NSP Reports

Computer Weekly - 20 December 2022: The Post Office IT scandal - cock-up or cover-up?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, the Post Office IT scandal inquiry continues to reveal shocking details – we review the latest evidence. We examine progress of the roll-out of fast broadband across the UK. And as the Online Safety Bill returns to Parliament, we look at the arguments about how to keep the internet safe. Read the issue now.
Posted: 16 Dec 2022 | Published: 20 Dec 2022

TechTarget ComputerWeekly.com

Web application firewalls: How they can help protect customers
sponsored by Astaro
EGUIDE: In this E-Guide from SearchNetworkingChannel.com, get an overview of web applications firewalls, what they are and how they work, the types of attacks they mitigate, and why they are superior to web application code reviews.
Posted: 04 Apr 2012 | Published: 04 Apr 2012

Astaro

Service Provider Solutions Guide
sponsored by Transition Networks, Inc.
PRODUCT LITERATURE: With products available in stand-alone, chassis-based, fixed optics or SFP ports, Transition Networks has a product to meet your requirements.
Posted: 08 Sep 2008 | Published: 05 Sep 2008

Transition Networks, Inc.

Hosted VoIP Savings Calculator
sponsored by Polycom, Inc.
ASSESSMENT TOOL: To see how much your company can save by implementing a Hosted VoIP solution, try this free, easy-to-use tool that requires just a few user inputs to quickly assess your potential savings. Businesses can now visualize the immediate and long-term cost savings and have a sound financial validation for moving forward with Hosted VoIP.
Posted: 14 Jun 2010 | Published: 14 Jun 2010

Polycom, Inc.

A Golden Age Dawns for Network Services
sponsored by TechTarget Networking
EBOOK: Advanced network technology options have expanded, offering enterprises better, cheaper, options for network services. This three part guide is designed to help you understand the ongoing evolution of network services and the connectivity technologies needed to access them.
Posted: 17 Oct 2016 | Published: 17 Oct 2016

TechTarget Networking

Cisco® ONE: Traffic Visualization and Control
sponsored by Cisco Systems, Inc.
WHITE PAPER: This resource explores how Cisco ONE's traffic visualization and control capability can help service providers visualize traffic end-to-end across the network and respond to unpredictable network capacity demands quickly, easily, and efficiently.
Posted: 26 Jun 2013 | Published: 30 Apr 2013

Cisco Systems, Inc.

Wireless Solutions for High Density Wireless
sponsored by Xirrus
WHITE PAPER: This brief resource outlines a smarter solution for high-density wireless networking that can scale to support thousands of simultaneous users and an ever-increasing range of wireless devices. Read on now to learn about the capabilities that make this solution a perfect fit for high-density environments.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

Xirrus

Remote Monitoring and Management Tools Selection Tips for Solution Providers
sponsored by Solarwinds N-able
EGUIDE: This E-Guide from MicroScope.co.UK offers advice that will help MSPs and VARs find the ideal remote monitoring and management (RMM) solution for their organization.
Posted: 17 Apr 2013 | Published: 17 Apr 2013

Solarwinds N-able

Outsourcing Your Network – Lock, Stock, and Barrel or Bite-sized Chunks?
sponsored by Dimension Data
WHITE PAPER: This whitepaper covers the changing strategy for outsourcing ICT to a service planner. Organizations are now using a multi-or-selective sourcing model instead of an all-in-one approach.
Posted: 13 Feb 2014 | Published: 13 Feb 2014

Dimension Data

Information Security Magazine – July/August 2013
sponsored by TechTarget Security
EZINE: This month's issue takes a comprehensive look at new ways information security pros are isolating, monitoring, and controlling traffic within their data centers. We also publish the results of our Enterprise Mobile Security 2013 survey this month and offer expert advice on third-party vendor risk management.
Posted: 06 Aug 2013 | Published: 06 Aug 2013

TechTarget Security