Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Strategies for a successful data protection program

        Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies, experts say that custom policies are essential to making a DLP system perform efficiently. Selection of a DLP vendor of-ten depends on how well the software integrates with the systems in place. Fortunately, enough companies have performed a DLP deployment providing best practices to avoid getting tripped up. The rollout is typically performed slowly and systematically. False positives are still an issue, though the system can be immediately tuned to avoid any disruption to employee productivity.

        This TechGuide identifies some of the challenges associated with deploying data protection technology, highlights some of the initial pitfalls encountered by early adopters and explains how it can be used effectively in an organization. CSOs share how they use it to mitigate risks and identify weaknesses and experts discuss some best practices for deploying data protection solutions.

        View E-Handbook
      • New technologies take enterprise collaboration to the next level

        Businesses that hope to collaborate effectively in today’s marketplace have a host of issues to contend with -- trust issues with the cloud (yes, still) and an ever-widening workforce among them. So the ways in which organizations collaborate must evolve. No longer can they count on face-to-face interaction to foster business innovation. Scattered workforces and closely guarded business assets can impede the community-aspect of business collaboration. To remain competitive, organizations are looking to technology to keep enterprise collaboration rolling.

        This three-part guide examines what organizations can do to foster that collaboration and improve on the ideation process. First, Lauren Horwitz, an executive editor in the Business Applications & Architecture Media Group, explains how cloud-based applications -- Dropbox, Skydrive and Google Drive, for example -- are enabling simple, secure file-sharing in organizations around the world. Horwitz is joined by Laura Aberle, SearchContentManagement site editor, in the second piece. Together, they describe how, for some organizations, file-sharing isn’t enough. These companies, aiming to take collaboration further, are bringing together external and internal employees -- and in some cases, users -- to crowdsource ideas through collaboration-as-a-service applications. To close, consultant Shawn Shell discusses in more detail the trend of crowdsourced collaboration -- specifically, the challenges wrought by connecting global, mobile and external collaborators.

        View E-Handbook
      • The cloud on the networking horizon

        This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in public, private and hybrid clouds. Included, too, is an in-depth look at what goes into hybrid cloud networking, and how the characteristics of cloud applications affect deployment. Hybrid cloud networking originally fell short when it came to enabling total orchestration across public and private clouds. But software-defined networking, network virtualization and orchestration tools are changing that.

        View E-Handbook
      • Liquid immersion cooling surfaces in the server market

        October 2014, Volume 3, Issue 9

        Includes:
        • Weighing next steps following Windows Server 2003 end-of-life
        • Liquid immersion cooling relief for ultra-dense data centers
        • In-line deduplication for a smaller data footprint
        View E-Zine
    • Page 1 of 2
      • The cloud on the networking horizon

        This Technical Guide examines how cloud has affected networking. It breaks down the concept of network as a service (NaaS) and its use in public, private and hybrid clouds. Included, too, is an in-depth look at what goes into hybrid cloud networking, and how the characteristics of cloud applications affect deployment. Hybrid cloud networking originally fell short when it came to enabling total orchestration across public and private clouds. But software-defined networking, network virtualization and orchestration tools are changing that.

        View E-Handbook
      • Hybrid cloud: When public and private clouds collide

        December 2013 Vol. 4 / No.6

        Includes:
        • Hybrid cloud: Who's in control when public and private clouds collide?
        • IPv6, SDN: When worlds collide ... in a good way
        • When cloud-based UC makes sense
        View E-Zine
      • E-book: Understanding cloud networks

        Cloud computing is catching on, but cloud networks are proving to be challenging to implement and manage. Before enterprises begin architecting their cloud computing networks, they need to consider the impact on the network. Read this e-book to find out what you need to know about cloud networks.

        View E-Book
      • Is the network ready for the private cloud?

        August 2011 Vol. 2, No. 4

        Includes:
        • Developing a private cloud computing strategy for your network
        • Is OpenFlow networking bunk? What vendors don't want to discuss
        • Zappos cloud security strategy: Distributed management
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 3
      • How to manage and monitor the converged network

        The network is converging. Voice, video, and storage and data networks are already converged, and more recently networking pros have had to tackle virtual networks, mobile devices and cloud services. Up next: software-defined networks. It's a lot to manage and monitor, and our tools must keep up.

        In this Technical Guide, our experts consider all these convergences and how best to manage and monitor them. The focus is largely on mobility and SDN, but it also includes a chapter focused on the user perspective and, hence, concerns about how to best manage and monitor application performance.

        View E-Handbook
      • What does WebRTC video mean for the network?

        September 2014 Vol.5 / No. 6

        Includes:
        • Will WebRTC video blow up the network?
        • The bare-metal switch moves closer to mainstream
        • Aggregation in IPv6 routing curbs effects of Internet growth
        View E-Zine
      • Does SDN change everything in network architectures?

        February 2014 Vol 5 / No.1

        Includes:
        • New network architectures and traditional components: Why both are key
        • Is service agility the payoff in network functions virtualization?
        • How WebRTC technology could turn enterprise video on its head
        View E-Zine
      • Your next switch: The data center's software-defined future

        The hardware-defined network is still around, but a software-defined switch is coming. Your next switch will include SDN features and will also need to be application-aware and integrated with robust security strategies. This handbook covers everything pros must know now about the software-defined switch of the near future.

        View E-Handbook
      Page 1 of 3
    • Page 1 of 1
      • Upgrading your network: Top tips and timesavers

        This SearchNetworking.com handbook will explore the challenges, best practices and essential technologies for responding to the shortcomings of today's network, as well as future-proofing your network for tomorrow's business challenges. We offer step-by-step advice from experts on what you need to know about upgrading your network, and learn about common pitfalls to avoid. Finally, learn about the latest tools to help you make your network upgrade faster and easier.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Is virtual networking the link to end-to-end management?

        Network virtualization has lagged behind server and storage virtualization, which means “single-pane-of-glass management and monitoring” in the data center is still on the horizon. Although the advent of software-defined networking (SDN) may make virtual network management easier, most enterprises are looking for more use cases before setting out an SND strategy. One thing is clear: The virtual network can’t remain invisible to the network manager. This handbook looks at existing network management and monitoring options that will help enterprises see the value in adding the network to server and storage virtualization.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • WAN optimization policy goes deep

        June 2013 / Vol. 4/ No. 3

        Includes:
        • WAN security vendor: To go network hardware provider or third-party?
        • What is Ethernet-dedicated Internet?
        • WAN optimization policy goes deep: Think, user, time, location
        View E-Zine
      •  
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      • Harvesting business intelligence with network monitoring tools

        August 2013 / Vol. 4 / No. 4

        Includes:
        • CIOs are laying SDN plans, but slowly
        • The 802.11ad standard is fast, but do we need that much throughput?
        • When network monitoring tools improve business intelligence
        View E-Zine
      • The new generation of network management and monitoring

        Network management and monitoring have grown from being similar operations that were at times challenging to get distinct views of, to a sophisticated monitoring and management toolset to provide real-time performance data. While these requirements have been driven by trends like the need to monitor network devices and boundary performance, the onslaught of virtualization has made things more challenging. As a result, tracking both physical and virtual assets has become critical. This TechGuide will help you understand how these tools have evolved and give network managers some insight into ensuring optimum performance in your organization.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 2
      • Assessing your options for increasing wireless LAN capacity

        Enterprises most often assess new wireless specifications in terms of speed, but capacity should also be at the top of the list due to the increased use of wireless LAN for functions that include file transfers and high-bandwidth video. Network engineers are increasingly challenged to make sure their WLANs have enough capacity to handle end-users' needs. This handbook looks at how enterprises can increase capacity in the WLAN with 802.11ac and examines the uses of 60 GHz wireless technology in the upcoming 802.11ad standard.

        View E-Handbook
      • Hybrid Cloud networking falls short, but not for long

        April 2013

        Includes:
        • How virtual switching integrates the network edge
        • Overlays may be the best path forward for networking
        • Hybrid cloud networking falls short, but not for long
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Data center fabric wars

        August 2012 Vol. 3, No. 4

        Includes:
        • Deep packet inspection tools: Proxy vs. stream-based
        • Using wireless network bandwidth monitoring to stay within data caps
        • Data center network fabrics vs. software – defined fabrics
        View E-Zine
      • Network security in a world of mobile workers

        April 2012 Vol. 3, No. 2

        Includes:
        • Mobile device security best practices for BYOD
        • Is virtual desktop infrastructure the answer?
        • Networking for BYOD: No single solution
        View E-Zine
      Page 1 of 2
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 1
      Page 1 of 1
    • Page 1 of 2
      • Five trends changing the game for UC

        October 2013 / Vol 4 / No.5

        Includes:
        • The programmable WAN: Applications are boss and networks bend
        • Is IT operational efficiency sexy enough to entice investment?
        • Five unified communications trends that change the collaboration game
        View E-Zine
      • Understanding the new WAN: Management and design

        This TechGuide will help you understand the demise of the traditional WAN and the emergence of the new WAN. Articles focus on how mobile devices and an increase in teleworkers have forced IT departments to find new ways to connect users to corporate resources. This TechGuide digs deeps into how to design, manage and optimize this new endpoint-driven network and extend secure access to private and public cloud services and virtual applications.

        View E-Handbook
      Page 1 of 2
    • Page 1 of 1
      • Next-generation WLAN: How IEEE 802.11ac will change your network

        Just five years ago, no one would have described Wi-Fi as a primary access technology but now, as Wi-Fi and cellular architectures deliver security, reliability and robust throughput sufficient to delivery video and multimedia content, wireless LAN (WLAN) is a critical enterprise component. With the IEEE 802.11ac-2013 standard approved, WLAN data rates will soar to multiple-gigabit territory. This TechGuide focuses on the WLAN's evolution and why it will soon be a viable alternative to Ethernet.

        View E-Handbook
      • Leveraging 802.11n for increased coverage and performance

        Deploying 802.11n can increase a WLAN's speed, capacity, reach and reliability, enabling mobility services that make workforces informed and productive. To be competitive, workers need ready access to data, people and tools for collaboration and decision making. Extending your network to deliver multimedia over wireless can make services like unified messaging and video conferencing available wherever needed. This e-book covers best practices for deploying and optimizing 802.11n to support data, voice and video applications.

        View E-Book
      • The mobile enterprise: Taking wireless networking to the next level

        Get the latest scoop on how faster, more robust 802.11n WLANs can help your business offer new mobility services to improve mobility and reduce cost through fixed-mobile convergence. Discover how unified communications applications can exploit wireless mobile connectivity to facilitate workforce collaboration and enhance productivity. And finally, get advice from our experts on mobile enterprise security.

        View E-Book
      Page 1 of 1

Featured E-ZINES on searchNetworking.comView all >>

  • Network Evolution

    Network Evolution magazine keeps IT professionals up-to-date on next-generation IT enterprise networking.

  • Modern Infrastructure

    Modern Infrastructure covers the convergence of technologies -- from cloud computing to virtualization to mobile devices -- and the impact on data centers.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchNetworking.comView all >>

  • Intrusion detection and prevention: IT decision center

    Intrusion detection and intrusion prevention systems (IDS/IPS) help to identify potential threats and to launch a swift response to defend your network. There are many factors to take into account when choosing IDS/IPS products, and this Decision Center series lays them out. It also provides critical questions to ask vendors, offers insight on how to match product features to your particular requirements, and challenges vendors in the IDS/IPS space to present the facts on their offerings.

  • Enterprise Hadoop: Ready for prime time?

    Many vendors are pitching Hadoop as the foundation for enterprise data management environments that delivers information and insights to business users and serves as a hub for other data systems and applications. In the era of big data, the case for Hadoop is strong: Hadoop provides a cost-effective way to ingest, store and process large volumes of multi-structured data. With Hadoop, organizations can store all data in its original format and provide a system of record for the enterprise. Even more, they can bring the applications to Hadoop and process the data in place.

    But does reality square with the promise today? Are companies willing to trust their enterprise data to Hadoop? The big question is whether Hadoop is ready to support enterprise-scale, production environments where data can't be corrupted or inconsistent. Does Hadoop have adequate management, monitoring, backup, recovery and security features? What are the major gaps today and what are vendors doing to plug the holes? At what point can companies trust production computing environments to Hadoop? This report, based on a comprehensive survey of business intelligence professionals and interviews with experts in the field, addresses these questions.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchNetworking.comView all >>

  • Strategies for a successful data protection program

    Deploying data protection technologies properly requires a lot of time and patience. While most firms can get started by using preconfigured policies, experts say that custom policies are essential to making a DLP system perform efficiently. Selection of a DLP vendor of-ten depends on how well the software integrates with the systems in place. Fortunately, enough companies have performed a DLP deployment providing best practices to avoid getting tripped up. The rollout is typically performed slowly and systematically. False positives are still an issue, though the system can be immediately tuned to avoid any disruption to employee productivity.

    This TechGuide identifies some of the challenges associated with deploying data protection technology, highlights some of the initial pitfalls encountered by early adopters and explains how it can be used effectively in an organization. CSOs share how they use it to mitigate risks and identify weaknesses and experts discuss some best practices for deploying data protection solutions.

  • New technologies take enterprise collaboration to the next level

    Businesses that hope to collaborate effectively in today’s marketplace have a host of issues to contend with -- trust issues with the cloud (yes, still) and an ever-widening workforce among them. So the ways in which organizations collaborate must evolve. No longer can they count on face-to-face interaction to foster business innovation. Scattered workforces and closely guarded business assets can impede the community-aspect of business collaboration. To remain competitive, organizations are looking to technology to keep enterprise collaboration rolling.

    This three-part guide examines what organizations can do to foster that collaboration and improve on the ideation process. First, Lauren Horwitz, an executive editor in the Business Applications & Architecture Media Group, explains how cloud-based applications -- Dropbox, Skydrive and Google Drive, for example -- are enabling simple, secure file-sharing in organizations around the world. Horwitz is joined by Laura Aberle, SearchContentManagement site editor, in the second piece. Together, they describe how, for some organizations, file-sharing isn’t enough. These companies, aiming to take collaboration further, are bringing together external and internal employees -- and in some cases, users -- to crowdsource ideas through collaboration-as-a-service applications. To close, consultant Shawn Shell discusses in more detail the trend of crowdsourced collaboration -- specifically, the challenges wrought by connecting global, mobile and external collaborators.

OTHER FEATURED E-HANDBOOKS