Features
Features
-
Networking elements of a digital transformation framework
Establishing a digital transformation framework includes adopting advanced technologies. Networking pros play a crucial role in managing this new wave of innovation. Continue Reading
-
Enterprise network management in the wake of vendor consolidation
Consolidation is a driving force among networking vendors, but network professionals have to actively consider how those changes affect enterprise network management. Continue Reading
-
Wireless networking technology helps craft IT modernization
A long-term care business looks to wireless network technology and Active Directory to kick off its IT modernization plan and business growth. Continue Reading
-
Network analytics tools deepen with machine learning and AI
Network analytics tools that utilize machine learning and AI can help IT pros with monitoring and performance evaluation, and provide business insight. But a holistic view of the network using analytics is still on the horizon. Continue Reading
-
The on-premises vs. cloud-managed WLAN architecture debate
Although on-premises WLANs and cloud WLANs both offer significant advantages, determining which approach will provide the best return depends on several factors. Continue Reading
-
Casemore: Cloud, as-a-service honing networking industry trends
Cloud and as-a-service delivery are bringing new urgency to networking. IDC analyst Brad Casemore cites the key networking industry trends worth watching in 2018. Continue Reading
-
What cloud data center interconnect technologies can do
Data center interconnect technologies and services now use cloud. Learn how CDCI improves traffic delivery and how to choose the right equipment and services. Continue Reading
-
Digital transformation process includes the network
The digital transformation process puts pressure on the network to support new technology. Network pros need to be transformative, too, adapting new skills to interact with business. Continue Reading
-
A comparison of leading application delivery controllers
You can simplify the process of buying an ADC device by examining how leading vendors address key considerations, including platform options, security and server load balancing. Continue Reading
-
Considerations for buying an application delivery controller
Before you buy an ADC device, learn which features you should look for and what questions you should ask prospective application delivery controller vendors. Continue Reading
-
As 2018 IT budgets rise, network upgrades become priority
A new TechTarget survey reveals network upgrades in 2018 are an amalgam of legacy and emerging technologies, as Wi-Fi fever spikes and network automation efforts grow. Continue Reading
-
Engineer uses Cisco DNA Center to combat network challenges
Durham County hopes Cisco DNA Center and network automation create efficient, seamless experiences for IT managers and users, after redesigning its data center with Cisco's ACI. Continue Reading
-
Small SDN providers' cost, flexibility appeal to enterprises
VMware's NSX and Cisco's ACI are the main SDN providers on the stage, but smaller vendors can offer enterprises flexibility and cost savings. Continue Reading
-
New 5G wireless technology trials spark enterprise interest
New 5G wireless technology promises super-fast network speeds and massive capacity. Businesses that require low latency and high throughput could see the advantages first. Continue Reading
-
SD-WAN security remains customer and vendor focus
Most SD-WAN vendors offer common features when it comes to SD-WAN security, but some tout security differentiators embedded in their services. Continue Reading
-
Network configuration tools: A primer
Script management, intent-based systems and new strategies with network configuration tools are propelling a paradigm shift in the way that networks are managed. Continue Reading
-
Application delivery controllers evolve to meet new demands
ADC devices have evolved to deliver a wide range of functionality, including web application firewall, denial-of-service protection, SSL offload and scalable performance. Continue Reading
-
How to select the best network monitoring tool
Learn the criteria for choosing the best network monitoring tool for your enterprise. Continue Reading
-
EarthLink SD-WAN helps Dunn-Edwards Paints connect with customers
When Dunn-Edwards Paints decided to explore software-defined WAN, they looked to their service provider, EarthLink. The latter's new managed SD-WAN service was a hit. Continue Reading
-
SDN service for sale ... from a healthcare provider?
Early NSX adopter BayState Health is weighing the possibility of a future as an SDN service provider -- using multi-tenancy to run other organizations' networks parallel to its own. Continue Reading
-
Managed enterprise network services gain traction
As network demands become increasingly complex, many enterprises are turning to managed network services, outsourcing maintenance to third-party providers. Continue Reading
-
Open source network software promises major industry shifts
Let the disruption commence! Observers say it's high time the networking sector accepts and sorts out open source, arguing it's not a question of if enterprises use it, but how. Continue Reading
-
Identifying the IT operations analytics product your enterprise needs
This guide to IT operations analytics tools explains how ITOA works so networking pros can determine the most important features and assess vendor offerings. Continue Reading
-
Networked cloud emerges to meet evolving infrastructure needs
Some enterprise network managers are beginning to move networking out to the cloud, as they sort out how to best meet their organizations' evolving infrastructure needs. Continue Reading
-
CN Tower climbs heights with mobile engagement platform
The CN Tower, Canada's tallest building, implements an Aruba mobile engagement platform to connect with customers. Continue Reading
-
ScienceLogic EM7: Network performance monitor overview
ScienceLogic EM7 is still a newcomer to the network performance monitoring market, but it offers flexible deployment options, including VMs and software-as-a-service installations. Continue Reading
-
Network refresh: Look at your needs, not the name on the box
In this Q&A, one networking pro shares why he and his team broke from their existing vendors during a network refresh and went with a new roster for their routers and switches. Continue Reading
-
Network automation scripts: Separating myth from reality
Network automation can make work easier, but be careful which processes you automate. Done wrong, automation can break more things than it fixes. Continue Reading
-
NIA awards: A look back at innovative technology products
As 2015 draws to a close, we look at the innovative technology products that garnered a SearchNetworking Network Innovation Award. Continue Reading
-
Blue Coat ProxySG: Secure Web gateway overview
With features like authentication and Web filtering, the Blue Coat ProxySG secure Web gateway can be deployed as a physical appliance, a virtual machine or a cloud-based service. Continue Reading
-
Palo Alto WildFire: Malware sandbox product overview
Tightly integrated with existing Palo Alto next-generation firewalls, the Palo Alto WildFire cloud-based malware sandbox service supports both public and private cloud deployments. Continue Reading
-
WAN optimization techniques pace IT investment
TechTarget's most recent Networking Purchasing Intentions survey reveals IT's priority to invest in WAN optimization techniques in the next 12 months. Continue Reading
-
NIA: Saisei's FlowCommand SDN appliance secures network flows
Saisei, our latest Network Innovation Award winner, uses its FlowCommand virtual SDN appliance to control network flows and prevent individual users from hogging bandwidth. Continue Reading
-
Facing network breach threats, visibility is key
In this Q&A, an IT pro at Penn Mutual shares how his dual strategy of user education and Layer 7 visibility helps prevent network breaches. Continue Reading
-
What are data center-class switches?
Choosing the right switch for your data center can be a difficult task. This article looks at how data center-class switches are evolving in the enterprise to offer flexibility and speed for new traffic flows. Continue Reading
-
Umpqua Bank employs NSX, micro-segmentation for enterprise security
Umpqua Bank's Sam Guidice tells how the organization deployed VMware's NSX as part of its effort to utilize micro-segmentation for enterprise security. Continue Reading
-
Network programming skills from scripting to DevOps: What to learn
Networking pros don't need to become code monkeys, but a little network programming can go a long way toward advancing their careers. Continue Reading
-
What is Ethernet-dedicated Internet?
Ethernet-dedicated Internet is a continuous, high-bandwidth way for enterprises to connect their LANs to the public Internet and to streamline the performance of their WAN. Continue Reading
-
Primer: A new generation of programmable ASICs
Programmable application-specific integrated circuits allow the data plane of switches to support new technologies, like software-defined networking. Continue Reading
-
How to plan for a campus core switch refresh: Basic requirements
Network architects and engineers discuss the features and functions they look for when planning a campus core upgrade. Continue Reading
-
Will we ever need 400 Gigabit Ethernet enterprise networks?
With 40 and 100 Gigabit Ethernet so new, what could possibly drive the need for 400 Gigabit Ethernet in the enterprise? Hint: It’s not just the WAN. Continue Reading
-
Avaya-Nortel acquisition: Infamous end; questionable beginning
The Avaya-Nortel acquisition was one of the more notable top networking stories of 2009, marking the end of a legacy player and a questionable beginning for Avaya as it struggles with whether to integrate the Nortel data networking portfolio. Continue Reading
-
10 Gigabit Ethernet tutorial: Connecting data centers, storage, LAN and beyond
As IT teams build 10 Gigabit Ethernet networks, they'll have to choose the right 10 Gigabit Ethernet cabling and components in order to ensure data center optimization and prevent latency in the network. They''ll also need to be sure their networks ... Continue Reading
-
Network-to-network VPN gateway configuration for Cisco EzVPN
Learn how to support network-to-network IPsec VPN topologies using a router as the VPN gateway with Cisco EzVPN. Continue Reading
-
Introduction -- Chapter 1 of 'Network Analysis, Architecture and Design'
This chapter introduces the analysis, architecture, and design processes. Described are the fundamental concepts of the processes of network analysis, architecture, and design; systems and services; as well as their characteristics and prepares the ... Continue Reading
-
How a Switch Works -- Chapter 6 of 'LAN Switching First-Step'
How a Switch Works explains how to differentiate among unicast, multicast, and broadcast transmission methods; store-and-forward, cut-through, and fragment-free switching mechanisms and then describes Layer 2 and Layer 3 switching operation. Continue Reading
-
"Network Security: The Complete Reference," Chapter 10: Network device security
Chapter 10 focuses on using routers and switches to increase the security of the network as well as providing appropriate configuration steps for protecting the devices themselves against attacks. Continue Reading
-
Reducing costs and generating revenue with network monitoring
Like most IT managers, you have a lot on your plate, and improving network monitoring is only one of the tasks you need to address. This article will discuss business-focused ROI around a network monitoring system (NMS) and enable you to demonstrate... Continue Reading
-
Mobility -- Chapter 5 of 802.11 Wireless LAN Fundamentals
Mobility, Chapter 5 of 802.11 Wireless LAN Fundamentals, covers the characteristics of roaming, Layer 2 roaming, Layer 3 roaming and an introduction to mobile IP. Continue Reading
-
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when ... Continue Reading
-
Multi Router Traffic Grapher (MRTG) - Open Source Network Administration, Chapter 3
The Multi Router Traffic Grapher (MRTG) is an open source tool used to monitor the traffic load on network links. In this chapter James Kretchmar tells us how MRTG produces Web pages containing PNG images, which provide a live visual representation ... Continue Reading
-
Lesson 2: How to build a secure wireless infrastructure
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast, as well as how traditional wired network devices ... Continue Reading
-
To block or not to block: Rogue containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these ... Continue Reading
-
Using your WIDS to monitor WLAN performance
"Wireless intrusion detection" -- the very name brings to mind security. But many WIDS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to ... Continue Reading
-
Fighting wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track ... Continue Reading
-
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. Continue Reading
-
Using VLANs to compartmentalize WLAN traffic
Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag ... Continue Reading
-
Combining 802.1X and VLANs for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how ... Continue Reading
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, ... Continue Reading
-
Lesson 4: How to use wireless IDS/IPS
In Lesson 4 of Wireless Security Lunchtime Learning, you'll walk away with an understanding of the value of wireless IDS/IPS -- even if your organization doesn't support a wireless LAN. Also learn how to choose a WIDS for your environment and how to... Continue Reading
-
Building a wireless LAN proxy server
Our router expert, Michael Martin, walks you through building an http proxy server for a wireless LAN with a Linux base. Continue Reading
-
Best practices for network management in the non-profit world
Discover how the Washington, D.C.-based National Parks Conservation Association developed their network management solution to ensure network uptime and availability. Continue Reading
-
The importance of IP address management
IP addresses are an integral part of any corporate network, and companies large and small are consuming them faster with more applications and devices than ever before. Overlooking the importance of getting a handle on IP addresses can prove ... Continue Reading
-
Will becoming an A+ certified technician help you?
-
Router and firewall configuration
ITKnowledge Exchange member "stephang" had a question about the balance between blocking packets and enabling NAT on his router and on his firewall. Fellow forum members chipped in with their advice; check out what they had to say. Continue Reading
-
Commonly overlooked security hazards
Security expert Dave Piscitello covers the ten most commonly overlooked security hazards and easy ways to prevent them from placing your network at risk. Continue Reading
-
The network administrator's survival guide
This piece from contributor Douglas Chick presents a humorous look at surviving in your role as a network administrator. Continue Reading
-
Most popular viruses and hacking tools
Here are 2004's most popular hacker tools, viruses, remote tools, adware, spyware, Trojans and worms. Continue Reading
-
Network Security Principles and Practices: Secure LAN switching
This book excerpt offers steps you can take to make Layer 2 environments and switches more secure, including permit lists, protocol filtering and VLANs. Continue Reading