White Papers: network




Sort by: Date | Company | Title


The Application Usage and Risk Report - An Analysis of End User Application Trends in the Enterprise
By Palo Alto Networks | 29/8/2012
This risk report provides a global view into enterprise application usage by summarising network traffic assessments conducted in 2,036 organisations worldwide between November 2011 and May 2012. Key findings include: Streaming video bandwidth consumption triples to 13%, P2P filesharing bandwidth consumption skyrockets 700%, and that social networking continues to define itself. View the detailed report.
Download this now


Nimsoft for Network Monitoring
By Nimsoft | 7/8/2012
The Nimsoft for Network Monitoring solution verifies network connectivity to devices and application services revealing accessibility and network latency. The solution auto-discovers network interfaces, monitors interface traffic and calculates bandwidth utilisation. Interface variables are polled for status data and the solution receives unsolicited SNMP traps. Syslog monitoring is supported for non-SNMP devices. Status data is analysed and displayed in graphical alarm consoles, performance reports and SLA reports. Read more.
Download this now


Consolidating Server and Network Equipment in Legacy Computer Rooms
By APC | 18/7/2012
Most IT racks have the same look, but rarely have the same feel. We have developed racks specifically for servers and networking which account for important details like cable management and power distribution. This solution pairs our optimised rack solutions with a high availability UPS for protecting all of your critical equipment as simply as possible. Read more.
Download this now


Deploying Networking Equipment Outside of the Dedicated IT Space
By APC | 18/7/2012
The NetShelter CX enclosure is designed specifically for deploying equipment in nondedicated spaces like offices and schools. This solution is truly an all-in-one, easy to manage solution for networking deployments outside of the closet.
Download this now


Bring Your Own Device and Virtualisation - Insights from the Cisco IBSG Horizons Study
By Cisco | 4/7/2012
Learn what 600 IT Executives see as primary trends for personal devices.
Download this now


Migrate From Solaris with Confidence
By RedHat | 21/6/2012
The global economy is driving competition at an ever-increasing rate, forcing enterprises both small and large to work as cost-effectively and efficiently as possible. To reduce costs in the datacenter, many IT managers are moving to commodity x86-based servers to replace their legacy RISC servers, such as those based on Oracle SPARC processors. Read more.
Download this now


Migrate From HP-UX and Standardise with Confidence
By RedHat | 21/6/2012
To increase agility, improve productivity, and reduce costs, many enterprises are moving away from proprietary platforms to a more standardised IT infrastructure and automated processes like service provisioning and private clouds. Read more.
Download this now


Web Security Services: Delegating Security Responsibility to the Cloud
By Webroot | 6/3/2012
Few readers need to be told that the Internet is a dangerous place. Anyone in the IT field is aware that viruses, spam, and malicious Web sites exist. Knowledge of these attacks and vulnerabilities was the domain of specialized security gurus just a few years ago. But the need to understand computer security has spread beyond the domain of specialists. Today, even IT end users need to be aware of threats and countermeasures to some degree.
Download this now


Providing effective endpoint management at the lowest total cost
By IBM | 21/2/2012
Endpoints, otherwise known as servers, workstations, laptops, mobile devices, and virtually any other network-connected device, are critical components that enable business to be transacted. Properly implemented, endpoint management ensures continuous compliance with IT policies, regardless of where the machines are located and what type of network they are connected to.
Download this now


Protecting Users from Firesheep and other Sidejacking Attacks with SSL
By Symantec | 17/2/2012
The recent release of the Firesheep Wi-Fi attack tool has increased awareness among both users and attackers of the inherent insecurity of unprotected HTTP connections. Users on unprotected networks who connect to web sites through plain HTTP connections expose their connections to those sites to open surveillance and full compromise. Read on.
Download this now
Sign up now to get free exclusive access to reports, research and invitation only events.
Featured Download
/downloads/product/170/gadwin-geforms/

Gadwin GeForms

GeForms allows you to create your own forms or fill in existing forms electronically. Using GeForms you are provided with sophisticated form design tools which ...

Computerworld newsletter

Join the most dedicated community for IT managers, leaders and professionals in Australia