-
Designing data security policy for BYOD
Expert Rainer Enders offers tips for a data security policy that will ensure personal data remains secure on enterprise devices -- and vice versa.
-
What to consider when choosing an MDM system
Choosing an MDM system can be a complicated process, but expert Rainer Enders breaks down the considerations into straightforward terms in this tip.
-
How does full-stream reassembly impact NPM?
Network management expert Jesse Rothstein explains the concept of full-stream reassembly and why it's necessary for network performance monitoring.
-
What is the best system for mobile device security?
VPN expert Rainer Enders shows the difference between mobile device management systems and enterprise application stores for mobile device security.
-
Is WEP cracking still a WLAN security issue?
Wireless expert Lisa A. Phifer explains to what extent WEP cracking remains a worrisome issue. It all depends on your company's WLAN security policy.
-
Should APM solutions include packet capture abilities?
Expert Jesse Rothstein explains the importance and challenges of packet capture abilities in application performance management (APM) solutions.
-
Is 802.1X authentication for WLAN outdated?
Wireless expert Lisa A. Phifer explains why you shouldn't stop using 802.1X authentication methods for enterprise WLAN access control.
-
How the 802.11ac standard impacts security
The upcoming 802.11ac standard is an improvement over 802.11n, but how could security be impacted? Wireless expert Lisa A. Phifer explains.
-
Wireless network settings for Android devices
Wireless expert Lisa Phifer addresses Android troubleshooting and the ways that changing wireless network settings could solve connectivity problems.
-
How cost-effective is top-of-rack switching?
Expert Carrie Higbie explains that top-of-rack switching may mean higher costs due to an oversubscription of ports that you don't need and can't use.
-
Will the FCoE architecture replace Fibre Channel?
There's been much hype over Fibre Channel over Ethernet (FCoE) architecture; expert Carrie Higbie doesn't think it will ever replace Fibre Channel.
-
Avoid wireless interference in mobile device testing
Wireless expert, Lisa Phifer explains methods and steps to prevent potential wireless interference during mobile device testing for both Wi-Fi and Bluetooth, on a wireless network.
-
Obtaining wireless access control for personal devices
Lisa Phifer explains methods for wireless access control to allow employees certain but not full access to a company’s network and maintaining network access protection.
-
Who needs application performance management?
Expert Jesse Rothstein says IT organizations accountable for the uptime and performance of core applications can benefit from application performance management solutions.
-
Creating Wi-Fi policy: Elements to consider
Wireless expert, Lisa Phifer offers advice regarding a Wi-Fi policy for a school preparing for implementation, including proper Wi-Fi security considerations and appropriate usage.
-
Overcome wireless network interference in public venues
In public venues, unplanned personal hotspots can cause wireless network interference. Wireless expert, Lisa Phifer explains how to overcome this and maintain Wi-Fi coverage.
-
APM tools offer simple and non-disruptive deployment
ExtraHop’s application performance management tools offer a simple and non-disruptive deployment on the systems being monitored, saving IT organizations time and money.
-
Network application performance monitoring bids issues
When conducting network application performance monitoring, network admins can face network application visibility issues due to increasingly complex and distributed networks.
-
Network-based application performance monitoring facets
Network-based application performance monitoring differs from old approaches by examining network traffic passing through the data center in real-time to spot and solve issues.
-
Blade server switches may ease density problems
When trying to remove density in the network, using blade server switches may help solve the problem, as well as offer latency advantages. Expert Carrie Higbie weighs in.
-
BYOD security: Which VPN is best for you, IPsec or SSL?
By 2016, 40% of the workforce will be mobile. IPsec VPNs are being widely discussed for BYOD security. But should we also be talking about SSL VPNs?
-
Why should you care about SDN?
Expert Jim Damoulakis weighs in on the potential of software-defined networking, or SDN, and why you should care.
-
Can you really have security, convenience and BYOD?
Employee-owned devices can seriously undermine security. But bring your own device is probably here to stay. So what should IT do?
Network Management Strategies for the CIO