• Login
  • Become a member
  • RSS
  • Part of the TechTarget network
SearchNetworking.com
  • News
    • Latest Headlines
      • New role for NAC? Endpoint visibility enables contextual security
      • Riverbed Steelhead RiOS update: Path selection, more app optimization
      • Junipers' Mobile Threats Report: Mobile malware attacks grew over 600%
      • View All News
  • Premium
    Editorial
    • E-Books
      • E-book: Understanding cloud networks
      • How to get a grip on mobile expense management
      • Upgrading wireless networks in the hospital
      • View All E-Books
    • E-Zines
      • Network Evolution
      • View All E-Zines
    • E-Handbooks
      • Desktop virtualization strategies for network managers
      • Upgrading your network: Top tips and timesavers
      • View All E-Handbooks
  • Networking
    Topics
    • Topics
      • Data Center

        Data Center Network Infrastructure, Cloud Networking, Data Center Ethernet, Storage Networks, App Acceleration and Load Balancing, Green Data Center Design, Cloud Computing Architecture

        WLANs

        Wireless LAN Implementation, Troubleshooting Wireless Networks, WLAN Security, WLAN Standards

        Network Mgmt

        Network Performance Management, Network Monitoring, Network Management Software and Tools, Network Security Monitoring, Enterprise Energy Management

      • Virtualization

        Managing Virtualization, Server Virtualization Networking, Network Virtualization Implementation, Emerging Virtualization Technologies, Storage Virtualization, Networking for VMware Infrastructures, Virtualizing Networks, High Performance Computing, Networking for Mobile Desktop Virtualization

        Network Security

        Network Security Best Practices and Products, Wireless Network Security, Network Security Monitoring and Analysis, Network Access Control, Desktop Networking Security, Mobile Network Security, Mobile Device Compliance

        Infrastructure

        Network Design, Network Hardware, Ethernet, LANs (Local Area Networks), IP Networking

      • Administration

        Network Administration, Networking Certs and Careers, The OSI Model, Working With Servers and Desktops, Networking Book Excerpts, Networking Tutorials and Guides, Network Conference News

    • Hot Topics
      • Network Management Strategies for the CIO
      • Data Center
      • Network Mgmt
      • WLANs
  • Tutorials
    • Guides
      • All-in-One Guides
      • Advanced Workshops
      • Interop 2012: Special Conference Coverage
      • BYOD networking guide: WLAN management and access policies
      • IPAM tools guide for network management fixes
      • Enterprise network management
      • Application delivery optimization
      • Application performance monitoring best practices
      • Interop Conference 2013
    • Technology Dictionary
      • Find definitions and links to technical resources
      • Powered by WhatIs.com
  • Expert
    Advice
    • Tips
      • Pros, cons of premises- vs. provider-based network management systems
      • Networking blogs: Reevaluating the optical market, config builder tips
      • Efficient data center cabling requires plan, follow-up
      • View All Tips
    • Answers
      • When it comes to BYOD security risks, which VPN is best, IPsec or SSL?
      • Why should I care about software-defined networking?
      • Will bring your own device security make you sacrifice convenience?
      • View All Answers
    • Ask a Question
      • Pose a question to the SearchNetworking.com Experts
      • Get help from our technical community
      • Powered By ITKnowledgeExchange.com
  • Vendor
    Content
    • Research Library
      • White Papers
      • Business Webcasts
      • Downloads
      • Powered by Bitpipe.com
    • Featured
      • Embracing Mobile Chaos

        Learn tips for controlling mobile technology and devices in your organization amid the chaos, with expert videos on mobile security and related resources from BlackBerry.

        Click Here
  • Blogs
    • Blogs
      • Network Hub
      • Powered By ITKnowledgeExchange.com
  • Home
  • Ask the Experts
  • BYOD security: Which VPN is best for you, IPsec or SSL?

    By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?

  • Why should you care about SDN?

    Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.

  • Can you really have security, convenience and BYOD?

    Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?

  • Meet All Experts

Submit a question to our experts

Expert Answers

  • Network bandwidth calculators: What will be my WAN's link speed?

    Use this recommended bandwidth calculator to calculate network latency and your WAN's link speed. Our network administration expert says this tool can simulate 1,000 users in your environment.

  • How to upgrade Windows Server 2003 to Server 2008

    Use these resources recommended by our network administration expert to upgrade from Windows Server 2003 to Windows Server 2008, in this expert response.

  • How a TV station tower will affect your wireless network

    Learn how to normalize the effects a TV station tower might have on your wireless network in this expert response explaining radio frequencies.

  • CCNA exam preparation: How to take tests faster

    To prepare for your Cisco Certified Networking Administrator (CCNA) certification exam, use these time-saving techniques to speed up your test-taking so that you don't run out of time.

  • How to calculate subnet masks in IPv6

    Find out from our IPv6 (Internet Protocol Version 6) expert whether or not calculating a subnet mask in IPv6 is different than calculating a subnet mask in IPv4.

  • Calculating subnets for IP addresses in IPv6

    Understand how subnetting in IPv6 differs from that of IPv4 and what you need to do in order to calculate the subnet of an IP address in IP version 6.

  • IP addressing in IPv6

    Understand the differences between network IP addressing in IPv6 and IPv4. Our expert, Silvia Hagen, explains the advantages and disadvantages of calculating IP addresses for each version.

  • What environmental factors cause switch connectivity to fail?

    If the power on your network's switch is fine, but the connectivity is not, ask yourself these questions posed by our switching expert to troubleshoot for environmental issues that may be causing t...

  • How can I pass the CCNA exam without spending any money?

    Is there any way to pass the CCNA exam without spending any money? Find out from our Cisco certification expert, David Minutella.

  • Are there beginner certifications to take before Cisco's CCNA exam?

    Even though Cisco's CCNA certification is a beginner course, if you're new to networking, passing this exam is daunting. Try the starter certifications our Cisco expert suggests in this piece of ad...

  • Why do Linksys WMP300N wireless cards have three antenna connectors?

    Before you make a larger antenna for your wireless network card, know how the Linksys WMP300N connects to its antenna, and understand why it has three connectors.

  • Can building T3 lines using satellite be cheaper than a carriers'?

    Would building your own T3 leased line be cheaper than a standard carrier's service? Our networking fundamentals expert explains this and how a large capacity link reacts over satellite communicati...

  • Differences between WLANs, Wi-Fi and WiMax

    Wireless networking expert Lisa Phifer explains the differences between WLAN, WiMax and Wi-Fi and provides an excellent tutorial on what separates Wi-Fi from WLAN.

  • LANs vs. WLANs: Which network designs are used for each company size?

    Which network design is easier to implement, LANs or wireless LANs? Our network administration expert explains this and which designs best fit particular functions and areas of your organization.

  • How can I block my competitor's IP address range from my website?

    Are you looking for free network tools to find an IP address range? This advice from our security expert shows you whois tools available to you and then explains how to block these ranges from view...

  • Controlling network access by MAC address restriction on wired networks

    If you've used MAC address restriction to control your network access on your wireless router, can you extend this to your wired network? Our security expert explains in this response.

  • Retrieve network resources and email after installing ISA Server 2004

    After a Microsoft ISA Server 2004 Standard Edition installation, learn how to retrieve email and access to network resources in this expert explanation on how to adjust your Internet Security and A...

  • Why are patch panels required for cabling networks?

    When cabling networks, you may wonder why it's a requirement to have patch panels and why they aren't connected to switches. This expert response explains why and how they're used in a rack with mu...

  • How to configure Cisco's 3750 Layer 3 switch for fallback IOS booting

    Our switching expert explains how to configure your Cisco 3750 Layer 3 (L3) switch to automatically boot your system from the IOS kept on the TFTP server, in this response on fallback booting.

  • Which exams must I pass for CCVP and CCNP recertification?

    To recertify for Cisco's networking certifications, CCNP and CCVP, you have a these options.

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
More from Related TechTarget Sites
  • Enterprise WAN
  • Unified Communications
  • Mobile Computing
  • Data Center
  • Networking Channel
  • Enterprise WAN
    • Wide area network resiliency best practices

      Learn about network resiliency best practices to keep your wide area network (WAN) services running during technical difficulties and outages.

    • Business continuation and disaster recovery tips for your WAN services

      Understand the tools, technologies and strategies used to ensure business continuance (BC) and disaster recovery (DR) for your WAN services.

    • IPv6 benefits: Making the IPv6 business case

      Depleted IPv4 addresses are not enough for many enterprises to deploy IPv6. Use these IPv6 benefits to make a business case for your IPv6 migration.

  • Unified Communications
    • Cisco adds immersive video wall option to telepresence technology

      Cisco has added a video wall option to its telepresence technology, giving enterprises a more immersive telepresence room.

    • Are wearable PoV cameras vulnerable to privacy issues and misuse?

      PoV cameras have the potential to be mishandled, but the same is true for all technology, according to unified communications expert Matt Brunk.

    • Use network simulation tools to prevent UC from crashing your network

      To avoid real-time UC applications from crashing your network, analyze the stress points using network simulation tools, then eliminate the problems.

  • Mobile Computing
    • Bringing BYOD to your enterprise

      Bring your own device (BYOD) can be a boon for both employees and enterprises, but clear policies and management tools are needed.

    • Meeting technical requirements for mobile health care deployments

      IT departments deploying mobile health care solutions must ensure that using mobile devices in health care settings doesn't violate federal laws or compromise security.

    • Making the call: Distributed antenna systems and in-building wireless

      Distributed antenna systems and in-building wireless solutions are two options to improve wireless cellular coverage within an enterprise facility.

  • Data Center
    • Reinvented mainframe technology keeps big iron alive

      Mainframes are costly, arcane data center dinosaurs. Right? Wrong! Today's mainframe technology supports varied workloads securely, with TCO benefits.

    • When to use Linux memory swap to solve server performance problems

      Adding physical memory may seem like the best way to solve a Linux server's memory shortage. But that's not the only way, so troubleshoot first.

    • IBM power servers seek a boost from Google, Nvidia

      IBM will attempt to improve its Power-based server business through an open development consortium with Google, NVIDIA, and others.

  • Networking Channel
    • Aruba Networks Partner Program Checklist

      Value-added resellers and service providers interested in reselling Aruba networking hardware and software can learn the benefits of becoming an Aruba Networks partner with this standardized checklist. Compare Aruba's reseller partner program with other vendors' offering similar products.

    • NetScout Systems Partner Program Checklist

      Learn the benefits of becoming a NetScout Systems reseller partner with our Partner Program Checklist.

    • Visage Mobile Partner Program Checklist

      Learn the benefits of becoming a Visage Mobile reseller partner with our Partner Program Checklist.

All Rights Reserved,Copyright 2000 - 2013, TechTarget
  • About Us
  • Contact Us
  • Site Index
  • Privacy policy
  • Advertisers
  • Business partners
  • Events
  • Media kit
  • TechTarget Corporate site
  • Reprints
  • Archive
  • Site map