Evaluate
Weigh the pros and cons of technologies, products and projects you are considering.
Internet and application security
Blue Coat enhances BYOD mobile application security
Blue Coat announces mobile application security for BYOD environments, giving IT a better view, and more control, of apps on personal devices. Continue Reading
VPN UTM vendor comparison: Evaluating secure remote access features
View this VPN UTM vendor comparison and understand how to manage your virtual private network infrastructure as part of a unified threat management solution. Continue Reading
What network monitoring tools give you visibility into corporate VPNs?
What network monitoring tools give enterprise WANs the visibility they need into their corporate VPNs? Find out in this expert answer. Continue Reading
-
Bringing application control and awareness to micro-branches
Next-generation firewalls bring more granular application control to enterprises, but extending this control to micro-branches is more of a challenges. There are several approaches engineers can take to keep these tiny remote sites connected and ... Continue Reading
WAN application security in the age of cloud and mobile devices
Security expert Kevin Beaver answers questions on WAN application security, this time focused on two of the latest networking trends: cloud services and mobile device management. While security for the applications living in the cloud may be more of... Continue Reading
WAN security and application threats
Security expert Kevin Beaver answers our questions on WAN security, covering the biggest threats to the enterprise wide area network, which might not actually be the hackers themselves but the mindset of those tasked with keeping the enterprise ...Continue Reading
WAN optimization paired with proactive tools improves app availability
'Best in class' companies that have combined WAN optimization and acceleration solutions with the right network monitoring tools have seen improvements in network throughput, accelerated application response times, and have a nearly perfect score ...Continue Reading
WAN applications performance shouldn't suffer as demands, complexity increase
With the number of telecommuting workers and virtual employees on the rise, and with the application infrastructure getting more complex and mobile, networks have to become more application sensitive to keep performance pumped and reliability up to ...Continue Reading
SSL support by WAN optimization vendors growing concern
WAN optimization of SSL encrypted traffic has improved, but the surge in encrypted data, and SaaS apps that automatically encrypt, means the capabilities are becoming a must for many enterprises.Continue Reading
Network engineers and developers must collaborate on WAN applications
Software developers often fail to test their applications for performance on a wide area network (WAN), and when the application fails, network engineers often get the blame. Networkers should climb out of their own silos and work directly with ...Continue Reading
-
Law firm chooses Silver Peak WAN optimization for its Layer 3 approach
Law firm Broad and Cassel chose Silver Peak for its Layer 3 approach to WAN optimization. The firm had a broad range of applications to accelerate and didn't want to rely on the application-specific vendors that focus on Layer 7.Continue Reading
NetFlow network monitoring tools go with the 'flow'
Network monitoring tool makers are again hyping the use of NetFlow data, promising better network and applications visibility.Continue Reading
Cisco, Juniper turn eyes toward application management and visibility
Cisco and Juniper this week rolled out products geared to better application traffic visibility.Continue Reading
WAN traffic, applications fastballed for baseball maker
WAN traffic was sluggish for Rawlings, to the point where it was on the verge of losing a major customer. The sporting goods maker hunted down solutions to ensure that traffic gets the treatment it deserves.Continue Reading
Checklist: Define requirements for new networking applications
In some companies, the in-house software development staff commonly develops and deploys applications outside the knowledge of the IT staff -- which can have dire consequences for the network. In this tip, Brien Posey explains why implementations go...Continue Reading