General Attributes Registration Protocol Reports

E-Guide: GARP and How it Helps you Achieve Better Information Governance
sponsored by IBM
EGUIDE: This e-guide answers the most frequently asked questions about information governance and GARP. Continue reading to get a firm introduction to GARP and information governance as a whole.
Posted: 22 Mar 2011 | Published: 22 Mar 2011

IBM

Focus: Network security
sponsored by TechTarget ComputerWeekly.com
EGUIDE: During the course of 2016 we saw the clamour around network security – which was already very loud – reach fever pitch. From allegations of nation state-level interference in crucial elections, to massive botnet attacks that brought down critical online services for millions, network security dominated mainstream news cycles for weeks on end.
Posted: 08 Feb 2021 | Published: 24 Apr 2017

TechTarget ComputerWeekly.com

Explore the Evolving DDoS Threat Landscape
sponsored by Radware
EGUIDE: Delve into the evolution of DDoS threats: learn how to deliver clean network traffic to your customers and mitigate the threat DDoS presents. Additionally, discover how to formulate a DDoS-resistant cloud by taking advantage of content delivery networks, reducing publicly exposed environments, and more.
Posted: 20 Oct 2016 | Published: 18 Oct 2016

Radware

WAN optimization: Techniques that speed up your business
sponsored by CDG
EGUIDE: This expert E-Guide discusses best practices and recommendations for WAN optimization. Specifically, learn why packet loss could be the source of WAN performance problems and how virtual WAN optimization software is bringing connectivity to far-flung branches.
Posted: 19 Oct 2011 | Published: 18 Oct 2011

CDG

Next Generation Network Management Techniques
sponsored by TechTarget Security
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

TechTarget Security

Business Continuity Management Systems
sponsored by TechTarget ComputerWeekly.com
BOOK: Brush-up you knowledge of the practical aspects of business continuity management with this book extract.
Posted: 17 Dec 2012 | Published: 13 Dec 2012

TechTarget ComputerWeekly.com

5 Stages, 3 Steps: Your Quick Guide to UCC Transformation
sponsored by Motorola Solutions
EGUIDE: Wainhouse Research analyst Bill Haskins reveals the 5 stages of UCC deployment and expansion. Learn a 3-step process for moving through these stages.
Posted: 15 Jun 2017 | Published: 15 Jun 2017

Motorola Solutions

Talari Case Study: American Railcar Industries
sponsored by Talari_DON'T USE
CASE STUDY: This exclusive case study examines how an American manufacturer was able to utilize a network solution to prevent downtime, eliminate off-hour crises, and maximize efficiencies.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

Talari_DON'T USE

Maintaining network infrastructure in a pandemic and beyond
sponsored by TechTarget Networking
EGUIDE: As workers join video conferences and access corporate resources remotely, they're likely unaware of the network infrastructure that supports those actions -- until something doesn't work. In this e-guide, learn how to prepare your network for an increased number of remote workers.
Posted: 05 May 2020 | Published: 05 May 2020

TechTarget Networking

Can a SASE architecture deliver better network performance?
sponsored by TechTarget Networking
EGUIDE: Secure Access Service Edge (SASE) is a cloud-based platform that provides networking capabilities and security functionality directly to endpoints that connect to the platform. In this guide, explore how the limitations of traditional networking led the industry to SASE.
Posted: 15 Dec 2020 | Published: 15 Dec 2020

TechTarget Networking