Subscribe: Most Popular White Papers and WebcastsNetwork Design and Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
business  cloud  data  discover  enterprise  infrastructure  learn  network  performance  published hewlett  published  security  visibility 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Design and Management Research

Most Popular White Papers and Webcasts Network Design and Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Tue, 27 Sep 2016 09:55:08 EDT

Last Build Date: Tue, 27 Sep 2016 09:55:08 EDT


Determine and Compare Hybrid Cloud TCO: Discovering Key Approaches

Tue, 27 Sep 2016 24:00:00 EDT

Download now to discover 2 methods for determining and comparing hybrid cloud TCO. Learn how to select the right type of hybrid infrastructure that fits your unique requirements for where apps will be deployed across traditional IT, public, private, and managed cloud. Published by: Hewlett Packard Enterprise

How to Create a Comparative Multi-Cloud TCO Analysis Spanning Public, Private and Managed Cloud

Tue, 27 Sep 2016 24:00:00 EDT

In this 451 Research report, discover a formula which allows IT decision-makers to make a quick-and-easy cost comparison of their cloud options. Read on to determine how several key factors—such as automation, maturity, architecture, and capacity—impact the economic benefits of private, public and managed cloud. Published by: Hewlett Packard Enterprise

10 Facts Every I&O Pro Should Know About Cloud Economics

Sun, 31 Jul 2016 24:00:00 EDT

Are you making the most of your cloud investments? Discover in this Forrester report the core principles of strategic cloud use, and from it you will glean the 10 most important facts every I&O professional should know about cloud economics. Published by: Hewlett Packard Enterprise

Raspberry PI with Java: programming the internet of things

Tue, 27 Sep 2016 24:00:00 EDT

In this chapter from the book Raspberry PI with Java: Programming the Internet of Things, Stephen Chin walks you through the process of setting up (or baking) the Raspberry Pi. Published by:

Kona Client Reputation

Thu, 31 Dec 2015 24:00:00 EST

Discover the business benefits and operational benefits you can achieve by adding a new, advance algorithm to your security infrastructure. Profile malicious users before they have a chance to infect your network. Published by: Akamai

Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements

Thu, 31 Dec 2015 24:00:00 EST

This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe. Published by: Gigamon

The Right Mix: Developing the Right Hybrid IT Infrastructure

Sun, 31 Jul 2016 24:00:00 EDT

Discover how to formulate the right hybrid IT infrastructure to meet the needs of your apps, services, and enterprise. Access now to learn the formula for achieving the optimal mix of traditional IT, private cloud, and public cloud services. Published by: Hewlett Packard Enterprise

Harnessing the Power of Metadata for Security

Wed, 31 Aug 2016 24:00:00 EDT

Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation. Published by: Gigamon

GigaSECURE Security Delivery Platform

Tue, 04 Aug 2015 24:00:00 EDT

Discover how to shift your security strategy from perimeter defenses towards a detect and protect frameworkm gaining greater visibility in the process. Learn how to extend the reach of your security applications everywhere on your network by giving them the right traffic at the right time. Published by: Gigamon

Configuring the Hyper Converged Cloud: HPE Helion CloudSystem

Fri, 23 Sep 2016 24:00:00 EDT

Learn how to install and configure the hybrid cloud HPE Helion CloudSystem on a hyper-converged infrastructure environment. Download now to discover a cost-effective and efficient hyper-converged cloud solution with highly integrated components and compact form factor, offering an easy path to hybrid cloud. Published by: Hewlett Packard Enterprise

IT Workload Automation (WLA): Market Providers on the Radar

Thu, 31 Mar 2016 24:00:00 EDT

Discover a complete evaluation of one leading workload automation (WLA) portfolio provider, and in it, learn how to centrally manage a vast variety of enterprise workflows and align resources to meet real-time business demands. Additionally, assess this WLA tool along 5 critical criteria. Published by: CA Technologies

Importance of Incident Response Collaboration

Wed, 21 Sep 2016 24:00:00 EDT

This e-guide helps you create a formal incident response plan that allows for effective and efficient collaboration between groups so you can mitigate threats fast. Ensure smooth containment and recovery whenever a breach occurs. Published by: Dimension Data

Digital Identity Insights: Dangerous Access, IoT Security, and Compliance

Wed, 16 Sep 2015 24:00:00 EDT

Join digital identity expert Chris Hickman for a review of the current state of the Internet of Things (IoT) from a security perspective and the critical role that digital identity authentication has in helping companies secure consumer-facing technology. Published by: Certified Security Solutions (CSS)

IDC Whitepaper: Integration is a core competency of digital transformation whitepaper

Mon, 01 Aug 2016 24:00:00 EDT

This feature white paper analyses three focal points of digital transformation, and the way these can transition existing systems, processes, organization structure, and relationships. Also, gain insight on key recommendations for this transformation Published by: Red Hat

Two Server Memory Types Shaking Up Performance Expectations

Tue, 20 Sep 2016 24:00:00 EDT

Memory manufacturers are getting creative for high performance. High Bandwidth Memory (HBM) and Hybrid Memory Cube (HMC) module could appear in the next generation of servers. This exclusive e-guide details each new memory type and how they're shaking up performance expectations. Published by: Dell EMC and Microsoft

The Power of Precise Threat Intelligence: Which SecureWorks service is right for me?

Wed, 31 Aug 2016 24:00:00 EDT

Creating meaningful threat intelligence requires specialized tools and expertise that go well beyond simple alerts and content searches. Discover hot to achieve this level of expertise within this short white paper. You'll gain a greater visibility into the deepest part of your network and better understand malware and the actors behind it. Published by: SecureWorks

Mobile Performance Solutions

Tue, 31 May 2016 24:00:00 EDT

This product overview highlights an integrated mobile and cellular web performance platform that can help you reduce cost by eliminating infrastructure needed to deliver mobile content, increase revenue by optimizing mobile web performance , and get ahead of competition by leveraging key user insight to tailor customers' mobile experiences. Published by: Akamai

eCommerce in the Cloud: Bringing Elasticity to Ecommerce

Wed, 31 Dec 2014 24:00:00 EST

Learn about the rise of electronic commerce, and how enterprises can leverage content delivery networks and hybrid cloud networks to get ahead in the market. Published by: Catchpoint Systems Inc.

The Security Fabric of The Cloud

Fri, 22 Apr 2016 24:00:00 EDT

This white paper explores the 5 traits every cloud environment has to have to ensure its safety. The first three things you need to be are: scalable, to meet volume and performance demands, aware, for deep visibility of the traffic traveling your network, and actionable, in order to be able to adapt to any discovered threat. Published by: Fortinet, Inc.

Securing Office 365 Is Easier Than You Think

Thu, 22 Sep 2016 24:00:00 EDT

SaaS security concerns can no longer be ignored: Discover how to safely enable Office 365. Read on to address O365-specific security concerns, including details on how to secure O365 from malware insertion and data loss, gain visibility into SaaS usage, and more. Published by: Palo Alto Networks

Say Hello, Again, to SIEM

Wed, 31 Aug 2016 24:00:00 EDT

SIEM products are ever-changing technologies. Here's what you need to know now about security information and event management tools. Published by:

Gain Network Visibility Or Fall Behind

Wed, 21 Sep 2016 24:00:00 EDT

This data sheet introduces a product that allows you to monitor all network components critical to service delivery, from your websites and apps to the DNS infrastructure and cloud – and beyond. Published by: Catchpoint Systems Inc.

EMC DSSD Rack-Scale Flash Overview

Mon, 29 Feb 2016 24:00:00 EST

Next-gen applications that take advantage of today's data growth are often too intensive for existing storage architectures. This video details a new storage platform that overcomes the limitations of direct-attached PCIe flash and all flash arrays by connecting ultra-fast, shared flash to rack-servers using the lowest latency protocols. Published by: Dell EMC

New Flash Storage Appliance: Game-Changing Performance for Current and Future Applications

Thu, 30 Jun 2016 24:00:00 EDT

This data sheet discusses a storage platform that unlocks the full power of flash storage for your mission-critical workloads and applications. Learn how this platform enables you to tap into all of the performance and capacity that flash storage can provide, maximize the capabilities of your existing data and performance-intensive applications. Published by: Dell EMC

NSS Labs 2016 Breach Detection System (BDS) Group Test Results

Mon, 01 Aug 2016 24:00:00 EDT

Expert independent testing has emerged as a critical shortlisting and decision-making tool for IT security teams. In this year's NSS Labs BDS testing, products were tested over a month-long period and subjected to more than 600 attacks. Learn what BDS provides your enterprise with the best protection. Published by: Fortinet, Inc.

Advancing Endpoint Security: The Importance of Threat Intelligence, Visibility

Wed, 31 Aug 2016 24:00:00 EDT

Discover how to mix anti-malware capabilities with high-level visibility and behavioral based detection to eliminate endpoint threats. By arming yourself with these weapons, your organization can not only detect threat actors and their tradecraft, but also slash time of response, minimizing the damage they cause. Published by: SecureWorks

The Energy Efficiency of Passive Optical Local Area Networks (POLANs)

Tue, 20 Sep 2016 24:00:00 EDT

POLAN has been introduced to enable higher bandwidth, coverage, and sustainability than its LAN counterpart. Access now to learn more about how a POLAN system provides a more energy-efficient local area networking solution compared to conventional copper Ethernet. Published by: Nokia

Podcast: Affordable Hyper Conversion Regardless of Business Scale

Tue, 20 Sep 2016 24:00:00 EDT

This podcast details a hyper converged appliance that allows you to easily build a complete, reliable, and scalable I.T. virtualization infrastructure from scratch, and a storage appliance designed to handle database, big data, and virtualization workload properly. Published by: StarWind Software Inc.

Webinar: Affordable Hyper Conversion Regardless of Business Scale

Tue, 20 Sep 2016 24:00:00 EDT

This webinar details a hyper converged appliance that allows you to easily build a complete, reliable, and scalable I.T. virtualization infrastructure from scratch, and a storage appliance designed to handle database, big data, and virtualization workload properly. Published by: StarWind Software Inc.

6 Crucial Incident Response Policy Mistakes to Avoid

Fri, 16 Sep 2016 24:00:00 EDT

Discover how to avoid 6 common pitfalls of a modern incident response policy as shared by expert Kevin Beaver. Access now before your policy's weaknesses make you – and your company – look bad. Published by: Delta Risk

From Campus to Capex: Graduating Network Innovation to Market

Tue, 13 Sep 2016 24:00:00 EDT

In this e-guide, learn about innovation in software-defined networking and network functions virtualization technologies for next-generation networks, and one IT pro's strategies for improving Wi-Fi in a device-saturated dormitory. Published by: Optus

The Benefits of Conducting a Network Security Overview

Thu, 15 Sep 2016 24:00:00 EDT

By preventing rogue projects from proliferating, and adopting a holistic approach to security, you can begin to prove the value of the security team. Access this e-guide to learn more about the benefits of conducting security overviews of every enterprise initiative and tightening up your enterprise's cybersecurity practices. Published by: Gigamon

Enterprise File, Sync and Share on the Cloud

Tue, 20 Sep 2016 24:00:00 EDT

Discover a corporate file sync-and-share system that can displace the need to use consumer grade technology. Published by: TeraGo Networks

SLA-Driven Data Protection Modernization: An ESG Video Interview

Thu, 31 Mar 2016 24:00:00 EDT

In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies. Published by: IBM

Medicat Maintains Market Leadership With Integrated Infrastructure

Mon, 19 Sep 2016 24:00:00 EDT

Access this case study to learn how one health IT provider was able to achieve 99% decrease in response times to enhance performance, 6x faster software delivery to increase speed to market, and more – as a result of implementing new integrated infrastructure systems. Published by: IBM

The Enterprise Network Firewall Market

Wed, 25 May 2016 24:00:00 EDT

Discover how NGFWs have added new features, what roles they play in network security functions today, and what place they have in future security developments. Also learn the strengths of specific NGFWs, as well as cautions for their use. Published by: Fortinet, Inc.

Cyber Security Recommendations from the C-Suite

Mon, 19 Sep 2016 24:00:00 EDT

From this resource, garner the top 5 cybersecurity best practices for enterprise leaders, as illustrated by a survey conducted of over 200 C-level security executives. Read on now to access detailed insight on their expert recommendations for cybersecurity in 2016. Published by: Radware

How Network Security Specialists Inspect Encrypted Traffic

Mon, 19 Sep 2016 24:00:00 EDT

In the following resource, WhatWorks takes a look at NetTects' decision to deploy an SSL visibility tool to detect unwanted network traffic. Uncover a Q&A in which CTO Michael Weinstein reveals his process for network security decision-making. Published by: Blue Coat Systems

Boost Business Value with FlashSystem V9000 and VersaStack

Wed, 28 Oct 2015 24:00:00 EDT

This short resource introduces an integrated infrastructure solution constructed by IBM and Cisco that dramatically reduces IT spending and more efficiently uses resources to boost performance. Published by: IBM

Transformative Business Outcomes Service Management

Thu, 31 Dec 2015 24:00:00 EST

Tune into this brief video to achieve transformative business outcomes with an ITSM that will improve organizational agility, boost business efficiency, and lower ops costs. Watch now to faster realize transformative ideas for the enterprise—and deliver them with greater impact. Published by: Hewlett-Packard Enterprise

How Graphiq Blocked Bot Data-Scrapers & Improved SEO

Mon, 19 Sep 2016 24:00:00 EDT

Uncover not only how to block bot data-scrapers, monitor suspicious activity, and eliminate spikes in traffic, but also how to significantly improve the user experience. Also learn how to deploy an automatically updating "known violators" database to keep up with the latest threats. Published by: Distil Networks

7 Reasons it's Time to Gain SSL Visibility with Application Delivery Controllers

Mon, 19 Sep 2016 24:00:00 EDT

When used with ADCs, some tools can fill the gaps in security coverage created by a lack of visibility into encrypted traffic. Access the following resource and uncover seven ways to improve visibility and data center security. Published by: Blue Coat Systems

Disruption Defined: What Your Business Needs to Know About Moving to the Cloud

Mon, 19 Sep 2016 24:00:00 EDT

Moving to the cloud is a business decision – not a technology decision. In order to become an enduring business, the benefits of the cloud have to be leveraged. Access this e-book to discover how you can remain ahead of the potential pitfalls. Published by: TeraGo Networks

The Definitive Buyer's Guide for Evaluating Enterprise Network Firewalls

Mon, 19 Sep 2016 24:00:00 EDT

This essential guide demonstrates how to reduce your attack surface by making an informed decision on the right firewall for your business. To do so, discover the fundamentals of modern firewall technology, 10 critical business requirements your next firewall must address, and more. Published by: Palo Alto Networks

An Agent of Change in an Era of Intensifying Threats

Wed, 31 Aug 2016 24:00:00 EDT

Discover a defense system tailored specially for your network that includes advanced sandboxing with CPU-level detection. Take the on-going cyberwar back to your cyberthieves' doorsteps by understanding the tools they use, their chosen attack vectors and the methods they employ. Published by: Check Point Software Technologies Ltd.

Agile and DevOps Can Be Friendly Rivals

Thu, 15 Sep 2016 24:00:00 EDT

In some regards, the old and the new -- Agile and DevOps methodologies -- are cut from the same nontraditional cloth, but can they learn to be friends? Published by:

The Top 3 Monitoring Challenges IT Faces

Fri, 16 Sep 2016 24:00:00 EDT

IT's visibility into applications both in-house and in the cloud is more important and more difficult than ever. Discover the top 3 monitoring challenges facing IT teams today and how to overcome them. Published by: AppNeta

Measuring Web App Performance Into and Across Cloud Providers

Thu, 14 Jul 2016 24:00:00 EDT

End user experience is what drives business. To ensure the best possible experience, IT teams need the ability to monitor off-premise apps and services. This webcast teaches you which metrics require attention in measuring app performance, why slow response times are as problematic as downtime, and more. Published by: AppNeta

The Case for Business-critical SaaS Application Monitoring

Thu, 30 Jun 2016 24:00:00 EDT

This case study details how National Instruments was able to overcome their application performance issues by implementing an application performance management platform that provided end-to-end path and user experience monitoring specifically designed for their applications. Published by: AppNeta

The Packet Train Difference

Fri, 16 Sep 2016 24:00:00 EDT

Get an in-depth look at packet train dispersion technology and how it delivers an accurate measure of network performance. You'll learn key benefits of packet train dispersion analysis, how it works, and more. Published by: AppNeta