-
Preparing for the 40 GbE migration
Transitioning from 10 Gigabit Ethernet to 40 GbE and beyond promises incredible network efficiency; this guide will help you plan the upgrade.11 Apr 2013
-
WLAN vendor Meru introduces context-aware networking
Meru expands network segregation capabilities onto its new MobileFlex architecture for context-aware networking, prioritizing apps across the wireless LAN.10 Apr 2013
-
Integrated mobile application, device management best approach
Administrators don't have to worry about interoperability; integrated mobile application and device management is the best approach.10 Apr 2013
-
Networking Update: Cisco buys Ubiquisys, strategies for analyzing VoFi
In this week's roundup, bloggers discuss Cisco's acquisition of Ubiquisys and offer strategies for VoFi analysis and engineering firewall policies.10 Apr 2013
-
ISSU (in-service software upgrade)
An ISSU (in-service software upgrade) is a technique for updating software on a network device without taking that device offline and thereby disrupting network services.09 Apr 2013
-
Use business service management to optimize application performance
To optimize application performance in the network, many companies are using business service management software and tools to automate IT services.09 Apr 2013
-
Network security assessment: 10 tools you can't live without
The top 10 tools to protect your network against security breaches.09 Apr 2013
-
Riverbed improves performance management tools with OpNet technology
Riverbed combines application acceleration and network performance management tools into one new offering for customers.09 Apr 2013
-
SSL certificate management: A practical guide
Certificate management is faced by many but understood by few. This guide provides a refresher of the basics and covers common tasks.08 Apr 2013
-
IPAM tools guide for network management fixes
IPAM tools can help manage your network IP addresses, but first read this three-part guide to help make IP address management decisions.08 Apr 2013
-
How does advanced malware use the network against you?
Find out how advanced malware can be detected by tracking its abnormal network behavior.05 Apr 2013
-
Advanced threat protection: Behavior-profiling network communications
Advanced threat protection specializes in detecting advanced and persistent malware inside networks?05 Apr 2013
-
Juniper enhances integrated wireless LAN control and management
As more devices and apps bombard the enterprise, IT needs integrated wireless LAN control to improve management flexibility and investment protection.04 Apr 2013
-
Networking blogs: Tips for network strategies, handling tech support
Bloggers in this week's roundup advise ditching tech-specific plans for more general corporate strategies, and approaching tech support with caution.04 Apr 2013
-
Why do I need to manage my VPN client software?
Ensuring that the client software itself is up to date is just one of many reasons why it's critical to oversee VPN clients.03 Apr 2013
-
Getting network security administration back in sync
Firewalls are rarely static models of invulnerability; instead they are a combination of compromises.03 Apr 2013
-
Network Instruments offers storage-upgradeable network recorder
Network Instruments offers network recorder that can scale from 2 TB to 16 TB of storage as networks grow.03 Apr 2013
Network Management Strategies for the CIO