Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jun 2014

    Critical Concepts of the 200-120 CCNA Routing and Switching Exam

    In the spring of 2013, Cisco announced major updates to their Cisco Certified Network Associate (CCNA) curricula, including a new version of the CCNA Routing and Switching exam (200-120 CCNA). This paper provides a review of the CCNA Routing and Switching exam's critical concepts, as an aid to students preparing...

    Sponsored By Global Knowledge

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • White Papers // Jun 2014

    Understanding AIX Logical Volume Management

    Like many UNIX operating systems, AIX uses the concepts of Logical Volume Management (LVM) in its data management architecture. This white paper explains the specifics of the AIX LVM and provides some tips and best practice recommendations to get the most from your AIX disk storage.

    Sponsored By Global Knowledge

  • eBooks // Feb 2014

    Achieve Deeper Network Security and Application Control (ebook)

    Next-generation firewalls have revolutionized network security. Traditional firewalls that focus on stateful packet inspection and access control rules are ineffective. Learn how to protect your organization from ever-evolving threats with a firewall that delivers a deeper level of network security.

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Enhance and optimize your mobility/BYOD infrastructure

    Wondering how to meet the needs of your growing mobile workforce without increasing security risks or administrative complexity? This new white paper outlines how Dell Mobility Solutions can help you increase mobile performance and capacity for mobility/BYOD initiatives while protecting company resources and streamlining IT management.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    Types of Prefabricated Modular Data Centers

    Data center systems or subsystems that are pre-assembled in a factory are often described with terms like prefabricated, containerized, modular, skid-based, pod-based, mobile, portable, self-contained, all-in-one, and more. There are, however, important distinctions between the various types of factory-built building blocks on the market. This paper proposes standard terminology for...

    Sponsored By APC by Schneider Electric

  • White Papers // Feb 2014

    Managing Data through Replication: Avoiding Errors, Improving Access

    CIOs and IT entities looking to secure data and ensure its availability during times of emergency could benefit from employing a data replication tool. Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it...

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Secure sensitive data encryption tech guide

    This report surveys the various encryption approaches for securing data at rest to understand what the technology does along with where each provides an optimal fit. After comparing the various encryption technologies, this paper explains why file level transparent data encryption provides the optimal balance of data type coverage, security,...

    Sponsored By Vormetric

  • White Papers // Jun 2014

    Enterprise encryption architecture

    This white paper Enterprise Encryption Architecture explores data security threats and provides some encryption strategies in order to protect private and confidential information.

    Sponsored By Vormetric

  • White Papers // Jun 2014

    SDN: How It Will Affect You and Why You Should Care

    You may have heard about software-defined networking (SDN) and its cousin network functions virtualization (NFV). These emerging technologies are likely to revolutionize the IT industry as well as your job. This white paper introduces you to SDN and NFV, examines their impact on you as well as the industry, and...

    Sponsored By Global Knowledge

  • White Papers // Jun 2014

    Security eBook : Identity as the New Perimeter

    This eBook provides some insights on why traditional security approaches fall short in the face of new and emerging workplace trends. Download this report and learn how CA Technologies helped organisations improved security perimeter.

    Sponsored By CA Technologies

  • White Papers // May 2014

    Maintaining AD: An Ounce of Prevention or Pound of Cure?

    Read about three commonly overlooked tasks by administrators that can improve Active Directory (AD) performance: monitoring replication, recovering objects and cleaning the database. Find out how to do these quickly and easily.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    What to Look for When Evaluating Next-Generation Firewalls

    This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality. See why not all next-generation firewalls offer the same level of protection – get your copy now.

    Sponsored By Dell Software

  • White Papers // Jan 2014

    BYOD and the seamless Integration of Macs in a Windows Based Environment:

    As Macs continue to permeate the enterprise Windows servers network environment, IT must be ready and able to support these devices— especially as employees are already, and will continue to, access the corporate network from their personal devices. Is your network equipped to handle seamless Mac/Windows integration? Read our recent...

    Sponsored By Acronis

  • White Papers // Jun 2014

    The Evolution of MEM Infographic

    Get up to speed quickly about Mobile Enterprise Management (MEM) in this insightful infographic. Find out what’s driving this evolution, and its benefits to end users and IT departments.

    Sponsored By Dell Software

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Apr 2014

    Building a Business Case for Continuity and Resiliency

    Based on findings from the largest study of its kind—the IBM Global Study on the Economic Impact of IT Risk—which surveyed 2,136 IT professionals around the world, 1,069 of them business continuity professionals looks at the cost data you need to build a business case for continuity and resiliency. Uncover...

    Sponsored By IBM

  • White Papers // Jan 2014

    Bring ROI to Your BYOD - Forrester Documents Benefits of Managed Mobility

    IBM recently commissioned Forrester Consulting to examine the total economic impact and potential return on investment that companies realized by engaging IBM to implement a “bring your own device” program. In this study, you’ll learn how to improve workplace flexibility, reduce overhead and admin costs and increase productivity.

    Sponsored By IBM

  • White Papers // Jun 2014

    Aberdeen Group :Infographic ERP Simplify Life at Work

    This Aberdeen's research provides the latest findings on the challenges for businesses without a single system. Read this infographic and learn how a single system provides accurate, easy to find data that enables visibility, collaboration and increase efficiency.

    Sponsored By SAP

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Jun 2014

    Selecting Foundational Controls Makes PCI DSS Compliance Easier

    Compliance isn't a choice – it’s mandatory, and ensuring your business stays in compliance is critical. In this new Dell Software white paper, learn more about IT compliance – straight from an auditor. Then, see how your business can quickly and easily meet PCI DSS guidelines today and tomorrow. Download...

    Sponsored By Dell Software

  • White Papers // May 2014

    14 Ways to More Secure, Efficient AD Administration

    Do your Active Directory (AD) tools provide the right amount of security? Do they allow you to complete tasks quickly and without error? AD is at the core of your organization’s security and IT operations. Discover how to get the most out of them.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    RocketSpace case study

    In this case study, see how RocketSpace got both high security and high performance with Dell™ SonicWALL™ E-Class Network Security Appliance (NSA) E5500 Next-Generation Firewall with application intelligence, control and visualization.

    Sponsored By Dell Software

  • White Papers // Feb 2014

    Using Data Replication to Upgrade Your Oracle Database with Minimal Downtime

    To save money, many companies are migrating to less expensive hardware and operation systems, and away from older versions of Oracle. In this white paper, learn about these types of migrations – and how to conquer their challenges. Then, learn about a data replication solution that reduces downtime and failure...

    Sponsored By Dell Software

  • White Papers // Apr 2014

    Maximizing mobile efficiency and productivity

    BYOD programs help employees be more productive, but how is your mobile strategy affecting your IT department? Read this new white paper to learn how Dell Mobility Solution Sets can help you optimize your IT infrastructure, maintain data security, streamline administration, and develop and modernize apps for your mobile workforce.

    Sponsored By Dell Software

  • White Papers // Jun 2014

    Implementing Mobility/BYOD While Maintaining Regulatory Compliance

    Discover how to successfully deploy or expand a BYOD program that complies with regulations, avoids data leaks/data loss/unauthorized access, streamlines management and simplifies the process of proving compliance. Read this informative white paper today.

    Sponsored By Dell Software

  • Webcasts // May 2014

    On-demand Webcast: Identity is the new perimeter

    The traditional enterprise IT infrastructure model has been one of centralized PCs and applications, accessed by users on the corporate network behind the firewall. This has recently given way to a much more fragmented model where applications are accessed by users outside the firewall through the cloud and on mobile...

    Sponsored By Centrify

  • White Papers // Jun 2014

    From Infrastructure to Applications, the Future of IT is On-Demand

    In this report From Infrastructure to Applications: The Future of IT is On-Demand Network World evaluates how IT departments are employing disruptive virtualisation and cloud computing approaches to support business growth and move IT into a value-adding profit centre.

    Sponsored By CA Technologies

  • White Papers // Jul 2014

    Evolution: Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency...

    Sponsored By IBM

  • White Papers // Jul 2014

    Building the Mobile Enterprise - A checklist for putting mobile first in your organization

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your...

    Sponsored By IBM

  • Case Studies // Apr 2014

    Building a Security Incident Response Plan

    Security breaches can cost millions of dollars—but these days they’re virtually inevitable. Every organization needs a formal, documented Computer Security Incident Response Plan (CSIRP) and it needs to be kept up-to-date. In this executive brief, IBM shares the ten most common shortcomings of CSIPRs and how you can avoid these...

    Sponsored By IBM

  • Case Studies // Apr 2014

    IDC Report - Managed Services: Business Value

    Research shows that today’s business goals are centered on reducing costs, strengthening customer relationships and improving financial management. The biggest challenges to achieving these goals are lack of skills and investment funds, and inadequate linkages between the IT environment and how business processes are managed. Read this analyst report to...

    Sponsored By IBM

  • White Papers // Mar 2014

    Defending Against Malware: A Holistic Approach to One of Today's Biggest IT Risks.

    Fighting malware doesn’t have to be a losing battle. The key is to remember that the varieties of malware on the loose today mean no single method of defense will suffice. An integrated portfolio of solutions, such as those provided by IBM, can work together to enhance protection.

    Sponsored By IBM

  • White Papers // Feb 2014

    NSS Labs 2013 Network IPS Comparative Analysis

    Discover how IBM scored 97.7% block rate against exploits and fared against other tested products in NSS Labs 2013 Network IPS Comparative Analysis.

    Sponsored By IBM

  • White Papers // Feb 2014

    Leverage Security Intelligence to Protect Sensitive Healthcare Data

    IBM solutions deliver the end-to-end systems visibility necessary to give healthcare organizations the true security intelligence they need - with the ease of use and labor-saving automation that makes security intelligence a powerful and achievable tool for protecting information.

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere Big Insights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time...

    Sponsored By IBM

  • White Papers // Feb 2014

    How Traditional Firewalls Fail

    Your current firewall may be jeopardizing your security. This white paper explains exactly where traditional firewalls fall short, and how next-generation firewalls can help.

    Sponsored By Dell Software

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Sponsored By Dell Software

  • White Papers // Jul 2012

    The Active Directory Management and Security You've Always Dreamed Of

    Businesses need more from their Windows security structure – including role-based access control, automated delegation of permissions, centralized permissions reporting, and data consistency rules. A lot has changed since the introduction of the Windows NT security structure in 1993, but finding the right solution can be a challenge. Learn...

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Promise Healthcare Case Study

    Promise Healthcare improved security, achieve HIPAA compliance, and gained visibility into and control over network utilization by replacing its outdated firewalls with Dell SonicWALL NSA 6600 firewalls.

    Sponsored By Dell Software