-
Cloud, hosting services offer equal security
Amy Larsen-DeCarlo writes that enterprises can expect similar security protections from cloud providers as they get from traditional hosting services.
-
How do I choose a cloud provider?
Choosing a cloud provider for your company can seem impossible until you compare your needs to a provider's core business.
-
iPerf made simple
Expert Chris Partsenidis explains what iPerf can do to help you measure your network's bandwidth, delay, jitter and potential for data loss.
-
End-to-end service critical element of cloud SLA
Amy Larsen-DeCarlo says that cloud service providers offer SLAs, but enterprises should demand concrete agreements that guarantee end-to-end service.
-
What cloud alternatives exist for enterprisewide apps?
Businesses worried about public cloud performance and compliance have cloud alternatives to consider, including virtual private clouds.
-
What are the best use cases for public cloud services?
Enterprises increasingly see public cloud services as secure and stable enough for specific non-core applications if they have effective SLAs.
-
What's the purpose of IPv6 over Low Power WPAN?
Expert Silvia Hagen explains what v6LoWPAN does and how it’s used.
-
What is ICMPv6 and how does it work?
Expert Silvia Hagen explains what ICMPv6 is, and how it differs from ICMPv4.
-
Integrated mobile app, device management best approach
Administrators don't have to worry about interoperability; integrated mobile application and device management is the best approach.
-
Why do I need to manage my VPN clients?
Ensuring that the client software itself is up to date is just one of many reasons why it's critical to oversee VPN clients.
-
How can you ensure mobile device security?
To ensure mobile device security, VPN expert Rainer Enders explains that it is crucial to monitor changed states and block software modifications.
-
Preventing mobile hacking: Must you take precautions?
Service providers do a good job of blocking mobile hacking -- to a point. VPN expert Rainer Enders offers tips on how to extend device security.
-
Designing data security policy for BYOD
Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa.
-
What to consider when choosing an MDM system
Choosing an MDM system can be a complicated process, but expert Rainer Enders breaks down the considerations into straightforward terms in this tip.
-
How does full-stream reassembly impact NPM?
Network management expert Jesse Rothstein explains the concept of full-stream reassembly and why it's necessary for network performance monitoring.
-
What is the best system for mobile device security?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security.
-
Is WEP cracking still a WLAN security issue?
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.
-
Should APM solutions include packet capture abilities?
Expert Jesse Rothstein explains the importance and challenges of packet capture abilities in application performance management (APM) solutions.
-
Is 802.1X authentication for WLAN outdated?
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.
-
How the 802.11ac standard impacts security
The upcoming 802.11ac standard is an improvement over 802.11n, but how could security be impacted? Wireless expert Lisa A. Phifer explains.
-
Pros and cons of integrated appliances
Integrated appliances incorporate storage, processing and networking into one single product. But are they always a good choice?
-
Provisioning IT services with the cloud
Using public cloud services requires diligent enterprise IT management of the cloud provider to make it a success.
-
Should you ever not use a firewall?
There are many new network security devices on the market today. Expert Chris Partsenidis opines on whether these can replace firewalls.
Network Management Strategies for the CIO