Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • eBooks // Jul 2014

    Managed Services: Your 10-Week Guide to Becoming an MSP

    Managed services is one of the fastest-growing segments in IT services and the growth is expected to continue. Making the transition to managed services requires a systematic plan with well-thought out steps that range from sizing up the market to retooling your staff. If you're considering becoming a managed service...

    Sponsored By LabTech Software

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes HIPAA Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet HIPAA guidelines today and tomorrow. Download your copy.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Security eBook : Identity as the New Perimeter

    This eBook provides some insights on why traditional security approaches fall short in the face of new and emerging workplace trends. Download this report and learn how CA Technologies helped organisations improved security perimeter.

    Sponsored By CA Technologies

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • eBooks // Jul 2014

    Remote Monitoring and Management: The Key to Proactive, Efficient IT Service Delivery

    In order for IT service providers to succeed, it’s paramount that they find a competitive advantage and continually develop new ways to find additional revenue streams. IT service providers need to be able to do it all for their clients – from managing entire technology infrastructures to responding quickly to...

    Sponsored By LabTech Software

  • White Papers // Aug 2014

    Aberdeen Group :Infographic ERP Simplify Life at Work

    This Aberdeen's research provides the latest findings on the challenges for businesses without a single system. Read this infographic and learn how a single system provides accurate, easy to find data that enables visibility, collaboration and increase efficiency.

    Sponsored By SAP

  • White Papers // Aug 2014

    The Total Ecocomic Impact of IBM PureApplication System

    IBM PureApplication System converges computer, storage, networking components, and software into a preconfigured and pretested system. This Forrester Whitepaper will help you to better understand the benefits, costs, and risks associated with the IBM PureApplication System.

    Sponsored By IBM

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2010

    Proactive Performance Management for Enterprise Databases

    Don't just react to performance issues in your database. Proactive database management can result in accelerated problem resolution, problem prevention, hardware resource maximization and risk reduction. How can you become more proactive in managing your enterprise database? Download the white paper to find out.

    Sponsored By Dell Software

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Beyond Next Gen Firewalls

    This ebook explains the differences in stateful firewalls and next generation firewalls, while giving you resources and other research to help you find the best defense against cyberattacks.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    What to Look For When Evaluating NGFW

    This white paper summarizes the results of three independent tests that can help you select a next-generation firewall, as well as links to public research that you can examine yourself.

    Sponsored By Dell Software

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • White Papers // Jun 2014

    From Infrastructure to Applications, the Future of IT is On-Demand

    In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    The Future of Work: Exceed Customer Expectations with Workload Management

    Customers expect a great end-to-end experience, whether work is accomplished in the enterprise or in the back office, it's all part of the Customer Service Value Chain. Is your enterprise meeting this expectation? What about in the future? In this white paper, Genesys outlines its vision for The Future of...

    Sponsored By Genesys Telecommunications Laboratories

  • Downloads // May 2014

    Replace a Failed Critical Network Device in Under One Hour

    Replacing a failed network device can be stressful because of the potential downtime and cost to your organization. Too often, replacing a failed device takes too long because you don’t have a backup of the configuration files. For critical devices the configuration files can be very difficult and time consuming...

    Sponsored By SolarWinds

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • Research // Jul 2014

    The State of Support Services: 2014

    2014 has already proven to be an incredibly challenging and exciting year for customer support. With the backdrop of the changes TSIA identified in the new world of B4B, and all the traditional pressures faced by support services organizations, we are witnessing a pace of change that the majority of...

    Sponsored By LogMeIn

  • White Papers // Aug 2014

    Foglight Solutions for Cross-Platform Database Performance Management

    Achieving consistent service levels for cross-platform database environments is next to impossible using each platform’s native tools. Foglight database monitoring software simplifies database monitoring and management, enabling you to consolidate and standardize database performance across multiple platforms. Download the white paper to learn how.

    Sponsored By Dell Software

  • White Papers // Oct 2010

    Key Methods for Managing Complex Database Environments

    A slow relational database can substantially impact the performance of the applications it supports. Discover the key methods for managing complex database environment, and ensure your database stack is operating at optimal levels of performance and availability. Download the white paper today.

    Sponsored By Dell Software

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Secure Mobile Access

    Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    Learn how to enable user mobility without compromising security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. See how to keep your data and resources secure.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Sponsored By Dell Software

  • Research // Aug 2014

    Gartner Malware Newsletter

    Businesses have relied on endpoint defenses like anti-virus software for protection against malware. But endpoint defenses alone are not sufficient and Gartner recommends businesses balance their investment across all four phases of the Gartner adaptive security architecture: predict, prevent, detect, and respond. Download this research report to learn how HP...

    Sponsored By HP

  • eBooks // Jan 2014

    Advanced Evasion Techniques for Dummies

    This book provides an overview of network security in general and explains how cybercriminals can use hidden and mostly undetectable methods to penetrate network systems. You don't have to be a Security Expert to understand how Advanced Evasion Techniques will break the security protection model most businesses are using...

    Sponsored By White AU: McAfee/Intel

  • White Papers // Aug 2014

    Is "Scalable Blade" an Oxymoron?

    Blade servers solved the problem of density for businesses, but they did so with compromises that limited their appeal for many applications. As complexity of both applications and environments grew, blade infrastructures were limited in their effectiveness for the task. Customers were relegated to lower-density rack servers for their more...

    Sponsored By IBM

  • White Papers // Oct 2013

    Evolving Your IT Services Offering in a Modern Mobile World

    To stay competitive, IT solution providers must evolve their IT services offering and embrace the modern needs of mobility through service-oriented and mobile safeguard technology. Get enabled to answer the IT service calls of clients wanting to get connected to their data, stay connected to their data and ensure they...

    Sponsored By LabTech Software

  • White Papers // Aug 2014

    Why Threat Intelligence is Critical for Next Generation Firewalls

    A top-tier threat intelligence network is the foundation of an effective next-generation firewall (NGFW). This white paper examines three criteria for judging threat intelligence networks: completeness, accuracy and speed, and discusses how one such network works in practice.

    Sponsored By Dell Software

  • Downloads // Sep 2014

    Your FREE 60-Day Trial Starts Here

    Get instant access to the Brocade Vyatta 5400 vRouter. Download your free virtual router trial now and enjoy 24/7 support. KEY FEATURES INCLUDE: Advanced IPv4 and IPv6 Unicast and Multicast Stateful firewall, IPsec, SSL-Based OpenVPN and DMVPN Linux-based extensible network OS Hypervisors Supported: VMware ESX, Citrix...

    Sponsored By Brocade

  • White Papers // Aug 2014

    What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware? - Report

    Mobile security is more than protecting the device. It is protecting applications on the device and preventing data leakage in the enterprise. IBM Security AppScan helps determine vulnerabilities early in the application development cycle to eliminate vulnerabilities malware can exploit.

    Sponsored By IBM