Share us:
> Research Library > Technology > Networking > Network Provisioning
 

Network Provisioning

The Provisioning process monitors access rights and privileges to ensure the security of an enterprise's resources and user privacy. As a secondary responsibility, it ensures compliance and minimizes the vulnerability of systems to penetration and abuse. As a tertiary responsibliity, it tries to reduce the amount of custom configuration using boot image control and other methods that radically reduce the number of different configurations involved.
Results 1 - 25 of 78Sort Results By: Published Date | Title | Company Name
White Paper Published By: Aerohive     Published Date: May 14, 2015
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware
    
Aerohive
White Paper Published By: Aerohive     Published Date: May 14, 2015
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
internetworking hardware, network architecture, network management, network performance, network provisioning
    
Aerohive
White Paper Published By: Aerohive     Published Date: Oct 15, 2014
This whitepaper will take you through the necessary connectivity and productivity requirements in order to ensure your network is truly ready for the mobility explosion.
Tags : 
prepare for mobility, byod, requirements for mobility and byod, infrastructure, internetworking hardware
    
Aerohive
White Paper Published By: Aerohive     Published Date: Jan 04, 2012
In today's virtual enterprise, access to corporate resources must be secure, reliable, and manageable, with consistently enforced policy while simultaneously allowing access from anywhere at any time. This is why access network strategies are critical to business growth.
Tags : 
aerohive, branch office, cloud computing, remote networks, vpn
    
Aerohive
White Paper Published By: Aerohive Networks     Published Date: May 06, 2015
This paper describes how to eliminate the complexity and cost of traditional wireless networks and create one that is ready for mobility.
Tags : 
mobility, networking, wi-fii, wireless, network architecture
    
Aerohive Networks
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
Manufacturers, in an effort to succeed with digital transformation, are relying on the Internet and public cloud to deliver key enterprise applications and processes. As manufacturers continue to become more digital enterprises, their network architecture must as well. Read this paper to learn key considerations for architects to create a holistic network that takes today’s, and tomorrow’s, requirements into consideration.
Tags : 
network management, manufacturing, network optimization, network applications, cloud services
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
The richness of the data combined with the increasing interconnectedness of healthcare technologies makes the industry ripe for cyberattacks.
Tags : 
healthcare, information security, web security, data management, technology
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
HIMSS Analytics, in partnership with Akamai, recently conducted a survey of U.S. hospitals to understand the current state of web security in healthcare as well as what plans are in place to improve preparedness. The results raise some concerns that despite greater consciousness of the increased risk to healthcare data security, many hospitals are still vulnerable to a wide range of cyberattacks. Read this survey to learn about critical weaknesses in hospital web security.
Tags : 
web security, healthcare, network management, security, cyberattack prevention
    
Akamai Technologies
White Paper Published By: Akamai Technologies     Published Date: Mar 15, 2016
The globalization of the medical device industry has delivered substantial business benefits, but it has also presented certain problems that can make the realization of those opportunities challenging. Learn about a comprehensive global collaboration solution that addresses and overcomes these obstacles.
Tags : 
medical device industry, global network, employee management, best practices, internet performance
    
Akamai Technologies
White Paper Published By: AT&T     Published Date: Nov 07, 2011
See how others are using communications enabled business processes (CEBP) to drive their business into the fast lane.
Tags : 
unified communication, cebp, communication, collaboration, collaboration capabilities
    
AT&T
White Paper Published By: AT&T     Published Date: Nov 07, 2011
Is your network prepared to ""speak"" IPv6? To say connected, your network must be able to communicate with either IPv4 or IPv6 hosts/users. Prepare your network for the transition!
Tags : 
ipv6, ipv4, network, customers, operations
    
AT&T
White Paper Published By: Aternity     Published Date: Mar 15, 2016
IT and Line of Business (LOB) management need precise, comprehensive metrics describing real end user experience, before and after going “virtual”, in order to support strategic desktop virtualization and consolidation decisions.
Tags : 
application virtualization, monitoring, strategic applications, best practices, network provisioning
    
Aternity
White Paper Published By: Avaya     Published Date: Mar 04, 2016
Explore the impact of SDN solutions Software Defined Networking (SDN) adoption rates are sky high, and so are the expectations around its potential. However, some feel current models are too limited. Learn more in this report >
Tags : 
software, network management, network solutions, best practices, network architecture
    
Avaya
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Learn how to proactively address the latest trends in WAN traffic. Tomorrow is here: video, Web 2.0, and SaaS applications are overtaking the WAN.
Tags : 
blue coat, wan optimization, secure web gateway, application performance monitoring, convergence
    
Blue Coat Systems UK
Webinar Published By: BMC     Published Date: Jan 09, 2012
The complexity of cloud computing warrants a unique approach to planning. See how BMC can help!
Tags : 
cloud computing, bmc, planning, initiative, computing
    
BMC
White Paper Published By: BMC     Published Date: Jan 05, 2012
Learn more on how users can customize their cloud services - while you maintain control.
Tags : 
bmc, cloud, cio, cto, hardware
    
BMC
White Paper Published By: BMC     Published Date: Jan 05, 2012
This reference guide provides an overview on the public and private cloud implementation (e.g. HMS Public/Private Cloud Choice).
Tags : 
bmc, cloud, cio, cto, hardware
    
BMC
Free Offer Published By: Box     Published Date: Jun 04, 2012
Enter Box. Our partner integrations and robust security suite ensure employees get any-device, on-the-go content sharing and collaboration... while IT retains control and visibility of all user accounts. Get Your FREE Box IT Strategy Kit!
Tags : 
free online storage, online storage, file sharing, online file storage, share files online
    
Box
White Paper Published By: Box     Published Date: Mar 14, 2012
Let's take a look at the emerging trends shaping business today, trends that are driving us to rethink and retool response.
Tags : 
sharing, cloud, content management, emerging trends, enterprise
    
Box
White Paper Published By: Brocade     Published Date: Sep 08, 2010
For organizations looking to be greener, the data center is the most obvious place to start.
Tags : 
brocade, green it, data center, emissions trading, carbon reduction
    
Brocade
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Most organizations want to leverage the cloud, but also recognize that migrating all their applications at once is not always practical. They are seeking ways to utilize cloud-based services while maintaining certain applications on-premise. For organizations utilizing this hybrid architecture, one of their major challenges is providing users with the flexibility to seamlessly move around the environment while still maintaining appropriate security levels—or more specifically, ensuring consistent control and security policy between on-premise applications and cloud services.
Tags : 
ca technologies, identity, identity management, identity and access management, iam
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security
    
CA Technologies
White Paper Published By: CA Technologies     Published Date: Jan 08, 2014
Cloud adoption, mobility, social media and the consumerization of IT are transforming many business activities for enterprise employees, partners and customers and eliminating the traditional network perimeter. Organizations have to change how they manage security and user identities if they want to keep their data and applications secure. Read this eBook to discover how a centralized identity and access management service can help you create a new identity perimeter.
Tags : 
ca technologies, identity, identity management, user provisioning, security
    
CA Technologies
Start   Previous   1 2 3 4    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

© 2019  Created by Boris Agranovich.

Badges  |  Report an Issue  |  Terms of Service