Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Aug 2014

    Access Control is Easy: Use Active Directory Groups and Manage Them Well

    Good access control results from avoiding the use of local groups, whether it’ Windows file servers, in Microsoft SQL Server, SharePoint or elsewhere, and instead, assigning permissions to Active Directory (AD) groups. Until you manage the bulk of entitlements through AD, you are unable to understand, much less control access....

    Sponsored By Dell Software

  • White Papers // Aug 2014

    The Migrate-Manage-Govern Strategy to Active Directory Transformation

    Active Directory (AD) environments today have become extremely complex and increasingly cumbersome to manage. This can lead to security and compliance challenges that impede the adoption of useful new technologies. Learn how the migration strategy outlined in this white paper can help you transform AD from an administrative burden into...

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Mobile Connect for iOS: Superior Network-Level Access for iPad, iPhone and iPod Touch Users

    Discover how Apple® iPad®, iPhone® and iPod touch® users can get superior network-level access to corporate, academic and government resources over encrypted SSL VPN connections, affording complete privacy and authentication.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Quick Guide SSL VPN Technical Primer

    Use this primer to quickly find answers to many common questions about SSL VPNs, and understand the many advantages of this technology for secure mobile access.

    Sponsored By Dell Software

  • White Papers // Aug 2014

    Secure Mobile Access

    Discover how to enhance mobile productivity among employees by using converged technology that combines the best of management and security capabilities.

    Sponsored By Dell Software

  • Resource Center // Aug 2014

    Brilliantly Simple Business Communications

    Complexity is NOT synonymous with "sophisticated" - that's a myth the suppliers of complexity want you to believe so they can sell you a service to cope with it. Learn how to leverage the power of pure IP, to provide your organization with a brilliantly simple unified communications suite...

    Sponsored By ShoreTel

  • Downloads // Aug 2014

    Find the root cause of your toughest SQL Server performance issues in 4 clicks!

    Slow SQL Server performance? Don't let yourself get tangled up in volumes of server health metrics. Get to the root cause of performance problems in just four clicks. Only SolarWinds Database Performance Analyzer correlates SQL response time with server health metrics - in a single view - to quickly pinpoint...

    Sponsored By SolarWinds

  • White Papers // Jul 2014

    Top 5 Reasons why Customers Deploy a Flash Strategy on EMC

    Customer are increasingly virtualizing their environment to maximise capacity and reduce costs. This EMC report provides details of a solution with unprecedented overall performance, optimizing for transactional performance and capacity effeciency with no trade offs. Read More.

    Sponsored By EMC

  • White Papers // Jul 2014

    Migrating Blackberry Policies to MobileIron

    As the next generation of smartphones and tablets enters the market, employees want the freedom to choose their own devices and use apps that meet their needs. Analyst recommendations that organizations migrate off BlackBerry have forced IT departments to develop contingency plans for their existing mission-critical BlackBerry Enterprise Server (BES)...

    Sponsored By MobileIron

  • eBooks // Jul 2014

    BYOD: Driving the mobile enterprise transformation

    Protecting corporate data and network resources while leveraging the benefits of mobility is a constant balancing act; one that requires IT to shift its focus from security lockdown to business enablement. While some companies (particularly in the tech sector) are “doing” BYOD well, most are still trying to devise a...

    Sponsored By MobileIron

  • eBooks // Jul 2014

    Remote Monitoring and Management: The Key to Proactive, Efficient IT Service Delivery

    In order for IT service providers to succeed, it’s paramount that they find a competitive advantage and continually develop new ways to find additional revenue streams. IT service providers need to be able to do it all for their clients – from managing entire technology infrastructures to responding quickly to...

    Sponsored By LabTech Software

  • eBooks // Jul 2014

    Managed Services: Your 10-Week Guide to Becoming an MSP

    Managed services is one of the fastest-growing segments in IT services and the growth is expected to continue. Making the transition to managed services requires a systematic plan with well-thought out steps that range from sizing up the market to retooling your staff. If you're considering becoming a managed service...

    Sponsored By LabTech Software

  • Webcasts // Jul 2014

    A New Approach to Endpoint Data Protection

    The rising number of mobile workers makes endpoint data protection increasingly important for organizations of all types and sizes. Now more than ever, business and IT decision makers must take a holistic view that includes a wide variety of mobile devices including laptops, smartphones and tablets. But what is the...

    Sponsored By Druva Software

  • Webcasts // Jul 2014

    For Your Eyes Only: Endpoint Data Privacy in the Cloud is Easier Than You Think

    Businesses see tremendous cost, flexibility, and scalability advantages in backing up endpoint data to a public cloud, but they are concerned about privacy, security, and availability of sensitive data. This webcast discusses how innovations in encryption and storage resolve issues of data privacy and key requirements for companies to look...

    Sponsored By Druva Software

  • White Papers // Jul 2014

    Ensuring the Availability of Your IBM Tivoli Monitoring Infrastructure

    This white paper addresses four different components of the Tivoli monitoring infrastructure for creating a high availability environment while providing redundancy and failover capacity. Although the principles are the same for each of these systems, the methods for adhering to these principles are different for each of them.

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    SDN and Cloud Computing

    After a review of Software-Defined Networking (SDN) and its close cousin Network Functions Virtualization (NFV), this white paper addresses three main deployment scenarios: SDN without deploying cloud computing, cloud computing without deploying SDN, and deploying cloud computing in conjunction with SDN. We'll look at use cases, when the approach makes...

    Sponsored By Global Knowledge

  • White Papers // Jul 2014

    Mobility is moving fast: Seven Questions that Prepare you for BYOD

    Are you ready for BYOD? For successful BYOD operations, organizations must address issues they may not have considered yet, but that can have significant consequences for business and IT operations. Here are seven questions you should answer as you roll out new mobile capabilities

    Sponsored By IBM

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Configure or Customize?

    With Workday, business systems can be quickly configured to fit the business—meaning the configuration happens without the need for programmers, professional services, or consultants. In this paper, we examine the high cost of making and supporting customizations to client/server-based applications as well as the differences between configuration and customization.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: What Your Peers Are Doing to Prime Their  Human Resources and Financial Systems

    Businesses facing growth and change require systems that evolve with them. The fact is, traditional software is simply too rigid to keep pace. Your savvy peers are transforming their systems to run in the cloud. Read the whitepaper to learn how you can, too, and benefit long into the future.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Workday User Experience

    When an organization redistributes responsibility to all employees, a business culture based on real information and informed decisions is the result. Read the whitepaper to find out how the Workday user experience is singularly focused on extending access to every user while ensuring simplicity is always at the forefront.

    Sponsored By Workday

  • White Papers // Jul 2014

    Whitepaper: Exclusive Aberdeen Group Analyst Report

    Are your finance and HR system silos helping or hurting your organization? Read this whitepaper from analyst firm Aberdeen Group to learn about the future of strategic business management, including key drivers for unification such as reporting processes and employee management.

    Sponsored By Workday

  • White Papers // Jul 2014

    Ultra high efficiency cooling modules for large data centers

    Of the various economizer (free cooling) modes for data centers, using fresh air is often viewed as the most energy efficient approach. However, this paper shows how indirect air economizer-based cooling produces similar or better energy savings while eliminating risks posed when outside fresh air is allowed directly into the...

    Sponsored By APC by Schneider Electric

  • White Papers // Jul 2014

    Magic Quadrant for Enterprise Mobility Management Suites

    The mobile device management market has evolved into the enterprise mobility management suites market. EMM is growing quickly, and the vendor landscape has changed significantly, which will impact IT leaders' choices. Check this Gartner Report Now!

    Sponsored By IBM

  • White Papers // Jul 2014

    Reducing Expenses Starts with the Programming Skills of Operations Groups

    Tools available today make it possible to significantly reduce the daily tasks that consume the time of IT operations groups like automation. And with today’s new cloud and SDN architectures being deployed or just on the horizon, automation is no longer just optional. No matter what we call it the...

    Sponsored By F5

  • Research // Jul 2014

    The State of Support Services: 2014

    2014 has already proven to be an incredibly challenging and exciting year for customer support. With the backdrop of the changes TSIA identified in the new world of B4B, and all the traditional pressures faced by support services organizations, we are witnessing a pace of change that the majority of...

    Sponsored By LogMeIn

  • Webcasts // Jul 2014

    Not Enough: IPSs and NGFWs Leave Dangerous Gaps in Enterprise Security

    Network security solutions are no longer enough to protect enterprises. Despite huge investments in the latest intrusion prevention systems (IPS) and next-generation firewalls (NGFWs), companies are still getting hacked. To protect against web-based threats, organizations need a web application firewall. In this on-demand webinar, Research Director Adam Hils of lead...

    Sponsored By Imperva

  • White Papers // Jul 2014

    Evolution: Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency...

    Sponsored By IBM

  • White Papers // Jul 2014

    Building the Mobile Enterprise - A checklist for putting mobile first in your organization

    Mobility is now a business fact of life. Will your organization be one with mobile capabilities or a truly mobile enterprise? The new IBM white paper “Building the mobile enterprise: integrated, secure and productive” explains the difference and offers a checklist of eight key items to consider when planning your...

    Sponsored By IBM

  • White Papers // Jul 2014

    Video: Improve Visibility and Threat Detection with Security Intelligence and Big Data

    Increasingly sophisticated cyber criminals, insider threats, fraud, and advanced persistent threats, plus the pervasive use of social media, cloud and mobile computing are dramatically changing the security environment faced by corporations today. Watch this video and learn how these exposures can be addressed with IBM's integrated Security Intelligence and Big...

    Sponsored By IBM

  • White Papers // Jul 2014

    Workday Integration Cloud Connect - Datasheet

    Companies need to integrate multiple third-party systems and applications to satisfy key business functions and processes. This document outlines the key benefits of Workday Integration Cloud Connect and the portfolio of integration products. Download this report to understand how Workday Cloud Connect provides pre-built connections to third-party applications and services....

    Sponsored By Workday

  • White Papers // Jul 2014

    Workday Integration Cloud Connect Datasheet

    Companies need to integrate multiple third-party systems and applications to satisfy key business functions and processes. This document outlines the key benefits of Workday Integration Cloud Connect and the portfolio of integration products. Download this report to understand how Workday Cloud Connect provides pre-built connections to third-party applications and services....

    Sponsored By Workday

  • White Papers // Jul 2014

    Using Encryption and Access Control for HIPAA Compliance

    Since 1997 Fortrex Technologies, Inc. has been providing IT Governance, Risk, and Compliance advisory services and solutions. In this white paper Fortrex explores how encryption, access control and file access audit logs from Vormetric can Contributes to HIPAA compliance and exempt from notification requirements of HITECH.

    Sponsored By Vormetric

  • White Papers // Jul 2014

    2014 Insider Threat Report

    The 2014 Vormetric Insider Threat Report - European Edition represents the result of analysis of interviews with 537 IT and Security managers in major European enterprises around the question of insider threats. Insider threats have expanded from the traditional insiders to privileged users of systems and the compromise of internal...

    Sponsored By Vormetric

  • eBooks // Jul 2014

    10 Things Your Next Firewall Must Do (eBook)

    Effectively stopping advanced threats requires a new approach to security. Find out the 10 must-haves for security products today. Download your booklet now! In this free booklet, you'll find insightful and practical advices on: The why and how of next-generation security 10 critical functions your network...

    Sponsored By Palo Alto Networks

  • White Papers // Jul 2014

    Getting Started: With a Zero Trust Approach to Network Security

    Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity—including users, devices, applications, and packets—regardless of what it is and its location on or relative to the corporate...

    Sponsored By Palo Alto Networks

  • White Papers // Jun 2014

    IBM Server Managed Services Benefit Assessment Tool

    Use IBM's assessment tool to learn how you can increase server efficiency and availability while lowering costs. The IBM Server Managed Services Benefit Assessment helps you identify how an IBM Managed Services solution can: Lower Total Cost of Ownership (TCO) of Server Management Improve Server Resource...

    Sponsored By IBM

  • Webcasts // Jun 2014

    Mind The Gap: Surviving The Technical Security Skills Crisis

    Gain insights from a recent Forrester and IBM study on the global IT security skills crisis Are you having a hard time finding and hiring qualified IT security staff – and retaining them on staff? If so, you are not alone. There is a widespread technical security skills crisis, and...

    Sponsored By IBM

  • White Papers // Jun 2014

    How Can I Obtain Identity and Access Management as a Cloud Service?

    CA CloudMinder™ provides identity and access management capabilities as a hosted cloud service. Quickly obtain security capabilities without deploying or managing a large IT infrastructure typically associated with enterprise security deployments.

    Sponsored By CA Technologies

  • White Papers // Jun 2014

    How CA Technologies Safeguards Competitive Advantage with Proactive Cloud and Web Application Monitoring

    Find out how CA Application Performance Management Cloud Monitor enables the IT team to replicate customer transactions from over 60 global locations to identify potential problems thus ensuring a consistent user experience and quickly resolving any performance problems.

    Sponsored By CA Technologies