Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jan 2014

    Cybersecurity Imperatives: Reinvent Your Network Security With Palo Alto Networks ®

    Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.

    Sponsored By Palo Alto Networks

  • White Papers // Jan 2014

    Big Data, Big Risks

    The cloud computing landscape continues to realize explosive growth. This white paper outlines what IT and security professionals need to know about the significant security risks of big data, including critical security vulnerabilities, risks, and challenges, key business and technical issues such as controls, privacy, and compliance and effective and...

    Sponsored By Vormetric

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Jan 2014

    Driving Enterprise Transformation with Box and Office 365

    Today, there is a gap growing between the expectations of end-users for simple, effortless apps in the workplace and the requirements of IT to protect content with enterprise-grade security. To cope with these conflicting trends, many organizations are now investing in an ecosystem of cloud applications and services. This is...

    Sponsored By Box

  • Webcasts // Jan 2014

    Webcast: The Next Frontier to the Mobile Enterprise

    Did you know that more than 1.5Bn mobile devices will be shipped in 2016? These devices are more powerful than ever, empowering users to access, share, and collaborate on information in new ways that we never thought possible. Join Box to learn more about the current trends in enterprise mobility...

    Sponsored By Box

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • White Papers // Dec 2013

    Cloud Resource Management the Right Way

    Find out how Red Hat® CloudForms gives IT administrators and managers a comprehensive solution to optimize their virtual, private cloud, and hybrid cloud infrastructures with advanced capacity planning and sophisticated resource management capabilities.

    Sponsored By Red Hat

  • White Papers // Dec 2013

    Lenovo Recommends: 15 Steps to Reducing Security Risks In Enterprise Mobility

    This checklist is designed to help you identify key steps to take to minimize the potential for security breaches and loss of data associated with mobile devices. Although every enterprise is unique, these 15 points will provide you with a strong foundation for assessing your current mobile security plans and...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    Determining Enterprise Readiness to Support Employee-Owned Devices

    The use of employee-owned devices (EODs) within the enterprise has exploded in just two short years. In a number of cases, the use has preceded the implementation of processes and structures to fully support them. As a result, organizations must quickly catch up. Enterprises need a cohesive plan that addresses...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    The Compelling Case for Touch-Enabled Notebooks, Now!

    One of the most important changes to IT infrastructure resulting from the rapid rise of BYOD and mobility is the move to touch- or gesture-based interfaces. Most consumer apps and many versions of business applications are now touch-enabled and many more will be in the next 12 months. End...

    Sponsored By Lenovo

  • White Papers // Dec 2013

    3 ways clinicians can leverage a patient portal to craft a healthcare community

    You probably have several goals for your patient portal of choice. Is “community” one of them? With a bevy of vendors offering portal solutions, it can be challenging for a hospital to know where to start. Fortunately, YourCareCommunity helps ease the decision-making process.

    Sponsored By Healthtech Holdings

  • White Papers // Dec 2013

    Patient Portals: A Platform for Connecting Communities of Care

    Connecting patient health data across the care continuum is essential to achieve improved care, increased access to personal health records and lowered costs. A successful approach rests in having the hospital serve as the connectivity hub for bringing patients, care givers and healthcare professionals together in a secure, online environment....

    Sponsored By Healthtech Holdings

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" "scenarios"

    Sponsored By IBM

  • Analyst Briefings // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • Webcasts // Dec 2013

    On-demand Webcast: Secure Collaboration with Dropbox for Business and Centrify SSO for SaaS and mobile

    Dropbox for Business lets you collaborate with ease, making storing and sharing files both intuitive and secure. More than 4 million businesses use Dropbox everyday to work smarter. Centrify and Dropbox have partnered to give Dropbox for Business users single sign-on and provide IT with centralized management and security using...

    Sponsored By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • eBooks // Nov 2013

    Do more with your data.

    IBM’s innovative portfolio of data management software and systems helps clients do more with less – and use data as a secret weapon in the competitive battle.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Security AppScan

    IBM® Security AppScan® enables organizations to assess the security of their applications and achieve regulatory compliance by identifying vulnerabilities and generating reports with intelligent fix recommendations to ease remediation.

    Sponsored By IBM

  • Downloads // Nov 2013

    IBM Rational Application Developer for WebSphere trial download

    IBM® Rational® Application Developer for WebSphere® Software accelerates the development and deployment of Java™, Java EE, Web 2.0, mobile, OSGi, portal and service-oriented architecture (SOA) applications. Both expert and novice developers can increase productivity and efficiency by using its many integrated capabilities for easier development, testing, analysis, and delivery of...

    Sponsored By IBM

  • eBooks // Nov 2013

    Transform Your Data Centers - HP ProLiant Gen8 - the World's Most Intelligent Servers

    From core to cloud HP ProLiant Gen8 servers are transforming data center expectations and economics with the world's most intelligent servers. Learn how they deliver maximum performance and reliability while simplifying day-to-day management. Sponsored by HP and Intel® Xeon® Processor : Intel,...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Nov 2013

    We’re no.1 for a Reason

    Alaska Communications is proud to be recognized as a world leader in Ethernet, and the first and only carrier in Alaska with Carrier Ethernet 2.0 Certified services. Our Business Ethernet is designed to provide the best performing and most reliable network for even the most demanding and complex network environments....

    Sponsored By Alaska Communications

  • eBooks // Nov 2013

    The MDM advantage: Creating insight from big data

    To help enterprises create trusted insight as the volume, velocity and variety of data continue to explode, IBM offers several solutions designed to help organizations uncover previously unavailable insights and use them to support and inform decisions across the business. Combining the power of IBM® InfoSphere® Master Data Management (MDM)...

    Sponsored By IBM

  • White Papers // Nov 2013

    Transforming your voice, video and collaboration infrastructure - The IBM journey toward unified communications for mobile and social collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • Analyst Briefings // Nov 2013

    Maximizing Your Virtual Environment for the Latest Business Initiatives

    Virtualization is one of the most highly demanded of all IT projects this decade because it enables enterprises to reduce capex and opex costs and at the same time increase business efficiency and agility. However, implementing, supporting, and managing virtualization can often be difficult tasks, especially as deployments increase in...

    Sponsored By IBM

  • White Papers // Nov 2013

    Build a business case: Developing custom Apps

    Custom applications deliver significant value and they provide the opportunity to automate unstructured work processes to make the business far more innovative, efficient and competitive.

    Sponsored By ServiceNow

  • White Papers // Nov 2013

    Consolidation: The foundation for IT business transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • Webcasts // Nov 2013

    Product Preview: Enterprise Cloud for HR and Finance

    Workday provides a suite of global enterprise applications—from HR to Finance—all delivered in the cloud. This video shows how Workday allows businesses to operate with a complete picture of their company, align people and financial performance, keep the workforce engaged and supported, and embrace change across the enterprise.

    Sponsored By Workday

  • Webcasts // Nov 2013

    Time Tracking

    Want to reduce labor costs, minimize compliance risks, and increase worker productivity? Workday Time Tracking makes all this and more possible. Watch the product preview to learn why Workday is a good fit for your organization.

    Sponsored By Workday

  • White Papers // Nov 2013

    Security Without Compromise: Context-Aware and Adaptive Next-Generation Firewalls

    Mobility has brought down the wall between business and personal, spiking corporate productivity and putting work/life balance within reach. The bring-your-own-device (BYOD) phenomenon is a way to be constantly connected for work, family, and play. Companies that do not adapt and allow people to work where, when, and how they...

    Sponsored By Cisco

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • White Papers // Oct 2013

    AppAssure 5: The next generation of backup, replication and recovery software

    IT environments are increasingly complex, with virtual and physical machines spread across local, offsite and—increasingly—cloud resources. AppAssure 5 alleviates these concerns with fast backup and even faster replication and recovery. As a key data protection element of Dell’s Fluid DataTM Architecture, AppAssure 5 controls cost, optimizes performance and enhances protection...

    Sponsored By Dell

  • White Papers // Oct 2013

    Strategy Guide to Converged Infrastructure in Government

    With HP's Converged Infrastructure, state and local governments build a foundation that can meet the demand for new services - from drivers wanting to renew their licenses via mobile phones to police officers requiring instant views from remote video surveillance. By offering three different converged infrastructure reference solutions, HP enables...

    Sponsored By Hewlett-Packard & Intel®

  • White Papers // Oct 2013

    Intelligent performance for a growing business: HP ProLiant Gen8 e-Series servers

    Learn more how HP ProLiant Gen8 e-Series servers are simple, reliable, affordable solutions that let a growing business boost performance as well as productivity. The HP ProLiant name ensures reliability. And that reliability is an especially wise investment for businesses with limited information technology (IT) budgets. Sponsored by HP...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Oct 2013

    HP ProLiant DL360p & DL380p Gen8 Servers: Power, Flexibility and Serviceability

    Explore the Power, Flexibility and Serviceability HP ProLiant DL360p and DL380p Gen8 Servers The DL360p and DL380p deliver innovative advances in performance, serviceability and lifecycle automation to address the pressing demands of today’s data-intensive and virtualized IT environments. Based on the HP ProActive Insight architecture, these intelligent servers can...

    Sponsored By HP & Intel® Xeon® Processor

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Oct 2013

    IDC paper - Extending PC Life-Cycle Management and Client Virtualization with VMware Horizon Mirage

    PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than...

    Sponsored By VMware

  • Videos // Oct 2013

    Tech Tips: Deployment of VMware Horizon View Virtual Desktop Infrastructure

    Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware...

    Sponsored By VMware

  • Downloads // Oct 2013

    Intel® Parallel Studio XE 2013 SP1

    Efficiently boost application performance. This development suite offers industry-leading compilers, along with highly tuned performance libraries for math, crypto, imaging, compression, and others. Harness performance from the latest processors simply by recompiling your code. Scale for multicore and many-core architectures with Intel® Threading Building Blocks and Intel® Cilk Plus™ parallel...

    Sponsored By Intel Software

  • Downloads // Oct 2013

    Intel® Inspector XE 2013

    Intel® Inspector XE finds memory leaks, corruption, deadlocks, data races, and more in C, C++, C#, F#, Fortran, and MPI applications. Use a normal build: no special compiler or recompiles are required. Heap growth analysis and debugger breakpoints simplify diagnosis of difficult bugs early in the development cycle―when they are...

    Sponsored By Intel Software

  • White Papers // Mar 2014

    Porting Applications to Linux on IBM System Z

    This white paper examines some of the common misconceptions about porting applications to Linux on IBM System z mainframes. It also provides an overview of the process used by the Platform Technology Center to port applications to Linux on IBM System z hardware. This paper will also discuss the decision...

    Sponsored By IBM

  • White Papers // Jan 2014

    The Smart Disaster Recovery Strategy for Desktops Desktops as a Service (DaaS)

    Most organizations believe that in the unlikely event of a natural disaster or major power outage, their disaster recovery (DR) plan will keep them up and running. But the reality is, these events happen more often than you think and most DR plans aren't up to snuff. They typically cover...

    Sponsored By Desktone

  • Downloads // Apr 2014

    Dameware - Provide secure remote support to end-users located anywhere in the world.

    With DameWare Remote Support you can: Support end-users and computers located both inside & outside your firewall Remotely control the desktop of Windows®, Mac OS X® and Linux computers Take advantage of extensive security and encryption capabilities, including multiple authentication methods Centrally manage shared host lists, users & administrators,...

    Sponsored By SolarWinds

  • White Papers // Apr 2014

    Guidelines for deploying Citrix BYOD solutions

    Read this white paper to learn how Citrix can help you design, implement, deploy, maintain and support a BYOD infrastructure that will enable your environment for BYOD transformation and success.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Enterprise Mobility Management: Embracing BYOD Through Secure App & Data Delivery

    Discover how IT can easily manage the ever-expanding diversity of mobile devices and platforms and expand their value by focusing on managing business content with a complete enterprise mobility management solution.

    Sponsored By Citrix

  • White Papers // Apr 2014

    The 10 Must Haves for Secure Enterprise Mobility Management

    While enterprise mobility brings opportunity for your users and organization, it also invites risk. Organizations can use this white paper as a mobile security framework and a checklist for evaluating enterprise mobility vendors.

    Sponsored By Citrix

  • White Papers // Apr 2014

    Taking Your Enterprise Mobile: An Executive Checklist

    According to nearly every analyst study, security is the primary inhibitor to both enterprise mobility and bring-your-own-device (BYOD) programs, and 17% of enterprises have already experienced a mobile breach. Yet the opportunities they present and a workforce reluctant to give up using their devices for work means taking your enterprise...

    Sponsored By Citrix

  • White Papers // Apr 2014

    Using DaaS to Create the Ideal Desktop User Experience Without a PC

    With the ubiquity of end-user computing long established, organizations now are grappling with a tough dilemma: Users want enterprise-class performance and availability, but they demand the flexibility to use familiar devices and applications—anywhere, and at any time. Download this whitepaper to learn why Desktops as a service (DaaS) can be...

    Sponsored By Desktone

  • White Papers // Jan 2014

    3 Ways to Save Software Costs Paper

    This paper discusses the potential for radically improving cost efficiency with a well thought-out Software Asset Management (SAM) strategy. It aims to improve understanding of the SAM discipline, including the challenges it poses as well as the tactical and strategic advantages it offers. And, it lays out a high-level plan...

    Sponsored By Hewlett-Packard (HP)

  • Webcasts // Nov 2013

    Product Preview: Enterprise Cloud for HR and Finance

    Workday provides a suite of global enterprise applications—from HR to Finance—all delivered in the cloud. This video shows how Workday allows businesses to operate with a complete picture of their company, align people and financial performance, keep the workforce engaged and supported, and embrace change across the enterprise.

    Sponsored By Workday

  • Videos // Mar 2014

    Product Preview: On-Demand Operations (Security/Availability)

    Join Jim Hopp, Workday's Chief Security Officer, as he gives an overview of Workday's on-demand operations, architecture, and how Workday ensures the reliability of the service, including the security of the Workday system, reliability of and the disaster recovery process, and the inherent auditability of the Workday system.

    Sponsored By Workday

  • Podcasts // Mar 2014

    Video: Developing Workday Big Data Analytics with Customers

    With Workday Big Data Analytics, you can integrate, analyze, and visualize data from Workday and non-Workday data to identify root causes, detect patterns/trends, and predict outcomes—all from a single application. Watch as Dan Beck, VP of Product Management, Financials and Analytics explores the state of big data today.

    Sponsored By Workday

  • Podcasts // Mar 2014

    Workday Rising 2013 Highlights

    Experience the energy of Workday Rising 2013, our 7th annual gathering of citizens of the cloud. Watch highlights from the event in this two-minute video.

    Sponsored By Workday

  • Podcasts // Mar 2014

    How We've Re-imagined Software Customization at Workday

    From the beginning, Workday's approach is to make it possible for customers to configure and extend Workday to meet their specific needs, while avoiding the classic problems of software customization. Watch as Workday CTO Stan Swete explains how Workday's approach is different, and why it's the best for modern organizations.

    Sponsored By Workday

  • Videos // Mar 2014

    Enterprise Mobility: A New Way to Work

    Your workforce expects anytime access to information and an intuitive, user-friendly interface. And they want that information from wherever they are. When it comes to mobile, Workday's approach is pretty straightforward: Make it simple, fast, and accessible. Watch this video to discover Workday's unique and innovative approach to mobile.

    Sponsored By Workday

  • White Papers // Apr 2014

    MDM Technology: How to Create the Perfect Solution

    As organizations continue to institute Bring Your Own Device policies, the ability to manage and protect the devices carrying company data will be a critical aspect of any IT department’s operations. Finding the right technology company to help simplify and secure the management of mobile devices will become a top...

    Sponsored By Skyhook Wireless

  • White Papers // Sep 2013

    Identity and Access Management in the Cloud Era

    The explosion of mobile devices, fragmented network access and multiple operating systems makes identity management a big challenge. Centrify through its wide range of products is able to provide firms both basic and advanced identity access management solutions making a fully integrated security possible – across all platforms, across all...

    Sponsored By Centrify

  • White Papers // Nov 2013

    An Overview of Samsung KNOX Active Directory and Group Policy Features

    Samsung KNOX is a set of business focused enhancements to the Android mobile environment for selected Samsung mobile devices. One of the most important new enterprise features provided with KNOX is the ability for KNOX devices to be joined, secured and managed by a Microsoft Active Directory infrastructure. An important...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Samsung KNOX: An Overview for Business Customers

    Samsung, the mobile device market leader, has introduced Samsung KNOX™ for its Android-based mobile platforms to satisfy the device management and security needs of business and government customers. This document provides a more detailed overview of the enterprise integration and management features in Samsung KNOX with a focus on its...

    Sponsored By Centrify

  • White Papers // Nov 2013

    Enterprise Identity Where You Want It

    Gartner ranked Cloud-based Identity and Access Management as the largest market segment in this year's $2 billion cloud-based security services market. Gartner raised some concerns about cloud identity with a focus on where identity is stored. Tom Kemp, CEO of Centrify, explores this issue in more detail and correlates this...

    Sponsored By Centrify

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • Downloads // Apr 2014

    SolarWinds Server & Application Monitor (SAM) Offers Easy Exchange Mailbox Management with NEW AppInsight™ for Exchange!

    SolarWinds Server & Application Monitor provides extensive capabilities to monitor and fix your servers and applications, including custom application monitoring. With AppInsight for Exchange, SAM provides expert alerts and advice along with comprehensive visibility to proactively pinpoint Exchange performance issues. Find & fix problems with Microsoft® Exchange & other...

    Sponsored By SolarWinds

  • Downloads // Mar 2014

    Download a FREE Trial of the Network Performance Monitor from SolarWinds!

    Monitoring your network with SolarWinds Network Performance Monitor (NPM) will not only help you improve the performance of your network, but it can also have a direct impact on your organization’s bottom line. NPM will assist in: Simplifying detection, diagnosis, & resolution of network issues before outages...

    Sponsored By SolarWinds

  • White Papers // Apr 2014

    Build your scalable storage environment upon a dynamic IBM Storwize family foundation

    The IBM Storwize family delivers sophisticated capabilities that are proven, efficient and dependable, in a wide range of storage systems designed to meet the differing needs of organizations, all built on a common platform. Shared technologies and common management features make the Storwize family the right system to meet today's...

    Sponsored By IBM

  • White Papers // Apr 2014

    Enabling devices and device management for your mobility/BYOD program

    Which mobile devices will best meet your business goals while satisfying employee preferences? This white paper explores how to maximize your mobility/BYOD program by selecting the right devices for your organization and managing them efficiently, flexibly and securely — using Dell Enterprise Mobility Management and a range of Dell mobile devices.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Securing the enterprise workspace: protect your organization while supporting mobility and BYOD

    Is your mobile workforce contributing to vulnerabilities that could lead to a security breach? This white paper explains how Dell Mobility Solutions for security can help protect your organization’s information, systems and networks while simplifying administration and supporting employees with forward-thinking mobility initiatives for a range of devices and operating...

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Maximizing mobile efficiency and productivity

    BYOD programs help employees be more productive, but how is your mobile strategy affecting your IT department? Read this new white paper to learn how Dell Mobility Solution Sets can help you optimize your IT infrastructure, maintain data security, streamline administration, and develop and modernize apps for your mobile workforce.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Dell Mobility Solutions: A powerful portfolio

    How do you balance security, efficiency and freedom of access when rolling out a BYOD strategy? Read this new white paper to see how Dell Mobility Solutions can help. Custom BYOD solutions offer the flexibility of anytime, anywhere access while boosting productivity, enhancing security and streamlining complex IT management.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Enhance and optimize your mobility/BYOD infrastructure

    Wondering how to meet the needs of your growing mobile workforce without increasing security risks or administrative complexity? This new white paper outlines how Dell Mobility Solutions can help you increase mobile performance and capacity for mobility/BYOD initiatives while protecting company resources and streamlining IT management.

    Sponsored By Dell Software

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Oct 2012

    SAP and Sybase: A Marriage Made in Database Heaven (IDC)

    Examine information about SAP and Sybase, a year after their merger, provided at analyst briefings in May, 2011. These briefings were held at the SAPPHIRE NOW conference in Orlando, FL, and the Sybase Analyst Summit in New York.

    Sponsored By SAP

  • eBooks // Feb 2014

    Patch Management Best Practices for IT Professionals

    Patch management is one of the largest concerns of IT professionals. With new vulnerabilities being discovered almost daily, keeping systems up-to-date with patches is often a full-time job, especially in larger environments. In addition, the lag time between when vulnerability is discovered and when a virus or worm appears is...

    Sponsored By LabTech Software

  • Videos // Apr 2014

    Engage, Empower and WIN customers by Making First the Mile Smarter with Kofax

    A video that will give you insights on how Kofax helps organisations to increase their responsiveness to customers and put emphasis on the need for a mobile application strategy. Watch this short video now to see how Kofax helped organisations grow their businesses while reducing operating costs.

    Sponsored By Kofax

  • White Papers // Apr 2014

    10 Steps to Mitigate a DDoS Attack in Real Time

    The growing number of sophisticated attacks and countless attack vectors are increasingly difficult to mitigate. Download our 10 Steps to Mitigate a DDoS Attack in Real Time Infographic to help you address current attacks and learn how to build a solution that will help you mitigate risk, lower management costs,...

    Sponsored By F5

  • White Papers // Apr 2014

    How to Fill the Threat Management Gateway Void

    The recent discontinuation of Microsoft Forefront Threat Management Gateway (TMG) requires enterprises to find a new solution to secure corporate access to the web. In choosing a new solution, it’s important for decision-makers to ensure that the solution they select includes the features and functionality necessary to ensure safe and...

    Sponsored By F5

  • White Papers // Oct 2013

    IDC paper - Extending PC Life-Cycle Management and Client Virtualization with VMware Horizon Mirage

    PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than...

    Sponsored By VMware

  • Videos // Oct 2013

    Tech Tips: Deployment of VMware Horizon View Virtual Desktop Infrastructure

    Organizations worldwide are using virtual desktop infrastructure (VDI) to run virtual desktops in the datacenter and deliver these to employees as a managed service. End users gain a familiar, personalized environment they can access anywhere from any device, while administrators gain control and security. With VMware® Horizon View™ (formerly VMware...

    Sponsored By VMware

  • Podcasts // Mar 2014

    Product Preview: Employee User Experience

    Want to empower your employees? Workday's employee self service solutions are available to all of the employees in an organization so they can manage their own information and requests. Check out this video to learn how Workday delivers a user experience that really is "All About Me."

    Sponsored By Workday

  • Videos // Mar 2014

    Product Preview: Strategic Initiatives

    Looking to strategically align and mobilize your talent for business impact? In this product preview, you will see how executives can take advantage of Workday to help effectively align and allocate human capital in support of strategic business objectives.

    Sponsored By Workday

  • Podcasts // Mar 2014

    Product Preview: Manager User Experience

    Today's workforce is more tech-savvy than ever before. They expect their work tools to be business-ready versions of the user-friendly, graphic technologies they already use. That’s why we modeled the Workday user experience after popular consumer-oriented designs. Check out this video to learn how Workday focuses on the manager's user...

    Sponsored By Workday