July 17, 2015
This week, experts discuss software-defined WANs as an alternative to traditional wide area networks. And one startup is looking to make data centers more efficient.
June 18, 2015
A Boston-area bank exploits its technology infrastructure to yield a competitive edge.
June 15, 2015
Increasingly enterprises are moving more mission-critical work to public clouds. To make this work well, and securely, though means devising a thorough IT plan for cloud networking. It takes more than just having a robust Internet link -- it takes a robust plan for ensuring communication among the diverse element of your network's service delivery environment. This three-part guide looks at the current considerations when it comes to networking in the cloud. The first chapter examines the limits of the traditional WAN, explores the idea of a virtual WAN and the software-defined WAN, and considers the concept of the network as a service. Other chapters consider the history of the cloud and its impact on the network; cloud as a replacement for the local service and virtual machine, and security issues like the danger of shadow IT in the enterprise.
The variety of ways to deliver network services is expanding. What must come first, though, is a plan that considers your enterprise goals and relevant security considerations.
May 28, 2015
Fiori mobile apps are at the core of CA Technologies' successful SAP mobility initiative. Next up: SAP Mobile Platform for true mobility, including push notification.
VPN Get Started
Bring yourself up to speed with our introductory content
Expert Ed Tittel examines the top unified threat management (UTM) appliances to determine which one could be the best for your organization. Continue Reading
Expert Ed Tittel explores key criteria for evaluating unified threat management (UTM) appliances to determine the best choice for your organization. Continue Reading
To maximize VoIP encryption methods, use Transport Layer Security in conjunction with Secure Real-Time Transport Protocol on all VoIP equipment. Continue Reading
Evaluate VPN Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Expert Ed Tittel explains why unified threat management is the right holistic IT security approach for SMBs and how it can fit into the enterprise, as well. Continue Reading
Virtual routers can be measured by platforms, features and price. Kevin Tolly reviews VRs from Brocade and Cisco. Continue Reading
In part two of a three-part series, an expert looks at how hybrid VPNs are impacted by the shift from private services to the public Internet. Continue Reading
Learn to apply best practices and optimize your operations.
The U.S. Postal Service suspended teleworking following a recent breach. Expert Kevin Beaver explains why teleworkers aren't always to blame in the event of a breach and explores methods for secure VPN access. Continue Reading
While the Misfortune Cookie router flaw can only be fixed by hardware vendors, there are several things enterprises can do to minimize the impact of such a vulnerability. Expert Kevin Beaver explains. Continue Reading
While data centers typically use an IP fabric under their network overlays, ISPs may find that MPLS fabric makes more sense as backbone underlays. Continue Reading
Problem Solve VPN Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Your company is merging: How do you link disparate WAN service providers to ensure continued connectivity? Continue Reading
Expert Julian Weinberger says that locking your VPN parameters can help secure your VPN tunnel by blocking users from changing configurations. Continue Reading
Expert Julian Weinberger says limiting user VPN access can help enterprises enforce security and BYOD policies and reduce risk at the same time. Continue Reading