internet protocol

Results 51 - 66 of 66Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Apr 02, 2015
Trust and consumer confidence is the foundation upon which the Internet has been built. Leading commerce and financial services companies worldwide have long used Secure Socket Layer and Transport Layer Security (SSL/TLS) technologies to secure customer communications and transactions. But with the rise of Web 2.0 and social networking, people are spending more time online and logged in, and they are communicating much more than just their credit card numbers. Unfortunately, Web security practices have not always kept pace with these changes. Many organizations use the SSL/TLS protocol to encrypt the authentication process when users log in to a website, but do not encrypt subsequent pages during the user’s session. This practice is risky because it leaves website visitors vulnerable to malicious online attacks, and can result in millions of users being unknowingly exposed to threats simply by visiting a trusted website. This white paper discusses the imperative need for Always On S
Tags : 
secure socket layer, transport layer security, secure customer communications, web security, online attacks, always on ssl
    
Symantec
Published By: Bronto     Published Date: Sep 09, 2013
Deliverability is a primary concern for email marketers. There are many nuances that can impact how your messages are delivered. This white paper explains the most common sending environments and answers the frequently asked questions around why and when to make the transition to a dedicated IP (Internet Protocol) address.
Tags : 
email deliverability, email marketing, dedicated ip, dedicated internet protocol
    
Bronto
Published By: NetCom Info     Published Date: Jul 16, 2009
NetCom's CCNA certification course teaches clients how to configure, install and maintain the following protocols:• Introduction to wireless networking concepts & terminology• Internet Protocol (lP)• Enhanced Interior Gateway Routing Protocol (EIGRP)• Serial Line Interface Protocol Frame Relay• Routing Information Protocol Version 2 (RIPv2)• Virtual Local Area Network (VLANs)• Ethernet and access control lists (ACLs)
Tags : 
ccna, cisco, networking, routing and switching, cisco certification, ccnp
    
NetCom Info
Published By: Aventail     Published Date: Aug 21, 2009
Internet Protocol Security virtual private networks (IPSec VPNs) were once the only options for secure remote access, but worked only site-to-site and were difficult and costly to maintain. Today, Secure Sockets Layer (SSL) VPNs are increasingly replacing IPSec VPNs because they are less costly to manage...
Tags : 
vpn, ssl, ssl vpn, ipsec, secure remote access, remote access security, network security, aventail
    
Aventail
Published By: Internet Security Systems     Published Date: Aug 21, 2009
Voice over Internet Protocol (Voice over IP or VoIP) allows users to make phone calls over the Internet, or any other IP network, using the packet switched network as a transmission medium rather than the traditional circuit transmissions of the PSTN. As the technology has become more reliable in recent years, companies have been moving to VoIP for a number of reasons.
Tags : 
voip, voice over ip, ip telephony, voip security, secure voip, pstn, network security, internet security
    
Internet Security Systems
Published By: Signiant     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant
Published By: Quocirca     Published Date: May 14, 2008
Virtual private networks (VPNs) are the technologies most widely used by organizations today in the provision of remote access to their networks for employees, business partners and suppliers. Of the VPNs available, IPSec (Internet Protocol Security) VPNs provide the most complete remote access solution, although they have traditionally been seen as costly and difficult to deploy. 
Tags : 
vpn, ipsec, remote access quocirca
    
Quocirca
Published By: Quocirca     Published Date: Oct 01, 2008
The internet has grown rapidly from a random collection of mainly academic networks and military control and routing protocols into a global, integrated and sophisticated commercial utility. No longer simply an 'Information Superhighway', it has extended to embrace voice telephony, video and mobile communications as part of a converged network. Connection options and services have expanded, with opportunities for internet service providers (ISPs) to add value beyond simply forwarding bit and bytes.
Tags : 
quocirca, isp, isps, internet service provider, convergence, ip telephony, voip
    
Quocirca
Published By: Quocirca     Published Date: Jan 13, 2009
Given today’s economic climate, businesses are, more than ever, looking to create additional value through the reduction of risk and by saving costs. For many, the economic downturn is seen as the best time to optimise the infrastructure that they already have in place, to look at ways to trim unnecessary expenditure and to use existing resources more effectively. As organisations are increasingly reliant on data networks that encompass an ever-growing range and number of internet protocol (IP) enabled devices and applications, they need to more effectively administer and manage these assets—they can no longer take the management of their IP networks for granted.
Tags : 
quocirca, ipam, dynamic host configuration protocol, domain name system, radio frequency identification, voice over ip
    
Quocirca
Published By: Indigo Rose Corporation     Published Date: Feb 14, 2007
TrueUpdate 2.0 allows any software developer to integrate automated update capabilities into their final product, providing a robust client/server framework for determining required updates, and then retrieving and applying the necessary patch or installation files using Internet or LAN protocols.
Tags : 
software development, updates, update installers, trueupdate, indigo rose
    
Indigo Rose Corporation
Published By: GFI     Published Date: Jun 14, 2007
This technical white paper gives an introduction to fax over Internet Protocol (FoIP) and explains the various usages and advantages of FoIP including Least Cost Routing (LCR).
Tags : 
ip fax, faxing, ip faxing, foip, fax server, gfi, real time, real-time faxing
    
GFI
Published By: Interactive Intelligence     Published Date: Jul 21, 2010
Read about five migration checkpoints that will make your move to VoIP the right one.
Tags : 
interactive intelligence, migration to voip, voice over ip, ip telephony, pbx, networking, quality of service, roi
    
Interactive Intelligence
Published By: Signiant Inc.     Published Date: Aug 14, 2008
FTP (File Transfer Protocol) is used to perform file transfers over Internet Protocol (IP) networks such as the public Internet and corporate intranets. FTP is widely deployed and is widely accepted as a file transfer solution. However, are there downsides to using FTP for file transfers? This paper compares FTP with file transfer methodologies of Signiant's software applications and identifies the shortcomings of FTP that Signiant was designed to overcome.
Tags : 
signiant, ftp, file transfer, file transfer protocol, content delivery
    
Signiant Inc.
Published By: Sparta Social Networks     Published Date: Oct 10, 2008
This case-study talks about how the Packet8 broadband voice over Internet protocol (VoIP) and video communications service which lets broadband Internet users add digital voice and video communications services to their high-speed Internet connection. Videophone users now account for almost 5 percent of Packet8’s 74,000 lines, and are one of several drivers in the company's quarterly growth, up 54 percent in the most period to $6 million in revenue. Download to learn more.
Tags : 
sparta, social network, packet8, internet protocol (voip)
    
Sparta Social Networks
Published By: Infoblox     Published Date: Jun 11, 2012
Learn why any organization relying on the IT ecosystem enabled by the Internet Protocol - especially those organizations with public-facing content - are at great risk. Get your free complimentary white paper NOW!
Tags : 
infoblox, private cloud, public cloud, cloud, routers, switches, servers, firewalls
    
Infoblox
Published By: Norse     Published Date: Mar 10, 2014
Learn about how the internet has changed over the past year and see how these major changes have affected security protocols and how your organization should respond to keep current in a world that is run by the Internet.
Tags : 
norse, sans, internet of things, cybersecurity, nstac, industrial internet, cyber-physical systems, emerging technologies
    
Norse
Start   Previous    1 2 3     Next   End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.