Manage
Learn to apply best practices and optimize your operations.
Manage
Learn to apply best practices and optimize your operations.
Enterprise RF spectrum management best practices
Effective spectrum management requires coordination from company departments to follow certain policies before introducing wireless devices to the enterprise. Continue Reading
How to prepare networks for the return to office
Network teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments. Continue Reading
Network capacity planning best practices for return to office
As workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance. Continue Reading
-
Modern network infrastructure design taps security, flexibility
As workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity. Continue Reading
How cloud-based network monitoring tools expand visibility
Organizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance. Continue Reading
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead.Continue Reading
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe.Continue Reading
Black network engineers juggle building networks, being seen
2020 didn't transform diversity and inclusion in companies, according to some Black network engineers. But diversity in their careers and networks goes beyond hiring practices.Continue Reading
Perform a network health check with network testing
Network engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle.Continue Reading
Pandemic pushes enterprise connectivity to take a new path
COVID-19 delivered a connectivity shock to businesses. But savvy network execs were primed -- and are now showing the way forward in 2021 with SD-WAN, 5G and Wi-Fi 6.Continue Reading
-
Key tasks in a network maintenance checklist
Network technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams.Continue Reading
NOC performance metrics for optimal operation
NOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success.Continue Reading
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education.Continue Reading
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers.Continue Reading
Cloud networking complexity includes visibility and security
Enterprises are deploying more workloads in cloud environments. But the visibility, security and management required for those extensions of IT infrastructure can get complicated.Continue Reading
IT groups abandon DIY SD-WAN; prefer managed, hybrid model
Enterprises don't want DIY SD-WAN. Instead, they prefer managed SD-WAN, but they also don't want to outsource all SD-WAN operations to a service provider.Continue Reading
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies.Continue Reading
Refreshing look at Wi-Fi 6 benefits, preparations
Wi-Fi 6's benefits are real, and most organizations will eventually upgrade to the latest and greatest standard. When and how they'll do so is more complicated.Continue Reading
Myths and realities of a Wi-Fi 6 upgrade
Despite the promise of high data rates, longer client battery life and more efficient radio techniques, enterprises need to weigh Wi-Fi 6's limitations.Continue Reading
Setting up and using a home VLAN to segment network traffic
Virtual LANs can help homeowners segment their network traffic for enhanced control and security. Network analyst John Fruehe takes you inside his home VLANs.Continue Reading
Ensure network resilience with redundancy and skills
Ensuring network resilience doesn't just mean building redundancy in network infrastructure. It should also include planning contingencies for people and skills.Continue Reading
Cloud automation use cases for managing and troubleshooting
Cloud automation use cases highlight the benefits these tools can provide to companies evaluating how best to manage and troubleshoot their cloud connections.Continue Reading
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders.Continue Reading
What network managers need to know about SaaS optimization
When strategizing SaaS optimization tactics, network management teams should consider their traffic steering preferences and geographically dispersed access points.Continue Reading
How to use ChatOps to automate network tasks
Integrating team collaboration chat systems with network automation results in the ability to automate tedious workflows, enabling faster problem resolution and streamlined operations.Continue Reading
How to ensure a scalable SASE architecture
Don't assume all SASE architecture is the same, especially when it comes to scalability. Enterprises should consider distance to vendor PoPs, office locations and agent onboarding.Continue Reading
How a network segmentation strategy works with SD-WAN
Legacy segmentation techniques are often unwieldy. But, as enterprises contemplate network segmentation with SD-WAN, they must understand their network environments and goals.Continue Reading
What's involved in VPN maintenance and management?
Before an organization's VPN is up and running, IT teams must address four important aspects of VPN maintenance and management to keep abreast of transforming security concerns.Continue Reading
Tips and tools for home network security monitoring
Homes now have more connected devices, which could become targets for hackers. Consequently, work-from-home employees should take certain steps to safeguard their networks.Continue Reading
Private LTE networks grow as 5G comes into view
Private LTE networks deliver secure cellular connectivity in localized enterprise or industrial spaces, with private 5G networks and newly available spectrum bands soon to follow.Continue Reading
Is the SD-WAN home office here to stay?
Debate over how to do SD-WAN has shifted with the dramatic rise in remote workers. But the need for home-based SD-WAN won't go away when the pandemic ends.Continue Reading
Best practices to maintain VPN security
Enterprises looking to maintain VPN security should focus on proper endpoint security and authentication, VPN server security and documentation for security policies.Continue Reading
3 SD-WAN cloud connectivity options to explore
Enterprises can connect their SD-WAN infrastructure to cloud providers' platforms using three methods: back-to-back access, private PoP connections and internet VPN.Continue Reading
Managing VPN bandwidth requirements, speed and overhead
Companies are relying on IPsec VPNs to connect their remote workers. But determining how much VPN bandwidth you need is just one consideration; VPN overhead is another.Continue Reading
How the cloud fractures application delivery infrastructure ops
Within a single IT organization, traditional network teams may clash with cloud teams over application delivery infrastructure operations and management.Continue Reading
Compare the 2 common types of technical debt
While enterprises often incur technical debt inadvertently through inexperience or poor management, sometimes, developers will plan technical debt to establish a market presence.Continue Reading
Edge computing and 5G bring the edge to remote workers
As remote work increases, edge computing services must extend to employees' homes. While 5G could help, internet connectivity must improve to enable edge access before 5G prevails.Continue Reading
MLB uses NetBox automation for network configuration backup
Major League Baseball used NetBox in tandem with its network automation project to streamline its configuration backup process and keep its infrastructure systems in sync.Continue Reading
A network automation roadmap to reap tech's best benefits
Network automation's advantages may be many, but to reap them requires certain IT skills. Learn how to prep your team to get the most out of network automation.Continue Reading
Remote work infrastructure requires on-prem network changes
Demilitarized zone, network access control and VPN termination points are some of the on-premises components that need to be addressed in a remote work infrastructure.Continue Reading
What SD-WAN design considerations are most critical?
Learn what steps are involved in making the many decisions -- both technological and financial -- required for implementing an effective and affordable SD-WAN design.Continue Reading
Tips to improve network visibility and security
Network visibility and security can be tricky, especially with the range of products available. These tips help teams pinpoint potential vulnerabilities and gauge the tools they need.Continue Reading
Why, and how, to merge your SD-WAN and security strategies
Putting strong security in place for your SD-WAN is essential but not easy. Make sure you're covering all the bases, from strategy and planning to implementation.Continue Reading
Why configuration management is important for networks
Configuration management is essential to keep accurate network configuration records and to help organizations avoid potential challenges or problems within their networks.Continue Reading
How SD-WAN and cloud exchanges benefit multi-cloud settings
As more organizations move IT workloads outside of company walls, SD-WAN services can help ease the shift to cloud environments and secure cloud connections, like cloud exchanges.Continue Reading
How to manage the surge in remote video internet traffic
As more people work from home and create more internet traffic, enterprise network managers should adjust bandwidth levels and consider connectivity upgrades.Continue Reading
Maintaining network infrastructure in a pandemic and beyond
Network infrastructure that supports remote workers is essential today and will be far into the future. That includes VPN connectivity, agile collaboration apps and more.Continue Reading
Discover key OpenStack deployment methods for networks
In this book excerpt, explore best practices for OpenStack deployment methods, and glean expert advice on how to achieve an efficient OpenStack network deployment.Continue Reading
Business culture is key in OpenStack network requirements
Network teams should expect a shift in their day-to-day routines if their organization embraces OpenStack. However, if the business culture is flexible, changes will be positive.Continue Reading
Remote work tests corporate pandemic plans
IT leaders share what's working and how they are supporting remote work mandates for employees as part of their corporate pandemic plans, as well as social distancing among IT.Continue Reading
Before deploying SD-WAN, assess your underlay network components
If enterprises are to reap the benefits of SD-WAN, they better pay attention to the SD-WAN underlay network. Learn what you should take into consideration.Continue Reading
Plan a VPN and remote access strategy for pandemic, disaster
Disasters and pandemics occur unexpectedly, affecting companies, workers and networks alike. Plan a remote access strategy that covers VPN requirements, bandwidth demands and licenses.Continue Reading
Network traffic analysis best practices: Assess and repeat
Network traffic analysis best practices require network teams to work closely with security teams and constantly assess their tool sets, analysis processes and traffic patterns.Continue Reading
When assessing SD-WAN benefits, don't ignore SD-WAN costs
SD-WAN offers several benefits, but companies also need to understand SD-WAN costs. Organizations need to consider some critical areas -- and not all of them are obvious.Continue Reading
What to include in a network services agreement
Network teams that create MSP contracts for their managed network services should cover delivery lead times, network performance, adds and changes, network uptime and escalation.Continue Reading
3 ways to improve WAN performance with SD-WAN
SD-WAN can improve WAN performance in three ways: It adds a secondary transport for network traffic, while also taking advantage of broadband Ethernet and application acceleration.Continue Reading
Build a source of truth into your network automation strategy
Many network automation approaches rely on a source of truth repository to provide data on network behavior. But building this automation database isn't always easy.Continue Reading
Network device discovery best practices -- other than ping sweeps
Traditionally, ping sweeps are the go-to method for network device discovery. But, by creating a network script, you can discover networked devices more efficiently.Continue Reading
Plan for simplicity when approaching HCI networking
HCI networking isn't as easy as plugging cables in and hoping the HCI system works. IT teams need to strategize around capacity and resiliency to achieve true simplification.Continue Reading
Decision-makers may prefer Wi-Fi over 5G in retail networks
For retail use cases, 5G may not provide as many benefits as it would for other sectors. Yet 5G offers innovative features, and retailers may still adopt 5G networks in the future.Continue Reading
How to benchmark 25 GbE NICs in converged networks
Network teams can use an array of tools to benchmark the performance and efficiency of 25 GbE network adapters that support converged networks and HCI environments.Continue Reading
Consider these 5 FAQs for network monitoring best practices
New technologies are transforming how organizations plan network management and monitoring, introducing questions about legacy system upgrades and the number of tools required.Continue Reading
Network security design best practices and principles: Keep it simple
Comprehensive network security design means understanding the components that constitute your network and how and when everything is managed.Continue Reading
Agile for infrastructure requires major cultural shift
To realize the benefits of Agile for infrastructure, network teams must think differently about how to deliver services -- embracing radical change and a trial-by-error approach.Continue Reading
The top 10 network security best practices to implement today
Even as security techniques improve, attackers are becoming more adept. Learn about 10 network security best practices and how they can keep your network secure.Continue Reading
How can SD-WAN and edge computing services work together?
Organizations may want to consider the effect SD-WAN and edge computing could have when combined. Make sure to consider all options before choosing a combination model, however.Continue Reading
After a data breach occurs, follow this network security checklist
Before a network breach occurs, you should already have a response plan in place. To make sure you're taking a proactive approach, follow this network security checklist.Continue Reading
Build an effective SD-WAN security strategy at the branch
Don't deploy SD-WAN without a solid network security strategy. IT teams should address four specific areas to ensure adequate security and protection against network threats.Continue Reading
Increase security visibility with network automation tasks
IT teams can set up automation tasks that generate security reports about network traffic data. These read-only dashboards are useful for executives that ask for system updates.Continue Reading
Fintech company goes all in on SD-WAN 2.0 with Versa tech
In the age of hybrid and multi-cloud environments, software-defined WAN technology must do more than just connect branch locations to data centers. Enter SD-WAN 2.0.Continue Reading
3 SD-WAN best practices before deployment
When planning an SD-WAN deployment, some best practices include evaluating your business model, testing the product and establishing vendor support guidelines.Continue Reading
Transform network management with a network automation strategy
Enterprises can employ a network automation strategy to provide some stability for network management and monitoring. Automation, however, still requires some hard work.Continue Reading
5 steps to follow in a network security audit checklist
Planning, execution, analysis, reporting and follow-up are the basic elements of a network security audit checklist. But coordination among IT teams is also important.Continue Reading
Top 3 network security threats and how to protect against them
Enterprise networks are seemingly always under attack. Learn about the most common network security threats and what protections you should have in place.Continue Reading
Security, business agility kindle network automation adoption
IT teams are confused by the multiple automation strategies available, but they're still adopting automation with hopes it will benefit network security and agility.Continue Reading
How do I create proper documentation of network automation?
Despite network automation's advantages, organizations can face disadvantages if they have improper network documentation. These four components can help enable proper documentation.Continue Reading
Automation improves firewall migration and network security
Firewall migration is a compelling automation use case, as automation scripts can shorten the migration process, eliminate unused rules and bolster overall network security.Continue Reading
Educate users when troubleshooting a network connection
In this roundup of industry blogs, engineers discuss why it's helpful to teach users the basics of troubleshooting a network connection and why it's hard to simulate a network.Continue Reading
The benefits of Wi-Fi 6 and how to prepare for them
In order to glean the benefits of Wi-Fi 6, enterprises first need to determine the best steps for a migration strategy. Two key steps are implementing more power and faster uplinks.Continue Reading
Software drives changes in network engineer skills, certifications
Learn what network analysts think about network engineer skills and certifications in the modern networking industry. Hint: Proprietary hardware is in the rearview mirror.Continue Reading
Travel tech company revs up Wi-Fi performance with analytics
TravelTab needed to find a way to improve its Wi-Fi performance so it could better anticipate customer demands and bandwidth requirements. Analytics software from Aerohive helped.Continue Reading
Top enterprise network challenges include agility, product hype
Product hype and network agility are some of the primary network challenges for modern enterprises, according to networking experts. Read up on their insights and advice.Continue Reading
Cloud-native deployment isn't for every application
In this roundup of networking blogs, analysts evaluate cloud-native deployments, the increasing value of Wi-Fi and the emergence of Citizens Broadband Radio Service.Continue Reading
Top AIOps use cases in network performance management tools
AIOps use cases in network performance management include automating certain network functions, including traffic analysis. But the data could be difficult to digest.Continue Reading
Better security through software-defined perimeter know-how
Network attacks keep changing, which means your strategy for protecting the network must too. Learn one advancement that's replacing traditional network architectures.Continue Reading
Achieve network perimeter security through deep segmentation
Firewall effectiveness is in deep decline, but there's still a way to create an effective security perimeter through the practice of deep segmentation. Learn how.Continue Reading
What to expect with SD-WAN management, intent and usability
Users can expect advancements in SD-WAN intent, usability and management, as vendors seek to improve their developer ecosystems, integration and multi-tenancy capabilities.Continue Reading
SD-WAN market sees continued growth, room for mobile support
The SD-WAN market is growing, thanks to financial firms with distributed deployments. VMware and Cisco continue to lead the vendor pack, with Aryaka and Silver Peak close behind.Continue Reading
3 real-world network automation use cases
The real benefits of network automation are managing multiple network devices at once. Larger networks, in particular, can benefit from these network automation use cases.Continue Reading
How to improve network visibility and regain control
Gaining visibility into the network has never been easy; technology like cloud and IoT makes it even tougher. Learn how to meet such challenges and keep network traffic flowing.Continue Reading
Follow trends and research to increase networking innovations
Organizations can witness network transformations if they are aware of market trends, research and disruptive technologies. Many turn to third parties for this information.Continue Reading
How do I plan a network management strategy for multiple tools?
Many IT teams deal with a bevy of network management tools, which complicates data integration and leads to errors. A network management strategy that focuses on coordination can help.Continue Reading
Edge computing and IoT combine to reshape the network
Enterprises are examining edge computing and IoT in a new light to determine the best way to process and transmit the mountain of data generated by IoT devices.Continue Reading
The role of edge computing security in enterprise networks
By ensuring IoT security, IT teams can secure enterprise networks as well. Edge computing can provide one path toward this security, as long as IT properly evaluates and plans for it.Continue Reading
Consider these 3 fundamentals of cloud architecture
In this roundup of networking blogs, experts explore three networking fundamentals of cloud architecture for both public and private cloud networks.Continue Reading
4 criteria to consider in your cloud migration strategy
Organizations that are evaluating a workload migration to the cloud should use this workload placement process to build a consistent cloud migration strategy.Continue Reading
The status of white box networking in the enterprise
Despite the benefits of white box networking, most enterprises are cautious about deployment. Use these five questions to determine when white box implementation is a smart move.Continue Reading
Will 5G networks require new network engineer skills?
The 5G network will likely affect network engineer skills in areas such as security, physical appliances and software. But enterprise teams won't see too much change, for now.Continue Reading
Benefits of 5G to drive enterprise adoption regardless of provider
Key 5G expectations among business decision-makers include improved network speed and reliability, and most enterprises are willing to obtain 5G regardless of provider or price.Continue Reading
DIY SD-WAN more complex than some vendors admit
Is DIY SD-WAN a do or a don't bother? One expert says it's rarely as simple as vendors suggest -- prompting a growing number of enterprises to enlist third-party support.Continue Reading