overview

Results 101 - 125 of 677Sort Results By: Published Date | Title | Company Name
Published By: Cisco     Published Date: Apr 10, 2015
While providing your customers and guests with Wi-Fi, you can give them pertinent information, individual attention, and special offers. And you can learn how, where, and when they move through your venue. Customers or guests passing through your store, hotel, or other venue increasingly expect free Wi-Fi. They also expect personal service. You can give them both, which can help boost your sales. And in doing so, you can gain information that will help make your venue more attractive and profitable.
Tags : 
cisco, wifi, wireless. wan, wlan, network design, it solutions
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: Cisco     Published Date: May 14, 2015
Cisco has acknowledged the need to address our customers’ array of employee and consumer mobility requirements with a full set of mobility solutions.
Tags : 
mobile users, strategy, app enabled, scalability, security, device management, enterprise, byod
    
Cisco
Published By: Cisco     Published Date: Jun 10, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wifi, wireless, technology, network, 802.11, wan, design
    
Cisco
Published By: Cisco     Published Date: Aug 03, 2015
Solutions overview.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 03, 2015
Productivity and flexibility to your workforce.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
The report is divided into two main areas: Threat Intelligence, which gives an overview of the latest threat research from Cisco. And, Analysis and Observations, where security industry consolidation and the emerging concept of integrated threat defense is discussed.
Tags : 
cisco, security report, cisco security report 2015, threat intelligence, network defenses
    
Cisco
Published By: Cisco     Published Date: Oct 14, 2015
Mobile technologies are having a dramatic effect on the way we live, work, learn, and play. While organizations recognize that the impact of mobility could be as great as that of the web, many are struggling with what exactly to do about it. IT leaders have the opportunity to direct this transformation. Read more to learn how.
Tags : 
cisco, mobility solutions, mobility, mobile technologies, mobile work environment
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
cisco, intelligent wan, validated designs, systems design
    
Cisco
Published By: Cisco     Published Date: Dec 04, 2015
This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
wan, applications, design guide, summary, technology
    
Cisco
Published By: Cisco     Published Date: Jan 05, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jan 08, 2016
The SVM provides a quick, clear overview of the relative value of security investment options by mapping security effectiveness and value (TCO per protected Mbps) of tested product configurations.
Tags : 
cisco, ngfw, security, svm, firewall, protection, leader
    
Cisco
Published By: Cisco     Published Date: Feb 23, 2016
This part of the CVD describes design considerations to implement a successful BYOD solution and different deployment models to address diverse business cases. Other parts of the CVD provide more details on how to implement unique use cases.
Tags : 
business models, development, business solutions
    
Cisco
Published By: Cisco     Published Date: Apr 15, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
cloud management, cloud services, cloud management, best practices, cloud computing
    
Cisco
Published By: Cisco     Published Date: Jun 21, 2016
Cisco® Validated Designs provide the foundation for systems design based on common use cases or current engineering system priorities. They incorporate a broad set of technologies, features, and applications to address customer needs. Cisco engineers have comprehensively tested and documented each Cisco Validated Design in order to ensure faster, more reliable, and fully predictable deployment. This design guide summary provides you with an overview of the Cisco Intelligent WAN Design Guide, the key technology, the use cases it provides, and additional and related resources.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jul 11, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 07, 2016
This white paper proves why vPC technology has nothing but a bright future.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Sep 08, 2016
This white paper summarizes the main architectural features that make the Cisco CloudCenter solution a unique and powerful choice for any IT organization or service provider seeking to deploy and manage applications in a mix of data center and cloud environments.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
Beginning with a brief overview of private cloud computing and the evolution of on-premises private clouds, we will compare Cisco Metapod to options from VMware and the OpenStack community. We’ll also describe Cisco’s unique OpenStack as a Service (OaaS) operating model, and present Total Cost of Ownership (TCO) analyses that compare Cisco Metapod to VMware vCloud Director and an OpenStack Do-It-Yourself (DIY) strategy.
Tags : 
    
Cisco
Published By: Cisco     Published Date: Dec 21, 2016
This part of the CVD describes design considerations to implement a successful BYOB solution and different deployment models to address diverse business cases
Tags : 
    
Cisco
Published By: Cisco     Published Date: Jun 12, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A paper providing an overview of Cisco Email Security
Tags : 
email security, cisco, email security, threat detection network
    
Cisco
Published By: Cisco     Published Date: Jun 16, 2014
A paper providing an overview of Cisco Email Security
Tags : 
    
Cisco
Published By: Cisco     Published Date: Aug 24, 2015
The Cisco 2015 Midyear Security Report examines these intersecting challenges while also providing updates on some of the most compelling threats. Using research by our experts, it provides an overview of the major threats observed in the first half of 2015. This report also explores likely future trends and offers advice for small, midsize, and enterprise organizations that seek security solutions and services.
Tags : 
malware, network defenses, detection, security gaps, threat defenses, trends
    
Cisco
Published By: Cisco     Published Date: Jan 02, 2018
Cisco commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) enterprises may realize by deploying Cisco TrustSec software-defined segmentation. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of Cisco on their organizations. To better understand the benefits, costs, and risks associated with TrustSec, Forrester interviewed four customers that had deployed TrustSec. The TrustSec software-defined segmentation solution simplifies the provisioning and management of highly secure access to network services and applications. Unlike access control mechanisms that work on network topology, TrustSec policies use logical grouping. Highly secure access is consistently maintained even as resources are moved in mobile and virtualized networks. A more detailed description of TrustSec is available on the Cisco TrustSec Overview page in this document.
Tags : 
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.