Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Apr 2014

    Designed to be the best

    Forward-thinking organizations are recognizing the superiority of Power Systems* technology. The Power Systems family offers the ultimate system for today’s compute intensive business applications and databases. “Power Systems continues to prove itself as the ultimate system for compute intensive workloads, high performance analytics, high performance UNIX*, and high performance computing....

    Sponsored By IBM

  • White Papers // Apr 2014

    Smarter Analytics for Insurers - Unlevel the Playing Field with Intelligent Infrastructures

    This Frost & Sullivan provides insight on the importance of infrastructure in optimizing analytics deployment and the key advantages derived by implementing IBM analytics infrastructure solutions. Read how insurance providers, such Unipol Group, Primerica, Unum Group, and Swiss Re, are using IBM Smarter Analytics approach to be more customer centric,...

    Sponsored By IBM

  • eBooks // Apr 2014

    Guarding the Castle

    Learn the strategies and tools that cybercriminals use to infiltrate your network and how you can stop them. See how you can secure your network every minute of the day, against all types of malware, with a high performance firewall that protects against the latest global threats.

    Sponsored By Dell Software

  • White Papers // Sep 2013

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    Learn why anti-evasion is a critical component for your intrusion prevention system. Sophisticated exploits that utilize advanced evasion techniques are all too common. Decoding and normalizing traffic across the network to detect and combat these attacks is critical for your network security plan.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Smarter Analytics for Communications Service Providers: Customer Insight from Analytics-Tuned Infrastructures

    This Frost & Sullivan provides insight on the importance of infrastructure in optimizing analytics deployment and the key advantages derived by implementing IBM analytics infrastructure solutions. Read how Communications Service Providers (CSPs), such as Sprint and Bharti, are using IBM Smarter Analytics approach to become more customer-centric, to better serve...

    Sponsored By IBM

  • White Papers // Apr 2014

    An Executive Guide to Analytics Infrastructure:Imperatives for Advanced Analytics

    Infrastructure Imperatives for Advanced Analytics.Get the most information from your data. Business has never been faster and is increasingly dependent on the timely analysis of large volumes of data for strategic and operational decisions. As executives come to rely on advanced analytics, the importance of a robust IT infrastructure cannot...

    Sponsored By IBM

  • White Papers // Apr 2014

    Where is the ROI for UC?

    What’s the business case for unified communications? The majority of companies (82%) that implement a UC solution earn a positive ROI. Yet, it can be challenging to get key decision makers on board. Learn how to build a business case for UC by evaluating hard- and soft-dollar savings opportunities, exploring...

    Sponsored By Windstream Communications

  • White Papers // Apr 2014

    CloudAccess.net brings high performance to the cloud Case Study

    CloudAccess.net is using an all-flash storage array to support top performance at a competitive cost for its Joomla! Virtual Private Memory Cloud – the world’s fastest Joomla cloud hosting system.

    Sponsored By IBM

  • White Papers // Apr 2014

    MDM Technology: How to Create the Perfect Solution

    As organizations continue to institute Bring Your Own Device policies, the ability to manage and protect the devices carrying company data will be a critical aspect of any IT department’s operations. Finding the right technology company to help simplify and secure the management of mobile devices will become a top...

    Sponsored By Skyhook Wireless

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Sponsored By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    SolarWinds Server & Application Monitor (SAM) Offers Easy Exchange Mailbox Management with NEW AppInsight™ for Exchange!

    SolarWinds Server & Application Monitor provides extensive capabilities to monitor and fix your servers and applications, including custom application monitoring. With AppInsight for Exchange, SAM provides expert alerts and advice along with comprehensive visibility to proactively pinpoint Exchange performance issues. Find & fix problems with Microsoft® Exchange & other...

    Sponsored By SolarWinds

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages...

    Sponsored By SolarWinds

  • White Papers // Feb 2014

    Protect your data: StoreOnce and HP Data Protector

    Your data is everywhere. It’s in the cloud, in virtual environments, in remote offices, and on mobile devices. Plus, there’s more of it, and much of it is business-critical, meaning you need to back up larger volumes of data than ever before without adding costs or bandwidth. Even more importantly,...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Dec 2013

    Lenovo Recommends: 15 Steps to Reducing Security Risks In Enterprise Mobility

    This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices. Although every enterprise is unique, these 15 points will provide you with a strong foundation for assessing your current mobile security plans and...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    Determining Enterprise Readiness to Support Employee-Owned Devices

    The use of employee-owned devices (EODs) within the enterprise has exploded in just two short years. In a number of cases, the use has preceded the implementation of processes and structures to fully support them. As a result, organizations must quickly catch up. Enterprises need a cohesive plan that addresses...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    The Compelling Case for Touch-Enabled Notebooks, Now!

    One of the most important changes to IT infrastructure resulting from the rapid rise of BYOD and mobility is the move to touch- or gesture-based interfaces. Most consumer apps and many versions of business applications are now touch-enabled and many more will be in the next 12 months. End...

    Sponsored By Lenovo

  • White Papers // Jan 2014

    3 Ways to Save Software Costs Paper

    This paper discusses the potential for radically improving cost efficiency with a well thought-out Software Asset Management (SAM) strategy. It aims to improve understanding of the SAM discipline, including the challenges it poses as well as the tactical and strategic advantages it offers. And, it lays out a high-level plan...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // Apr 2014

    Using DaaS to Create the Ideal Desktop User Experience Without a PC

    With the ubiquity of end-user computing long established, organizations now are grappling with a tough dilemma: Users want enterprise-class performance and availability, but they demand the flexibility to use familiar devices and applications—anywhere, and at any time. Download this whitepaper to learn why Desktops as a service (DaaS) can be...

    Sponsored By Desktone

  • White Papers // Apr 2014

    Enterprise Mobility Management: Embracing BYOD Through Secure App & Data Delivery

    Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

    Sponsored By Citrix

  • White Papers // Apr 2014

    The 10 Must Haves for Secure Enterprise Mobility Management

    While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Taking Your Enterprise Mobile: An Executive Checklist

    According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise...

    Sponsored By Citrix

  • White Papers // Apr 2014

    Guidelines for deploying Citrix BYOD solutions

    Read this white paper to learn how Citrix can help you design, implement, deploy, maintain and support a BYOD infrastructure that will enable your environment for BYOD transformation and success.

    Sponsored By Citrix

  • Downloads // Apr 2014

    Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

    Sponsored By SolarWinds

  • White Papers // Jan 2014

    The Smart Disaster Recovery Strategy for Desktops Desktops as a Service (DaaS)

    Most organizations believe that in the unlikely event of a natural disaster or major power outage, their disaster recovery (DR) plan will keep them up and running. But the reality is, these events happen more often than you think and most DR plans aren't up to snuff. They typically cover...

    Sponsored By Desktone

  • White Papers // Apr 2014

    How to Select the Right Remote Support Tool

    Today’s customer support and IT service organizations are charged with supporting ever-more complex environments that include multiple channels of communication to a seemingly limitless number of devices and systems—all while keeping support costs down. To meet these conflicting demands, service organizations are turning to remote support solutions. But as these...

    Sponsored By LogMeIn

  • White Papers // Mar 2014

    Porting Applications to Linux on IBM System Z

    This white paper examines some of the common misconceptions about porting applications to Linux on IBM System z mainframes. It also provides an overview of the process used by the Platform Technology Center to port applications to Linux on IBM System z hardware. This paper will also discuss the decision...

    Sponsored By IBM

  • White Papers // Feb 2014

    Mobile Security: How to Protect the Enterprise in the Mobile Era

    Learn about the three pillars of mobile security, and how they give users the flexibility and access they need while providing a strong foundation that protects systems and data.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Managing Risk in an Active Directory Integrated Virtualized Environment

    Explore the interdependent and combined security issues of Active Directory (AD) and virtualization, as well as how to identify and manage these risks. Gain insight into the native audit capabilities of these technologies and learn how they provide centralized visibility into your IT environment.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Enterprise Best Practices for Real Time Auditing and Event Archival

    With data being generated at a record-setting pace, it’s never been more critical for your organization to properly manage it. Learn how the insights in this white paper can help transform your IT organization and help them intelligently collect, organize and store data.

    Sponsored By Dell Software

  • White Papers // Mar 2014

    Protecting IP Data from Loss and Theft

    This white paper describes the shortest path to reaching the prevention stage of data loss and data theft incidents without bringing data flows to a grinding halt. The paper presents an expanded view of IP and outlines six steps an organization can take to deploy data security controls. Read more...

    Sponsored By Websense

  • Downloads // Apr 2014

    Business Essential: Complimentary Vulnerability Scan

    This complimentary security scanner searches for endpoint vulnerabilities, including misconfigurations, missing patches, open services and backdoors. Run the scan to receive a detailed report so you can address security vulnerabilities before they become a problem. Find out if your endpoints are secure. Try this FREE vulnerability scanner now.

    Sponsored By Webroot Software

  • White Papers // Mar 2014

    HP Proliant Gen8 Servers Positioning Guide

    HP ProActive Insight architecture fundamentally redefines how administration is performed across the entire server lifecycle. Powerful new capabilities automate and simplify system provisioning, troubleshooting, and software updates. Read about the four discint pillars that the HP ProLiant Gen8 Servers and HP Active Insight architecture were built around and what it...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Feb 2014

    On-demand Webcast: How Centrify and Zoom can help you secure your cloud and mobile conferencing

    The Internet makes distances disappear. Take meetings, for example. No longer do meetings among geographically diverse participants require the cost and discomfort of air travel. Now, it's simply a matter of launching an app or signing into a desktop, making sure your hair is combed, and looking into the camera....

    Sponsored By Centrify

  • Webcasts // Mar 2014

    Reducing the Risk of Catastrophic Failure in the Software Defined Data Center

    The Software Defined Data Center (SDDC) is one the hottest areas in high tech, fueled in part by recent introductions of comprehensive offerings of virtualized servers, storage and networking. These abstractions create highly dynamic movements of workloads, and in the process can dramatically affect the physical resources required to power...

    Sponsored By Nlyte Software

  • Case Studies // Mar 2014

    Retail Industry Data Center Case Study

    One of the world’s largest home improvement retailers operating four data centers with over 1,500 servers across a national footprint needed to see detailed information on asset location, age, utilization, power requirements and connections at disparate data centers on one screen.

    Sponsored By Nlyte Software

  • White Papers // Mar 2014

    Security in the Cloud for SAP HANA

    High-speed data analytics is changing the way companies compete, enabling them to generate real-time insights to support their most important business processes. Cloud computing offers a complementary technology that also provides game-changing capabilities for business computing. Yet many companies have been reluctant to deploy mission-critical applications, such as SAP HANA,...

    Sponsored By Vormetric