This guide originally appeared on SearchSMB.com. For more IT articles and tips specific to small and midsized businesses, visit SearchSMB.com
If you are like most network managers, you're probably realizing your network infrastructure is out of date -- even though you feel like you just upgraded it. Hopefully that's not the case, and you're just beginning to consider what to do next to get ultimate network performance and security.
Networks, like most IT components, can always be improved, updated and more secure. But as new network technology promises to simplify your job, it also adds another layer of complexity to your network. A virtual private network isn't secure with just a firewall. Wireless networks work well -- but what about remote users? What about networking tools that are made for large companies but scaled down for small and midsized shops? Are they OK?
This guide offers articles, tips and advice on just about everything networking for the small or midsized business. From simple definitions to security options and VPN must-haves, this guide is a worthwhile beginning to the seemingly never-ending network management challenge. Send us your comments, questions and queries, and we'll do our best to satisfy your networking needs.
For free advice and resources on more IT and business topics, visit our main SMB IT Management Guide section.
|Expert's corner||Return to Table of Contents|
There is no doubt that network security has been and will remain a hot topic for years to come. The basic idea is to "secure" your network from the outside world. However, you can't forget about securing your network from the inside as well. Because there are now so many services available for small and medium-sized businesses (SMBs), it's much harder to identify what to focus on to achieve an adequate level of network security.
This guide aims to help you focus on strategic areas of your network and the services it provides to ensure that you get the best possible results -- without blowing your budget (even though sometimes it's unavoidable). The articles, tips and advice columns offer valuable information for networking at SMBs. (Take a look at my Network security 1-2-3, which explains network infrastructure, Active Directory, honey pots and several network security resources that help secure your networks.)
You can prevent network attacks and catastrophes by constantly monitoring your network and resources as well as keeping up with the latest technologies, network news and the many resources available in this guide and on the Web.
Chris Partsenditis is founder and senior editor of Firewall.cx. View his Introduction to Network Security article here, and also view his answers to questions on SearchNetworking.com's Ask the Experts section.
|Basics||Return to Table of Contents|
- Definition: Networking
- Network security 1-2-3
- Check IT List: Managing wireless networks
- FAQ: Outlook Web Access
|VoIP Basics||Return to Table of Contents|
- Definition: VoIP
- SMB Buying Decisions: VoIP
- TechTalk: VoIP is worth considering
- VoIP: What you don't know could hurt you
- IT Management Guide: VoIP for SMBs
|Network Management||Return to Table of Contents|
- Check IT List: Network appliances for small offices
- Weighing the costs of wireless network management
- Internet access devices aplenty for SMBs
- Measuring the value of network management packages
- Network administrator documentation
- Top five things to know about access control lists
|Network Administration||Return to Table of Contents|
- Check IT List: Choosing the right remote-access VPN
- Choosing a WLAN for your SMB: A primer
- Common Exchange mail delivery issues
- Expand number of Internet Explorer's 'zones'
- How (and why) to turn a Linux server into a router
- Launch Internet Explorer in a separate process
- The top five most common Windows networking mistakes
- Remote admin cards
- Wireless for redundancy
- SRLGs solve network reliability problems
- Test drive: Firefox enhancements make IE look like an 'artifact'
- Tuning your network cyborg
|Network Security||Return to Table of Contents|
- SMB Buying Decisions: WLAN security tools
- Avoiding open relays
- Cleansing an infected mail server
- Essential security testing tools for SMBs
- Gartner underscores five overblown threats
- Max interrupts
- Patch management: A preventive process
- Troubleshooting firewalls
|More Resources||Return to Table of Contents|
- IT cheat sheets for all
- More SMB predictions: Performance-in-a-box?
- The SMB Information Architect Top 10
- IT Management Guide: Mobile computing for SMBs