White Papers at Webtorials  




Secure Beyond the Signature









  • Frost & Sullivan Stratecast on behalf of McAfee



The Ultimate Guide to BYOD



  • ZK Research on behalf of Avaya


Net Diversity



The Multichannel Difference



  • Center for Strategic and International Studies on behalf of McAfee




Windows Phone 8.1 in the Enterprise

Advanced Attacks Demand New Defenses
  • InformationWeek on behalf of McAfee


"SDN 2.0" Application Traffic Control



  • Ed Metcalf and Rick Simon 
  • McAfee








This is Not Your Father's Cache


PCI Compliance and Mobile Devices




A Business Case for Mobility Solutions

The Missing Link between Cloud and Network

Solving the Engagement Challenge

What iOS 7 Means for the Enterprise

  • Frost & Sullivan Stratecast on behalf of McAfee



Net Diversity

The 7 Deadly Threats to 4G



  • Tolly Group on behalf of Avaya







  • Osterman Research on behalf of McAfee

Three Steps to Get Started With Email DLP
  • Osterman Research on behalf of McAfee



  • The Insider's Guide to Evaluating Mobile Data Management Software
  • DCIG on behalf of MobileIron


  • Intel in collaboration with McAfee



How to Manage Multicast Routing




  • Osterman Research on behalf of McAfee

  • Survey Research Highlights and Considerations for Enterprise IT 
  • Cisco Systems


The Autonomous Customer 2013

  • Osterman Research on behalf of McAfee




Top Five Contact Center Trends for 2013
  • Nemertes Research on behalf of Avaya

  • Bringing Benefits to Users, Business Decision Makers and IT Pros
  • ShoreTel









Integrated NetFlow and IP Route Analysis

  • Osterman Research on behalf of McAfee






The Multiple Threats of BYOD and BYOA


Neutralize Advanced Malware


WebRTC - A Reality Check


BYOD Policy in the Enterprise


Inspecting Encrypted Web Traffic
  • Secure and enforce HTTPS traffic compliance
  • McAfee







Object-Oriented Test Automation




  • Getting IT Back in Control of BYOD
  • Osterman Research on behalf of McAfee

2013 Cisco Annual Security Report



Securely Enabling Social Media


Videoconferencing Goes Viral

Rules for Video Conferencing

Practical Enterprise Mobility





Identity in the Cloud
  • Use the cloud without compromising enterprise security
  • McAfee


Cloud Identity Buyer's Guide
  • Managing identity in the cloud
  • McAfee


Dangers of the Cloud



BYOD Security Challenges in Education

  • Tolly Group on behalf of Avaya


Beginner's Guide to Video





Cisco Global Cloud Index

  • Nemertes Research on behalf of Avaya

2013 Cisco Annual Security Report


Comparing Campus and Data Center Switches


Next Generation Network IPS



BYOD: Putting a Lid on Pandora's Box
  • Getting IT Back in Control of BYOD
  • Osterman Research on behalf of McAfee


Inspecting Encrypted Web Traffic
  • Secure and enforce HTTPS traffic compliance
  • McAfee

  • The Pulse Network with Avaya




All Beamforming Solutions Are Not Equal

Pervasive Video in the Enterprise
  • Understanding Desktop Video Solutions, How They Scale, Bandwidth Considerations and Their Total Cost of Ownership
  • Constellation Research compliments of Avaya

Mitigating Carrier Mobile Traffic Jams


What You Need to Know about 802.11AC
  • Demystifying the Business and Technical Implications of the Next Generation of WLAN Technology
  • Motorola Solutions

The Ten Commandments of BYOD


802.11ac: The Fifth Generation of Wi-Fi

Microsoft Lync and SIP Trunking

What is an E-SBC?

Cisco CUBE - SIP Trunking Case Studies

Mitigating Carrier Mobile Traffic Jams


What You Need to Know about 802.11AC
  • Demystifying the Business and Technical Implications of the Next Generation of WLAN Technology
  • Motorola Solutions


Microsoft Lync and SIP Trunking

  • Four European Case Studies
  • IDC on behalf of MobileIron


802.11ac: The Fifth Generation of Wi-Fi

Are SLAs wooden swords at best?



  • Enterprise mobility strategy must account for parameters set by local data privacy laws
  • Ovum on behalf of MobileIron



  • Forrester Consulting on behalf of Avaya

Securing Virtual Applications and Servers





The Ten Commandments of BYOD






BYOD Smart Solution
  • Providing a work-your-way solution for diverse users with multiple devices, anytime, anywhere
  • Cisco Systems

Cisco Bring Your Own Device



Fifteen Steps to Conquering BYOD



  • Béatrice PIQUER DURAND
  • Ipanema Technologies

BYOD and the Wireless Revolution

Mobility/BYOD Security Survey

  • How Government, Education, and Healthcare Organizations Are Assessing and Overcoming Barriers to Cloud Deployments
  • Cisco Systems

Android Best Practices for BYOD

  • How Today's Government, Education, and Healthcare Organizations Are Benefiting from Cloud Computing Environments
  • Cisco Systems




  • Lower TCO by Activating Embedded Switch Tools that Automate Lifecycle Management Operations
  • Cisco Systems



Cisco Bring Your Own Device

Unified Communications
  • Redefining Anytime, Anywhere Communication and Collaboration
  • AT&T

  • A TCO Guide for SMBs
  • 8x8
  • Updated February 10, 2012

  • Using Locator/ID Separation Protocol (LISP) to Optimize Routing in IP Encryption Environments
  • Cisco Systems



Cisco Annual Security Report


  • A Step-by-Step Guide
  • AT&T


Why UC Implementations Fail
  • Here are the top 10 reasons and how to avoid them
  • Avaya

Cisco Global Cloud Index

Up to Your Assets in Technology?
  • Why now is the time to review your communications portfolio and reevaluate your strategy
  • Avaya

Raising the Bar on Desktop Virtualization
  • Understand the important considerations and use cases to make the most of your desktop virtualization initiative
  • Frost & Sullivan in collaboration with Cisco Systems




The VAR vs. the Cloud




Avaya web.alive
  • A Collaborative Immersive 3D World for the Enterprise and Education
  • Wainhouse Research on behalf of Avaya

Deploy and Monitor IPv6 End to End

The New Era of Federation
  • Introducing Universal Collaboration
  • Avaya





The iEverything Enterprise



  • Social Business Framework: Using People as a Platform to Enable Transformation
  • IDC on behalf of Avaya


  • How a network monitoring switch helps IT teams stay proactive
  • Anue Systems


How will IPv6 Impact your Network?


  • A Look Beyond the Rhetoric
  • Avaya



QoS: The Missing Link




  • Aberdeen Group on behalf of Avaya

The Strategic Network

  • Boost the Bottom Line with Mobile UC
  • Frost and Sullivan on behalf of Avaya


SIP Trunking: Second-Wave Benefits
  • Ovum Consulting on behalf of Avaya


  • On-Demand Webcast
  • AT&T

The Definitive Guide to Telework

Collaboration for Dummies

Medianet WAN/VPN QoS Design


WLAN Management Moves to the Cloud




  • Redefining Communications
  • Standardization and Componentization Create Efficiency, Innovation, and Business Value
  • Forrester Consulting on behalf of Avaya

  • Aligning Security and Data-Center Dynamics
  • Nemertes Research on behalf of Cisco Systems

  • Meeting the Need for High Performance and Ubiquitous Coverage with the Proliferation of Mobile Devices in the Enterprise
  • Juniper Networks

  • Evangelyze Communications on behalf of Avaya

  • Tolly Test Report
  • Performance Features and Usability of the Anue Network Visibility System
  • Anue Systems


Telepresence Options Series

IPv6-Enabling Your Web Environment
  • Begin Migration to IPv6 with your Internet-Facing Services
  • AT&T


  • Integrate Communications with Enterprise Applications to Drive New Business Value
  • Avaya

The Future of Network Security

The True Cost of Voice Over IP
  • As VOIP Becomes Mainstream, Costs Level Out, Benefits Increase
  • Robin Gareiss, Executive Vice President & Sr. Founding Partner, Nemertes Research
  • On behalf of Avaya


The Future of Hotspots

Defining Characteristics of Qfabric



2010 Annual Security Report





Seamless MPLS

Migrating to SIP Trunking

  • Unified Communications: A Key Component of your Telework Program
  • Chuck Wilsker, President & CEO, The Telework Coalition
  • On behalf of Avaya

  • How to Gain Competitive Advantage Using the Latest Conferencing and Collaboration Technologies.
  • Blair Pleasant, Co-Founder, UCStrategies.com
  • On behalf of Avaya


  • Zeus Kerravala, Distinguished Research Fellow, Yankee Group
  • On behalf of Avaya




Virtualizing UC
  • Reaping the Benefits and Understanding the Issues for Real-Time Communications
  • Abner Germanow and Jonathan Edwards, IDC
  • On behalf of Avaya

3Q10 Global Security Threat Report

  • Peter Finney, Senior Consultant, Strategic Communications Consulting Practice
  • Avaya




SIP-O-Nomics
  • Saving Money and Simplifying Architecture with the Session Initiation Protocol
  • Irwin Lazar, Vice President, Communications Research, Nemertes Research
  • On behalf of Avaya




Overlay vs. Integrated Wireless Security
  • The pros and cons of different approaches to wireless intrusion prevention
  • AirMagnet


IPv6 / IPv4 Dual Stack Networks

On-Line WiFi Planner


Reputation Filtering


AT&T MPLS: The Platform for Your Apps
  • On-Demand Webcast
  • AT&T



Mobile Device Security and Management
  • Enterprise Strategy Group
  • Commissioned by Juniper Networks

x86 Blades: Shrinking the Branch Office
  • Facilitating Branch Office Infrastructure Consolidation
  • Cisco Systems

IPv6 - Getting Ready
  • On-Demand Webcast
  • AT&T



Understanding Cloud Services
  • On-Demand Podcast
  • AT&T

Is Utility Hosting Right for Your Business?
  • AT&T


Wireless Clients in the Crosshairs
  • Wireless intrusion prevention counters growing threat
  • AirMagnet

Cross-Domain VPLS Deployment Strategies

Borderless Network Access

  • On-Demand Webcast
  • AT&T

  • AT&T

2010 Midyear Security Report
  • The Impact of Global Security Threats and Trends on the Enterprise
  • Cisco Systems

  • A Revealing Look at why Integrating Video with Unified Communications is a Winning Long-Term Strategy
  • E. Brent Kelly, Wainhouse Research
  • Sponsored by Avaya

Unified Communications for Dummies
  • Lawrence Miller, CISSP
  • Second Custom Edition
  • Avaya

Troubleshooting Your VoIP Ecosystem
  • Integrated Research

Successfully Mitigating Corporate Risk
  • AT&T

  • AT&T

Threat Defense for Borderless Networks
  • Cisco Systems

Introduction to Carrier Ethernet VPNs

VPLS: The Switched Ethernet
  • AT&T


  • AT&T


  • Enterprise Strategy Group, Inc.

  • AT&T


  • Cisco Systems


  • A Webtorials Featured Discussion
  • Featuring Devin Akin, Aerohive Networks

Managing the Mobile Workforce
  • On-Demand Webcast
  • AT&T with Yankee Group

  • A Win-Win for Business, IT, and Users
  • Infonetics Research, Inc.

A Practical Approach to Wireless 2.0

WAN Governance Executive Primer

  • AT&T

Network Services Virtualization

  • AT&T

Contact Centers Go Social
  • Creating a social media strategy for your contact center
  • Avaya

The Network Impact of 802.11n

802.11n Video Series

WLAN CleanAir Technology

  • The Network Offset Effect
  • AT&T

  • A Webtorials Featured Discussion
  • Featuring Masergy


  • The Business Case for Hybrid Network Unification
  • Maximizing Performance, Continuity and IT savings
  • Ipanema Technologies


  • Cisco's Security Vision for the Borderless Enterprise
  • Making Web 2.0 Safe for Business
  • Cisco Systems

802.11n Primer

Compliance for Internal Wi-Fi SLAs


  • Real-Time Event Detection and Response and Task Automation Using Cisco IOS Embedded Event Manager
  • Cisco Systems

Threat Control and Containment

Building Secure Wireless LANs




Filling the Layer 3 Gap in VoIP Management

  • Infoblox Integrated IP Address Management Solution
  • Integrated and Automated for Real-Time Visibility, Control and Compliance
  • Infoblox


Online Wi-Fi Planning Tool

  • Cisco Systems

Securing the Smart Grid
  • Cisco Systems

  • A Systematic Assessment Can Streamline the Shift to Oracle R12
  • AT&T

  • Cisco Systems

  • AT&T

  • Exclusive podcast interview with  Joanie Wexler and Aerohive

New PCI DSS Wireless Guidelines Overview
  • Cisco Unified Wireless Network Solution Positioning
  • Cisco Systems

Security Goes Virtual
  • AT&T

  • Protecting Cisco Catalyst 6500 Series Switches
  • Cisco Systems

Adaptive Private Networking
  • A Webtorials Editorial/Analyst Division Special Webcast Replay
  • Steven Taylor interviewing executives from Talari Networks

  • AT&T

  • Cisco Catalyst 6500 High Availability
  • Cisco Systems


  • AT&T

  • Cisco Systems

  • AT&T

  • Cisco Systems

Choosing a Content Delivery Method
  • AT&T

Cisco 2009 Midyear Security Report
  • An update on global security threats and trends
  • Cisco Systems

  • AT&T

Cisco Unified Border Element
  • SP Edition on Cisco ASR 1000 Series
  • Cisco Systems

  • Xangati

Xangati Application Management 2.0
  • Enterprise View
  • Xangati

Xangati Application Management 2.0
  • Service Provider View
  • Xangati

Managing Virtualization in 2009
  • A Double-Edged Sword
  • Yankee Group for Xangati

How to Virtualize
  • AT&T

  • Deploying Redundant Supervisors for Maximum Uptime
  • Cisco Systems

  • Packet Design

Why Virtualize?
  • Can Virtualization Benefit your Enterprise?
  • AT&T

  • Cisco Systems

  • Cisco Systems

  • The Total Economic Impact™ Of NetQoS Performance Center
  • Forrester Consulting for NetQoS

  • Cisco Systems

  • Michael F. Finneran, dBrn Associates, Inc.

Performance First
  • Managing Network and Application Availability and Performance
  • NetQoS

  • Increase network infrastructure utilization and efficiency to reduce operational costs
  • Cisco Systems

  • Mobility Without Complexity
  • Cisco Systems

  • Cisco Systems

  • Packet Design

  • Cisco Systems

  • Packet Design

Cisco EnergyWise
  • Cisco Systems

  • Cisco ASR 1000 Series Aggregation Services Routers
  • Cisco Systems

Synchronous Ethernet
  • Achieving High-Quality Frequency Distribution in Ethernet NGNs
  • Cisco Systems

  • MPLS WAN Explorer
  • Packet Design

  • Cisco Systems

  • Higher Ringing Voltage and Loop Current
  • Cisco Systems

  • Packet Design

  • VPN Traffic Explorer
  • Packet Design

  • Packet Design

  • Packet Design

  • Layer 3 Visibility for Mission-Critical Network Services
  • Packet Design

  • Packet Design

  • Packet Design

Network Management Time Travel
  • Rewinding and Replaying Your Network for Superior Troubleshooting
  • Packet Design

  • Prognosis




Join the Webtorials Community
Subscription Maintenance
Resource Guide

Featured Sponsors























Recent Comments

Notices

Please note: By downloading this information, you acknowledge that the sponsor(s) of this information may contact you, providing that they give you the option of opting out of further communications from them concerning this information.  Also, by your downloading this information, you agree that the information is for your personal use only and that this information may not be retransmitted to others or reposted on another web site.  Please encourage colleagues to download their own copy after registering at http://www.webtorials.com/reg/.  Continuing past this point indicates your acceptance of our terms of use as specified at Terms of Use.

Webtorial® is a registered servicemark of Distributed Networking Associates. The Webtorial logo is a servicemark of Distributed Networking Associates. Copyright 1999-2013, Distributed Networking Associates, Inc.