New & Notable


Security strategies need user activity monitoring

User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates.


Consider public key platform to harden BGP security

The Border Gateway Protocol does a lot of wonderful things. But there are steps you should take to ensure your IP routing is secure.


ICYMI: Cisco makes security analytics open source

ICYMI: Dynatrace released its holiday shopping survey, which revealed mobile performance will be a key retailer strategy; Cisco, IBM were named leaders in smart city technology market.


Enterprises need rapid mobile development to keep pace

SN blogs: This week, analysts discuss Progress Software's use of rapid application development and review a tool small businesses can use to protect their data.

Have a question for an expert?

Please add a title for your question

Get answers from your peers on your most technical Networking challenges.

You will be able to add details on the next page.

Find Solutions For Your Project

Pro+ Networking Downloads

View All

Networking Basics

  • Get Started

    How can Generic Ethernet access work for you?

    Generic Ethernet access is a new carrier service rolling out in the United Kingdom. Is this a technology that can work for you?

  • Get Started

    The cloud on the networking horizon

    This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in public, private and hybrid clouds. Included, too, is an in-depth look at what goes into hybrid cloud ...

  • Get Started

    DNS: What it is and how it works

    The domain name system is a fundamental building block of the Internet. Our expert explains the details of what makes it work.

View All Get Started


Videos, Podcasts and Photo Stories

Blog: The Network Hub

Sections from across SearchNetworking