Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Conquer the endpoint backup challenge

        Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

        This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

        View E-Handbook
      • Overcome today's disaster recovery challenges

        The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

        View E-Book
      • Open Trusted Technology Provider Standard (O-TTPS)

        The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

        View E-Handbook
      • The identity perimeter

        Successful businesses recognise the value of open communications within and beyond their organisations. However, achieving this means that the physical and virtual perimeters that had previously defined the reach of most organisations’ IT systems have disappeared. This report makes the case for the use of identity and advanced single-sign-on (SSO) to overcome many of the issues of providing open integration between businesses and their customers and partners. It should be of interest to all those in roles charged with the responsibility of providing secure access to online resources and to those who want to make the case for rolling out new online services, but have to overcome the security concerns of others in their organisation before they get the approval to do so.

        View E-Handbook
    • Page 1 of 1
      • Hybrid cloud: When public and private clouds collide

        December 2013 Vol. 4 / No.6

        Includes:
        • Hybrid cloud: Who's in control when public and private clouds collide?
        • IPv6, SDN: When worlds collide ... in a good way
        • When cloud-based UC makes sense
        View E-Zine
      • E-book: Understanding cloud networks

        Cloud computing is catching on, but cloud networks are proving to be challenging to implement and manage. Before enterprises begin architecting their cloud computing networks, they need to consider the impact on the network. Read this e-book to find out what you need to know about cloud networks.

        View E-Book
      • Is the network ready for the private cloud?

        August 2011 Vol. 2, No. 4

        Includes:
        • Developing a private cloud computing strategy for your network
        • Is OpenFlow networking bunk? What vendors don't want to discuss
        • Zappos cloud security strategy: Distributed management
        View E-Zine
      • Network planning for cloud computing

        The cloud promises to be one of the most dramatic transformations in technology since IT shifted from mainframes to client server systems. Cloud computing comes in different shapes and sizes, and the architecture used will have an impact on the network. Network managers must be involved in cloud architecture decision-making, and must understand the impact that private, public, or hybrid clouds will have on the network. Read this e-guide to learn more about network planning for cloud computing.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 2 of 2
      • Modern data center networking strategies

        Data center design is changing at a rapid pace, and network architects find themselves at a crossroads when selecting and implementing infrastructure. Their short-term and long-term goals often seem at odds, and they are dealing with major changes in traffic patterns and user needs. In addition, virtualization, the convergence of data and storage networks, and the evolution of how and where people work are all changing the way the data center should be designed. This e-book examines the issues and offers strategies for developing a data center network that will stand the test of time and emerging technology. Get access to the latest information on modern data center networking strategies in this guide.

        View E-Book
      Page 2 of 2
    • Page 1 of 1
      • Upgrading your network: Top tips and timesavers

        This SearchNetworking.com handbook will explore the challenges, best practices and essential technologies for responding to the shortcomings of today's network, as well as future-proofing your network for tomorrow's business challenges. We offer step-by-step advice from experts on what you need to know about upgrading your network, and learn about common pitfalls to avoid. Finally, learn about the latest tools to help you make your network upgrade faster and easier.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Is virtual networking the link to end-to-end management?

        Network virtualization has lagged behind server and storage virtualization, which means “single-pane-of-glass management and monitoring” in the data center is still on the horizon. Although the advent of software-defined networking (SDN) may make virtual network management easier, most enterprises are looking for more use cases before setting out an SND strategy. One thing is clear: The virtual network can’t remain invisible to the network manager. This handbook looks at existing network management and monitoring options that will help enterprises see the value in adding the network to server and storage virtualization.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • WAN optimization policy goes deep

        June 2013 / Vol. 4/ No. 3

        Includes:
        • WAN security vendor: To go network hardware provider or third-party?
        • What is Ethernet-dedicated Internet?
        • WAN optimization policy goes deep: Think, user, time, location
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Harvesting business intelligence with network monitoring tools

        August 2013 / Vol. 4 / No. 4

        Includes:
        • CIOs are laying SDN plans, but slowly
        • The 802.11ad standard is fast, but do we need that much throughput?
        • When network monitoring tools improve business intelligence
        View E-Zine
      • The new generation of network management and monitoring

        Network management and monitoring have grown from being similar operations that were at times challenging to get distinct views of, to a sophisticated monitoring and management toolset to provide real-time performance data. While these requirements have been driven by trends like the need to monitor network devices and boundary performance, the onslaught of virtualization has made things more challenging. As a result, tracking both physical and virtual assets has become critical. This TechGuide will help you understand how these tools have evolved and give network managers some insight into ensuring optimum performance in your organization.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 2
      • Finally! APM vendors design tools with networking pros in mind

        April 2014 Vol.5 / No.3

        Includes:
        • Benefits of video conferencing include less travel, but it's not No. 1
        • Complex apps need network-based application performance management tools
        • 802.11ac Wi-Fi takes the lead, but wired network has to play backup
        View E-Zine
      • Assessing your options for increasing wireless LAN capacity

        Enterprises most often assess new wireless specifications in terms of speed, but capacity should also be at the top of the list due to the increased use of wireless LAN for functions that include file transfers and high-bandwidth video. Network engineers are increasingly challenged to make sure their WLANs have enough capacity to handle end-users' needs. This handbook looks at how enterprises can increase capacity in the WLAN with 802.11ac and examines the uses of 60 GHz wireless technology in the upcoming 802.11ad standard.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Data center fabric wars

        August 2012 Vol. 3, No. 4

        Includes:
        • Deep packet inspection tools: Proxy vs. stream-based
        • Using wireless network bandwidth monitoring to stay within data caps
        • Data center network fabrics vs. software – defined fabrics
        View E-Zine
      • Network security in a world of mobile workers

        April 2012 Vol. 3, No. 2

        Includes:
        • Mobile device security best practices for BYOD
        • Is virtual desktop infrastructure the answer?
        • Networking for BYOD: No single solution
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Five trends changing the game for UC

        October 2013 / Vol 4 / No.5

        Includes:
        • The programmable WAN: Applications are boss and networks bend
        • Is IT operational efficiency sexy enough to entice investment?
        • Five unified communications trends that change the collaboration game
        View E-Zine
      • Understanding the new WAN: Management and design

        This TechGuide will help you understand the demise of the traditional WAN and the emergence of the new WAN. Articles focus on how mobile devices and an increase in teleworkers have forced IT departments to find new ways to connect users to corporate resources. This TechGuide digs deeps into how to design, manage and optimize this new endpoint-driven network and extend secure access to private and public cloud services and virtual applications.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • Next-generation WLAN: How IEEE 802.11ac will change your network

        Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, reliability and robust throughput sufficient to delivery video and multimedia content, wireless LAN (WLAN) is a critical enterprise component. With the IEEE 802.11ac-2013 standard approved, WLAN data rates will soar to multiple-gigabit territory. This TechGuide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.

        View E-Handbook
      • Leveraging 802.11n for increased coverage and performance

        Deploying 802.11n can increase a WLAN's speed, capacity, reach and reliability, enabling mobility services that make workforces informed and productive. To be competitive, workers need ready access to data, people and tools for collaboration and decision making. Extending your network to deliver multimedia over wireless can make services like unified messaging and video conferencing available wherever needed. This e-book covers best practices for deploying and optimizing 802.11n to support data, voice and video applications.

        View E-Book
      • The mobile enterprise: Taking wireless networking to the next level

        Get the latest scoop on how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity. And finally, get advice from our experts on mobile enterprise security.

        View E-Book
      Page 1 of 1

Featured E-ZINES on searchNetworking.comView all >>

  • Network Evolution

    Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchNetworking.comView all >>

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchNetworking.comView all >>

  • Conquer the endpoint backup challenge

    Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

    This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

  • Open Trusted Technology Provider Standard (O-TTPS)

    The O-TTPS is an open standard containing a set of guidelines that when properly adhered to have been shown to enhance the security of the global supply chain and the integrity of Commercial Off-The-Shelf (COTS) ICT products. It provides a set of guidelines, requirements, and recommendations that help assure against maliciously tainted and counterfeit products throughout the COTS ICT product life cycle encompassing the following phases: design, sourcing, build, fulfillment, distribution, sustainment, and disposal.

OTHER FEATURED E-HANDBOOKS