EXPERT ANALYSIS

LATEST CONTENT TAGGED WITH NETWORKING



5 Real Ways To Approach Security Automation
Commentary  |  8/20/2015  | 
7 Comments
We've all heard about the benefits of automating system configurations to avoid human error, but introducing it to your infrastructure may be easier said than done. Here are five real-world ways to get started....

IO Visor: Where The Kernel Meets The Network
Commentary  |  8/19/2015  | 
3 Comments
Find out how the latest open source project to launch can help network performance by moving functionality inside the Linux kernel....

The Shift To Cloud Security Services
Commentary  |  8/19/2015  | 
5 Comments
Enterprises are increasingly looking to boost their security posture by tapping cloud-based security services....

NASCAR Team Overhauls Network With Juniper
News  |  8/18/2015  | 
10 Comments
Joe Gibbs Racing replaced its network at headquarters with Juniper MetaFabric architecture to boost network performance and provide room for growth....

NEC Putting Its UC and SDN Technologies Together
News  |  8/18/2015  | 
1 Comment
It turns out that the SDN model of higher-level controllers driving lower-level infrastructure elements fits nicely with the unified communications model....

4G Edge Routers On The Rise
Commentary  |  8/17/2015  | 
4 Comments
Enterprise networks are increasingly leveraging 4G edge router technology for flexibility in providing connectivity for POS terminals, IoT devices and more....

Web-Scale IT: The Enterprise Impact
Commentary  |  8/17/2015  | 
3 Comments
Enterprises can follow the lead of big cloud companies with an architectural approach that includes open hardware and DevOps to increase data center agility and cost efficiency....

Cisco Warns Of Malicious Firmware
News  |  8/13/2015  | 
3 Comments
Attackers are using rogue firmware to take over Cisco IOS networking devices, according to Cisco security bulletin....

Where Should WAN Functionality Live?
Commentary  |  8/13/2015  | 
5 Comments
Improving outdated WAN architecture is not a simple decision, due to the growing number of technology options and services....

When Will Enterprises Adopt SDN?
Commentary  |  8/12/2015  | 
0 Comments
Enterprises need straightforward use cases that clearly demonstrate value before they begin adopting SDN....

Automation And Orchestration: Speed Vs. Efficiency
Commentary  |  8/12/2015  | 
0 Comments
We need to go beyond automating network tasks via SDN into the realm of orchestration and DevOps to eliminate inefficiency....

SDN Security Under Scrutiny
Commentary  |  8/11/2015  | 
2 Comments
A researcher at Black Hat reveals ONIE vulnerabilities, showing that SDN isn't immune to security problems. However, the nature of white-box switches promises rapid fixes....

Network Change Management Best Practices
Commentary  |  8/10/2015  | 
8 Comments
No one wants to be that person who caused the network to crash while implementing a change. Here are some steps to help ensure successful network changes....

Log Analysis: Untapped Network Intelligence
Commentary  |  8/07/2015  | 
3 Comments
Don't overlook log data as a resource for detecting network problems and improved network planning....

Defending Industrial Ethernet Switches Is Not Easy, But Doable
News  |  8/07/2015  | 
0 Comments
Attacks and vulnerabilities against ICS and SCADA can be detected and monitored if operational folks know their network infrastructure....

HP, Cisco Ranked As Top WLAN Vendors
News  |  8/06/2015  | 
3 Comments
HP reaps rewards from its acquisition of Aruba Networks, asserting itself as an enterprise WLAN market leader alongside rival Cisco, according to IHS research....

Converged Infrastructure Vs. Disaggregated Systems
Commentary  |  8/06/2015  | 
4 Comments
Deciding whether converged systems or network disaggregation is right for your organization requires looking beyond the hype....

Why I'm Listening To John Chambers' Dire Warning
Commentary  |  8/06/2015  | 
4 Comments
The final keynote by Cisco's former CEO reeked of fire and brimstone. But do regular IT pros need to worry about an impending IT apocalypse?...

Securing BGP Not As Difficult As You'd Think
News  |  8/06/2015  | 
0 Comments
But few service providers and organizations bother to deploy security for BGP, security expert says....

Terracotta VPN Piggybacks On Network Of Compromised Windows Servers
News  |  8/05/2015  | 
1 Comment
APT groups use this VPN service to launch attacks against organizations around the world....

Dark Reading News Desk Live At Black Hat 2015
News  |  8/05/2015  | 
1 Comment
Please join host Sara Peters and her guests for the latest in security from the Dark Reading News Desk show at Black Hat USA 2015, premiering Wednesday....

Networking Career: How To Make It To The Big League
Commentary  |  8/04/2015  | 
3 Comments
Networking pros who want to make the leap from a small shop to a big network environment can learn from how our newest network engineer got the job....

Cumulus Offers Free Open Networking Tool
News  |  8/03/2015  | 
5 Comments
The startup's virtual appliance is designed to give networking pros an easy way to test its software for white-box switches....

OpenFlow Faces Interoperability Challenges
News  |  7/30/2015  | 
10 Comments
Software-defined networking experts at the OpenDaylight Summit discussed hardware and interoperability issues that may limit the SDN protocol's adoption....

Network Troubleshooting: Consider The Load Balancer
Commentary  |  7/30/2015  | 
10 Comments
Packet analysis can discover issues in your network, but if there is a load balancer in the mix, you'll want to follow these best practices....