Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Unlocking WAN Optimization Security

A wide area network (WAN) has to be efficient, cost-effective and built to deliver the best quality of service (QoS), given the growing demands placed on it, but above all it has to be secure. In this second installment of a three-part series on WAN optimization (the first examined visibility and part 3 will look at the issue of application performance), Network Computing looks at the security tools that protect a network so it can deliver data, video, voice, cloud applications and all the other traffic it needs to send on its way.

The research firm Gartner highlights the importance of security in a January report on the WAN optimization space, including the acceleration of encrypted protocols such as hypertext transfer protocol secure (HTTPS) and the security of data stored on WAN optimization controller (WOC) systems.

More Insights


More >>

White Papers

More >>


More >>

“Ensure that your vendor provides timely support for new versions of applications and protocols and that data in flight and at rest is protected by strong encryption,” Gartner advises its clients in the report.

Among the vendors with the best security tools are Blue Coat Systems, Websense and Palo Alto Networks, says Zeus Kerravala, principal analyst with ZK Research. Blue Coat underwent a reorganization since it was acquired and taken private by Thoma Bravo to narrow its focus to Web security and WAN optimization. It is addressing security in the latest version of its PacketShaper 9 appliance, which watches for 'shadow networks', in which IPv6-based network device traffic is traversing IPv4 networks and isn’t recognized by by IPv4-based security tools.

Websense specializes in security that provides Web, e-mail and mobile security as well as data loss prevention (DLP). Palo Alto Networks, which recently announced plans to do an initial public offering (IPO) of stock, is known for its next-generation firewall products.

The security features of WOCs (WAN optimization controllers) increasingly have to be tuned for wireless networks, which are becoming predominant in the enterprise. “The network edge has become predominantly wireless, consumer mobile devices reign supreme, and the lines are blurring between internal and external networks,” says Kerravala.

IDC research, meanwhile, looking at the growth of wireless mobility, says IT needs to rethink networks. The company says that 83% of IT users say tablets are going to be an integral part of how they do their work in the future and that 79% of executives have given their 'blessing' to the bring your own device (BYOD) trend.

Page:  1 | 2  | Next Page »

Related Reading

Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Next Gen Network Reports

Research and Reports

Network Computing: April 2013

TechWeb Careers