Backbone Providers Reports

Essential Guide: Securing hybrid IT infrastructure
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.
Posted: 08 Feb 2021 | Published: 16 Nov 2017

TechTarget ComputerWeekly.com

Computer Weekly – 13 March 2018: Unlocking digital change in criminal justice
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the IT and digital chief at the Ministry of Justice about digital transformation across the criminal justice system. European cities are trying to attract British IT talent as a result of Brexit – what does it mean for UK IT? And we take an in-depth look at the fintech sector. Read the issue now.
Posted: 08 Feb 2021 | Published: 09 Mar 2018

TechTarget ComputerWeekly.com

Outsourcing Your Network – Lock, Stock, and Barrel or Bite-sized Chunks?
sponsored by Dimension Data
WHITE PAPER: This whitepaper covers the changing strategy for outsourcing ICT to a service planner. Organizations are now using a multi-or-selective sourcing model instead of an all-in-one approach.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Dimension Data

Cisco: Leading the Way to Borderless Networks
sponsored by Cisco Systems, Inc.
WHITE PAPER: Cisco's borderless networks promises to connect anyone to anywhere, using any device, to any resource—securely, reliably, transparently. In order to fully deliver on this promise, Cisco is advancing along three critical fronts: workplace transformation, technology leadership, and operational excellence. Read this paper to learn more.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

Cisco Systems, Inc.

How a Techie Built a Network That Cuts Costs by 50%
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover how a technical supervisor used network technology to help his company slash phone service costs, improve security and service, and add four satellite offices without adding more IT support.
Posted: 13 Dec 2011 | Published: 13 Dec 2011

Cisco Systems, Inc.

The Financial Benefit of Cisco’s Elastic Core
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore how three Cisco software-based initiatives for the core network can help you address the challenges facing core networks today – including the increasing volumes of traffic, diversity of services, and adoption of cloud services.
Posted: 28 Jun 2013 | Published: 31 Dec 2012

Cisco Systems, Inc.

Hosted VoIP Savings Calculator
sponsored by Polycom, Inc.
ASSESSMENT TOOL: To see how much your company can save by implementing a Hosted VoIP solution, try this free, easy-to-use tool that requires just a few user inputs to quickly assess your potential savings. Businesses can now visualize the immediate and long-term cost savings and have a sound financial validation for moving forward with Hosted VoIP.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

Polycom, Inc.

A Golden Age Dawns for Network Services
sponsored by TechTarget Networking
EBOOK: Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

TechTarget Networking

Information Security Magazine – July/August 2013
sponsored by TechTarget Security
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security

The Problem Facing Advanced Threat Defense
sponsored by UnitedLex
EGUIDE: The biggest problem facing advanced threat defense is not necessarily the threat itself but rather uncertainty about which security strategy will offer the best results—and there's often not enough time to answer that question before making an investment. This e-guide provides expert commentary on how to address this problem in threat management.
Posted: 18 Feb 2016 | Published: 16 Feb 2016

UnitedLex