Ask the Experts
Ask the Experts
-
What is network verification and do enterprises need it?
Network verification can help organizations gain critical network performance insight and alleviate network complexity. But aspects of the concept are new and not yet mainstream. Continue Reading
-
How does DevOps in networking change network requirements?
As more organizations embrace DevOps in networking, the approach can transform network requirements, such as visibility and security policies, which network teams should consider. Continue Reading
-
What should I know about IP address management systems?
As networks continuously gain more devices, outdated IP address management methods face new challenges. Despite this, IPAM is still crucial for any organization's network. Continue Reading
-
How do I build a cloud-ready network?
IT teams can prepare their networks for cloud migrations by planning around their applications, security strategies, remote users and WAN performance. Continue Reading
-
What's the difference between SD-branch vs. SD-WAN?
As networking pros evaluate SD-branch vs. SD-WAN, they'll notice a key distinction between the two technologies, namely how network functions are managed and orchestrated. Continue Reading
-
12 questions to ask about SD-WAN managed services
When contemplating SD-WAN managed services, organizations should ask questions about network security, infrastructure compatibility and bandwidth requirements. Continue Reading
-
What's the difference between thin and thick SD-WAN branch offices?
When rolling out software-defined WAN, you'll need to consider the current makeup of your branch offices. For instance, are applications on-site or in the cloud? Continue Reading
-
Why should I consider an AIOps platform for my network?
AIOps can take various tasks -- such as data collection and analysis -- off the plates of network teams. This can provide organizations with better insight into network visibility. Continue Reading
-
SD-WAN vs. DMVPN vs. IPsec tunnels: How do I choose?
Software-defined WAN, DMVPN and IPsec tunnels each have a place among enterprises. Our network expert compares each one and explains where they can be most beneficial. Continue Reading
-
How do I choose the right network automation tools or platform?
In your organization's search for the best network automation platform for business operations, compare the pros and cons of proprietary and open source tools. Continue Reading
-
How do I build the right cloud network design?
Networks look different now than they did a decade ago, and that continuous change isn't slowing down. Cloud networking plays a large role in the transformation of legacy networks. Continue Reading
-
What is the difference between a bridge and a router?
While a bridge and router share some similarities, the difference between a bridge and router is significant, including how the devices interpret network connections. Continue Reading
-
How can SD-WAN and edge computing services work together?
Organizations may want to consider the effect SD-WAN and edge computing could have when combined. Make sure to consider all options before choosing a combination model, however. Continue Reading
-
What's the difference between half-duplex and full-duplex?
A half-duplex transmission could be considered a one-way street between sender and receiver. Full-duplex, on the other hand, enables two-way traffic at the same time. Continue Reading
-
How realistic are compact SD-WAN appliances compared to VPNs?
The battle between VPN vs. SD-WAN returns. In this clash, see how realistic SD-WAN appliances are for remote and mobile workers compared to VPN connections. Continue Reading
-
Network security vs. application security: What's the difference?
Different tools protect different assets at the network and application layers. But both network and application security need to support the larger security plan. Continue Reading
-
What SD-WAN certifications and courses are available?
A few SD-WAN certifications do exist, but they're heavily focused on specific vendors and their respective products. Find out why market-wide certs are unlikely. Continue Reading
-
How to compare Cisco vs. HPE Aruba switches
Organizations have much to consider when evaluating Cisco vs. HPE Aruba switches, such as device architecture, Opex, Capex and analytics capabilities. Continue Reading
-
How do I create proper documentation of network automation?
Despite network automation's advantages, organizations can face disadvantages if they have improper network documentation. These four components can help enable proper documentation. Continue Reading
-
How will BSS coloring boost Wi-Fi 6 performance?
BSS coloring is a feature that will help accelerate Wi-Fi 6 performance. Find out how the new mechanism will help access points transmit more efficiently. Continue Reading
-
Bridge vs. switch comparison: What's the difference?
A network bridge connects two local area networks. A network switch, on the other hand, connects multiple clients to a network. Learn more about these two network components. Continue Reading
-
How does 802.11ax security benefit from WPA3?
Security methods like WPA3 and Opportunistic Wireless Encryption will give a boost to 802.11ax security, but securing the new wireless standard is still pretty complicated. Continue Reading
-
What are the steps I should take for network transformation?
The path to digital transformation has three points that all organizations should reach to ensure their network is ready for digital transformation. Continue Reading
-
What is 5G massive MIMO and how can it boost bandwidth?
With a large array of small antennas and time division duplex communication, 5G massive MIMO is expected to support more bandwidth and users with lower latency. Continue Reading
-
What are the top 3 network analytics use cases?
Network analytics use cases illustrate some of the benefits that companies are receiving from network analysis tools. Gauging network performance is just one key area. Continue Reading
-
How does SD-WAN analytics monitor network performance?
With SD-WAN analytics, administrators can fine-tune their WAN connections and determine how well their network is performing. Continue Reading
-
What effect will 400 GbE have on enterprise networks?
400 Gigabit Ethernet is the next hurdle for Ethernet capabilities to surpass. But enterprises may not be prepared for this technology yet, due to its immaturity. Continue Reading
-
What is the difference between TCP/IP model vs. OSI model?
Use this expert advice to learn the differences between the TCP/IP model vs. the OSI model, and explore how they relate to each other in network communications. Continue Reading
-
Which SD-WAN features truly comprise SD-WAN technology?
How do you protect your organization and network against SD-WAN washing? Here are four key SD-WAN features that your system must have in order to be called SD-WAN. Continue Reading
-
How can network security analytics detect and thwart threats?
Network security analytics gives organizations an additional level of protection against malicious attacks. It works closely with network analytics tools. Continue Reading
-
What steps should I take in the event of a network failure?
Don't panic when the network goes down. Instead, use this checklist to go through five factors that could cause network failure, and follow tips on how to plan for them in advance. Continue Reading
-
What does stateful vs. stateless mean in a networking context?
When it comes to understanding state from a networking perspective, knowing the difference between stateful vs. stateless firewalls is a crucial starting point. Continue Reading
-
What does open source SD-WAN look like, and do we need it?
Open source software has an openly available source code that users can adopt or modify. Open source combined with SD-WAN might be a perfect match or a too idealistic goal. Continue Reading
-
Can you integrate legacy network monitoring and analytics?
Legacy network monitoring and new analytics tools don't often mix. One workaround is APIs, but a better option is to upgrade older management software. Continue Reading
-
How do I plan a network management strategy for multiple tools?
Many IT teams deal with a bevy of network management tools, which complicates data integration and leads to errors. A network management strategy that focuses on coordination can help. Continue Reading
-
What roles are included in a network engineer job description?
What is a network engineer? The role can encompass several disciplines, especially as new technologies emerge. Software knowledge, in particular, is in high demand. Continue Reading
-
How is service mesh architecture different from SDN and NFV?
Service mesh separates itself from SDN and NFV approaches with its clear focus on managing the communication and forwarding between multiple microservices. Continue Reading
-
What's the difference between a router, switch and hub?
Although a router, switch and hub all help direct network traffic, the devices transmit packets in different ways. Discover the differences among these network devices. Continue Reading
-
What's the difference between an edge router vs. core router?
Clearly, an edge router and core router are placed in different parts of the network, but their routing roles are more complex than their physical locations. Continue Reading
-
Will 5G networks require new network engineer skills?
The 5G network will likely affect network engineer skills in areas such as security, physical appliances and software. But enterprise teams won't see too much change, for now. Continue Reading
-
What are private 5G networks and could they emerge as a major trend?
In some network environments, businesses may need broader connection options for devices and automation. Private 5G networks, at some point, might be the answer. Continue Reading
-
What is network traffic analytics and how does it enhance security?
Network traffic analysis has evolved to incorporate machine learning techniques that help identify network security threats in real time and expedite a response. Continue Reading
-
SD-WAN with IoT enables the enhanced network edge
In a world teeming with IoT devices -- and the resulting data -- SD-WAN and SD-branch can provide the security, visibility and connectivity the IoT edge requires. Continue Reading
-
What are the 5 types of network firewalls and how are they different?
As they monitor and filter network traffic, some firewalls can provide some pretty advanced security controls. But added packet inspection can slow network performance. Continue Reading
-
What is a programmable data plane and where does P4 fit in?
A programmable data plane presents a versatile way to forward packets and supports various formats and protocols. The P4 language is used to configure the forwarding actions. Continue Reading
-
What is Cisco Smart Licensing and how might it benefit my business?
Cisco Smart Licensing, the networking vendor's fairly new approach to software licensing, aims to provide customers with more visibility and control over their licenses. Continue Reading
-
When will enterprises adopt the new Wi-Fi 6 standard?
Networking vendors have unveiled Wi-Fi 6 devices, yet the wireless standard is not ratified. Don't expect Wi-Fi 6 to flow into the mainstream anytime soon. Continue Reading
-
What is the purpose of an SD-WAN gateway?
Software-defined WAN architecture has adapted with the growth of cloud services, resulting in a cloud-based model that uses SD-WAN gateways to handle traffic and control. Continue Reading
-
Which 802.11ax features support IoT adoption?
A handful of key 802.11ax features could help accelerate widespread internet-of-things adoption, according to networking experts familiar with the new standard. Continue Reading
-
How are automated network configuration and management changing?
Could a new generation of network testing and verification tools combine with automated network configuration to mimic intent-based networking systems? Continue Reading
-
What tools can reinforce network edge security?
Firewalls, intrusion prevention systems and cloud-based threat intelligence are just a few of the many ways that organizations can bolster network edge security. Continue Reading
-
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security. Continue Reading
-
What 5 items should be on your network monitoring checklist?
Device monitoring, visual performance tools and a deep understanding of network data are just a few of the items that should be on your network monitoring checklist. Continue Reading
-
What are the benefits of ADCs with per-application functionality?
DevOps development has driven the need for application delivery controllers to adapt. The result is per-application functionality, which enables customization for each application. Continue Reading
-
How does a WAN-cloud exchange work?
WAN-cloud exchanges provide private and secure connectivity to cloud environments, making them beneficial for software-defined WAN and SaaS platforms. Continue Reading
-
How do cloud data centers affect network bandwidth requirements?
When deciding which applications to move to a cloud data center, enterprises should consider network bandwidth requirements and latency, among other factors. Continue Reading
-
Wi-Fi 6: How does OFDMA work?
The new Wi-Fi 6 standard works harder but also smarter, thanks to a game-changing feature called orthogonal frequency-division multiple access. Continue Reading
-
How does security for intent-based networking work?
Monitoring plays an essential role when it comes to security in intent-based networking environments, as it ensures policies are met and detects network anomalies. Continue Reading
-
How do SDN protocols compare to those used in SD-WAN?
Traditional SDN controllers use northbound and southbound APIs to communicate. But software-defined WAN controllers don't rely on those same SDN protocols. Continue Reading
-
Why would an organization move to intent-based networking?
Intent-based networking doesn't use any magical commands. But it does use a heavy dose of automation, which might cause some network teams to be wary of the new approach. Continue Reading
-
How do network virtualization and network abstraction compare?
Network virtualization and network abstraction share similarities, like supporting the creation of virtual resources, but the two approaches vary in complexity and outcome. Continue Reading
-
What are the pros and cons of machine learning in network security?
The predictive nature of machine learning can benefit network security strategies. But it can also benefit those looking to break through secure network barriers. Continue Reading
-
What 4 questions can help prepare your network for IoT?
Increasingly, organizations are seeing a marriage of IoT and networking for more efficiency and enhanced services. Here's what you need to know to prepare your networks for IoT. Continue Reading
-
What network tools are available for hybrid cloud monitoring?
As hybrid cloud adoption ramps up, businesses should consider hybrid cloud monitoring tools that provide network performance insight across the entire environment. Continue Reading
-
What are the pros and cons of open source network monitoring tools?
They're usually free and customizable, but can lack customer support. Take a look at the best and worst features of open source network monitoring tools. Continue Reading
-
Intent-based networking vs. SDN: How do they differ?
When it comes to the primary differentiators between intent-based networking and SDN, abstraction and administrator commands are at the top of the list. Continue Reading
-
What is a software-defined perimeter, and do I need it?
An evolving network world requires evolving network security. Learn how software-defined perimeter offers a compelling answer to network vulnerabilities. Continue Reading
-
Which core network functions are being virtualized?
Network functions virtualization can virtualize both data center and branch office network services. But a couple of special cases, like virtual switches, require clarification. Continue Reading
-
What roles do vCPE and uCPE have at the network edge?
As service providers look to virtualize the edge and deliver network services faster, they're turning to vCPE and uCPE that run services as software on generic hardware. Continue Reading
-
What are the top benefits of CDN services for enterprises?
You might be asking yourself, 'Do I need a CDN?' According to one network analyst, the answer is most likely yes, as CDNs provide faster access to internet content. Continue Reading
-
Which KPIs should I measure for security in SDN?
KPIs provide useful guidelines to measure how network performance and security align with business objectives. Here are some KPIs to help keep track of an SDN environment. Continue Reading
-
How might NFV in IoT enhance network edge security?
The emergence of IoT devices has considerable network security implications. An NFV architecture, however, could add another layer of network defense. Continue Reading
-
What is a service mesh, and how does it relate to networking?
A service mesh can ease the deployment of microservices and container-based applications, while supporting the delivery of network services, like load balancing and authentication. Continue Reading
-
What are the top 3 benefits of NFV technology?
The use of standard hardware, consolidation of network functions and machines, and flexible system upgrades are some of the key benefits of NFV technology. Continue Reading
-
How can organizations improve their network change management?
Organizations can optimize their network change management processes with dedicated change management services for improved planning, monitoring and communication capabilities. Continue Reading
-
What are the differences between network security vs. cybersecurity?
IT groups need to consider varying layers of security. For instance, the similarities and differences between cybersecurity and network security are closely entwined. Continue Reading
-
What are the pros and cons of deploying containers?
Containers can reduce a company's OS licensing costs and required CPU usage, while acting as a bridge to serverless computing. But IT teams need to evaluate the potential drawbacks. Continue Reading
-
Where does SDN fit in edge computing architecture?
SDN and edge computing can work together to apply data processing decisions that make better use of network links and bandwidth, especially when it comes to edge versus cloud. Continue Reading
-
What are the pros and cons of blockchain in networking?
While blockchain could be a valuable network management tool, enterprises don't exactly have a driving need for the ledger technology in the networking arena. Continue Reading
-
What are today's top 3 network security challenges?
A significant shortage of cybersecurity staff, poorly configured firewalls and unmanaged end-user mobile devices are some of the top network security threats. Continue Reading
-
How do last-mile connections work for SD-WAN deployments?
SD-WAN technology plays well with existing last-mile connections, and it allows enterprises to use more than one type of transport link. But beware of provider sprawl. Continue Reading
-
What is the status of VNF deployments among service providers?
Although service providers are undertaking VNF deployments in the network core, they're hard-pressed to deploy them at the network edge due to complexity and cost. Continue Reading
-
What is a long-tail DoS threat, and how does it target web apps?
Fine-grained application monitoring can defend against a long-tail DoS threat. This new kind of vulnerability manipulates service queues within a web application. Continue Reading
-
How do virtual ADCs benefit enterprise data centers?
Virtual ADCs bring another level of flexibility, authentication and performance monitoring, moving application delivery controllers beyond load balancing and application acceleration. Continue Reading
-
Does software-defined networking architecture use segment routing?
Segment routing steers packets using a list of instructions, and it can be used in MPLS and IPv6 architecture. But does software-defined networking architecture support it? Continue Reading
-
How do I begin network infrastructure planning for SD-WAN?
When gearing up for SD-WAN upgrades, enterprises should take their time with network infrastructure planning. These three steps can help get them started. Continue Reading
-
What metrics and tools can accurately measure network performance?
Several methods and metrics measure network performance and throughput. But IT needs to gauge these measurements on a consistent basis to avoid major service issues. Continue Reading
-
What is multi-access edge computing, and how has it evolved?
Multi-access edge computing provides the processing capacity needed to support the increase of 'things' at the network edge. But for all its promise, MEC has challenges to face. Continue Reading
-
Does software networking fit modern data center requirements?
Software networking can support modern data center requirements, private clouds and accompanying applications. But IT teams need to wade through components and suppliers to get there. Continue Reading
-
How do I troubleshoot network performance with traffic monitoring?
When undertaking network performance troubleshooting, organizations can benefit from a mix of passive and active network traffic monitoring to identify issues. Continue Reading
-
What key network performance issues spark service disruptions?
From cabling to capacity issues, IT professionals need to consider all possibilities when rooting out the underlying cause of network performance problems. Continue Reading
-
Which SD-WAN security concerns should I tackle first?
IT teams thinking about software-defined WAN technology should assess a few SD-WAN security concerns before deployment to make sure it's worth the investment. Continue Reading
-
How can network analytics tools benefit IT staff?
Network analytics tools can help IT managers proactively pinpoint network performance issues and trends -- even before the underlying problem is revealed. Continue Reading
-
Does software-defined networking architecture need network overlays?
Network overlays and software-defined networking architecture share a history. But while overlays offer flexibility, they also bring extra overhead and troubleshooting complications. Continue Reading
-
Can hyper-converged systems benefit from SDN architecture?
Hyper-convergence combined with software-defined networking architecture might seem like hyper-hype, but SDN offers many network capabilities required of hyper-converged systems. Continue Reading
-
How do I improve my network programming knowledge?
When it comes to SDN and programmable network skills, combining training with practice and hands-on experience can help advance your programming knowledge. Continue Reading
-
How can network analytics tools be used to improve performance?
With pressure and expectations for network and enterprise performance rising, IT professionals are turning to network analytics tools that use machine learning to remain ahead of the game. Continue Reading
-
How do the benefits of SDN improve network automation?
The ability to automate networks isn't new, and while the benefits of SDN reach out to encompass aspects of automation, SDN and network automation don't mean the same thing. Continue Reading
-
How do I choose between open source and commercial SDN?
Commercial SDN offers vendor-backed support, while open source platforms can be upgraded more quickly. Whether an enterprise chooses one over the other depends on its preferences. Continue Reading
-
What tools are needed to build a DevOps management model?
Amy Larsen DeCarlo answers why so many businesses are combining their development and operations teams and what tools are needed to make effective DevOps management happen. Continue Reading