Ask the Experts
Ask the Experts
-
What is network traffic analytics and how does it enhance security?
Network traffic analysis has evolved to incorporate machine learning techniques that help identify network security threats in real time and expedite a response. Continue Reading
-
What are the advantages and disadvantages of CLI and GUI?
An old-fashioned command-line interface still has some advantages over its counterpart, the graphical user interface, when managing network devices. See how CLI and GUI stack up. Continue Reading
-
Fog computing vs. edge computing: What's the difference?
Fog computing vs. edge computing -- while many IT professionals use the terms synonymously, others make subtle but important distinctions between them. Continue Reading
-
SD-WAN with IoT enables the enhanced network edge
In a world teeming with IoT devices -- and the resulting data -- SD-WAN and SD-branch can provide the security, visibility and connectivity the IoT edge requires. Continue Reading
-
What are the 5 types of network firewalls and how are they different?
As they monitor and filter network traffic, some firewalls can provide some pretty advanced security controls. But added packet inspection can slow network performance. Continue Reading
-
What is a programmable data plane and where does P4 fit in?
A programmable data plane presents a versatile way to forward packets and supports various formats and protocols. The P4 language is used to configure the forwarding actions. Continue Reading
-
What is Cisco Smart Licensing and how might it benefit my business?
Cisco Smart Licensing, the networking vendor's fairly new approach to software licensing, aims to provide customers with more visibility and control over their licenses. Continue Reading
-
When will enterprises adopt the new Wi-Fi 6 standard?
Networking vendors have unveiled Wi-Fi 6 devices, yet the wireless standard is not ratified. Don't expect Wi-Fi 6 to flow into the mainstream anytime soon. Continue Reading
-
What is the purpose of an SD-WAN gateway?
Software-defined WAN architecture has adapted with the growth of cloud services, resulting in a cloud-based model that uses SD-WAN gateways to handle traffic and control. Continue Reading
-
Which 802.11ax features support IoT adoption?
A handful of key 802.11ax features could help accelerate widespread internet-of-things adoption, according to networking experts familiar with the new standard. Continue Reading
-
How are automated network configuration and management changing?
Could a new generation of network testing and verification tools combine with automated network configuration to mimic intent-based networking systems? Continue Reading
-
What tools can reinforce network edge security?
Firewalls, intrusion prevention systems and cloud-based threat intelligence are just a few of the many ways that organizations can bolster network edge security. Continue Reading
-
What is the network edge and how is it different from edge computing?
The network edge, also known as the WAN edge, is where an enterprise network connects to third-party network services. Edge computing, however, is something different. Continue Reading
-
What does a zero-trust model mean for network security?
A zero-trust model limits access and permissions according to a defined set of parameters that enterprises specify for each application. Learn what this means for network security. Continue Reading
-
What 5 items should be on your network monitoring checklist?
Device monitoring, visual performance tools and a deep understanding of network data are just a few of the items that should be on your network monitoring checklist. Continue Reading