Issue OverviewNetwork Evolution - June 2013 / Vol. 4/ No. 3
The nature of the branch office is changing. Previously, branch offices were small remote sites with groups of workers that had a single focus, such as sales or customer support. Generally these workers accessed the same narrow set of applications. But these days, remote sites tend to be larger and made up of heterogeneous groups that include everything from sales reps to marketing executives.
Now the network team must ensure access to a wider range of applications that put a new kind of strain on the network. Network pros are turning to WAN optimization and application acceleration that depend on role-based and location-based policy setting. In our cover story this month, David Geer presents WAN and application optimization strategies for complex branch offices. Access >>>
Premium Content for Free.
WAN optimization policy goes deep: Think, user, time, location
by David Geer
IT teams are setting WAN optimization policy that takes into account user, location and application type.
WAN security vendor: To go network hardware provider or third-party?
by Paul Korzeniowski
Network hardware providers and third-party vendors have very different WAN security offerings. How do you choose?
- WAN optimization policy goes deep: Think, user, time, location by David Geer
What is Ethernet-dedicated Internet?
by Sally Johnson
Ethernet-dedicated Internet is a continuous, high-bandwidth way for enterprises to connect their LANs to the public Internet and to streamline the performance of their WAN.
- What is Ethernet-dedicated Internet? by Sally Johnson
The new WAN: Virtualization, user-aware optimization, and more
by Rivka Gewirtz Little
In the new WAN, we’ll see the rise of WAN virtualization, user-aware optimization and a move toward hosted WAN services.
Diving into SDN WAN? Take a deep breath
by Marc Goodman
SDN could make the WAN flexible enough for dynamic network virtualization, but first engineers must address a myriad of challenges.
- The new WAN: Virtualization, user-aware optimization, and more by Rivka Gewirtz Little
More Premium Content Accessible For Free
Context makes network security policy smarter, but not easier
Traditional approaches to network security are no longer sufficient to combat today's advanced threats. Attacks now target users and applications, ...
As users carry more devices, wireless network design must evolve
The average person carries three mobile devices, according to an informal poll conducted last year by Sophos Labs. While Kindles and Fitbits probably...
Mobile devices are gobbling up your WLAN bandwidth: Here’s how to cope
More -- and more complex -- mobile devices are jumping on your enterprise network, gobbling up bandwidth from the WLAN infrastructure. This technical...