Networking

Computer networks literally run our world of data exchange and communications. TechRepublic keeps up with the latest networking hardware and software, wired and wireless networking technology, and best practices for your network's security and performance.

  • White Papers // Jan 2014

    Empowering Your Mobile Workers White Paper

    A modern mobile IT strategy is no longer an option, it is an absolute business necessity. Today’s most productive employees are not tied to a desk, an office, or a location. They are mobile. And your company’s IT strategy has to be ready to support them with easy, reliable,...

    Sponsored By Box

  • Case Studies // Jan 2014

    MageMojo Boosts Security and Ensures Availability Using F5 Solution

    Magento e-commerce hosting provider MageMojo needed to improve security after a series of distributed denial-of-service (DDoS) attacks that took its site offline at the worst possible time: Cyber Monday. Consolidating its DDoS mitigation and firewall needs in a high-performance F5 solution, MageMojo strengthened both its security posture and its business.

    Sponsored By F5

  • White Papers // Jan 2014

    Driving Enterprise Transformation with Box and Office 365

    Today, there is a gap growing between the expectations of end-users for simple, effortless apps in the workplace and the requirements of IT to protect content with enterprise-grade security. To cope with these conflicting trends, many organizations are now investing in an ecosystem of cloud applications and services. This is...

    Sponsored By Box

  • Analyst Briefings // Dec 2013

    NSS Labs Network Intrusion Prevention System Product Analysis- IBM GX7800

    Learn how IBM performed in the latest NSS Labs testing, exploring the security effectiveness and performance characteristics of the GX7800 intrusion prevention appliance. This analyst paper covers: How IBM achieved an exploit block rate of 95.7% Ratings for stability/reliability and evasion Performance ratings based on "real-world" scenarios

    Sponsored By IBM

  • White Papers // Dec 2013

    The Benefits of an Integrated Approach to Security in the Cloud

    As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data...

    Sponsored By IBM

  • White Papers // Nov 2013

    Transforming Your Voice, Video and Collaboration Infrastructure - The IBM Journey Toward Unified Communications for Mobile and Social Collaboration

    A recent IDG survey of CIOs revealed that those using virtual desktops now say the biggest benefits are increased simplicity and a more productive and mobile workforce. Find out how other companies are using virtual desktops to: Drastically cut IT investment costs Simplify management across multiple platforms...

    Sponsored By IBM

  • White Papers // Nov 2013

    Consolidation: The Foundation for IT Business Transformation

    This white paper explores how to consolidate legacy, redundant IT services and shows how consolidation can accelerate growth while cutting costs and reducing complexities and enhance competitiveness.

    Sponsored By ServiceNow

  • White Papers // Oct 2013

    Best Practices for Selecting a Vulnerability Management (VM) Solution

    With attackers using increasingly-sophisticated ways to break into systems, manual methods of locating and inspecting devices on your network are no longer enough. The right Vulnerability Management (VM) solution can monitor your environment, enabling you to: discover devices running in your network, determine whether they are vulnerable to attack, find...

    Sponsored By Qualys

  • White Papers // Oct 2013

    Evolving Your IT Services Offering in a Modern Mobile World

    To stay competitive, IT solution providers must evolve their IT services offering and embrace the modern needs of mobility through service-oriented and mobile safeguard technology. Get enabled to answer the IT service calls of clients wanting to get connected to their data, stay connected to their data and ensure they...

    Sponsored By LabTech Software

  • eBooks // Oct 2013

    5 Technology Trends you Need to Follow

    Mobile devices, social business apps, and business analytics are converging with the Cloud to create the most substantial changes in technology since the Internet revolution. Businesses have to change the way they think and operate, and with rising budgets for technology, they need someone to provide the services that will...

    Sponsored By ConnectWise

  • White Papers // Oct 2013

    Symantec Internet Security Threat Report 2014

    Threats to online security have grown and evolved considerably. From the threats of cyberespionage and industrial espionage to the widespread, chronic problems of malware and phishing, we have seen constant innovation from malware authors. We have also seen an expansion of traditional threats into new forums. In particular, social media...

    Sponsored By Symantec

  • Downloads // Oct 2013

    Download a FREE Trial of the Network Bandwidth Analyzer Pack from SolarWinds!

    Don’t let network performance issues cripple your organization. Monitoring and analyzing network bandwidth performance and traffic patterns will enable you to quickly detect and solve critical issues, such as bandwidth hogs or underperforming devices. With SolarWinds Network Bandwidth Analyzer Pack you’ll be able to simplify detection, diagnosis, and resolution...

    Sponsored By SolarWinds

  • White Papers // Oct 2013

    Comparing Data Center Power Distribution Architectures

    Significant improvements in efficiency, power density, power monitoring, and reconfigurability have been achieved in data center power distribution, increasing the options available for data centers. This paper compares five power distribution approaches including panelboard distribution, field-wired PDU distribution, factory-configured PDU distribution, floor-mount modular power distribution, and modular busway, and describes...

    Sponsored By APC by Schneider Electric

  • White Papers // Sep 2013

    Anti-Evasion: Why It's a Critical Component of Intrusion Prevention Systems

    As the number and severity of cyber-crimes continues to grow, it’s important to understand the steps cyber-criminals take to attack your network, the types of malware they use, and the tools you need to stop them.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    The Promises and Pitfalls of BYOD

    Find out how to let employees use personal smartphones, tablets and laptops for work purposes while protecting your network from malware, data theft and unauthorized access.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Effective Security in a BYOD Environment: Arming Your Organization Against the Unknown

    Learn how to get ahead of threats and develop a pragmatic strategy to secure data and assets from malware and theft — without impeding the flexibility, agility and efficiency BYOD can deliver for your enterprise.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Business Insight: Enabling User Mobility with Enterprise Security Solutions

    Learn how to enable user mobility without compromising security. Savvy organizations have embraced the benefits of user mobility, including increased productivity, improved customer relationships and lower costs. See how to keep your data and resources secure.

    Sponsored By Dell Software

  • White Papers // Aug 2013

    Leverage Security Intelligence for Energy and Utilities Companies

    In this solution brief we delve into the topic of how to leverage security intelligence for energy and utilities companies and show how IBM Security Qradar solutions help smooth the wat to a secure smart grid.

    Sponsored By IBM

  • White Papers // Aug 2013

    Boosting Enterpise Security with Integrated Log Management

    This white paper explains an integrated approach for reducing potential security risks and facilitating compliance, and introduces how IBM® Security QRadar® Log Manager can help organizations stay a step ahead of the latest security threats.

    Sponsored By IBM

  • White Papers // Aug 2013

    Enterprise Information Security in Transition: An Opportunity for IBM

    Many CISOs are in a no-win situation. On the one hand, they face a dangerous threat landscape and need to secure new IT initiatives such as cloud computing, mobile computing, and social media. On the other hand, they continue to rely on discrete point tools, under-staffed organizations, and manual processes...

    Sponsored By IBM

  • White Papers // Jul 2013

    Creating the Ultimate Security Platform

    It may sound counterintuitive, but business security challenges aren’t always only about security. Sure, keeping the bad guys out is the ultimate goal. But the challenges an organization faces every day are just as likely to be about the cost of providing security or the administrative hassles of ensuring regulatory...

    Sponsored By IBM

  • White Papers // Jul 2013

    Identity and Access Management Buyer's Guide

    This buyer's guide provides assistance in evaluating identity and access management solutions. It describes common identity and access management challenges and the capabilities required to address them, and it includes checklists for assessing vendors and their products.

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Jul 2013

    File Sharing: Risk or Remedy?

    Ever-increasing file sizes. Document-centric, complex collaboration needs. Two big reasons organizations are turning to cloud file sharing (CFS) as a lightweight but effective solution. Read this complimentary report and learn more about: Document-centric collaboration and how to complement your existing ECM ecosystem with CFM applications Feature...

    Sponsored By Box

  • White Papers // May 2013

    Develop an Intelligent Disaster Recovery Solution With Cloud Technologies

    If you're unhappy with the state of your current disaster recovery operations, IBM is offering a must-read Q and A. In this interview, IBM cloud experts share their insights on how cloud computing can provide nearly instantaneous failover and failback of critical business applications. This type of speedy recovery keeps...

    Sponsored By IBM

  • White Papers // Apr 2013

    Mobile Content, Collaboration & IDC's 3rd IT Platform: The Next Frontier for the Mobile Enterprise

    IDC focuses this article on talks about the new IT platform. This 3rd IT Platform will be the new wave for the about the next 25 years, so they urge all current companies to embrace it themselves. They also talk about how mobile is a huge part of this...

    Sponsored By Box

  • White Papers // Feb 2013

    Top 10 Reasons to Move to HP Blade Servers

    Enterprise and midsize businesses are increasingly turning to blade servers as the platform of choice to deliver the next generation of virtualized applications. Blade servers can yield significant cost efficiencies over rack servers - while taking up a smaller footprint, consuming less power and providing significant advantages in terms of...

    Sponsored By HP & Intel® Xeon® Processor

  • White Papers // Feb 2013

    Beyond the Next Generation: Meeting the Converging Demands of Network Security

    A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk...

    Sponsored By IBM

  • White Papers // Feb 2013

    Extending Security Intelligence with Big Data

    Learn about the latest security intelligence solution combining IBM Security QRadar SIEM and IBM InfoSphere Big Insights technologies helping organizations address the most vexing security challenges, including advanced persistent threats, fraud and insider threats. The solution allows security analysts to extend their analysis well beyond typical security data using real-time...

    Sponsored By IBM

  • White Papers // Feb 2013

    IT Executive Guide to Security Intelligence

    This white paper discusses how security intelligence addresses accurate threat detection shortcomings and empowers organizations—from Fortune Five companies to midsize enterprises to government agencies—to maintain comprehensive and cost-effective information security. In particular, it will show how security intelligence addresses critical concerns in five key areas: Data silo consolidation, Threat detection,...

    Sponsored By IBM

  • White Papers // Feb 2013

    Delivering Success that Scales with the Largest Enterprises

    IBM Security QRadar solutions power some of the world’s largest, most successful security intelligence deployments. The award-winning IBM® QRadar® Security Intelligence Platform collects, correlates and monitors even the highest data volumes and supports the rich customization that large organizations require—without the cost and complexity associated with first-generation security information and...

    Sponsored By IBM

  • White Papers // Feb 2013

    IBM zSecure Compliance and Administration

    IBM Security zSecure Compliance and Administration provides security personnel with the tools to efficiently administer IBM Resource Access Control Facility through simplified security administration. It helps security staff measure and verify the effectiveness of their mainframe security settings and policies. It also automates audit reporting and monitors security events to...

    Sponsored By IBM

  • White Papers // Feb 2013

    Virtualizing Disaster Recovery Using Cloud Computing

    Given the demands of an around-the-clock world, organizations need to start thinking in terms of application continuity rather than infrequent disasters. With faster recovery time and reduced costs, cloud-based business resilience can provide an attractive alternative to traditional disaster recovery. Read this paper to learn how organizations can use cloud...

    Sponsored By IBM

  • White Papers // Aug 2012

    The Importance of Managing Privileged Accounts

    Discover invaluable insights on the benefits of properly managing administrative privileges, developing a policy for managing privileged accounts and enforcing those policies. Could you be managing your privileged accounts better? Download the whitepaper today and find out.

    Sponsored By Dell Software

  • White Papers // Jun 2011

    The Evolution of Business Resiliency Management

    A white paper details IBM’s approach to planning, managing and executing business resilience and continuity across six defined layers of resilience. It also covers recent trends and best practices used in today’s evolving business resiliency management programs, as well as IBM’s portfolio of business continuity and resiliency services....

    Sponsored By IBM

  • eBooks // May 2011

    The Modern Office and You: 5 Ways to Capitalize on Cloud Opportunities

    Many technology providers are nervous about the Cloud and what it means for their business. Rather than look at the Cloud with fear, embrace it and take advantage of the opportunities it brings for new revenue. In this eBook, you’ll learn 5 ways to capitalize on the future of the...

    Sponsored By ConnectWise

  • White Papers // Oct 2010

    Key Methods for Managing Complex Database Environments

    A slow relational database can substantially impact the performance of the applications it supports. Discover the key methods for managing complex database environment, and ensure your database stack is operating at optimal levels of performance and availability. Download the white paper today.

    Sponsored By Dell Software

  • White Papers // Aug 2010

    Proactive Performance Management for Enterprise Databases

    Don't just react to performance issues in your database. Proactive database management can result in accelerated problem resolution, problem prevention, hardware resource maximization and risk reduction. How can you become more proactive in managing your enterprise database? Download the white paper to find out.

    Sponsored By Dell Software

  • White Papers // Oct 2014

    Lab Audit: EMC IT: Leading the Transformation

    EMC launched a transformational journey toward cloud computing beginning in 2004. In 2009, ESG published an initial audit of EMC’s achievements. This 2013 update finds EMC leveraging the firm foundation of efficiency they have built and what steps are needed for such a transformation.

    Provided By EMC

  • White Papers // Oct 2014

    EMC Hybrid Cloud Solution overview

    The right mix of public and private cloud is required to support business initiatives, but a lack of visibility make it difficult for to effectively leverage both. Implementing EMC Hybrid Cloud enables enterprise IT to leverage resources and respond to business needs seamlessly.

    Provided By EMC