Subscribe: Most Popular White Papers and WebcastsNetwork Design and Management Research
Added By: Feedage Forager Feedage Grade A rated
Language: English
access  apps  cloud  data  discover  enterprise  learn  management  network  new  performance  published  security  software 
Rate this Feed
Rate this feedRate this feedRate this feedRate this feedRate this feed
Rate this feed 1 starRate this feed 2 starRate this feed 3 starRate this feed 4 starRate this feed 5 star

Comments (0)

Feed Details and Statistics Feed Statistics
Preview: Most Popular White Papers and WebcastsNetwork Design and Management Research

Most Popular White Papers and Webcasts Network Design and Management Research

White papers, webcasts, podcasts, IT downloads and product information provided by Bitpipe

Published: Thu, 08 Dec 2016 11:30:17 EST

Last Build Date: Thu, 08 Dec 2016 11:30:17 EST


Defense-In-Depth with Internal Segmentation Firewalls

Wed, 30 Nov 2016 24:00:00 EST

Deployed at strategic points, internal segmentation firewalls (ISFWs) increase threat visibility and enhance breach discovery. Learn how to stop the uncontrollable spread of cyberthreats within your borderless network and prevent any single point from introducing vulnerability. Published by: Fortinet, Inc.

Modernize Your Data Center to Survive and Thrive

Thu, 08 Dec 2016 24:00:00 EST

Discover how to turbo charge your business and apps by modernizing your data center and IT infrastructure. You will learn how data center modernization sets you up to leapfrog competitors with Big data-driven insights, accelerate workload delivery with the right cloud strategy, and more. Published by: Hewlett Packard Enterprise

Getting Down to Business: Reducing the Risk of Restrictive IT

Sat, 28 Feb 2015 24:00:00 EST

This white paper explores how to overcome issues with restrictive, legacy IT technologies. Find out how CIOs can implement strategic planning to absorb the growing cost of updating systems, mitigate the impact of a failing network, and more. Published by: Brocade

Security Analytics Brings Data-Driven Security Into The 21st Century

Wed, 30 Nov 2016 24:00:00 EST

With security analytics, security professionals see opportunities for faster incident response, more efficient staff and better business alignment. Learn how you too can streamline security operations using SIEM systems and enable more efficient, data-centric threat analysis. Published by: FireMon

Building a Flexible Foundation for a Software-Defined Data Center

Thu, 08 Dec 2016 24:00:00 EST

To deliver physical and virtual network functions, architectures, and services at high scale and performance, organizations are looking to the software-defined data center (SDDC.) Discover ways to achieve improved visibility across data center resources. Published by: Brocade

Powering Vital Applications to Gain Competitive Advantage

Thu, 08 Dec 2016 24:00:00 EST

Data center modernization is not just a "nice-to-have," today it's a business imperative. Access this resource to examine several approaches to data center modernization, from which you can ensure vital applications run smoothly and prepare for modern software enhancements. Published by: Hewlett Packard Enterprise

Firewall Clean Up Recommendations

Wed, 30 Nov 2016 24:00:00 EST

Discover the benefits of proper firewall policy for your organization. Learn the main causes of firewall policy mistakes, which include excessive access, ineffective change management, lack of aging strategy, etc., and how to clean up your current firewall management processes. Published by: FireMon

Analyzing the Top 8 Indicators of Threat Traffic

Wed, 07 Dec 2016 24:00:00 EST

While endpoint security tools assist with the detection of a compromised endpoint, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. Read on for details on the top 8 indicators of compromise in network traffic. Published by: LogRhythm, Inc.

Quantifying the Value of Firewall Management

Mon, 31 Oct 2016 24:00:00 EDT

Learn how to reduce the total annualized business impact of managing firewalls without reducing the protection afforded by them. Access now to discover detailed models breaking down the costs and effectiveness of network firewalls, as well as upkeep, realistic examples of their use, and more. Published by: FireMon

Data Center Modernization: Brief Overview of Migrating Your Applications to Hybrid Cloud

Wed, 07 Dec 2016 24:00:00 EST

To successfully leverage the cloud, IT must source the right mix of public, private, IaaS, and managed-cloud environments to match application workloads to the appropriate platform. Access this resource to learn the essential methodologies behind this hybrid cloud migration. Published by: Hewlett Packard Enterprise

How Multi-Vendor DNS Can Protect Your Internet Presence

Wed, 26 Oct 2016 24:00:00 EDT

This webinar discusses the October 2016 DDoS Attack and the value of a secondary DNS strategy for resilience within your infrastructure. Published by: Dyn

Don't Go "IT" Alone: Protect Your New Digital Edge From A Volatile Internet

Tue, 22 Nov 2016 24:00:00 EST

This brief, "ask anything" webinar discusses how to use the cloud itself to build a future-proof plan. Learn how to: Leverage your existing on-premise investments to make you "internet strong", expand your visibility to encompass your new cloud assets and create consistent, reliable, fast global internet reach. Published by: Dyn

Data Center Modernization Boosts Application Performance with Scale-Up Infrastructure

Wed, 07 Dec 2016 24:00:00 EST

Discover a scale-up data center infrastructure designed with the power, scale, and reliability to boost your most demanding apps. Read on to reduce complexity with an infrastructure that accelerates mission-critical SAP HANA apps, provides always-on business continuity, and more. Published by: Hewlett Packard Enterprise

Build Your Own Ethernet Fabric

Mon, 31 Aug 2015 24:00:00 EDT

Learn about creating a self-forming and self-healing Ethernet fabric, and why Ethernet fabric is the right choice for your data center in the first place. Within, you will see a quick sketch of how to construct a reflexive, powerful, data center network infrastructure. Published by: Brocade

Case Study: Brocade and the Jim Henson Company

Tue, 06 Dec 2016 24:00:00 EST

This case study discusses how the famed Jim Henson company removed the limits to timely content development and delivery. These improvements being principally achieved by embracing technology which facilitates large data transfers and improved editing productivity. Published by: Brocade

Bringing Hyper-Scale Cloud Efficiencies to the Enterprise Data Center and Network

Tue, 06 Dec 2016 24:00:00 EST

Discover how the software-defined data center (SDDC) and software-defined networking (SDN) market is building products and services that can deliver hyper-scale cloud efficiencies to the enterprise today. Published by: Brocade

Setting a New Standard for Network Efficiency with Ethernet Fabric Multilayer, Multipathing Capabilities

Tue, 06 Dec 2016 24:00:00 EST

Modern Ethernet fabrics employ multi-pathing capabilities in both hardware and software to. Learn 3 ways to help your organization efficiently use the network for best performance and maximum network utilization. Published by: Brocade

Enable Advanced Ethernet Fabric Capabilities and Scalable Networking

Mon, 05 Dec 2016 24:00:00 EST

Read this white paper and learn about network switches that allow you to overcome key challenges, and enable you to support cloud-optimized networking and greater enterprise agility. Learn about Ethernet fabric technology, and how it is helping organizations overcome barriers to network optimization. Published by: Brocade

Three Golden Rules for Safe and Sound Endpoints

Wed, 30 Nov 2016 24:00:00 EST

Discover best practices and new strategies to help mitigate security risk as your enterprise perimeter expands to include new endpoints. Learn a three-part approach to address vulnerabilities, increase control over your environment and ensure compliance with regulatory requirements. Published by: IBM

Reducing Attack Surface: SANS' Survey on Continuous Monitoring Programs

Wed, 30 Nov 2016 24:00:00 EST

Discover how continuous monitoring (CM) is slowly, but surely improving security practices and shifting the focus of today's security teams. Because CM programs do not necessarily call for new resources, learn what you can do right now to improve your existing CM program or establish a new one. Published by: IBM

API and Traffic Management: How Bazaarvoice Drove Brand Engagement

Wed, 10 Aug 2016 24:00:00 EDT

Explore the API-led approach Bazaarvoice implemented, leveraging client side Javascript and mobile apps. Discover how this API grew richer and expanded, leading them to rely on an API management platform to unlock increased scalability, improve customer relationships, create new opportunities for innovation, and more. Published by: TIBCO Software Inc.

The Cyber Threat Guide

Wed, 30 Nov 2016 24:00:00 EST

This e-book describes the 9 types of attacks a typical network faces and offers some of the successful mitigation strategies IT professionals have used against them. Published by: LogicNow

Computer Weekly – Rolling out full-fibre broadband

Fri, 02 Dec 2016 24:00:00 EST

In this week's Computer Weekly, as Ofcom moves to force a split between BT and its Openreach subsidiary, we examine whether the regulator's action will improve the roll out of full-fibre broadband. Our buyer's guide looks at trends in client access devices. And IT leaders discuss the roadmap to a software-defined infrastructure. Read the issue now. Published by:

8 Key API Performance Indicators for Digital Business

Fri, 02 Dec 2016 24:00:00 EST

This white paper explores and defines some of the most common and useful key API performance indicators (KAPIs). Discover how to boost your API management and analytics with KAPIs like registered API keys, usage consistency, queries per second, and 5 more. Published by: TIBCO Software Inc.

Designing a Modern Enterprise Architecture

Wed, 30 Nov 2016 24:00:00 EST

In this expert e-guide, we examine the key attributes of cloud-connected, modern architectures. Discover how to foster API-centric enterprise architectures and learn about the emergence of progressive web apps, as well as how they're creating new, mobile app-like experiences. Published by: Metavine

Different Approaches to App Modernization and Development

Wed, 30 Nov 2016 24:00:00 EST

In this expert e-guide, we examine the different approaches to app modernization, including how to leverage the third platform, redesign cloud-native apps, and couple modernization efforts with PaaS. Find out how each of these approaches makes integrating the cloud into your architecture and updating legacy apps an easier, more streamlined process. Published by: Metavine

5 Reasons Why All-Flash Storage on Oracle Is Essential for Application Owners

Thu, 01 Dec 2016 24:00:00 EST

In this article, discover the top five reasons why flash storage is a must have for application owners running Oracle. Published by: Pure Storage

Beyond the Trial: Taking OpenStack into Production

Thu, 01 Dec 2016 24:00:00 EST

This resource aims to improve your implementation of OpenStack as you transition from a trial phase into full production. By taking the steps detailed inside you can move to a production level and prepare for the next stage: utilizing the cloud for its agility and resilience. Published by: Nokia

What to Look for in IT Operations Analytics

Thu, 01 Dec 2016 24:00:00 EST

In this buyer's guide, learn what IT operations analytics is, how it works, what product features are essential and how to evaluate vendor ITOA offerings. Published by:

Beyond the Trial: Fulfilling OpenStack’s Promise of Dynamism

Mon, 31 Oct 2016 24:00:00 EDT

Once you have employed OpenStack, the next step is to harness the dynamism that's inherent in virtualization and cloud computing models. This white paper details the essential steps to take to fully leverage the benefits of the cloud virtual network. Published by: Nokia

Southern California Edison Protects Workers and Customers with EHS Management

Wed, 31 Dec 2014 24:00:00 EST

Discover how Southern California Edison, the largest subsidiary of Edison International, is using environment, health, and safety (EHS) management tools to streamline management of operational risks and environmental compliance processes. Learn what 4 objectives they were looking to solve with an EHS app and 7 benefits they're receiving. Published by: SAP

UCaaS-to-SaaS Cooperation Offers Competitive Edge

Thu, 01 Dec 2016 24:00:00 EST

In this edition of Network Evolution, find out how integrating your unified communications platform with mission-critical enterprise applications like Salesforce can provide significant competitive advantage by reducing human error and offering new insight into customer behavior. Published by:

Networking & Digital Transformation: ANZ

Thu, 01 Dec 2016 24:00:00 EST

What are the digital transformation trends driving major changes in enterprise networking strategy? In this guide, we look at the IoT and smart city initiatives currently taking off in Australia/New Zealand, look at how hyper-converged infrastructure can enhance networking capabilities and why more businesses are refreshing aging infrastructure. Published by:

Devise a Cloud Strategy that Doesn't Cast a Shadow on App Performance

Wed, 30 Nov 2016 24:00:00 EST

Download this paper to learn how to devise a cloud strategy that doesn't cast a shadow on, or deter, app performance. Discover several cloud deployment models compared for their visibility and control, including private cloud, SaaS, and 2 more. Published by: Riverbed Technology, Inc.

Big Data Management: Streamlining IoT App Development

Tue, 29 Nov 2016 24:00:00 EST

This custom article explores how a multi-model, multi-workload data platform with support for both structured and unstructured data alike can streamline the IoT app development lifecycle. Discover how to simplify IoT and big data management with a development approach that blends analytics, natural language processing, and more. Published by: InterSystems

Give Them Access. NOT a VPN

Tue, 29 Nov 2016 24:00:00 EST

Gain a clear understanding of the vulnerability posed by allowing third parties and vendors access to your network via VPNs and what can be done to give them privileged access without the risk. Published by: Bomgar Corp.

CenterPoint Properties Overcomes Poor Office 365 Performance in the Cloud

Tue, 29 Nov 2016 24:00:00 EST

In this case study, you'll learn how CenterPoint Properties was able to realize a 63% decrease in Office 365 traffic and implement on-going network monitoring and faster troubleshooting. Access now to learn more. Published by: Riverbed Technology, Inc.

Case Study: Sub-Zero Group, Inc. Requires Improved App Performance and Visibility

Tue, 29 Nov 2016 24:00:00 EST

Sub-Zero Group accelerated Office 365 performance, cut application troubleshooting times to less than a minute, and improved the customer experience in their showrooms. Access this case study to learn how they achieved these goals. Published by: Riverbed Technology, Inc.

Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services

Tue, 22 Nov 2016 24:00:00 EST

Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more. Published by: Riverbed Technology, Inc.

CIO's Security Checklist: Do You Know What Your Vendors are Doing?

Mon, 28 Nov 2016 24:00:00 EST

This short infographic asks an important question: Do you have complete visibility intro what your vendors are doing in your network? Learn why legacy solutions used by companies today don't provide the granular control of access required to ensure security. Published by: Bomgar Corp.

Protecting the Distributed Enterprise

Mon, 31 Oct 2016 24:00:00 EDT

Discover how to protect your distributed enterprise without compromising data access. Uncover the 5 requirements for a distributed enterprise firewall. Published by: Fortinet, Inc.

Application Performance Tools for Microsoft Office 365

Mon, 28 Nov 2016 24:00:00 EST

Access this resource to discover an app performance tool that will transform Office 365 by leveraging hybrid IT for new forms of operational and network agility. Learn how to enact complete performance awareness of O365 apps and make optimal use of network resources by analyzing design and traffic. Published by: Riverbed Technology, Inc.

How to Facilitate a Successful Transition to Office 365: A Brief Video

Fri, 16 Sep 2016 24:00:00 EDT

Discover a tool that will identify and mitigate hidden network constraints to ensure a smooth transition to O365. Here, learn how to analyze your network requirements with dependency mapping, capacity planning, and SLA analyses to ensure the best performance for all O365 end users. Published by: Riverbed Technology, Inc.

IBM FlashSystem: Powering the Future of IT

Fri, 30 Jan 2015 24:00:00 EST

This white paper explains how flash storage can provide the performance and security needed to run these apps and prevent data breaches. Access now and discover how flash can help 5 key drivers of info technology: cloud, data analytics, mobile and social engagement and security. Published by: IBM

Top 3 Cybersecurity Challenges Facing Healthcare Organizations

Thu, 30 Jun 2016 24:00:00 EDT

Tune into this webcast as healthcare cybersecurity experts identify three key areas that render your organization most vulnerable —ransomware, phishing, and data leaks—and delve into the most pertinent inhibitors to risk mitigation. Published by: Arctic Wolf Networks, Inc.

Advanced Network Device Troubleshooting & End-to-End Visibility

Wed, 23 Nov 2016 24:00:00 EST

This webinar is designed to show how you can manage and monitor all aspects of your IT infrastructure now that we live in a hybrid world. Discover a network performance monitor, and view demos of the product in action. Published by: SolarWinds, Inc.

The Top Cybersecurity Risks – And How Enterprises Are Responding

Mon, 31 Oct 2016 24:00:00 EDT

Download this report, based on a 2016 Strategic Cybersecurity Survey of 300 IT and security professionals, to discover key strategies to promote smooth sailing when navigating your organization through the shifting threat management landscape, including also a risk assessment of cloud providers. Published by: Arctic Wolf Networks, Inc.

The 7 Step Hack: Thinking Like a Cybercriminal

Tue, 22 Nov 2016 24:00:00 EST

Discover how even a VPN secure network can be cracked open in 7 simple steps, leaving your enterprise at the mercy of hackers. Learn how to control, monitor, and mange access to critical systems by privileged users, including third-party vendors, without leaving yourself open to malicious activity. Published by: Bomgar Corp.

SD-WAN Market Swells Because of Cloud-Based Business Apps

Fri, 18 Nov 2016 24:00:00 EST

IDC predicts that the SD-WAN market will hit $6 billion by the year 2020, with a 90% annual growth rate. This expert e-guide takes a look at the current SD-WAN market swell and how it's attributed to cloud-based business apps. Published by: Silver Peak

SD-WAN Market Consolidation, APIs, SDN and More

Mon, 21 Nov 2016 24:00:00 EST

Will the software-defined WAN market consolidate? How are APIs affecting software-defined networking? And what is the state of cybersecurity in the next presidency? In this expert e-guide, 3 industry veterans answer these questions to help you stay abreast of the evolving landscape. Published by: Silver Peak