Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jun 2014

    Enabling and Protecting the Open Enterprise

    A decade or so ago, security wasn’t nearly as challenging as it is today. Users, data and applications were all centralized in data centers that, in effect, kept them contained within a network perimeter. This eBook outlines how the open enterprise has changed the role of security.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    How Can I Obtain Identity and Access Management as a Cloud Service?

    CA CloudMinder™ provides identity and access management capabilities as a hosted cloud service. Quickly obtain security capabilities without deploying or managing a large IT infrastructure typically associated with enterprise security deployments.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    How CA Technologies Safeguards Competitive Advantage with Proactive Cloud and Web Application Monitoring

    Find out how CA Application Performance Management Cloud Monitor enables the IT team to replicate customer transactions from over 60 global locations to identify potential problems thus ensuring a consistent user experience and quickly resolving any performance problems.

    Sponsored By CA Technologies

  • White Papers // May 2014

    Advanced Malware Protection Everywhere

    Today’s constantly evolving advanced malware and APTs can evade point-intime defenses to penetrate networks. Security professionals must evolve their strategy in lock-step to confront these advanced threats before, during and after attacks. NSS Labs recently cut through the noise surrounding advanced threats and the tools that fight them in the...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Addressing the Malware Challenge - Strategies at Work: An IANS Custom Report

    We all know malware is a problem, but what's really being done about it? - IANS answers this question with in-depth research on how 100 large global organisations are combating sophisticated security threats. In general, the report provides insights on how malware is changing, what the implications for defence are...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Buyer's Criteria for Next-Generation Network Security

    This Next-Generation Network Security Buyer's Criteria will provide an in-depth explanation of the factors that drive organisations to look at next-generation solutions. It offers an analysis of the key capabilities you should look for (and demand) from your network security gear, and will arm you with the information you need...

    Sponsored By Sourcefire, Inc.

  • Case Studies // Mar 2014

    Cisco Annual Security Report 2014 (CASR)

    You have to know the threats to stop them. It's not a question of if – but when and how – Internet criminals will get into your network. The Cisco 2014 Annual Security Report highlights the most current security concerns, such as shifts in malware, trends in vulnerabilities, and the...

    Sponsored By Sourcefire, Inc.

  • White Papers // Mar 2014

    Advanced Malware Protection: Buying Criteria

    In this advanced Malware Protection Buyer's Criteria, we'll identify the key questions you should ask your advanced malware protection vendor, and we'll describe how Sourcefire combines big data analytics, collective security intelligence and enforcement across networks, endpoints, virtual systems and mobile devices, as well as unique Retrospective Security to combat...

    Sponsored By Sourcefire, Inc.

  • eBooks // May 2011

    The Modern Office and You: 5 Ways to Capitalize on Cloud Opportunities

    Many technology providers are nervous about the Cloud and what it means for their business. Rather than look at the Cloud with fear, embrace it and take advantage of the opportunities it brings for new revenue. In this eBook, you’ll learn 5 ways to capitalize on the future of the...

    Sponsored By ConnectWise

  • White Papers // Apr 2014

    The 5 Technology Trends You Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Feb 2013

    Top 10 Reasons to Move to HP Blade Servers

    Enterprise and midsize businesses are increasingly turning to blade servers as the platform of choice to deliver the next generation of virtualized applications. Blade servers can yield significant cost efficiencies over rack servers - while taking up a smaller footprint, consuming less power and providing significant advantages in terms of...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Apr 2014

    Where is the ROI for UC?

    What’s the business case for unified communications? The majority of companies (82%) that implement a UC solution earn a positive ROI. Yet, it can be challenging to get key decision makers on board. Learn how to build a business case for UC by evaluating hard- and soft-dollar savings opportunities, exploring...

    Sponsored By Windstream Communications

  • White Papers // Apr 2014

    Windows Server 2012 – Are You Ready?

    Short: Planning a migration to Windows Server 2012 R2? Explore its new features and benefits – as well as some key considerations when moving from a legacy platform. Plus, learn how to prepare for your move, migrate content efficiently and effectively manage your new environment.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Mergers and Acquisitions: Impacts on Active Directory and Exchange Infrastructures

    In today’s fast-paced market, organizations are often undertake a merger or acquisition in order to remain competitive, and with this come a need for restructuring of the underlying infrastructures such as Active Directory and Exchange email systems.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Office 365 – Bringing Enterprise-Class Cloud Email Capabilities to the Masses

    Learn how migrating to the Microsoft® Office 365 cloud-based messaging and collaboration solution can benefit your organization’s business-critical email infrastructure in terms of availability, functionality and cost savings in this webcast from Dell™.

    Sponsored By Dell Software

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Microsoft Exchange

    Whether you are transitioning from a legacy platform, consolidating multiple Exchange environments or upgrading to a more recent version of Exchange, learn how the tools and processes outlined in this webcast can help streamline your migration project.

    Sponsored By Dell Software

  • Videos // Apr 2014

    Mastering Migration Webcast Series: Mergers and Acquisitions—Controlling Impacts on Active Directory and Exchange Infrastructures

    Learn how the strategies for consolidating Exchange and Active Directory outlined in this white paper can help you choose the right strategy for your organization, and how combining tools and processes can ensure a successful consolidation project.

    Sponsored By Dell Software

  • Webcasts // May 2014

    On-demand Webcast: Beyond High Availability

    Information has become the lifeblood of most enterprises, and competitive advantage goes to those organizations that can make data available to decision-makers anytime, anywhere and in whatever context needed. This is often difficult to accomplish in today's siloed environments in which data is often maintained within legacy environments. In addition,...

    Sponsored By Dell Software

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    A secure, scalable and cost-effective Cloud Platform

    This case study explores the challenges faced by Tickethour before to entering to the UK market, and the reasons that took them to consider a Cloud base solution that offered security and scalability while guaranteeing an ease use and efficient maintenance process.

    Sponsored By Fujitsu

  • White Papers // Jul 2014

    Case Study: Cloud Iaas implementation at Ajinomoto Co. Inc.

    This case study is exploring the benefits of a Cloud IaaS pay-per-use Model. Ajinomoto is a japanese organsation with activities in the food industry, they needed to decentralise the production and disaster recovery systems, while reducing costs and time with DR systems maintenance. Download this case to learn what was...

    Sponsored By Fujitsu

  • White Papers // May 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • White Papers // Mar 2014

    Global Compliance for Data Security

    Driven on by relentless news about security breaches and data loss, law makers and regulators the world over are increasingly engaged in implementing new legal frameworks and defining new obligations for data security. Prominent within recent legal developments has been a focus on encryption, not only of portable equipment and...

    Sponsored By Vormetric

  • White Papers // May 2014

    Whitepaper: Total Cost of Ownership

    In today′s difficult business climate, every company is looking to drive cost out of its business and impact the bottom line. This whitepaper presents the tools you need to build a business case to assess—and eventually lower—the total cost of ownership of your HR technology footprint.

    Sponsored By Workday

  • White Papers // May 2014

    SAP Enterprise Mobility: Bringing a Cohesive Approach to a Complex Market

    Social, mobile, big data, and cloud technologies are creating complexity for the enterprise, but embracing the changes associated with this third "wave" of IT can lead to more productive mobile workers as well as better communications with employees, partners, and customers. The trends in the enterprise mobility landscape drive a...

    Sponsored By SAP

  • White Papers // May 2014

    Whitepaper: Global at the Core

    Global business can’t be served by legacy applications. That’s why Workday designed SaaS solutions that are global at the core. This whitepaper explains how Workday has built modern, global enterprise application solutions that effectively transform enterprise business by providing superior information, agility, control, and economics.

    Sponsored By Workday

  • White Papers // May 2014

    Driving Business Innovation with a New Generation

    Every industry that is dependent on information technology (IT) is in the midst of a major transition brought about by the combination of four primary forces. These four forces make up the 3rd Platform for business applications, succeeding client/server (2nd Platform) and mainframes (1st Platform). The 3rd Platform takes applications...

    Sponsored By SAP

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • White Papers // Feb 2014

    Managing Risk in an Active Directory Integrated Virtualized Environment

    Explore the interdependent and combined security issues of Active Directory (AD) and virtualization, as well as how to identify and manage these risks. Gain insight into the native audit capabilities of these technologies and learn how they provide centralized visibility into your IT environment.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Enterprise Best Practices for Real Time Auditing and Event Archival

    With data being generated at a record-setting pace, it’s never been more critical for your organization to properly manage it. Learn how the insights in this white paper can help transform your IT organization and help them intelligently collect, organize and store data.

    Sponsored By Dell Software

  • Videos // May 2014

    Product Preview: Workforce Alignment

    Alignment is more than just cascading goals—people, and the work they are doing, must be aligned with individual and organizational initiatives. In this product preview, you will learn how Workday helps businesses understand this alignment and identify which workers are contributing most to their organization's strategic goals and success.

    Sponsored By Workday

  • Videos // May 2014

    Video: Workday Time Tracking (Epipheo)

    Time tracking is painful. But it doesn't have to be. You just need a better system. And with Workday Time Tracking, you can have one. Watch the video to learn about this cutting-edge time and attendance application that allows you to process payroll and do workforce analysis in minutes.

    Sponsored By Workday

  • White Papers // Feb 2014

    The Right Way to Prove Identity and Establish Trust

    Right now, one of your employees is accessing network resources. Do you know who it is? See how to verify user identities and protect your company’s critical information. Read this technical brief.

    Sponsored By Dell Software

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // May 2013

    Top five questions you should ask before purchasing a two-factor authentication solution

    Two-factor authentication is critical for safeguarding your company’s critical information. In this technical brief, discover five things to know before purchasing a two-factor authentication solution, and which solution is the best fit for your business.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    The Use of Ceiling-Ducted Air Containment in Data Centers

    Ducting hot IT-equipment exhaust to a drop ceiling can be an effective air management strategy, improving the reliability and energy efficiency of a data center. Typical approaches include ducting either individual racks or entire hot aisles and may be passive (ducting only) or active (include fans). This paper examines available...

    Sponsored By APC by Schneider Electric

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes FISMA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet FISMA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric

  • White Papers // May 2014

    Nightmare on Delegation Street with Native AD Tools

    Delegating Active Directory (AD) permissions – and managing and reporting on those delegations – is a nightmare. If you’re using native tools, that is. With the right tools, the job is easy. Learn how to put your AD delegation nightmares to rest – forever.

    Sponsored By Dell Software