WAN Security Channel
News and Analysis
Networking giant extends ACI beyond the data center with new APIC module that provides SDN functionality across campus and branch networks.
More News and Analysis
- NSA Elite Hacking Team Operations Exposed
- Huawei Backs Out Of US Switch Market
- From Event Gatherers To Network Hunters
- Monitoring Where Search Engines Fear To Tread
Texas Tech University Health Sciences Center turns to a new network architecture and dark fiber to support the academic and healthcare needs of dozens of regional campuses and clinics.
Reviews & Workshops
Smartphones and tablets equipped with fingerprint readers or other biometric hardware have the potential to drive greater adoption of biometric authentication in the enterprise—if we can get the hardware, software and business processes right.
More Reviews & Workshops
- Web Security Services Put to the Test
- Wave Embassy Trusted Drive Manager Simplifies Encrypted Drive Management
- When To Encrypt At Layer 2 Or Layer 3
February 27, 2014 09:43 AM
Posted by Erik Nygren
IPv6 adoption has finally turned the corner. IT organizations and networks without an active IPv6 rollout program may find themselves caught unawares.
See all blogs by Erik Nygren
February 19, 2014 01:11 PM
Posted by Natalie Timms
An effective security policy requires careful planning to ensure the roles and capabilities of routers, switches and firewalls are properly configured.
See all blogs by Natalie Timms
February 10, 2014 01:37 PM
Posted by Joel Dolisy
Following best practices can go a long way toward preventing unplanned downtime caused by internal errors as well as external attacks.
See all blogs by Joel Dolisy
October 17, 2013 11:06 AM
Posted by Michele Chubirka
Security analysts can become insular and disengaged because of job pressures and organizational isolation. Here's how to lead your security team out of the wilderness.
See all blogs by Michele Chubirka
September 24, 2013 11:00 AM
Posted by Greg Ferro
Whatever trust customers had in the security of WAN connections from service providers is gone. Encrypt now, and consider less-expensive Internet connections instead.
See all blogs by Greg Ferro
February 06, 2013 05:38 PM
Posted by Andrew Conry Murray
Network Computing readers weighed in on F5’s entry into the firewall market and how its strategy of integrating firewall software into its load-balancing platform might play out with customers and competitors.
See all blogs by Andrew Conry Murray