administration with DameWare Remote Support

    Support hundreds of end-users without having to leave your desk. DameWare Remote Support is an easy to-use sysadmin tool that lets you manage servers and workstations remotely, and deliver faster support for end-users. From a single, user-friendly interface, initiate multiple remote sessions with Windows®, Linux®, and Mac OS® X systems....

    Sponsored By SolarWinds

  • White Papers // Apr 2014

    The 5 Technology Trends You Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • Downloads // Mar 2014

    Free Trial - Unified IT Monitoring for Infrastructure and Applications with up.time®

    Powerful and Unified IT Monitoring Software: From physical to virtual to cloud, get the deep reporting and proactive monitoring you need to stay on top of IT performance, availability, and capacity. up.time® has customizable and role-based dashboards to monitor Servers, VMs, Applications, Services and the Network across all platforms, on-premise,...

    Sponsored By Uptime Software

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Fix spotty wireless coverage and improve connectivity with the wireless heat maps in SolarWinds® Network Performance Monitor. Display wireless coverage and signal strength using automated polling of adjacent access points. Map the location of connected clients within a few meters. Generate user-sourced wireless signal strength surveys for coverage in...

    Sponsored By SolarWinds

  • Analyst Briefings // Mar 2014

    Magic Quadrant for Master Data Management of Customer Data Solutions

    Read this Gartner Report: Gartner Magic Quadrant for Customer Master Data This Gartner's Magic Quadrant offer insight into the part of the packaged MDM solution market that focuses on how organizations master and share a "single version" of customer data.

    Sponsored By IBM

  • White Papers // Mar 2014

    Combat the Latest Security Attacks with Global Threat Intelligence

    The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.

    Sponsored By IBM

  • White Papers // Mar 2014

    Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks.

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

    Sponsored By IBM

  • White Papers // Mar 2014

    Breaking Down Silos of Protection: An Integrated Approach to Managing Application Security

    An enterprise runs hundreds, if not thousands, of applications, many of which are vulnerable to attack. The necessary response is to replace point security products with integrated solutions and adopt risk-based application security management. IBM Security solutions can be the foundation.

    Sponsored By IBM

  • White Papers // Feb 2014

    Mobile Connect

    Mobile users increasingly expect IT to extend support to critical enterprise applications, data and resources. That access offers benefits to your organization, but introduces significant risks. Find out how you can give your employees safe, easy access to the resources they need from iOS, Android™ and Windows 8.1. Read the...

    Sponsored By Dell Software

  • White Papers // Feb 2014

    10 Tips for Moving Social Media and Mobile Marketing out of Silos

    Read this white paper for 10 tips on integrating customer data across your marketing, and find out how to deliver personalized, seamless interactions through mobile, social media, and other channels to create lasting—and profitable—customer engagement.

    Sponsored By IBM

  • White Papers // Feb 2014

    Making Sense of the Chaos: Measuring The Influence of Social Media

    Just as there are valuable marketing tools for monitoring social media and managing social marketing campaigns, there are also tools available to measure the effectiveness of those social campaigns. Read more for a better understanding of the true value of social marketing and the three pillars of social media.

    Sponsored By IBM

  • White Papers // Feb 2014

    ICSA Labs Network IPS Certification Testing Report

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how midsized organizations can improve endpoint security, patch compliance and lifecycle management on a limited budget.

    Sponsored By IBM