Premium Content

Access "WAN optimization policy goes deep: Think, user, time, location"

David Geer Published: 30 May 2013

The branch office used to be uncomplicated. It housed small groups of workers—sales people, for example—who all worked on similar tasks and accessed a small group of applications. That simplicity is a thing of the past. Now branch offices often house a diverse set of workers who need access to everything from virtual desktop to basic email, delivered on a wide array of devices. The sheer number of applications sent between remote offices, their headquarters and data centers, can strain the WAN, even surpassing the limits of MPLS technologies. So network managers and administrators are responding by applying application acceleration and WAN optimization policy that takes into account user identity and role, as well as location and even time of day. This kind of granular policy setting can be accomplished with next-generation firewalls that are often attached to WAN optimization appliances. Implementing WAN optimization: In-band or out-of-band? Before network managers move into setting user-based policy, they must first determine where a next-generation ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • Harvesting business intelligence with network monitoring tools
    network_evolution_august_2013.png
    E-Zine

    Network technologies and architectures are rapidly changing due to a wide range of innovations from software-defined networking to gigabit wireless. ...

  • Hybrid Cloud networking falls short, but not for long
    evolution_cover_april_2013_landscape.PNG
    E-Zine

    As if network management isn’t hard enough, now engineers must find ways to manage physical networks, virtual networks and SDN environments. In this ...

  • BYOD challenges that lurk beyond network security
    Evolution_Jan_2013_cover_lg.jpg
    E-Zine

    Every access network now must be engineered to enable, manage and secure BYOD. In this edition of Network Evolution, we offer insight into ...