Feature

2010 year in review: Top WAN feature stories

Michael Brandenburg, Technical Editor

December is always a time when folks are either looking back on the previous year or looking ahead to the new one. Based on the popularity of the top feature stories on SearchEnterpriseWAN.com, our readers are clearly doing a bit of both. Not surprisingly, security and bandwidth concerns dominate our 2010 year in review, as both are always on the minds of WAN managers. But the rise of cloud computing, along with the significant uptick of mobile devices in the enterprise, is adding new elements to an already complex wide area network (WAN) infrastructure and may demand a new approach to security and WAN management. Long-standing issues, including packet loss and WAN outages, highlight the ongoing challenges of enterprise wide area networks.

Our guide to understanding IPv6 was one of the top five feature stories. With the looming threat of running out of IPv4 addresses coming closer to reality, being ready for IPv6 will be on the top of WAN managers’ to-do lists going into 2011. New wireless WAN technologies will also come to the forefront in the new year and offer new choices on how to extend the enterprise network.

Here is the 2010 year in review top 10 WAN technology feature stories:

No. 10 -- Taking a data-centric approach to enterprise network security: WAN managers should focus on securing an organization’s data, rather than focusing on technology solutions alone.

No. 9 -- File transfer methods: How can WAN managers improve the process? With pressure from governance and regulatory issues, WAN managers are looking for a secure, controlled way to move data around. Dan Sullivan suggests an alternative to one-off scripts.

No. 8 -- Determining the impact of wide area network outages: Understanding the impact of an enterprise's wide area network downtime, in terms of both lost productivity and sales, is a necessary step in developing countermeasures to minimize the impact to remote users. 

No. 7 -- Consider mature WWAN networks for machine-to-machine applications: While all the talk is about 4G high-speed wireless networks, enterprises should look at the venerable and pervasive older networks for their machine-to-machine data needs.

No. 6 -- The best branch office technology choices for remote management: Ted Ritter of Nemertes Research highlights the best approach for dealing with remote sites across the WAN.

No. 5 -- WAN application security in the age of cloud and mobile devices: In part two of the Q&A with security expert Kevin Beaver, he focuses his attention on a pair of hot technologies: cloud computing and mobile devices. Beaver discusses the unique threats that these technologies may pose to your network.

No. 4 -- IPv6 explained: Understanding the Internet Protocol Version 6: With the exhaustion of the IPv4 address drawing nearer, WAN managers need to get up to speed with its inevitable replacement, IPv6.

No. 3 -- WAN security and application threats: Security expert Kevin Beaver discusses overall WAN security threats and common mistakes made by WAN engineers. 

No. 2 -- Packet loss could be the source of WAN performance problems: Promises of higher bandwidth may not always translate into higher WAN performance, and packet loss could be the culprit.   

No. 1 -- WAN bandwidth management frequently asked questions: From dealing with BitTorrent to determining the bandwidth needed for VoIP, we compiled the best answers to the most common bandwidth questions from TechTarget's IT Knowledge Exchange (ITKE).

 

See more of SearchEnterpriseWAN.com's 2010 year in review:

 


This was first published in December 2010

There are Comments. Add yours.

 
TIP: Want to include a code block in your comment? Use <pre> or <code> tags around the desired text. Ex: <code>insert code</code>

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
Sort by: OldestNewest

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to: