CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

traffic

Results 251 - 275 of 503Sort Results By: Published Date | Title | Company Name
Published By: Citrix Systems     Published Date: Nov 10, 2014
Don't let poor performance and inadequate security constrain your enterprise mobility initiatives. Accelerate and protect your mobile workspaces with innovative NetScaler MobileStream technology from Citrix.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, wireless, data management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Citrix NetScaler helps your organization fully optimize, secure and control the delivery of all enterprise and cloud services. NetScaler Insight Center and ActionAnalytics deliver unprecedented visibility and enables real-time control in response to network traffic from a variety of services such as native web and mobile apps and virtual desktops.
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, wireless, storage
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Many organizations are struggling with network infrastructure that is vastly outdated, and with the rise in cloud computing, the time to upgrade is now. Cloud-based network solutions for application delivery are a great way for businesses to ensure high levels of performance, security and flexibility. This guide explores two solutions that organizations use to build a network for today's evolving enterprise and how you can fully address cloud requirements for secure application delivery. Read now for this vital information on cloud networking!
Tags : 
optimization, enterprise, cloud services, mobile apps, virtual desktop, visibility, enterprise, organization, insight, real-time, traffic, native web, application, action analytics, netscaler, solve, control, security, data center
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 10, 2014
Today’s enterprises face new requirements for their datacenter and cloud architectures, from keeping pace cost-effectively with fast-growing traffic to ensuring optimal application performance no matter how quickly business needs or the enterprise environment evolve. At the same time, IT must reduce costs and datacenter sprawl, ensure security and uptime, and prepare for a new generation of cloud computing initiatives. While many Application Delivery Controller (ADC) solutions promise to meet demanding customer needs, the reality often falls short. Taking a closer look at the available options and how they measure up against the criteria that matter most, it becomes clear that NetScaler beats the competition—providing better performance and scalability than F5 Networks, Inc.
Tags : 
dos, denial of service, netscaler, defense, network, low-bandwith, attacks, transactions, targeting, companies, prevention measures, firewall, intruder, security, data management
    
Citrix Systems
Published By: Citrix Systems     Published Date: Nov 23, 2015
Learn about the most prevalent application delivery challenges and the advantages of real-time network visibility by viewing the infographic, "Gain 20/20 Vision Into Network and Application Traffic"
Tags : 
citrix, network, application traffic, application delivery, network visibility, data, networking, enterprise applications, storage, data management, business technology, data center
    
Citrix Systems
Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions
Published By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : 
sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
    
Viavi Solutions
Published By: Cisco Systems     Published Date: Oct 01, 2013
Annual global IP traffic has increased fourfold in the past five years, and it will surpass the zettabyte threshold by 2017. In this Cisco® Visual Networking Index (VNI) paper, discover the details and methodology of this forecast. Read report.
Tags : 
ip traffic, technology, cisco visual networking index, vni, best practices, telecommunication, wireless, business technology, telecom
    
Cisco Systems
Published By: Cisco Systems     Published Date: Oct 01, 2013
The Cisco® Global Cloud Index is an ongoing effort to forecast the growth of global data center and cloud-based IP traffic. In this paper, take a look ahead at virtualization and cloud computing trends on the horizon. View report.
Tags : 
cisco global, cloud, forecasting, best practices, virtualization, cloud computing, trends, telecommunication, wireless, business technology, telecom, data center
    
Cisco Systems
Published By: Aruba Networks     Published Date: Nov 15, 2013
The content for this excerpt was taken directly from the IDC MarketScape: Worldwide Enterprise WLAN 2013-2014 Vendor Analysis by Rohit Mehra (Doc # 231686). All or parts of the following sections are included in this excerpt: IDC Opinion, In This Study, Situation Overview, Future Outlook, Essential Guidance, and Synopsis.
Tags : 
idc, marketscape, enterprise wlan, vendor analysis, brod, wireless lan, increase mobility, mission-critical mobility applications, cloud services, alternative architects, traffic flow, enterprise communications, unified communications, service providers, wlan infrastructure, wlan market
    
Aruba Networks
Published By: Cisco     Published Date: May 14, 2015
Data center administrators face a significant challenge: They need to secure the data center without compromising the performance and functionality that new data center environments enable. Many are looking to secure the data center using solutions designed for the Internet edge, but these solutions are not enough. The data center has unique requirements around provisioning, performance, virtualization, applications, and traffic that Internet-edge security devices are simply not designed to address.
Tags : 
hacker detection, intrusion detection, security management, security policies, web service security, vulnerability management, data loss prevention
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Today’s corporate networks are more important to business objectives than ever before. Consequently, greater amounts of sensitive data traverse both wired and wireless networks. This plethora of valuable data in today's enterprise attracts an increasing number of hackers and malware applications. However, the inherent connected intelligence and distributed nature that makes the network a treasure trove for cybercriminals can also empower the network to be a proactive security tool. Through traffic visibility, and segmentation, today's enterprise network can prove itself to be a sensor and enforcer for security
Tags : 
    
Cisco
Published By: VMware SD-WAN by VeloCloud     Published Date: May 20, 2019
What is SD-WAN? Software-Defined Wide Area Network (SD-WAN) is the application of software-based network technologies to WAN connections to more effectively route all network traffic between headquarters or data centers, remote and branch offices, and the cloud. More simply, it is the method of leveraging the benefits of the cloud, the bandwidth of broadband and existing enterprise-wide network infrastructure to more efficiently and cost effectively transmit media (data, video, voice) and quickly access cloud applications from every location in the network. SD-WAN dynamically utilizes multiple available connections (MPLS, broadband, LTE) to find the optimal delivery path for traffic across the entire network, shaping the bandwidth as needed to eliminate jitter and dropped data packets, thereby delivering an optimal user experience regardless of location. The more sophisticated solutions will first attempt to dynamically steer traffic to the best available link and if the available link
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud
Published By: Oath     Published Date: May 31, 2017
Searching for auto-related terms signals that a consumer is interested in a vehicle. And, 96% of people who search for auto-related terms can be found on a Yahoo site within a week of searching. Learn how to leverage these search signals to re-target consumers with native advertising by reading our infographic.
Tags : 
search advertising, native advertising, search ads, native ads
    
Oath
Published By: Oath     Published Date: Nov 20, 2017
On the road, traffic slows you down— online, it drives sales. When AutoWeb, a leading automotive marketing site, saw success with its search campaigns via Oath’s Yahoo Gemini, it began to test additional Oath ad solutions and found that a layered approach can be a win/win.
Tags : 
    
Oath
Published By: BrickWork Software     Published Date: Oct 24, 2017
In the world of Amazon, the future of retail may seem uncertain. With a 57% decline in brick-and-mortar traffic over the last five years, increases in store closings, and a growing number of retail bankruptcies, today’s retailers face many challenges. The truth is that while you can’t beat Amazon, you can survive in the digital era — but you need a completely new strategy. In this e-book, you’ll learn: ? Why e-commerce alone can’t save you ? Why 80% of store customers start their journey to your store online ? How the modern customer journey changes everything ? Which customers you need to captivate ? How to leverage digital to drive in-store sales
Tags : 
    
BrickWork Software
Published By: Monetate     Published Date: Jun 27, 2018
Delivering personalized experiences at scale is a challenge the travel and hospitality industry would be well advised to take on. While segmentation can work to a point, truly 1:1 experiences are the key to more conversions. This case-study brief shows how eight companies, including one in the luxury travel space, used personalization to make an impact. In the case-studies you’ll learn: • What one luxury travel company did to achieve a +33.5% lift in email sign up traffic. • How a leading apparel company saw a 73.9% lift to email sign ups without offering a discount • How a retailer achieved a 3.3% reduction in homepage bounce rate with a customized carousel. • What 5 more companies did to achieve equally impressive results from their personalization efforts.
Tags : 
    
Monetate
Published By: Amazon Web Services     Published Date: Apr 11, 2018
Elastic Load Balancing distributes incoming application traffic across multiple EC2 instances, in multiple geographic areas. This increases the fault tolerance of your applications. Load Balancing
Tags : 
    
Amazon Web Services
Published By: Amazon Web Services     Published Date: Apr 11, 2018
It’s important to provide effective inbound and outbound network traffic control to distinguish between legitimate and illegitimate requests. Effectively managing, monitoring, controlling, and filtering network traffic are key actions that can help do so and further enable a robust cloud security infrastructure. Filtering Cloud Network Traffic and Preventing Threats
Tags : 
    
Amazon Web Services
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 24, 2019
The increase of SSL/TLS traffic indicates that organizations are more and more focused on safeguarding the integrity of the data that flows through their Internet-facing applications. However, the concurrent growth of malware hidden within that encrypted traffic is cause for concern. Without visibility into your SSL/TLS traffic, you’ll have some serious blind spots in your security, and these blind spots could lead to financial losses, data breaches, and damage to your corporate reputation. That’s why it’s essential to regain visibility into that encrypted traffic and allow your malware-scanning and prevention devices to protect your apps and your network. The most efficient way to get that visibility is by orchestrating your outbound SSL/TLS traffic. With a robust SSL/TLS orchestration solution, you’ll enjoy better visibility, increased performance, and more flexibility—so you can stop worrying about hidden malware and focus on developing and supporting new apps to drive your business
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd
Published By: F5 Networks Singapore Pte Ltd     Published Date: Jan 28, 2019
You’ve been having trouble sleeping because of the SSL visibility problem with all the fancy security tools that don’t do decryption. Put down that ambien, because this Lightboard Lesson solves it. In episode, David Holmes diagrams the Right Way (tm) to decrypt and orchestrate outbound SSL traffic, improving SSL visibility, decreasing failures and improving network performance.
Tags : 
ssl, outbound visibility
    
F5 Networks Singapore Pte Ltd
Published By: SafeNet     Published Date: Oct 06, 2010
High-speed Ethernet WANs are the answer to new applications and computing technologies that need increasing bandwidth. But did you know that securing your shiny new Ethernet WAN traffic will cost thousands of pounds/euros more every month if you make the wrong choices?
Tags : 
safenet, high speed ethernet wan, bandwidth, security policy management, network, encryption, ipsec, bandwidth management, ethernet networking, network management, network security, wide area networks
    
SafeNet
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search