-
Are application signatures the new firewall-rules bloat?
We've all heard of firewall-rules bloat, but the problem could get worse considering all of the application signatures that must be maintained in next-generation firewalls.29 Jun 2012
-
Do you need virtual firewalls? What to consider first
With virtual firewalls, you can avoid routing traffic out of the virtual environment to pass through a physical firewall. But there are challenges to consider in going virtual.27 Jun 2012
-
Major shake-up of Cisco executives: engineering, acquisitions shuffled
Cisco announces longtime M&A chief Ned Hooper is leaving. CTO Padmasree Warrior takes over and Pankaj Patel assumes sole leadership of engineering.26 Jun 2012
-
New Gartner Magic Quadrant topic: Unified wired and wireless LAN
Gartner is dumping its wireless LAN and LAN switching categories and replacing them with one on unified wired and wireless LAN access and another on the data center network.22 Jun 2012
-
Obtaining wireless access control for personal devices
Lisa Phifer explains methods for wireless access control to allow employees certain but not full access to a company’s network and maintaining network access protection.20 Jun 2012
-
Wireless sniffing best practices using Wireshark
Wireless sniffing using Wireshark lets engineers troubleshoot poor performance and connectivity problems, as well as analyze traffic activity on the network.18 Jun 2012
-
Who needs application performance management?
Expert Jesse Rothstein says IT organizations accountable for the uptime and performance of core applications can benefit from application performance management solutions.15 Jun 2012
-
Juniper shrinks QFabric to reach mid-sized customers
Hoping to capture a larger customer base, Juniper has unveiled QFabric updates that will make the technology more accessible to smaller companies.13 Jun 2012
-
With Locator/Identifier Separation Protocol, seamless mobile handoffs
At Cisco Live, Cisco CEO John Chambers highlighted the Locator/Identifier Separation Protocol as a method to seamlessly move applications between cellular and Wi-Fi networks.13 Jun 2012
-
Deep packet inspection vendors: Quite the diverse crew
Deep packet inspection vendors can vary from traditional network infrastructure vendors to third-party specialists. Here we run down a smattering of providers and their offerings.05 Jun 2012
-
Deep packet inspection tools: Proxy vs. stream-based
As more enterprises consider deep packet inspection tools, network managers must choose the technique that works best for them.05 Jun 2012
-
Network Innovation Award: Enterasys remote network management
Enterasys Networks wins our Network Innovation Award for its remote network management suite that lets engineers manage networks using Facebook, Twitter and Salesforce.com.31 May 2012
Network Management Strategies for the CIO