VPN And Cifs ImprovingWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: VPN And Cifs Improving returned the following results.
RSS What is RSS?
Related Categories

 •   VPN, Extranet and Intranet Solutions
 •   Network Security
 •   Network Management
 •   WAN/ LAN Solutions
 •   Virtualization
 •   SSL VPN
 •   Storage Management
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Networks
 •   Remote Access Technologies

Related Searches
 •   Audits VPN And Cifs
 •   Directory VPN
 •   Implementation VPN And Cifs
 •   Manufacturers VPN
 •   Packages VPN And Cifs
 •   Policies VPN
 •   Statistics VPN And Cifs
 •   Terms VPN And Cifs
 •   VPN And Ecommerce
 •   VPN And Learning
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Accelerating File Services Across the WAN by BlueCoat

May 11, 2010 - (Free Research)
CIFS performs poorly across WAN links due to higher latency. The solution to solve the CIFS problem is to apply several WAN optimization technologies working together to quickly and easily restore application performance, improve response time, and recover WAN bandwidth. 
(DATA SHEET) READ ABSTRACT |

Solution Brief: Accelerating File Services Across the WAN by BlueCoat

February 09, 2011 - (Free Research)
Trends towards server consolidation and decentralized employees can seriously impact WAN bandwidth. A typical CIFS file often requires hundreds of round trips between the file server and the user to complete a simple file request. 
(WHITE PAPER) READ ABSTRACT |

Best Practice for NDMP Backup Veritas NetBackup by Symantec Corporation

January 05, 2009 - (Free Research)
Customers are confronting the confusing number of options and configurations when it comes to backing up and restoring their network attached storage servers. This paper addresses this by describing the best practices for protecting and recovering NAS devices utilizing the Network Data Management Protocol. 
(WHITE PAPER) READ ABSTRACT |

Improve the Efficiency and Productivity of Healthcare Workers--with NetMotion Wireless' Award-winning Mobile VPN Software, Mobility XE by NetMotion Wireless

June 2008 - (Free Research)
Mobility XE has proved to be a vital component acting as the fulcrum in maintaining the wireless connection, and giving clinicians access to their applications. 
(WHITE PAPER) READ ABSTRACT |

Network Foundation - Cisco 1700 Series by Cisco Systems

Cisco 1700 Series modular routers are ideal for enterprise small branch offices and small and medium-sized businesses that need secure access to business applications, network resources, and Internet services. The Cisco 1700 Series delivers fast, reliable and secure Internet/network access through a wide-range of high-speed WAN access technologies. 
(HARDWARE PRODUCT)

Key Considerations for MPLS IP-VPN Success by XO Communications

April 2012 - (Free Research)
<p>Uncover the benefits of an MPLS-based private IP network and learn how it can not only help you simplify network management and reduce costs, but also prioritize application, create and improve disaster recovery, and much more!</p> 
(WHITE PAPER) READ ABSTRACT |

Today’s Tape Market Offers Improved Data Access and Integrity by Iron Mountain

September 2012 - (Free Research)
This expert E-Guide reports on the ways in which the tape market has evolved, evaluates new uses for modern tape technology and explains how organizations can continue to archive with their existing tape investments. 
(EGUIDE) READ ABSTRACT |

VMware View WithJuniper NetworksSA Series SSL VPN Appliances: Configuring Secure SSL VPN Access in aVMware Virtual Desktop Environment by Juniper Networks, Inc.

March 2010 - (Free Research)
Customers running a VMware View environment don’t just want secure access for virtual desktop sessions, they want convenience as well. With this in mind, Juniper Networks extend the security deployment by brokering connections to virtual machines and providing single sign-on (SSO) when users access their assigned virtual desktops. 
(WHITE PAPER) READ ABSTRACT |

File Virtualization Explained by F5 Networks

October 2009 - (Free Research)
At its most basic, file virtualization is about separating file data from restrictions in how it is accessed and manipulated. It can also ease things when it comes to migrating those storage systems. Read this presentation transcript to find out more about file virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Titan 3000 Series High Performance Network Storage by BlueArc Corp.

August 2008 - (Free Research)
BlueArc's Titan 3000 Series is the next generation of intelligent platforms for file services designed to meet the requirements of today's sophisticated enterprise data centers and high performance applications. 
(WHITE PAPER) READ ABSTRACT |

The New File Sharing Imperative by Hitachi Data Systems

April 2013 - (Free Research)
The "bring your own device" trend continues to shape the IT and business landscape – but traditional file-sharing tools are no longer suitable in the age of mobility. This report explores emerging market trends in file sharing, storage, and sync-n-share. 
(WHITE PAPER) READ ABSTRACT |

Security - Pix 500 Series Firewalls by Cisco Systems

The world-leading Cisco PIX Security Appliance Series provides robust, enterprise-class, integrated network security services including stateful inspection firewalling, protocol and application inspection, virtual private networking, in-line intrusion protection, and rich multimedia and voice security-in cost-effective, easy-to-deploy solutions. 
(HARDWARE PRODUCT)

Presentation Transcript: File Virtualization Explained by F5 Networks UK

October 2009 - (Free Research)
At its most basic, file virtualization is about separating file data from restrictions in how it is accessed and manipulated. It can also ease things when it comes to migrating those storage systems. Read this presentation transcript to find out more about file virtualization. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Field Service Mobility Best Practices by NetMotion Wireless

June 2011 - (Free Research)
Delivering applications and data to mobile workers is a key initiative among modern organizations. Mobile field initiatives offer tangible benefits, such as improved customer service and productivity.  Learn how a virtual private network (VPN) helps achieve a seamless deployment while providing reliable network connections for mobile workers. 
(WHITE PAPER) READ ABSTRACT |

Managed WAN Acceleration by Virtela Communications, Inc.

February 2008 - (Free Research)
Virtela provides a comprehensive WAN Acceleration and Optimization suite of managed services to deliver enhanced performance and reduced latency impact on business-critical applications at key customer locations. 
(DATA SHEET) READ ABSTRACT |

Cisco ASA 5500 Series by Cisco Systems, Inc.

The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, so you can feel confident your business is protected. 
(HARDWARE PRODUCT)

NetStor MVD NAS by Excel Meridian Data, Inc.

NetStor MVD NAS is extremely versatile and scalable solution. Up-to (6) Gigabit NIC's per system, up-to (15) separate hardware driven RAID's, Snapshot file system for instant file restoration, local or remote tape backup options. Web based administration interface, native Windows file security. 
(HARDWARE PRODUCT)

Success Story: Associates in Rehabilitation Medicine Heals their Network Ills with Astaro by Astaro

August 2011 - (Free Research)
Medical facility, Associates in Rehabilitation Medicine, was concerned about its current network security solution's ability in protecting confidential and private patient data from possible hackers, as well as VPN performance. View this case study to learn how they were able to tackle these challenges by switching to Astaro Security Gateway. 
(CASE STUDY) READ ABSTRACT |

HP X5000 G2 Network Storage System Evaluation by HP and Intel

February 2012 - (Free Research)
Read this Tolly Test Report and how the HP X5000 G2 Network Storage System powered by Intel® Xeon® processors not only integrates with existing Microsoft, Unix, and Linux applications using CIFS and/or NFS, but also enables high-speed connectivity to a host of virtualization platforms, database applications, backup applications and more. 
(WHITE PAPER) READ ABSTRACT |

Optimizing WAN Performance: Accelerating Market Growth by Burton Group

April 2008 - (Free Research)
This report, updated by Senior Analyst Eric Siegel, describes cost-effective bandwidth optimization techniques such as compression and caching along with protocol optimization techniques and wide-area file services (WAFS) technologies. 
(WHITE PAPER) READ ABSTRACT |

Service Provider MPLS VPN Security Considerations by Certes Networks

September 2011 - (Free Research)
This report explores security considerations for service provider MPLS VPN, and describes two threat scenarios against a real MPLS VPN environment that was constructed to demonstrate the typical attack surface of an MPLS Layer 3 VPN provider network. 
(WHITE PAPER) READ ABSTRACT |

Network Boost: control all data in your network and accelerate your data exchanges by Orange Business Services

April 2009 - (Free Research)
This quick Flash presentation gives us an overview of Network Boost, a turn-key networking solution that offers application acceleration tools that are focused on achieving performance objectives. 
(PRODUCT OVERVIEW) READ ABSTRACT |

SSL VPN for Secure Wireless LAN Access by F5 Networks

October 2007 - (Free Research)
For most deployment scenarios, an SSL VPN appliance can provide many of the features and benefits of a special purpose WLAN controller for wireless access, but at a much lower cost and with greater flexibility. This paper describes the key sell... 
(WHITE PAPER) READ ABSTRACT |

Cisco PIX 506E Security Appliance by Cisco Systems, Inc.

The Cisco® PIX® 506E Security Appliance delivers enterprise-class security for remote office, branch office, and small-to-medium business (SMB) networks, in a highperformance, easy-to-deploy purpose-built appliance. 
(HARDWARE PRODUCT)

How to Cut Overhead Costs Right Now: Connect Remote Workers, Using VPN Security by Cisco Systems, Inc.

August 2009 - (Free Research)
Giving remote workers easy and secure access to your network with virtual private network (VPN) technology can result in big savings. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts