<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/">
    <channel>
        <copyright>Copyright TechTarget - All rights reserved</copyright>
        <description></description>
        <docs>https://cyber.law.harvard.edu/rss/rss.html</docs>
        <generator>Techtarget Feed Generator</generator>
        <language>en</language>
        <lastBuildDate>Mon, 09 Mar 2026 19:43:29 GMT</lastBuildDate>
        <link>https://www.techtarget.com/searchnetworking</link>
        <managingEditor>editor@techtarget.com</managingEditor>
        <item>
            <body>&lt;p&gt;&lt;a name="_Hlk222748612"&gt;&lt;/a&gt;Networks are the cornerstone of any modern business. Networks play a crucial part in nearly every aspect of an enterprise's daily operations. Networks enable customers, suppliers and partners to access enterprise data and services, while also connecting IoT, central systems, cloud architectures and more.&lt;/p&gt; 
&lt;p&gt;However, most enterprises haven't upgraded their networks to relevant standards. Companies must be prepared to invest in their networks to improve infrastructure.&lt;/p&gt; 
&lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/tip/How-to-plan-and-start-a-network-upgrade"&gt;Upgrading a network&lt;/a&gt; improves performance, resiliency, security and flexibility. Moreover, these areas of improvement can yield returns on the investment, such as the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;Performance improvements.&lt;/b&gt; Better performance increases productivity, UX, higher revenue and partner retention.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Resiliency.&lt;/b&gt; Greater resiliency reduces network downtime, eliminating lost revenue and service restoration costs.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Security. &lt;/b&gt;Stronger security leads to fewer and less severe cybersecurity incidents, reducing the costs of breach-related downtime.&lt;b&gt; &lt;/b&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Flexibility. &lt;/b&gt;More flexibility reduces the time it takes to deploy new services, which can create new revenue streams.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;A modern network strategy reflects infrastructure that delivers continuous availability and superior performance as it minimizes risk. Because networks are such a crucial part of business, organizations must modernize their networks to support the needs and requirements of their respective enterprises.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Business cases point to the results of network investments"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Business cases point to the results of network investments&lt;/h2&gt;
 &lt;p&gt;When measuring the ROI of network investments, enterprises can realize direct and indirect returns. Most enterprises won't realize every return. It largely depends on how the organization conducts business.&lt;/p&gt;
 &lt;h3&gt;Direct returns on investments&lt;/h3&gt;
 &lt;p&gt;Some returns are easier to quantify than others. For example, if a company's &lt;a href="https://realmdigital.com/insights/ecommerce-downtime-causes-consequences-and-prevention/"&gt;e-tailing site is inaccessible&lt;/a&gt; because the network connecting the front end to the back end is down, that has direct and measurable costs. Essentially, when organizations prevent lost revenue during downtime, it can be seen as a return on the investment.&lt;/p&gt;
 &lt;p&gt;Any company should be able to compile an overall average cost per minute of downtime for these operations, as well as per-service and seasonally adjusted figures. A chief financial officer or chief revenue officer is likely to pay more attention to a network failure that happens during a rush, with its higher direct cost-per-minute-of-downtime, than to a generic scenario using an annual average.&lt;/p&gt;
 &lt;p&gt;It's also typically easier for IT staff to provide accurate estimates of the cost in staff and contractor time -- and therefore wages -- to restore network service.&lt;/p&gt;
 &lt;p&gt;Direct returns can also include penalties for failing to perform contractually obligated actions within a specified time. They might also result from a network-based breach that leads to the loss of client data, potentially resulting in fines, legal fees and settlements.&lt;/p&gt;
 &lt;h3&gt;Indirect returns on investments&lt;/h3&gt;
 &lt;p&gt;Other potential returns are harder to quantify, however. Take customer or staff satisfaction with enterprise systems, for example. Poor performance often affects both customer and user satisfaction. However, network performance isn't always a factor in system performance, and it might not be the most important.&lt;/p&gt;
 &lt;p&gt;Some aspects of poor performance, such as transaction failures caused by timeouts, are easy to track. These failures often occur due to &lt;a href="https://www.techtarget.com/searchnetworking/definition/packet-loss"&gt;packet loss&lt;/a&gt; or increased latency, which are more likely to cause transaction-level problems as applications shift to complex architectures. It's possible to quantify the return gained from avoiding episodes of poor performance and to estimate the potential added revenue from improved overall performance.&lt;/p&gt;
 &lt;p&gt;Indirect returns can include expenses like the money spent paying non-IT staff for time they are unable to spend on their jobs when the network is down. Some parts of a company, like sales, can quantify this kind of idle-time cost, but many other parts, such as HR or financial services, can't.&lt;/p&gt;
&lt;/section&gt;           
&lt;section class="section main-article-chapter" data-menu-title="Measure to manage"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Measure to manage&lt;/h2&gt;
 &lt;p&gt;It's crucial to have relevant data to understand the return on any investment. Important network metrics to evaluate include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Service availability. &lt;/b&gt;Service accessibility rather than component uptimes.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;User-level performance. &lt;/b&gt;Service performance at the user-relevant level, usually transaction rates and transaction completion times.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network metrics.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchnetworking/tip/NOC-performance-metrics-for-optimal-operation"&gt;Network operations metrics,&lt;/a&gt; such as mean time to repair and mean time to identify, measure IT's ability to address problems in the existing environment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Service flexibility. &lt;/b&gt;The time it takes staff to spin up new services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network-based breaches.&lt;/b&gt; The number of network-based breaches and the median time to contain a breach and recover from a breach.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Similarly, CIOs will need to look at the following stats to determine the ROI of network investments:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Revenue at as granular a level as possible -- dollars per transaction, dollars per minute and dollars per staff member.&lt;/li&gt; 
  &lt;li&gt;Customer satisfaction.&lt;/li&gt; 
  &lt;li&gt;Employee satisfaction, leading to greater productivity and less turnover.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Why investing in the network pays off"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why investing in the network pays off&lt;/h2&gt;
 &lt;p&gt;For most businesses, the ROI of a network primarily comes in the form of saved costs. However, CIOs can point to other returns, even if they are more difficult to quantify. A well-run modern network can make a business more flexible, while deep automation and resilient security reduce operational costs and &lt;a href="https://www.verizon.com/business/resources/reports/dbir/"&gt;cybersecurity risks&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;A modern network can also improve employee satisfaction. When a network has fewer incidents of downtime and better application performance, it can decrease turnover and the associated costs related to it. In addition, when employees have less frustration with the network, it can translate to greater trust in the CIO and overall IT team.&lt;/p&gt;
 &lt;p&gt;Investing in the network can make it high-performing, secure and reliable, generating significant returns. CIOs, when building a networking ROI business case, should cite how these investments will avoid costs and deliver positive benefits.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;John Burke is CTO and a research analyst at Nemertes Research. Burke joined Nemertes in 2005 with nearly two decades of technology experience. He has worked at all levels of IT, including as an end-user support specialist, programmer, system administrator, database specialist, network administrator, network architect and systems architect.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Modern networks improve performance, resiliency, security and flexibility. These gains translate into measurable direct and indirect returns for the business.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/money_g1255091249.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/How-network-modernization-creates-measurable-ROI</link>
            <pubDate>Fri, 06 Mar 2026 17:15:00 GMT</pubDate>
            <title>How network modernization creates measurable ROI</title>
        </item>
        <item>
            <body>&lt;p&gt;Many company executives and contact center leaders know about the struggles to protect customer data. With increased distractions or assessing how new technology, like AI, can improve contact center services, company leaders can't lose focus on emerging security threats that could compromise data.&lt;/p&gt; 
&lt;p&gt;Contact center security must remain a focal point to protect customer data and enhance customer confidence when interacting with an organization, which is key to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-improve-the-contact-center-experience-for-customers"&gt;better customer relationships and experiences&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The increasing importance of contact center security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The increasing importance of contact center security&lt;/h2&gt;
 &lt;p&gt;Contact center security must be front and center when developing and implementing a strategic customer experience framework. Organizations that don't employ proper security controls could risk serious negative consequences, such as the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Financial.&lt;/b&gt;&amp;nbsp;A security or data breach can result in lost business revenue and fines levied by various entities that significantly affect the bottom line.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Reputation.&lt;/b&gt;&amp;nbsp;Customers who feel their personal data isn't secure or who have been&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/feature/10-types-of-security-incidents-and-how-to-handle-them"&gt;affected by security incidents&lt;/a&gt;, such as identity theft, might no longer do business with the organization or post their concerns on various social channels. The goodwill and positive reputation an organization builds over time is one of the biggest drivers to acquiring and retaining customers.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Business disruption.&lt;/b&gt;&amp;nbsp;Resources dedicated to running the business must be redirected to research and resolve the incident and improve security protocols.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Types of contact center security best practices"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Types of contact center security best practices&lt;/h2&gt;
 &lt;p&gt;To avoid security problems, businesses need to implement a contact center security checklist that covers three categories: technology, customer and business best practices.&lt;/p&gt;
 &lt;h3&gt;Technology best practices&lt;/h3&gt;
 &lt;p&gt;In order to protect customer data and maintain security, companies and their contact centers should implement the following technology checklist:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Encrypt data.&lt;/b&gt;&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/encryption"&gt;Encryption&lt;/a&gt;&amp;nbsp;translates an organization's stored or transmitted data into different forms, which require a specific key to translate it back into its original format. Organizations often encrypt data to protect specific customer records, including medical, credit card or personal information.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Update technology.&lt;/b&gt;&amp;nbsp;Keeping technology current ensures systems and components have the latest safeguards in place. Bad actors continuously test systems, looking for cracks that let them access data. Key practices to update technology include antivirus software,&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/answer/Testing-a-security-patch"&gt;installing software patches&lt;/a&gt;&amp;nbsp;and eliminating legacy systems that vendors no longer support.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Minimize data availability and access.&amp;nbsp;&lt;/b&gt;More data is being stored each day. And, with more individuals given access to that information, an organization multiplies its risk of a potential data breach. Best practices to minimize availability and access to data include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Restrict the number of people who can access sensitive information.&lt;/li&gt; 
  &lt;li&gt;Use system permissions to manage who can access specific data.&lt;/li&gt; 
  &lt;li&gt;Automate session timeout rules.&lt;/li&gt; 
  &lt;li&gt;Delete employee access to accounts as soon as the person leaves the organization.&lt;/li&gt; 
  &lt;li&gt;Mask sensitive data to limit the information displayed to employees. For example, place asterisks over the first five digits of a Social Security number.&lt;/li&gt; 
  &lt;li&gt;Use alternate technologies to capture sensitive information. For example, send a caller to an&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/definition/Interactive-Voice-Response-IVR"&gt;interactive voice response&lt;/a&gt;&amp;nbsp;system to enter credit card information.&lt;/li&gt; 
  &lt;li&gt;Limit the storage of critical information. For example, delete data after a customer provides a credit card number in a transaction. This scenario represents a tradeoff between customer convenience and data security.&lt;/li&gt; 
  &lt;li&gt;Use firewalls and intrusion detectors to prevent and report attempted and unauthorized activity.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Perform regular data backups.&amp;nbsp;&lt;/b&gt;Regular&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdatabackup/definition/backup"&gt;data backups&lt;/a&gt;&amp;nbsp;should be established to minimize data loss and provide the ability to recreate customer records in the event of a security breach.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/https://youtu.be/SuNtmCgIhiM?si=2yJAWZLY8lMdBmBy?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;Customer best practices&lt;/h3&gt;
 &lt;p&gt;Businesses should institute the following&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-fit-customer-experience-security-into-your-strategy"&gt;customer-related best practices to protect customer data&lt;/a&gt;:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Maintain transparency.&amp;nbsp;&lt;/b&gt;Companies must be transparent with customers, including telling them why the business requires sensitive data and how it uses and&amp;nbsp;protects that information. Effective transparency goes beyond typical privacy statements, and organizations should share this information in an easy-to-understand format.&lt;/p&gt;
 &lt;p&gt;Transparency improves customer confidence, which instills a higher level of trust in the organization. Additionally, if an organization can teach its customers how to protect themselves -- like how to monitor credit card usage -- they feel better about sharing information.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Use authentication protocols.&amp;nbsp;&lt;/b&gt;Authentication aims to prove somebody is the person they claim to be. In the past, typical&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/tip/Use-these-6-user-authentication-types-to-secure-networks"&gt;authentication protocols&lt;/a&gt;&amp;nbsp;used single-factor authentication that required users to enter a single piece of identifying information, such as a password. Many organizations have shifted to multifactor authentication, where users must enter multiple pieces of identifying information, like a password and an additional code. In many cases, the system sends the code to a user's mobile device.&lt;/p&gt;
 &lt;p&gt;Voice authentication is a lesser-used technology. As the technology improves, it should become a more viable customer identification tool.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/call_center_compliance_checklist-f.png 1280w" alt="Contact center checklist for data security and compliance." height="266" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;This compliance checklist ensures contact center agents keep customer data safe.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;Business best practices&lt;/h3&gt;
 &lt;p&gt;Organizations should adhere to the following business-related procedures to protect customer data:&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Train employees.&amp;nbsp;&lt;/b&gt;Organizations need to&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-agent-training-programs"&gt;continuously train contact center agents&lt;/a&gt;&amp;nbsp;to ensure they understand how easily bad actors can steal customer data. Employee training should focus on specific behaviors to protect customer data along with understanding the process to communicate suspicious activity. Training should include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Follow smart practices to maximize password strength, like avoiding easily identifiable information.&lt;/li&gt; 
  &lt;li&gt;Shred documents with personal information and don't leave written notes around. Eliminate the need for paper documents wherever possible.&lt;/li&gt; 
  &lt;li&gt;Limit the information sent electronically to customers, like personal medical information.&lt;/li&gt; 
  &lt;li&gt;Don't open attachments or access links unless they come from a reliable source.&lt;/li&gt; 
  &lt;li&gt;Follow facility physical security protocols whether working on-site or remotely.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Implement improved remote work practices.&lt;/b&gt; Remote employees create new security gaps that can be addressed by the following measures:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Require the use of company-issued devices.&lt;/li&gt; 
  &lt;li&gt;Develop requirements and monitor compliance for home network security and data access.&lt;/li&gt; 
  &lt;li&gt;Don't allow third-party listening systems in the remote workplace.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Share responsibility for data security.&amp;nbsp;&lt;/b&gt;Everyone, even individuals outside of the contact center, is responsible for customer data security. Organizations can practice broad ownership of customer data security in many ways, including the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Monitor and&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-train-agents-on-call-center-fraud-detection"&gt;report suspicious activity&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Restrict unauthorized hardware or software and access to questionable websites and documents.&lt;/li&gt; 
  &lt;li&gt;Bring unattended sensitive documents to leadership.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Use security expertise.&amp;nbsp;&lt;/b&gt;Security expertise is critical to stay ahead of malicious actors. Organizations must bring on staff or use consulting firms that specialize in cybersecurity and other security-related matters.&lt;/p&gt;
 &lt;p&gt;Protecting an organization from security breaches and managing sensitive information isn't a part-time job, and ensuring the proper controls are in place -- and keeping an eye on the future -- requires dedicated effort and expertise.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Test security controls.&amp;nbsp;&lt;/b&gt;Organizations must continuously test their technologies and processes to protect customer data. Business leaders should never assume everything will work as planned, especially when dealing with human behaviors and sophisticated bad actors. Examples of testing security controls include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Implement&amp;nbsp;&lt;a href="https://www.techtarget.com/searchcio/definition/security-audit"&gt;security audits&lt;/a&gt;, including security log reviews if a breach occurs.&lt;/li&gt; 
  &lt;li&gt;Scan for malware and other unauthorized software regularly.&lt;/li&gt; 
  &lt;li&gt;Perform office and home workstation reviews to ensure agents follow security best practices.&lt;/li&gt; 
  &lt;li&gt;Include the testing of security controls and the recovery process as part of the overall business continuity planning.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Prepare for a security breach.&amp;nbsp;&lt;/b&gt;Customers are more likely to feel confident in the recovery process if an organization quickly controls a breach and has an action plan to protect customers. Security breach preparation should be included in&amp;nbsp;&lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/Business-Continuity-and-Disaster-Recovery-BCDR"&gt;disaster recovery and business continuity plans&lt;/a&gt;&amp;nbsp;with specific actions outlining how and when to notify employees and customers, and how to support continued operations.&lt;/p&gt;
 &lt;p&gt;Business executives and contact center leaders should not get distracted by other initiatives. As security threats become more sophisticated, CX leaders should always prioritize contact center security.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Scott Sachs is president and founder of SJS Solutions, a consultancy that specializes in contact center strategy assessments and technology selection.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Follow this comprehensive contact center security checklist that encompasses technology safeguards, customer data protection procedures and common business sense.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a135187239.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/Call-center-security-best-practices-to-protect-customer-data</link>
            <pubDate>Fri, 06 Mar 2026 02:30:00 GMT</pubDate>
            <title>A guide to contact center security best practices</title>
        </item>
        <item>
            <body>&lt;p&gt;Modern hybrid cloud frameworks extend public cloud services into private infrastructure. While these capabilities make building a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/hybrid-cloud"&gt;hybrid cloud&lt;/a&gt; easier, the bigger challenge is assembling a tool set that enables effective management of hybrid cloud infrastructure and workloads over the long term -- specifically, by helping to streamline tasks such as hybrid cloud administration, performance optimization, cost management and security.&lt;/p&gt; 
&lt;p&gt;Correct tools are essential, especially as hybrid cloud becomes the default deployment model. According to VMware's "Private Cloud Outlook 2025: The Cloud Reset" &lt;a href="https://www.vmware.com/docs/private-cloud-outlook-2025"&gt;report&lt;/a&gt;, 92% of enterprises run a blend of private and public clouds. Additionally, 75% of respondents said this blended approach is an intentional strategy, which suggests that organizations value the flexibility of a hybrid cloud environment to meet specific use cases.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why hybrid cloud management matters"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why hybrid cloud management matters&lt;/h2&gt;
 &lt;p&gt;In recent years, &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/public-cloud"&gt;public cloud&lt;/a&gt; vendors have rolled out a new generation of frameworks for hybrid cloud creation -- most notably, Azure Stack Hub and HCI, Azure Arc, AWS Outposts and Google Cloud Anthos. At the same time, more conventional hybrid cloud management platforms, such as VMware Cloud Foundation and Cisco Intersight, continue to thrive. In addition, Kubernetes can be useful as a platform for hybrid cloud management, especially for organizations that use Kubernetes services, like Elastic Kubernetes Service (EKS) Anywhere, to manage workloads deployed on private infrastructure using Amazon's managed Kubernetes service.&lt;/p&gt;
 &lt;p&gt;These platforms provide a centralized way to deploy and administer workloads across a cloud environment that mixes private infrastructure with public cloud resources. Integration between these entities is a significant improvement over earlier hybrid cloud architectures, which more closely resembled a &lt;a href="https://www.techtarget.com/searchcloudcomputing/definition/private-cloud"&gt;private cloud&lt;/a&gt; and a public cloud running side by side. Modern tooling has made creating a hybrid cloud environment easier than ever.&lt;/p&gt;
 &lt;p&gt;Yet, hybrid cloud management remains a major challenge, and the platforms and frameworks mentioned above don't fully solve it. They simplify and centralize the deployment of public cloud services on private infrastructure, but they don't always address hybrid cloud management requirements, such as workload provisioning, log aggregation and analysis, and governance enforcement. These tasks often require additional functionality beyond what's available in hybrid cloud frameworks.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/Zae3jApGq-U?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;The importance of visibility in hybrid cloud&lt;/h3&gt;
 &lt;p&gt;Hybrid clouds are, by their nature, especially complex and not fully centralized. Because they mix private and public cloud infrastructure and services, they make it harder to centralize monitoring and management than would be the case with a cloud environment that includes only private or only public resources.&lt;/p&gt;
 &lt;p&gt;Hybrid cloud management demands an especially deep level of visibility. Visibility ensures that organizations have an accurate, continuously updated understanding of the status of all their cloud infrastructure and workloads, including both the private and public cloud components.&lt;/p&gt;
 &lt;p&gt;The lack of effective hybrid cloud visibility can create challenges, such as the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;Service disruptions resulting from failure to detect outages or performance anomalies across the various workloads hosted within a hybrid cloud.&lt;/li&gt; 
  &lt;li&gt;The inability to predict or optimize cloud spending due to poor visibility into the costs of both the private and public cloud infrastructure.&lt;/li&gt; 
  &lt;li&gt;Security risks, which could arise due to inconsistent access controls and governance policies across the private and public parts of the cloud environment.&lt;/li&gt; 
  &lt;li&gt;Difficulty modernizing or migrating hybrid cloud workloads because of a lack of understanding of where each workload resides, what its requirements are and so on.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="3 types of hybrid cloud management tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3 types of hybrid cloud management tools&lt;/h2&gt;
 &lt;p&gt;The hybrid cloud management landscape is complex. Tools have overlapping functionality. And, since there are multiple approaches to implementing a hybrid cloud architecture -- such as building it directly on top of cloud infrastructure or using a platform like Kubernetes as an abstraction layer -- not all tools apply to all hybrid cloud configurations.&lt;/p&gt;
 &lt;p&gt;That said, hybrid cloud management tools are generally categorized as one of three types of tools:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;Native tools built into frameworks for building a hybrid cloud.&lt;/li&gt; 
  &lt;li&gt;Third-party tools that integrate with hybrid environments but are not natively included in them.&lt;/li&gt; 
  &lt;li&gt;Tools for managing the physical infrastructure that serves as the foundation for hybrid clouds.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;1. Native hybrid cloud management tools&lt;/h3&gt;
 &lt;p&gt;The first category of management tools consists primarily of public cloud services that can extend into hybrid cloud environments. For example, if AWS Outposts is used to build a hybrid cloud architecture, the AWS public cloud's standard management tools -- including CloudWatch and CloudTrail -- can be used to help monitor the hybrid environment and manage logs. The Azure Stack suite of products provides a similar experience by integrating with Microsoft Azure public cloud's standard monitoring tools. Anthos does this as well, using Google Cloud Console.&lt;/p&gt;
 &lt;p&gt;Platforms such as VMware Cloud Foundation and Kubernetes can be tied into some public cloud vendors' services, too. But, for the most part, they don't extend public cloud management tooling into hybrid environments. Instead, users manage hybrid environments via the native tooling that's built into the platforms, such as kubectl on Kubernetes. That said, some integrations between these platforms and public cloud platforms exist. For example, it's possible to use the AWS Identity and Access Management framework to govern some permissions within Kubernetes environments hosted by using Amazon EKS, a Kubernetes service available through the Amazon cloud.&lt;/p&gt;
 &lt;h3&gt;2. Third-party hybrid cloud monitoring and management tools&lt;/h3&gt;
 &lt;p&gt;Because of limitations in native hybrid cloud management tools, it's sometimes necessary to add third-party management tools. These tools can offer broader, richer functionality. They also offer the advantage of working across multiple cloud platforms at once, which is usually not the case when using cloud provider tools. This capability makes third-party hybrid cloud tools useful for businesses whose cloud strategy includes &lt;a href="https://www.techtarget.com/searchcloudcomputing/feature/Multi-cloud-vs-hybrid-cloud-and-how-to-know-the-difference"&gt;multiple public clouds in addition to a hybrid cloud&lt;/a&gt;.&lt;/p&gt;
 &lt;h3&gt;3. Physical infrastructure integration and management&lt;/h3&gt;
 &lt;p&gt;Hybrid cloud management isn't just about digital assets. It also extends to the physical hardware that hosts hybrid clouds. It's necessary to keep track of the servers, which hardware resources they provide and whether they're adequate to meet the hybrid cloud architecture's needs. Cloud providers have &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Evaluate-on-premises-vs-cloud-computing-pros-and-cons"&gt;extended their reach to on-premises&lt;/a&gt; by bundling hardware with services and linking back up to their clouds. These products eliminate the need for an enterprise to manage physical infrastructure. But, sometimes, there are tradeoffs.&lt;/p&gt;
 &lt;p&gt;For instance, with AWS Outposts, the servers must be acquired directly from AWS. On other hybrid cloud platforms, however, a company typically purchases and manages its own hardware.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/weighing_hybrid_cloud_connectivity_factors-f.png 1280w" alt="Six connectivity parameters when building and managing hybrid cloud architectures" height="426" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Six connectivity parameters when building and managing hybrid cloud architectures.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="Top hybrid cloud management tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top hybrid cloud management tools&lt;/h2&gt;
 &lt;p&gt;Hybrid cloud management tools represent a complex ecosystem that has evolved significantly in recent years through acquisitions and new product launches. The evolution is likely to continue, making it important to keep up to date with the hybrid cloud tooling landscape.&lt;/p&gt;
 &lt;p&gt;At present, key vendors and offerings include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Amazon (CloudFormation, Amazon CloudWatch and AWS CloudTrail).&lt;/b&gt; These cloud services integrate with Amazon's hybrid cloud frameworks -- particularly Outposts and EKS Anywhere -- to provide visibility and monitoring capabilities. Turnkey integration among AWS services makes them especially easy to deploy.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Broadcom (VMware Tanzu CloudHealth and Tanzu Observability).&lt;/b&gt; Originally built to help administer VMware-centric private and hybrid cloud environments, these offerings are now part of the Broadcom portfolio and support virtually all types of hybrid environments, not just those built using VMware and Broadcom technology.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CloudBolt Software.&lt;/b&gt; Offers a suite of products for hybrid cloud monitoring, reporting and compliance management, with particularly strong capabilities in automated governance policy enforcement.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;CloudSphere (Illuminate360).&lt;/b&gt; A holistic IT monitoring and visibility offering that can deliver visibility into hybrid cloud environments as well as on-premises, private clouds and public clouds.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Flexera (Snow Commander).&lt;/b&gt; Built up through a series of acquisitions, Snow Commander aims to provide a highly automated approach to hybrid cloud management and monitoring. User self-service capabilities further reduce the administrative burden placed on IT staff.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Google Cloud (Google Cloud Operations).&lt;/b&gt; A visibility tool complete with monitoring, logging, debugging and tracing capabilities that integrates easily with hybrid clouds built on top of Google Cloud using Anthos.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;HPE (HPE Morpheus).&lt;/b&gt; Creates a centralized control plane for monitoring and tracking hybrid cloud environments built using virtually any underlying platform, such as AWS, Azure, Google Cloud, VMware, Kubernetes and others. It is notable for strong vendor agnosticism.&amp;nbsp;&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;IBM Cloud Pak for Multi Cloud Management.&lt;/b&gt; A hybrid cloud management and monitoring service that integrates most tightly with Red Hat OpenShift -- a Kubernetes-based management platform owned by IBM. Although the product is tightly coupled with IBM's native cloud offerings, it can support third-party environments so long as they also run a version of OpenShift.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Micro Focus Hybrid Cloud Management X (HCMX).&lt;/b&gt; Provides a highly centralized approach to managing and monitoring workloads across virtually any hybrid or multi-cloud environment, with a strong focus on compliance and cost management.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Microsoft (Microsoft Azure Automation and Azure Monitor).&lt;/b&gt; These services integrate seamlessly with hybrid clouds constructed using Azure Arc or Hub solutions.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Scalr.&lt;/b&gt; Aims to centralize hybrid cloud and multi-cloud management by using infrastructure as code to automate workload deployment, provisioning and governance. It offers a few native monitoring and observability capabilities but can integrate with third-party tools to fill this gap.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;The tools should work with all parts of the IT infrastructure and cover all related management needs -- something that native management tools built into hybrid cloud frameworks sometimes can't do.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Evaluation criteria for hybrid cloud management tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Evaluation criteria for hybrid cloud management tools&lt;/h2&gt;
 &lt;p&gt;Given the wide selection of &lt;a target="_blank" href="https://www.gartner.com/reviews/market/cloud-management-tooling" rel="noopener"&gt;hybrid cloud management tools available&lt;/a&gt; and the varying use cases they support, organizations should weigh a range of factors when considering options. These are some key areas of evaluation:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Platform support.&lt;/b&gt; Not all hybrid cloud management tools work with all types of cloud platforms. For instance, some logging and monitoring tools might work with the public cloud platform on which the hybrid cloud is partly based. But they might not work well -- or at all -- with the abstraction layer, such as Kubernetes or Cloud Foundation, that runs on top of it.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Tool integrations.&lt;/b&gt; Consider how well the tools integrate with other offerings. For instance, if a hybrid cloud management tool automates log and metric collection, does it integrate well with analytics tools to help interpret them?&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Centralized visibility and operations.&lt;/b&gt; Some management platforms are stronger than others regarding their ability to support all aspects of hybrid cloud administration, asset tracking, workload deployment and so on via a single, centralized vantage point.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Prescriptive and predictive capabilities.&lt;/b&gt; In addition to providing visibility into hybrid cloud environments, some tools offer features to predict how workloads will evolve over time and provide recommendations to support goals such as cost optimization.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security monitoring.&lt;/b&gt; While performance and availability monitoring are the main focus of most hybrid cloud management tools, some also offer security monitoring and threat detection capabilities.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;i&gt;Chris Tozzi, senior editor of content and a DevOps analyst at Fixate IO, has worked as a journalist and Linux systems administrator with particular interest in open source Agile infrastructure and networking.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;&lt;i&gt;Editor's note:&lt;/i&gt;&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article originally published in 2023 and was updated in 2026 to include more hybrid cloud management tools.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The techniques used to build hybrid cloud architectures have come a long way, but managing these environments long term is plenty more complex without the right software.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/cloud_g1183958722.jpg</image>
            <link>https://www.techtarget.com/searchcloudcomputing/feature/Top-enterprise-hybrid-cloud-management-tools-to-review</link>
            <pubDate>Mon, 02 Mar 2026 15:15:00 GMT</pubDate>
            <title>Top enterprise hybrid cloud management tools to review</title>
        </item>
        <item>
            <body>&lt;p&gt;Network&amp;nbsp;change management&amp;nbsp;is a process that aims to reduce the risk of a failed change. This process entails several steps that ensure successful changes.&lt;/p&gt; 
&lt;p&gt;Aircraft pilots use well-defined processes to ensure safe flying. Similarly, network teams can use defined processes to reduce the risk of failed network changes that create&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/feature/The-true-cost-of-network-performance-issues-for-your-business"&gt;unplanned outages&lt;/a&gt;. Still, organizations sometimes find that changes don't go as planned, leading to network outages. Some disruptions are due to a process failure, while others result from unintended consequences of complex configurations.&lt;/p&gt; 
&lt;p&gt;This article discusses the basic operating principles of network change management, such as the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Scope determination and&amp;nbsp;risk analysis.&lt;/li&gt; 
 &lt;li&gt;Peer review.&lt;/li&gt; 
 &lt;li&gt;Pre-deployment testing and validation.&lt;/li&gt; 
 &lt;li&gt;Implementation and testing.&lt;/li&gt; 
 &lt;li&gt;Documentation updates.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Before entering the change management process, network teams must establish the change details, such as new configurations, device connection information and documentation.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="1. Scope and risk analysis"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;1. Scope and risk analysis&lt;/h2&gt;
 &lt;p&gt;The first step in the network change management process is to evaluate the scope of a proposed change. Determine which services might be affected and the stakeholders who use those services. Consider the blast radius&amp;nbsp;of a change for its potential scope and effect, including any possible negative outcomes.&lt;/p&gt;
 &lt;p&gt;Teams should measure the scope in terms of the following two factors:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;The number of endpoints affected by a change.&lt;/li&gt; 
  &lt;li&gt;The importance of the services a change might affect.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;Once teams identify the scope, they should perform a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsecurity/definition/risk-assessment"&gt;risk assessment&lt;/a&gt;&amp;nbsp;of the change. Is it something that has been done many times before and is well understood? Is it fully automated, or is it possible that human error will alter the change in an unexpected way? Is the technology involved well understood, or is there a chance of something unexpected happening?&lt;/p&gt;
 &lt;p&gt;The scope of a change figures into the risk. A change to the infrastructure on which key business processes run poses a greater risk to the business than a change to a small branch site.&lt;/p&gt;
 &lt;p&gt;Network teams can assess risk by assigning values to key parameters. By averaging the values from the following example parameters, they can determine the overall risk level.&lt;/p&gt;
 &lt;p&gt;&lt;iframe title="Risk factor scoring system" aria-label="Table" id="datawrapper-chart-IpB8G" src="https://datawrapper.dwcdn.net/IpB8G/3/" scrolling="no" frameborder="0" style="width: 0; min-width: 100% !important; border: none;" height="659" data-external="1"&gt;&lt;/iframe&gt;&lt;/p&gt;
 &lt;p&gt; &lt;script type="text/javascript"&gt;window.addEventListener("message",function(a){if(void 0!==a.data["datawrapper-height"]){var e=document.querySelectorAll("iframe");for(var t in a.data["datawrapper-height"])for(var r,i=0;r=e[i];i++)if(r.contentWindow===a.source){var d=a.data["datawrapper-height"][t]+"px";r.style.height=d}}});&lt;/script&gt; &lt;/p&gt;
 &lt;p&gt;The greater the risk, the more careful teams need to be during the remainder of the change management process. Teams should have clear change control documentation in place, detailing the rationale for any changes, rollback procedures and scope.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="2. Peer review"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;2. Peer review&lt;/h2&gt;
 &lt;p&gt;The next step is to conduct a peer review. Teams can perform this step before the risk analysis, but it's better to use the risk level to drive the thoroughness of a peer review. While all peer reviews should be comparably thorough, it's likely that teams conduct cursory reviews for routine changes, such as access control list changes or virtual LAN modifications.&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/automated-software-testing"&gt;Automated testing&lt;/a&gt;&amp;nbsp;and deployment of routine changes can help mitigate the risk of cursory peer reviews.&lt;/p&gt;
 &lt;p&gt;Typically, internal staff who are familiar with the network conduct the peer reviews. If a change is out of the ordinary, however, it makes sense to have an expert from the equipment vendor perform the review. Findings from the reviews should feed back to the risk analysis phase and update the technical risk measurements.&lt;/p&gt;
 &lt;p&gt;Peer reviewers should examine several factors during a review, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Configuration scripts.&lt;/li&gt; 
  &lt;li&gt;Hardware and software compatibility.&lt;/li&gt; 
  &lt;li&gt;Rollback procedures.&lt;/li&gt; 
  &lt;li&gt;Change rationale.&lt;/li&gt; 
  &lt;li&gt;Business needs.&lt;/li&gt; 
  &lt;li&gt;Network security and compliance.&lt;/li&gt; 
  &lt;li&gt;Templates and documentation.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/networking-5_principles_network_change_management_process-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/networking-5_principles_network_change_management_process-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/networking-5_principles_network_change_management_process-f_mobile.png 960w,https://www.techtarget.com/rms/onlineImages/networking-5_principles_network_change_management_process-f.png 1280w" alt="5 steps to follow in network change management" height="288" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Follow these network change management steps to ensure successful changes.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="3. Pre-deployment testing and validation"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;3. Pre-deployment testing and validation&lt;/h2&gt;
 &lt;p&gt;Ideally, all changes go through a pre-deployment testing and validation phase. Consider automating low-risk, repetitive tasks and changes to remove the temptation to skip testing for changes that teams perceive as low risk. The greater the scope and risk, the more important it is to properly test and validate the proposed change.&lt;/p&gt;
 &lt;p&gt;The prevalence of virtual router and switch OS instances makes it easier to automate the creation of test network topologies without expensive hardware investments. &lt;a href="https://www.techtarget.com/searchnetworking/tip/The-role-of-network-sandboxing-and-testing"&gt;Use network labs and sandboxes&lt;/a&gt; to build automation workflows within a virtual network topology that teams can tear down after the tests are successfully completed.&lt;/p&gt;
 &lt;p&gt;Pre-deployment testing includes several steps teams should follow to evaluate a proposed change:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Verify that the test network works as intended prior to the change.&lt;/li&gt; 
  &lt;li&gt;Implement the change in a test infrastructure to confirm that the change results in the desired final state. Teams should&amp;nbsp;use automated processes&amp;nbsp;to avoid human error and reduce the time to validate the change. If validation in the test environment fails, determine the reason. Did it fail because the change was incorrect, or was it because the test network didn't accurately represent the real network?&lt;/li&gt; 
  &lt;li&gt;Test the backout change process so it's easy to revert to the previous state if something goes wrong. The rollback should return the network to the starting state, which teams can validate by repeating Step 1.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="4. Implementation and testing"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;4. Implementation and testing&lt;/h2&gt;
 &lt;p&gt;Deployment and post-deployment testing and validation should follow Steps 1 and 2 of pre-deployment testing. If teams have done a good job of pre-deployment testing and validation, nothing unexpected should happen. If post-change testing detects an unexpected problem, teams should back out the change and verify service restoration.&lt;/p&gt;
 &lt;p&gt;Some network protocols take longer to converge after changes to large networks. As such, post-change verification should incorporate delays or convergence tests, which pre-deployment testing in a small test environment doesn't need.&lt;/p&gt;
 &lt;p&gt;Many organizations automate network configuration changes to migrate to a DevOps culture based on&amp;nbsp;infrastructure as code. The objective is to adopt a&amp;nbsp;&lt;a href="https://www.techtarget.com/searchsoftwarequality/definition/continuous-integration"&gt;continuous integration&lt;/a&gt;/continuous delivery&amp;nbsp;process for low-risk changes.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="5. Documentation and network management updates"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5. Documentation and network management updates&lt;/h2&gt;
 &lt;p&gt;Ideally, teams create and update documents during the change creation process, enabling them to review the documentation and network management changes along with details of the change. Once teams have implemented and verified the change, they can incorporate the documentation changes into a network documentation system.&lt;/p&gt;
 &lt;p&gt;Teams should also update the network management system as needed. Most network management systems have APIs that enable automated processes to make the changes.&lt;/p&gt;
 &lt;p&gt;If the change validation step is automated, it can be incorporated into periodic network validation checks. These periodic checks can detect failures in highly&amp;nbsp;&lt;a href="https://www.techtarget.com/searchnetworking/tip/7-factors-to-consider-in-network-redundancy-design"&gt;redundant and resilient networks&lt;/a&gt;. Over time, teams build a library of network validation checks that cover many parts of the network.&lt;/p&gt;
 &lt;p&gt;The principles of good network change management provide guidance to reduce unplanned network outages due to failed changes. Teams should create a process that works for their organization and work toward making that process highly efficient.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note: &lt;/b&gt;&lt;i&gt;This article was originally written by Terry Slattery and updated by Informa TechTarget editors to improve the reader experience.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Terry Slattery is an independent consultant who specializes in network management and network automation. He founded Netcordia and invented NetMRI, a network analysis appliance that provides visibility into the issues and complexity of modern router- and switch-based IP networks.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Network change management includes five principles, including risk analysis and peer review. These best practices can help network teams reduce failed network changes and outages.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/maze_g1261411056.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/5-principles-of-the-network-change-management-process</link>
            <pubDate>Fri, 27 Feb 2026 11:30:00 GMT</pubDate>
            <title>5 principles of change management in networking</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/definition/5G"&gt;5G&lt;/a&gt; marketing initially focused on the tremendous speed, latency and bandwidth improvements as well as leading-edge features that it offers mobile consumers. But the technology's potential for serious business use has become a major part of the story, including how &lt;a href="https://www.techtarget.com/searchnetworking/definition/private-5G"&gt;private 5G&lt;/a&gt; networks might reshape organizational wireless connectivity in the years to come.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What is private 5G?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What is private 5G?&lt;/h2&gt;
 &lt;p&gt;As the name implies, private 5G is a wireless network that uses the latest generation of cellular technology and is implemented for an organization's exclusive use. Private 5G is one of many wireless options beyond Wi-Fi that help tech-savvy enterprises use the right technology for their specific wireless needs. IoT applications are a prominent use case.&lt;/p&gt;
 &lt;p&gt;The &lt;a href="https://www.infosys.com/iki/techcompass/private-5g-network-deployments.html" target="_blank" rel="noopener"&gt;building blocks&lt;/a&gt; of private 5G include cloud management, radio access hardware -- often referred to as a radio access network (RAN) -- and the private 5G core, also known as the &lt;i&gt;packet core&lt;/i&gt;. Without end nodes, private 5G would have no purpose, so client devices are another essential part of any private 5G system.&lt;/p&gt;
 &lt;p&gt;Types of private 5G deployment include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Standalone.&lt;/b&gt; In this model, all the needed components form a system inside the organization's logical and operational boundaries, with dedicated hardware throughout. It's usually supported in-house by staff who have been trained on it.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hybrid. &lt;/b&gt;While there can be a range of subtle variations, the primary hallmark of a hybrid private 5G network is the use of both private RAN hardware and public cellular carriers for broader connectivity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;As a service.&lt;/b&gt; As with any as-a-service model, this approach makes the private 5G environment someone else's responsibility to implement and support. Private 5G as a service might use aspects of the standalone or hybrid models, but in every case it is run by a third party.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="How to build a private 5G network"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to build a private 5G network&lt;/h2&gt;
 &lt;p&gt;Building a private 5G network follows the same critical-path steps for building any sort of wireless network. It starts with defining requirements: What does the network specifically need to do, and for what end devices? Then qualified staff must design both the radio coverage layer and the core environment based on those requirements.&lt;/p&gt;
 &lt;p&gt;The design might be as simple as one virtual LAN and one private slice network (PSN) -- loosely, the cellular equivalent to the &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/service-set-identifier"&gt;SSID&lt;/a&gt; that identifies a Wi-Fi network -- or as complicated as many VLANs and PSNs for different use cases. Then comes product selection, installation and design verification testing.&lt;/p&gt;
 &lt;p&gt;Finally, everything is scrutinized against the beginning requirements to make sure the network does what it's supposed to at the most granular operational levels. I've made it sound easy here, but, in reality, building a private 5G network increases in complexity based on the size of the environment being covered as well as the sophistication of the requirements.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/networking-private_5g_network_architecture-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/networking-private_5g_network_architecture-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/networking-private_5g_network_architecture-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/networking-private_5g_network_architecture-f.png 1280w" alt="diagram of private 5G network architecture" height="364" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Take a closer look at the components and connections of private 5G networks.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Private 5G vs. Wi-Fi"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Private 5G vs. Wi-Fi&lt;/h2&gt;
 &lt;p&gt;Wi-Fi can be considered both the dominant and incumbent wireless network access method for enterprises, given its long history and frequent evolution. Nevertheless, private 5G is gaining market share alongside &lt;a href="https://www.techtarget.com/whatis/definition/Wi-Fi6"&gt;Wi-Fi 6&lt;/a&gt; because its unique characteristics make it better suited for certain uses.&lt;/p&gt;
 &lt;p&gt;Here's &lt;a href="https://www.techtarget.com/searchnetworking/feature/A-deep-dive-into-the-differences-between-5G-and-Wi-Fi-6"&gt;how 5G and Wi-Fi 6 compare&lt;/a&gt; in key areas:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Coverage.&lt;/b&gt; This is an important characteristic of any wireless network, but context matters. Often, Wi-Fi cells are purposely kept very small for better client density, given how popular the 802.11 Wi-Fi standard is, as measured in client count and variety. But as a general rule, a single private 5G access point can cover the same area as a few strong Wi-Fi access points or as many as 15-20 small Wi-Fi cells. Higher power, cellular-type antenna placements and spectrum that has fewer line-of-sight requirements than Wi-Fi all contribute to private 5G's wider coverage.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Robustness.&lt;/b&gt; Private 5G works in protected spectrum, using cellular protocols for more efficient client roaming and traffic flow. Private 5G is also subject to far less interference than the unlicensed bands where Wi-Fi operates.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Security.&lt;/b&gt; Wi-Fi has the flexibility to be quite wide open or extremely locked down from a network security perspective. With private 5G, all clients need to be "subscribers" at the SIM level, and strong encryption is a requirement. Is one technology better than the other for security? It all comes down to your operational goals.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Throughput.&lt;/b&gt; In theory, both Wi-Fi and private 5G have the potential to deliver fantastic throughput that exceeds that of many wired options. In reality, both technologies tend to be over-hyped compared with their real-world throughput. What users actually get for throughput depends on factors like overall client count, specific client capabilities and distance from access points.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Client market.&lt;/b&gt; There is an order of magnitude more client device types and myriad client capabilities in the decades-old Wi-Fi world. But the private 5G client market is growing. At the same time, private 5G is still largely a specialty technology, with perhaps its biggest initial advantage being in newer IoT devices.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/UCLtahIJfYY?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Private 5G deployment considerations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Private 5G deployment considerations&lt;/h2&gt;
 &lt;p&gt;While each organization's requirements and deployment model of choice will drive the final topology of the private 5G setup, there are several topics and questions to keep in mind when considering private 5G. They include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Difficult locations.&lt;/b&gt; Are there areas needing coverage in which it will be challenging to locate access points and antennas? Port operations and some large industrial sites are examples of scenarios that can require creative approaches to providing service with any wireless technology, including private 5G.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Client onboarding.&lt;/b&gt; Client devices must subscribe to a private 5G network the same way a new cell phone has to be onboarded to a public carrier. Who will do that work, and how will they keep up with it as devices are added and removed?&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;End-to-end monitoring and troubleshooting.&lt;/b&gt; The new private 5G network will likely be an extension of your existing LAN in some fashion. How will the whole thing be monitored and supported when trouble strikes? Will in-house staff get training on the private 5G side, and can you use your existing monitoring and logging tools?&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Expandability. &lt;/b&gt;It's easy to design a network for today's needs, only to realize a year later that you painted yourself into a corner for expandability. Any private 5G implementation should satisfy current requirements but also easily accommodate new uses that might develop.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Private 5G might seem exotic because it brings its own language and characteristics. At the same time, it's just another way of networking. For those who understand its advantages and limits, private 5G has a &lt;a href="https://www.techtarget.com/searchnetworking/Enterprise-5G-Guide-to-planning-architecture-and-benefits"&gt;place in the enterprise&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Lee Badman is a network architect specializing in wireless and cloud technologies for a large private university. He's also an author and frequent presenter at industry events.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>A private 5G network can provide organizations with a powerful new option for their wireless environments. Here are the major requirements to consider before building one.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/mobile_g871133984.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/How-to-build-a-private-5G-network-architecture</link>
            <pubDate>Wed, 25 Feb 2026 09:00:00 GMT</pubDate>
            <title>How to build a private 5G network architecture</title>
        </item>
        <item>
            <body>&lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/definition/5G"&gt;5G&lt;/a&gt; technology, with its promise of faster speed, wider bandwidth and lower latency, is gradually becoming mainstream. It's also increasingly viable as a networking option for businesses.&lt;/p&gt; 
&lt;p&gt;&lt;a href="http://www.techtarget.com/searchnetworking/tip/What-are-the-features-and-benefits-of-5G-technology-for-businesses"&gt;5G's technical advancements&lt;/a&gt; include a new security architecture, but they also present new security challenges.&lt;/p&gt; 
&lt;p&gt;Here's a look at 5G security architecture, &lt;a href="https://www.techtarget.com/searchnetworking/feature/A-deep-dive-into-the-differences-between-4G-and-5G-networks"&gt;how it differs from 4G&lt;/a&gt;, and the benefits and security challenges it brings.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="5G network security risks and threats"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G network security risks and threats&lt;/h2&gt;
 &lt;p&gt;5G security consists of protections and practices designed to defend the entire architecture of fifth-generation mobile networks, which encompasses infrastructure -- such as core networks, radio access networks (RANs) and edge computing -- connected devices, data traffic and the services that run on top of them. 5G networks rely heavily on virtualization, software-defined components, &lt;a href="https://www.techtarget.com/whatis/definition/network-slicing"&gt;network slicing&lt;/a&gt; and cloud-native functions that increase flexibility and performance but also broaden the potential attack surface.&lt;/p&gt;
 &lt;p&gt;As 5G becomes the backbone of industries, infrastructure and everyday life -- connecting more devices, enabling critical applications like remote healthcare and smart grids -- it carries higher stakes. A breach can affect not just individual users but entire systems. At the same time, advanced features like network slicing and distributed edge nodes create new security challenges, such as difficulties in isolating network slices from each other, securing supply chains and managing vast numbers of IoT endpoints.&lt;/p&gt;
 &lt;p&gt;Here are some of the key &lt;a target="_blank" href="https://www.gsma.com/newsroom/article/safeguarding-the-future-managing-5g-security-risks/" rel="noopener"&gt;risks&lt;/a&gt; and threats to take into account when securing a 5G network:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Supply chain compromise.&lt;/b&gt; Malicious or faulty hardware, firmware and other components introduced through third-party vendors can compromise the network's integrity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Legacy infrastructure and backward compatibility risks.&lt;/b&gt; Dependence on older systems, such as 4G LTE, as fallbacks can reintroduce known vulnerabilities into the 5G environment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Expanded attack surface from IoT device connectivity.&lt;/b&gt; Having to support a huge number of connected devices -- many with weak security -- can leave entry points for malware, botnets and other hostile elements.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Virtualization, cloud-native and software-defined infrastructure risks. &lt;/b&gt;5G's use of software-defined networking, virtualized network functions, edge computing and APIs means misconfigurations, insecure containers and shared resources are more likely to pose threats.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Network slicing and multi-tenant isolation vulnerabilities.&lt;/b&gt; Virtual "slices" of the network might not be completely isolated, so compromising one slice can compromise others.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Denial-of-service&lt;/b&gt;&lt;b&gt; and signaling-storm attacks. &lt;/b&gt;Because 5G networks carry a lot of device traffic and control signaling, &lt;a href="https://www.techtarget.com/searchsecurity/definition/denial-of-service"&gt;DoS&lt;/a&gt; attacks designed to flood them with control messages and other traffic can disrupt the availability of critical services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Eavesdropping, traffic analysis and rogue base stations. &lt;/b&gt;Attackers might intercept or manipulate data, track users or exploit fake towers to degrade privacy or integrity.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Inadequate monitoring and visibility in distributed edge environments.&lt;/b&gt; With more edge nodes, devices and distributed infrastructure, spotting threats and enforcing consistent security becomes harder.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5G security architecture"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G security architecture&lt;/h2&gt;
 &lt;p&gt;The 5G core network, which provides coordination between different parts of the RAN and connectivity to the internet, is a service-based architecture (SBA) built around cloud-based technologies that provides authentication, security and session management, as well as other functions and services.&lt;/p&gt;
 &lt;p&gt;The SBA decouples network functions into modular services and relies heavily on &lt;a href="https://www.techtarget.com/searchnetworking/definition/network-functions-virtualization-NFV"&gt;network functions virtualization&lt;/a&gt;, which virtualizes network services that were traditionally run on proprietary hardware. These are deployed using &lt;a href="https://www.techtarget.com/searchnetworking/definition/What-is-multi-access-edge-computing-Benefits-and-use-cases"&gt;multi-access edge computing&lt;/a&gt;, a network architecture that puts cloud computing and storage capabilities at the edge of a network and close to its users.&lt;/p&gt;
 &lt;p&gt;Despite these changes, there's still a clear modular separation between the RAN, which provides wireless connectivity, and the security protocols of the 5G core.&lt;/p&gt;
 &lt;p&gt;However, because 5G now depends heavily on virtualized network functions, cloud-native infrastructure, multi-vendor environments and edge deployments, it cannot rely on legacy hardware-centric security assumptions alone. As a result, 5G networks support and require a broader set of security protocols, techniques and features to address the vastly expanded attack surface, the growing number of devices and use cases, and the complexity of modern deployments.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5G security features"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G security features&lt;/h2&gt;
 &lt;p&gt;The following 5G security improvements are among the most important.&lt;/p&gt;
 &lt;h3&gt;Encryption&lt;/h3&gt;
 &lt;p&gt;Stronger 256-bit cryptographic algorithms and separating security keys from the core network provide better data protection and aim to make communications sufficiently resistant to attacks by quantum computers.&lt;/p&gt;
 &lt;h3&gt;Privacy&lt;/h3&gt;
 &lt;p&gt;All data passing through 5G networks has confidentiality and integrity protection. Threats like international mobile subscriber identity catchers and temporary mobile subscriber identity catchers, which exploit the fact that 2G, 3G and 4G networks send a user's permanent or temporary identifier in plaintext during the device's initial contact with the network, won't be possible in 5G networks.&lt;/p&gt;
 &lt;p&gt;5G security specifications don't allow plaintext transmissions of the Subscription Permanent Identifier (SUPI). Instead of sending its true identity, a 5G device sends a privacy-preserving identifier containing the concealed SUPI. This Subscriber Concealed Identity ensures that a user's or device's identity and location are encrypted, which makes them impossible to identify or locate from the moment they join a network.&lt;/p&gt;
 &lt;p&gt;Also, 5G has an integrity check on the network control plane and adds an additional check on the user plane, which carries the network user traffic between the device and the RAN. This guarantees that messages between a device and the application on the user plane can't be intercepted and modified over the air.&lt;/p&gt;
 &lt;h3&gt;Authentication and authorization&lt;/h3&gt;
 &lt;p&gt;5G has an authentication protocol called 5G Authentication and Key Agreement to verify the identity of users, devices and network elements using &lt;a href="https://www.techtarget.com/searchsecurity/definition/asymmetric-cryptography"&gt;asymmetric randomized encryption&lt;/a&gt;. Its Access and Mobility Management Function sends an authentication request to the Authentication Server Function, which forwards authentication requests to the Unified Data Management, which then decides on the appropriate authentication method depending on the subscriber profile. It supports pre-shared keys, certificates and tokens, whereas 4G requires a physical SIM card, which isn't practical for simple IoT devices that rely on an embedded SIM.&lt;/p&gt;
 &lt;h3&gt;Roaming security&lt;/h3&gt;
 &lt;p&gt;All communications between core network nodes employ the same set of protocols protected by the same security controls, reducing the number of security processes, while the Security Edge Protection Proxy (SEPP) implements end-to-end security protection for source and destination network traffic. SEPP replaces &lt;a href="https://www.techtarget.com/searchnetworking/definition/Signaling-System-7"&gt;Signaling System 7&lt;/a&gt; and Diameter used in 3G and 4G networks.&lt;/p&gt;
 &lt;h3&gt;Reliability&lt;/h3&gt;
 &lt;p&gt;Network slicing, which is similar to traditional network segmentation, enables different segments to have customized security controls for specific use cases. Also, in the event of an incident, traffic can be quickly blocked or quarantined if it's on a separate network slice.&lt;/p&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="5G security benefits"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G security benefits&lt;/h2&gt;
 &lt;p&gt;5G introduces much-needed improvements to 4G network security with more frequent authentication and integrity checks. The fact that data can be transferred at high speed, with strong encryption complemented by authentication, means &lt;a href="https://www.techtarget.com/searchnetworking/feature/10-ways-5G-is-transforming-manufacturing"&gt;smart automation&lt;/a&gt;, better critical infrastructure monitoring and smart cities are realistic possibilities.&lt;/p&gt;
 &lt;p&gt;The 5G standard is based on input and expertise from around the world and has security at its heart. With security controls baked in at the design stage, 5G networks should be more resilient to attacks now and in the future.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="5G security implementation challenges"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G security implementation challenges&lt;/h2&gt;
 &lt;p&gt;These benefits come at a price, since deploying 5G is expensive. For example, more transmitters are required to cover the same area as a 4G network, and security best practices add to the cost. 5G requires strong enforcement by regulators, such as the Federal Communications Commission, to clamp down on providers that omit mandatory security features to cut costs -- a practice that has weakened security in many previous-generation networks.&lt;/p&gt;
 &lt;p&gt;Rolling out 5G depends on a global supply chain, which opens up plenty of opportunities for hackers to compromise hardware, software and services. In fact, it will be several years before there are 5G networks with no legacy technologies. Until then, 5G must remain interoperable with 3G and 4G. This means downgrade attacks, in which hackers manipulate a connection into using a less secure 3G or 4G service, will remain a threat.&lt;/p&gt;
 &lt;p&gt;There is also a shortage of security practitioners with in-depth knowledge of 5G security. Vendors need to correctly implement the security controls required by the relevant standards, obviously, but a bigger risk is that mobile network operators -- in practice, the ones deploying 5G -- might introduce new or unforeseen risks and vulnerabilities into the system if they don't configure their systems correctly.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/definition/5G-infrastructure"&gt;5G infrastructure&lt;/a&gt; is far more complex than 4G infrastructure, with millions more connected devices, more traffic routing points and a wider range of entry points, which greatly increases the attack surface. Monitoring and maintenance need to be upgraded to sustain real-time threat detection; otherwise, one malicious device could potentially compromise thousands of interconnected devices.&lt;/p&gt;
 &lt;p&gt;5G supports creating connected services and industries with innovative use cases that could attract a new wave of cybercriminals and threat vectors that test the resilience of 5G networks and the strength of the controls that provide security for 5G communications. Many of these risks and security threats are not yet fully understood. As a result, the 3rd Generation Partnership Project and other organizations involved in setting the security standards for mobile technologies need to ensure updated requirements are implemented based on changes to the threat landscape and future risk assessments.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Approaches to securing 5G networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Approaches to securing 5G networks&lt;/h2&gt;
 &lt;p&gt;Service providers and enterprises are increasingly adopting a &lt;a href="https://www.techtarget.com/searchsecurity/definition/zero-trust-model-zero-trust-network"&gt;zero-trust&lt;/a&gt; and identity-centric architecture to protect 5G environments. Rather than implicitly trusting devices or network segments, every access request -- whether from a device, user or network function -- is continuously verified based on identity, context and risk. This approach is often coupled with micro-segmentation of network domains -- for example, isolating IoT endpoints, edge nodes and core services -- to limit the damage of a security compromise. Robust identity management, including mutual authentication between user equipment and network and certificate- or token-based access, is a pillar of this approach.&lt;/p&gt;
 &lt;p&gt;At the same time, protecting the deeper infrastructure of 5G &lt;a target="_blank" href="https://www.prodshell.com/blog/5g-security-strategies" rel="noopener"&gt;means&lt;/a&gt; tackling the increased complexity introduced by virtualization, cloud-native components, edge computing and global supply chains. Key measures include end-to-end encryption across both control and user planes; securing the software-defined and virtualized components by using hardened hardware security modules, cryptographic key lifecycle controls and trusted platform modules; and implementing strong vendor as well as component evaluation programs to manage supply chain risk. Monitoring and threat detection capabilities based on machine learning and other forms of AI are increasingly incorporated to spot anomalous behaviors across distributed network slices or edge nodes in real time.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Due diligence for 5G security"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Due diligence for 5G security&lt;/h2&gt;
 &lt;p&gt;Effective due diligence begins with rigorous vendor and supply chain assessment. Operators must verify who their suppliers are, evaluate the trustworthiness of hardware and software components, and ensure there are documented processes for secure manufacturing, patching, updates and incident notification. This includes collecting company background, financial information and the vendor's security posture, not only during onboarding but continuously afterward.&lt;/p&gt;
 &lt;p&gt;Next is a comprehensive review of network architecture, identity and access management, and monitoring. Due diligence means mapping all endpoints and segments, including edge‑nodes, slices, RAN and core; checking that micro‑segmentation or zero trust principles are adopted; verifying mutual authentication and strong key management; and confirming that encryption is in place across control and user planes. Ongoing ability to detect anomalies, log events and respond to incidents is also critical.&lt;/p&gt;
 &lt;p&gt;Finally, telecom operators must handle compliance, operational readiness and continuous security assurance. They need to ensure adherence to relevant standards, maintain audit trails, conduct regular risk assessments of vendor access and infrastructure changes, and sustain visibility into the security of virtualized or cloud‑native functions. It's not enough to build once; the distributed, software‑defined nature of 5G demands ongoing diligence.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="5G network security trends"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G network security trends&lt;/h2&gt;
 &lt;p&gt;Like most technology developments, 5G security is in a continual state of evolution. The following are some of the 5G network security trends to keep in mind as this sector evolves:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Wider adoption of zero&lt;/b&gt;&lt;b&gt;‑&lt;/b&gt;&lt;b&gt;trust and identity&lt;/b&gt;&lt;b&gt;‑&lt;/b&gt;&lt;b&gt;centric models.&lt;/b&gt; As 5G architectures become more distributed and virtualized, the traditional perimeter-defense approach is no longer sufficient. More organizations &lt;a target="_blank" href="https://www.psmarketresearch.com/market-analysis/5g-security-market-report" rel="noopener"&gt;are shifting&lt;/a&gt; to zero‑trust frameworks that continuously verify devices, users and services rather than implicitly trusting network segments. This approach also supports micro‑segmentation and granular control over access in 5G‑enabled environments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Increased use of AI, machine learning and edge analytics for threat detection and response.&lt;/b&gt; With 5G networks enabling massive connectivity and edge computing deployments, there's a growing need for real‑time monitoring and automated response. &lt;a href="https://www.techtarget.com/searchenterpriseai/feature/How-5G-and-artificial-intelligence-may-influence-each-other"&gt;AI and ML tools are being embedded&lt;/a&gt; into network operations to identify anomalous patterns, respond to threats faster and adapt to new attack methods -- especially those targeting IoT endpoints or network slices.&lt;/li&gt; 
  &lt;li&gt;&lt;strong&gt;Preparing for future threats: quantum‑safe cryptography and supply chain resilience controls.&lt;/strong&gt; As the number of 5G devices and virtualized network functions grows, so does the attack surface. Two responses will dominate here: first, introducing or piloting &lt;a href="https://www.techtarget.com/searchsecurity/definition/post-quantum-cryptography"&gt;post-quantum cryptography &lt;/a&gt;to protect against future quantum-powered attacks; second, greater emphasis on securing the supply chain for both hardware and software, since compromised components in a 5G network can undermine the entire system.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Editor's note: &lt;/b&gt;&lt;i&gt;This article was updated in February 2026 and edited to improve the reader experience. &lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>5G has better security than 4G, including stronger encryption, privacy and authentication. But enterprises need to know the challenges of 5G's complex, virtualized architecture.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/security_a385093447.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/5G-security-Everything-you-should-know-for-a-secure-network</link>
            <pubDate>Tue, 24 Feb 2026 09:00:00 GMT</pubDate>
            <title>5G security: Everything you should know for a secure network</title>
        </item>
        <item>
            <body>&lt;p&gt;Fixed wireless access, or FWA, is an efficient, reliable and cost-effective wireless networking technology designed to provide high-speed broadband connectivity to subscribers.&lt;/p&gt; 
&lt;p&gt;FWA doesn't rely on traditional wired infrastructure, such as fiber optic, cable or DSL. Instead, it establishes radio links between two fixed points to provide internet connectivity. In simple words, FWA is a type of wireless broadband.&lt;/p&gt; 
&lt;p&gt;Different wireless technologies, such as 4G LTE, WiMax and short-wavelength millimeter wave (&lt;a href="https://www.techtarget.com/searchnetworking/definition/millimeter-wave-MM-wave"&gt;mmWave&lt;/a&gt;) 5G, can be used to deliver FWA. 4G FWA has been around for decades. It offers high-speed internet connectivity within several miles of the base station and in speeds of several hundred Mbps, up to 1 Gbps.&lt;/p&gt; 
&lt;p&gt;The advent of the latest cellular standard, &lt;a href="https://www.techtarget.com/searchnetworking/definition/5G"&gt;5G&lt;/a&gt;, has accelerated FWA adoption. 5G FWA is replacing 4G FWA because it offers higher bandwidth, lower latency and more reliability. According to the analyst firm Opensignal, FWA is the &lt;a target="_blank" href="https://insights.opensignal.com/2024/06/06/5g-fixed-wireless-access-fwa-success-in-the-us-a-roadmap-for-broadband-success-elsewhere" rel="noopener"&gt;secret sauce&lt;/a&gt; in telecom companies' efforts to make money from their 5G infrastructure, and it has grown faster in the U.S. than in other countries.&lt;/p&gt; 
&lt;p&gt;Globally, FWA is replacing fiber optics. The June 2025 "Mobility Report" from mobile provider Ericsson predicted that the number of global active FWA connections will rise to 350 million by 2030 and that approximately 35% of new internet connections will be FWA.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How FWA works"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How FWA works&lt;/h2&gt;
 &lt;p&gt;FWA works like a typical cellular network, with a radio link connecting a transmitter and a receiver. The transmitter in a cell tower is referred to as the &lt;i&gt;base station&lt;/i&gt;. The receiver, often referred to as &lt;i&gt;customer premises equipment&lt;/i&gt; (CPE), is situated at the subscriber location and can be outside or inside the premises. The CPE is the main component of FWA responsible for performing all the necessary functions. An on-premises internet router connected to the CPE provides internet access through Ethernet or Wi-Fi to both stationary and mobile devices.&lt;/p&gt;
 &lt;p&gt;Despite misconceptions, FWA isn't Wi-Fi, though it is one &lt;a href="https://www.techtarget.com/searchnetworking/tip/The-4-different-types-of-wireless-networks"&gt;type of wireless technology&lt;/a&gt;. Wi-Fi is designed to distribute internet connectivity inside homes or buildings, while FWA provides higher-speed network connectivity over longer ranges, with a different deployment model and use cases than Wi-Fi. FWA functions as the last-mile connection between the network operator and the subscriber. It complements Wi-Fi rather than replacing it.&lt;/p&gt;
 &lt;p&gt;In contrast to how wired broadband employs traditional network cabling, such as copper wires, coaxial cables or optical fibers, FWA uses CPE to provide connectivity to a single premise. Even though FWA is a wireless technology, it's referred to as &lt;i&gt;fixed&lt;/i&gt; because the transmitter and receiver operate in fixed locations, as does the CPE.&lt;/p&gt;
 &lt;p&gt;CPE antennae can operate either in direct line of sight or without line of sight of the base station tower. Obstacles like buildings and trees can't weaken signals or prevent them from reaching the CPE. The strength of the FWA signal depends on a collection of factors, including antenna technology, CPE placement and hardware type, distance between the transmitter and receiver, coverage area, and cellular traffic.&lt;/p&gt;
 &lt;p&gt;When operators place CPE in several locations, such as rooftop mounts, walls and poles, the setup is called &lt;i&gt;outdoor CPE&lt;/i&gt;. The signal strength is stronger due to the direct line of sight. The signal strength of indoor CPE is weaker because of attenuation caused by physical obstacles, which presents a challenge for 5G carriers. Nevertheless, indoor CPE is more common in enterprises.&lt;/p&gt;
 &lt;p&gt;The CPE uses built-in routers or connects to internal routers to provide broadband in different on-premises locations. Modern CPE has advanced features such as remote provisioning, security, management and IoT support.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/how_fixed_wireless_access_works-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/how_fixed_wireless_access_works-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/how_fixed_wireless_access_works-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/how_fixed_wireless_access_works-f.png 1280w" alt="Depiction of a fixed wireless access system, which includes a transmitter tower and an on-premises base station with signals emitting from the base station to the premises" height="301" width="559"&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="FWA features"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;FWA features&lt;a href="https://www.techtarget.com/searchnetworking/feature/Evaluate-top-5G-fixed-wireless-access-benefits"&gt;&lt;/a&gt;&lt;/h2&gt;
 &lt;p&gt;FWA provides several benefits compared with other forms of wireless connectivity.&lt;/p&gt;
 &lt;h3&gt;Faster deployment&lt;/h3&gt;
 &lt;p&gt;FWA offers low deployment costs to service providers, reducing time to market and enabling quick revenues. Providers minimize upfront investment because there is no need to buy cables, acquire permits and hire technicians to deploy the network. Installation takes a few days instead of weeks or months.&lt;/p&gt;
 &lt;h3&gt;Affordable rates&lt;/h3&gt;
 &lt;p&gt;Copper-based networks typically incur high costs from materials, installation, maintenance and repair. With FWA, users pay a one-time cost to install CPE or rent it for a minimal fee. FWA lifecycle costs are typically lower than alternatives.&lt;/p&gt;
 &lt;h3&gt;High speeds&lt;/h3&gt;
 &lt;p&gt;5G FWA provides high-bandwidth connections at mmWave frequencies using &lt;a href="https://www.techtarget.com/searchmobilecomputing/definition/MIMO"&gt;multiple input, multiple output&lt;/a&gt; technology, beamforming, network optimization and other advanced networking methods. FWA provides high-strength signals for fast network connectivity similar to wired broadband, but at cheaper rates. Additionally, mmWave 5G FWA enables cloud access, data storage and quick downloads.&lt;/p&gt;
 &lt;h3&gt;IoT integration&lt;/h3&gt;
 &lt;p&gt;FWA promotes rapid, cost-effective and secure IoT integration in several applications. It supports IoT sensors deployed in remote locations and&lt;b&gt; &lt;/b&gt;enables faster IoT device communication, third-party integration, remote provisioning, control, monitoring and real-time updating.&lt;/p&gt;
 &lt;h3&gt;Enterprise advantages&lt;/h3&gt;
 &lt;p&gt;FWA benefits enterprises through rapid deployment, lower network infrastructure costs and faster speeds for both internet access and VoIP for internal and external communication. When enhanced with &lt;a href="https://www.techtarget.com/whatis/definition/network-slicing"&gt;network slicing&lt;/a&gt;, it can provide high-bandwidth internet in multiple locations, cloud application support, low latency in voice packet transfer, improved audio and high-quality video conferencing.&lt;/p&gt;
 &lt;h3&gt;Network security&lt;/h3&gt;
 &lt;p&gt;Just as Wi-Fi enables users to set password protections, FWA gives users options to secure their networks and meet regulatory requirements to protect privacy. FWA CPE helps to ensure secure data packet transfer, authentication, control and protection against attacks.&lt;/p&gt;
 &lt;h3&gt;Scalability&lt;/h3&gt;
 &lt;p&gt;FWA is more scalable than wired network infrastructure. Adding base stations, deploying more CPE or using advanced CPEs with better hardware and software upgradeability are typical ways to extend coverage.&lt;/p&gt;
&lt;/section&gt;                
&lt;section class="section main-article-chapter" data-menu-title="FWA use cases"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;FWA use cases&lt;/h2&gt;
 &lt;p&gt;One of the biggest reasons to use FWA is to access innovations like smart city technologies that don't work well on wired infrastructure. Other reasons for adopting FWA include wired network infrastructure limitations, the need to deliver connectivity to numerous locations in remote areas or difficult terrain, and having an eager subscriber base.&lt;/p&gt;
 &lt;p&gt;FWA use cases include the following.&lt;/p&gt;
 &lt;h3&gt;Remote areas&lt;/h3&gt;
 &lt;p&gt;A common use of FWA is delivering wireless broadband to enterprises, educational institutions and residences in remote locations with a relatively low population and "teledensity." Such places are typically rural, suburban or disadvantaged areas lacking in modern conveniences like high-speed connectivity, healthcare access and business opportunities.&lt;/p&gt;
 &lt;p&gt;Mobile network operators (MNOs) typically find it impractical to roll out broadband in these areas. Even when it's possible to deploy wired broadband, maintaining the infrastructure is challenging and expensive. MNOs implement FWA to provide last-mile, high-speed connectivity and enable enterprises to grow while lowering their cost of operations. Moreover, high-speed connectivity might enable people in small households to find remote work. One recent example of FWA deployment in such remote locations is Smith Island in Maryland, where FWA enabled the rural communities of the island to access 5G for the first time.&lt;/p&gt;
 &lt;h3&gt;Temporary setups&lt;/h3&gt;
 &lt;p&gt;FWA is a good choice for enterprises that move offices frequently. Configuring wired infrastructure in temporary locations increases the operating cost of a business. With FWA, customers pay a one-time cost to buy and install CPE on premises and get broadband connectivity at affordable rates. Enterprises can quickly implement FWA in new offices and unsubscribe when they move them.&lt;/p&gt;
 &lt;p&gt;Moreover, locations with volatile weather often lose network access due to malfunctioning or damaged wired infrastructure. FWA can integrate seamlessly with wired networks and serve as an effective backup.&lt;/p&gt;
 &lt;h3&gt;Construction sites&lt;/h3&gt;
 &lt;p&gt;Construction sites typically have complex layouts and irregular placement of materials that are inhospitable to traditional wired networks. In addition, the most remote sites might lack LTE connectivity or provide poor-quality mobile communication.&lt;/p&gt;
 &lt;p&gt;Construction sites can use FWA as a temporary option for months -- or even years -- to enable connectivity for effective communication, collaboration, project planning and management. Workers can access project information, such as designs, layouts and plans, more easily. Owners and stakeholders can monitor ongoing work. APTIM, a Louisiana-based engineering, construction and environmental services company, &lt;a target="_blank" href="https://www.verizon.com/business/resources/customer-success-stories/remote-internet-access/" rel="noopener"&gt;regularly uses&lt;/a&gt; FWA for internet connectivity at its remote construction sites.&lt;/p&gt;
 &lt;h3&gt;Canal cities&lt;/h3&gt;
 &lt;p&gt;Cities that cross bodies of water can't count on wired infrastructure for all their networking needs. Internet access over Wi-Fi is often the most suitable option for heavily populated canal cities, such as Venice, Italy; San Rafael, Calif.; and Giethoorn, the Netherlands. Users can access the internet even when commuting in boats.&lt;/p&gt;
 &lt;p&gt;While cities in developed countries offer free Wi-Fi in many areas, certain businesses might need more reliable options. That's where FWA is gradually gaining momentum. With FWA, businesses in canal cities can access networks faster with better on-premises coverage than city Wi-Fi can provide.&lt;/p&gt;
 &lt;h3&gt;Islands&lt;/h3&gt;
 &lt;p&gt;The most remote islands are often surrounded by hundreds of miles of water and have rugged mountains and extensive forests. FWA is one of the best ways to provide internet and improve safety with IoT sensors without spending exorbitant sums on wired infrastructure. Nevertheless, the presence of numerous physical obstacles leads to signal attenuation that makes it challenging to provide wireless service.&lt;/p&gt;
 &lt;p&gt;Caribbean islands provide emerging examples of FWA's advantages as they start to deploy it, along with other mobile services, to boost connectivity between businesses and residents as well as support tourists.&lt;/p&gt;
&lt;/section&gt;                  
&lt;section class="section main-article-chapter" data-menu-title="Several industries can benefit from FWA"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Several industries can benefit from FWA&lt;/h2&gt;
 &lt;p&gt;FWA can benefit numerous industries, including the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Educational institutions.&lt;/b&gt; FWA can support e-learning and research as well as help maintain records of grades, attendance and schedules.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Healthcare.&lt;/b&gt; FWA enables telemedicine applications that provide healthcare access, doctor consultations and diagnosis in underserved areas.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Retail.&lt;/b&gt; Malls and restaurants can use FWA to offer on-site connectivity for customer engagement and faster payments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Manufacturing and logistics.&lt;/b&gt; FWA can support inventory management, barcode scanning, fleet management, auditing and more.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;IoT-enabled sectors.&lt;/b&gt; FWA supports IoT networks in many sectors, such as smart cities, agriculture, energy and utilities, manufacturing, mining, oil and gas, retail, and healthcare.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="The business opportunity of FWA"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The business opportunity of FWA&lt;/h2&gt;
 &lt;p&gt;FWA is mostly a growth opportunity for mobile telecom service and infrastructure providers. The following categories stand out.&lt;/p&gt;
 &lt;h3&gt;Internet service providers&lt;/h3&gt;
 &lt;p&gt;One of the easiest ways to start with FWA is to become an ISP. Most service providers run FWA networks and bill them to users on a per-subscriber basis. Each subscriber is an independent user -- either an enterprise or a household -- paying monthly, quarterly or annual fees. Factors like fee structures, data allowances and speed vary by provider. ISPs can unlock new business opportunities by adding coverage. If they already offer 5G, they can easily add FWA to provide subscribers with a better internet experience. Verizon and T-Mobile are major players in the FWA market in the U.S.&lt;/p&gt;
 &lt;h3&gt;OEMs&lt;/h3&gt;
 &lt;p&gt;CPE is the main component of FWA. OEMs make 4G or 5G CPE devices and sell them to operators and ISPs. Nokia and ZTE are among the major players.&lt;/p&gt;
 &lt;h3&gt;Chipset and module designers and manufacturers&lt;/h3&gt;
 &lt;p&gt;CPEs contain chips, such as 5G chipsets, SIM cards, eSIMs and systems on a chip. The business opportunities lie in designing these chips and manufacturing them. Some companies specialize in design and hire contract manufacturers. TSMC, based in Taiwan, is a well-known contract manufacturer in the semiconductor industry. Qualcomm and MediaTek are two of the "fabless" vendors that design chipsets.&lt;/p&gt;
 &lt;h3&gt;Software vendors&lt;/h3&gt;
 &lt;p&gt;CPE FWA modules need software for many of their features, such as embedded system OSes, remote provisioning, network automation and secure connectivity. Cisco, Kigen and Fujitsu are among the well-known names in CPE software.&lt;/p&gt;
 &lt;h3&gt;Full-stack services&lt;/h3&gt;
 &lt;p&gt;Some of the above-mentioned companies, including Cisco and Qualcomm, not only sell CPE equipment but also license their platforms to others. Some ISPs become full-stack FWA service providers. They own the network, CPEs, software and all the licensing services. Local startups can stack these services to offer FWA at cheaper rates than competitors.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Venus Kohli is an engineer turned technical content writer, having completed a degree in electronics and telecommunication at Mumbai University in 2019. Kohli writes for various tech and media companies on topics related to semiconductors, electronics, networking, programming, quantum physics and more&lt;/i&gt;.&lt;/p&gt;
&lt;/section&gt;</body>
            <description>FWA delivers wireless broadband internet to remote regions, temporary setups and other locations not suitable for wired networking. 5G has supercharged its growth.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g1128254725.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/FWA-use-cases-for-next-generation-connectivity</link>
            <pubDate>Wed, 18 Feb 2026 12:45:00 GMT</pubDate>
            <title>5G fixed wireless access use cases continue to grow</title>
        </item>
        <item>
            <body>&lt;p&gt;DNS, widely termed the phonebook of the internet, translates human-readable domain names into numerical IP addresses, making it easier for users to access applications and websites. DNS is a bedrock technology. It permits everything from the transmission of emails and VoIP calls to the availability of public-facing products and applications. This article examines &lt;a href="https://www.techtarget.com/searchnetworking/tip/DNS-functions-remain-vital-but-must-adapt-as-demands-shift"&gt;this vital protocol&lt;/a&gt; and steps you should take to optimize DNS.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The ABCs of DNS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_gcmnwny8sbgq"&gt;&lt;/a&gt;The ABCs of DNS&amp;nbsp;&lt;/h2&gt;
 &lt;p&gt;When you enter the URL of a website in your browser, e.g., TechTarget.com, your computer sends out a query to find the corresponding IP address. The query's first stop is the &lt;a href="https://www.techtarget.com/searchsecurity/tip/The-3-types-of-DNS-servers-and-how-they-work"&gt;DNS recursive resolver&lt;/a&gt;, typically provided by your ISP.&lt;/p&gt;
 &lt;p&gt;This resolver issues a series of requests to find the IP address, starting from the root server. Thirteen sets of root servers are available worldwide, each identified by letters A through M. Root servers don't really know the IP address you are looking for, but they can direct requests in the right direction through the appropriate top-level domain (TLD) server -- in our case, the TLD responsible for .com domains.&lt;/p&gt;
 &lt;p&gt;The TLD then refers the query to the authoritative nameserver specifically delegated for the second-level domain (SLD) -- where the actual domain resides. This information is returned to the DNS resolver and then received by the browser. This process -- known as &lt;a href="https://www.techtarget.com/searchnetworking/tip/The-role-of-name-resolution-in-networking"&gt;DNS resolution&lt;/a&gt; -- typically takes milliseconds.&lt;/p&gt;
 &lt;p&gt;If you've visited the specific site before, your browser will most likely have it cached locally in the stub resolver located in the DNS client running on your machine's OS. If not found in the cache, it will check the local hosts file for a manual mapping. If it is found, then the entire external resolution process will be skipped.&lt;/p&gt;
 &lt;p&gt;DNS also plays a role in email delivery. When you send an email, your mail server uses DNS to look up the mail exchanger records for the recipient's domain. The MX records tell your server where to deliver the emails.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="The need for DNS optimization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_jzn5842h54ox"&gt;&lt;/a&gt;The need for DNS optimization&lt;/h2&gt;
 &lt;p&gt;Unreliable DNS can severely affect productivity. Increased page load times result in higher bounce rates, which reduce conversions and SEO, ultimately resulting in revenue loss for businesses. For employees, DNS failures disrupt access, leading to an increase in IT support tickets and other operational issues.&lt;/p&gt;
 &lt;p&gt;It's no surprise that attackers set their sights on DNS. A 2025 Forrester study &lt;a target="_blank" href="https://efficientip.com/resources/forrester-2025-dns-security-report/" rel="noopener"&gt;reported&lt;/a&gt; that 95% of companies faced DNS-related attacks within the past year, with incursions costing companies an average of $1.1 million per attack. The October 2025 incident that targeted AWS' Northern Virginia region's DNS management resulted in the provider being down for 15 hours, affecting various high-profile sites.&lt;/p&gt;
 &lt;p&gt;Companies can employ the strategies below to optimize DNS performance and ensure resiliency.&amp;nbsp;&lt;/p&gt;
 &lt;h3&gt;Multi-region and multi-cloud deployment&lt;/h3&gt;
 &lt;p&gt;&lt;a name="_rymlbhuuohsu"&gt;&lt;/a&gt;&lt;a name="_zbodkdqy33zt"&gt;&lt;/a&gt;Design your DNS architecture to run across multiple cloud providers and regions from the start. This approach will eliminate dependencies, maintain high availability, prevent vendor lock-in and enable compliance with &lt;a href="https://www.techtarget.com/searchsecurity/tip/Data-sovereignty-compliance-challenges-and-best-practices"&gt;data sovereignty laws&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Consider multi-provider synchronization, where primary authoritative DNS zones are hosted in one cloud and replicas (secondary zones) in others (e.g., Azure DNS, Google Cloud DNS or Cloudflare). This setup can be synchronized with DNS tools for consistency.&lt;/p&gt;
 &lt;p&gt;Geographical traffic distribution can be handled by Anycast routing, natively supported by most DNS providers. This steers incoming traffic to specific regions within cloud environments. For example, if users in Asia query your domain, Anycast may route to the nearest point-of-presence, which could be Google Cloud's Asia-South PoP (with the lowest latency).&lt;/p&gt;
 &lt;p&gt;If that region or provider fails, the &lt;a href="https://www.techtarget.com/searchnetworking/definition/BGP-Border-Gateway-Protocol"&gt;Border Gateway Protocol&lt;/a&gt; reroutes to the next closest -- for example, AWS Asia-Pacific. Optionally, improve regional intelligence by using global server load balancing. Taking this step gives businesses near-100% uptime and prevents severe disruptions that affect revenue.&lt;/p&gt;
 &lt;h3&gt;Load balancing and automatic failover&lt;/h3&gt;
 &lt;p&gt;Implement load balancing with an active-active configuration that efficiently distributes traffic across a pool of healthy and active servers. No switch-over is required; if one server goes down, the others absorb the load seamlessly.&lt;/p&gt;
 &lt;p&gt;Pair load balancing with a DNS failover strategy. &lt;a name="_3tjre9dcmsx0"&gt;&lt;/a&gt;DNS-based failovers continuously &lt;a href="https://www.techtarget.com/searchnetworking/tip/Perform-a-network-health-check-with-network-testing"&gt;check the health&lt;/a&gt; of application endpoints in a primary region, probing network reachability, response codes or even for specific content.&lt;/p&gt;
 &lt;p&gt;Configure address and canonical names with failover policies that dictate switching these records to a secondary region if necessary. If an endpoint in a primary region fails, the DNS service detects this anomaly and updates the DNS record. Hence, traffic and other active processes are redirected from the IP address of an unhealthy server or data center to the IP address of a preconfigured standby server with &lt;a href="https://www.techtarget.com/searchdisasterrecovery/definition/data-replication"&gt;data (zone) replication,&lt;/a&gt; typically located in a different geographical location.&lt;/p&gt;
 &lt;p&gt;Validate periodically to ensure readiness for incident response. Load balancing and automatic failover complement each other: load balancing for day-to-day efficiency and failover for resilience during problems. AWS Route 53 offers native failover routing with health checks, while Cloudflare provides advanced load balancing with steering options.&lt;/p&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="How to manage DNS performance"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_buzqwk8sbg2c"&gt;&lt;/a&gt;How to manage DNS performance&lt;/h2&gt;
 &lt;p&gt;Organizations can take the following steps to boost the performance of their DNS:&lt;/p&gt;
 &lt;h3&gt;1. Choose a fast, reliable provider&lt;/h3&gt;
 &lt;p&gt;&lt;a name="_jedmju2xbx0e"&gt;&lt;/a&gt;Rather than stick to DNS servers provided by your ISP, which are often slow and unreliable, switch to a high-performance public or managed provider. Examples include Cloudflare (1.1.1.1), Google Public DNS (8.8.8.8) and Quad9 (9.9.9.9). Run a DNS benchmark for your location to know what's best.&lt;/p&gt;
 &lt;h3&gt;2. Understand the time to live value&lt;/h3&gt;
 &lt;p&gt;&lt;a name="_2zrfxtezwmc1"&gt;&lt;/a&gt;DNS is incredibly efficient, but caching can make it even faster. When a DNS resolver finds the IP address for a domain, it stores this information for a certain period known as the time to live (TTL). When a query is made for the same domain within this TTL period, the resolver will respond immediately from its cache, bypassing the entire lookup process.&lt;/p&gt;
 &lt;p&gt;It's important to be aware of trade-offs, however. A lower TTL value -- such as 60 seconds -- permits faster DNS propagation, speeding up failover events or migrations. This is because the client devices will query for updated records more frequently. But this increases query volume and can cause latency. A higher TTL value -- such as one to 24 hours -- will reduce the number of queries to authoritative servers, thus reducing the load and improving speed.&lt;/p&gt;
 &lt;h3&gt;3. Integrate with content delivery networks&lt;/h3&gt;
 &lt;p&gt;Consider using a &lt;a href="https://www.techtarget.com/searchnetworking/definition/CDN-content-delivery-network"&gt;CDN&lt;/a&gt; &lt;a name="_t5czezlq5fgh"&gt;&lt;/a&gt;as an authoritative DNS provider. DNS queries are distributed and resolved through the CDN's global network of edge servers. Assets are cached at the edge, thus reducing loads. This approach is recommended for applications with media-heavy content. Edge caching dramatically lowers delivery times and bandwidth costs.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="How to secure DNS"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_3jqrw13dluk9"&gt;&lt;/a&gt;How to secure DNS&lt;/h2&gt;
 &lt;p&gt;Because DNS is bidirectional, it carries data and can't be turned off, making it ripe for abuse. As a result, adversaries are constantly developing new ways to exploit it. Below are some methods to protect it.&lt;/p&gt;
 &lt;h3&gt;Use DNSSEC to validate DNS data integrity&lt;/h3&gt;
 &lt;p&gt;&lt;a name="_lmvqqv4mz5ii"&gt;&lt;/a&gt;By default, DNS queries are funneled through &lt;a href="https://www.techtarget.com/searchnetworking/tip/Why-does-DNS-use-TCP-Port-53-and-UDP-Port-53"&gt;UDP port 53&lt;/a&gt;, which is in plain text and unencrypted, making it a prime target for malicious actors.&lt;/p&gt;
 &lt;p&gt;Common attacks include &lt;a href="https://www.techtarget.com/searchsecurity/definition/IP-spoofing"&gt;DNS spoofing&lt;/a&gt; and &lt;a href="https://www.techtarget.com/searchsecurity/definition/cache-poisoning"&gt;DNS cache poisoning&lt;/a&gt;:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;DNS spoofing.&lt;/b&gt; Hackers sniff and impersonate your DNS server, intercept requests and respond with another IP address.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;DNS cache poisoning.&lt;/b&gt; Bad actors insert false information into a DNS resolver's cache, redirecting users to malicious websites without their knowledge.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;DNS Security Extensions add a layer of cryptographic signatures to the DNS data, ensuring the information received is authentic and hasn't been tampered with.&lt;/p&gt;
 &lt;h3&gt;DDoS mitigation and network traffic filtering&lt;/h3&gt;
 &lt;p&gt;&lt;a name="_4df78uj5lxev"&gt;&lt;/a&gt;Imagine a scenario in which the root name servers are &lt;a href="https://www.techtarget.com/searchsecurity/tip/DDoS-mitigation-How-to-stop-DDoS-attacks"&gt;targeted by a DDoS attack&lt;/a&gt;. If these servers get taken down or become slow to respond, the entire chain of DNS queries could be delayed or fail.&lt;/p&gt;
 &lt;p&gt;While such a coordinated attack could, in theory, delay global DNS resolution, this scenario is unlikely to occur given the servers' massive Anycast distribution across hundreds of independent instances worldwide.&lt;/p&gt;
 &lt;p&gt;Actual DDoS threats involve &lt;a target="_blank" href="https://www.cloudflare.com/learning/ddos/dns-amplification-ddos-attack/" rel="noopener"&gt;DNS amplification&lt;/a&gt; or reflection attacks on authoritative or recursive servers, in which malicious actors spoof the victim's IP to obtain oversized responses from open resolvers, thus multiplying the traffic volume exponentially.&lt;/p&gt;
 &lt;p&gt;To combat these attacks, employ a layered approach:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Start with anycast absorption. This tactic will spread attack traffic and prevent a single point of overload.&lt;/li&gt; 
  &lt;li&gt;Implement &lt;a href="https://www.techtarget.com/searchsecurity/feature/Implement-API-rate-limiting-to-reduce-attack-surfaces"&gt;rate limiting&lt;/a&gt; to control the number of requests the DNS server can process within a period of time. A CDN adds an extra layer of security.&lt;/li&gt; 
  &lt;li&gt;Deploy traffic filtering to intercept DNS queries and evaluate them against threat intelligence to check if the destination site is safe before anything malicious can occur.&lt;/li&gt; 
  &lt;li&gt;Enforce policies to block inappropriate and unproductive sites. DNS filtering options range from public or free DNS resolvers, like Cloudflare 1.1.1.1 and Cisco Umbrella -- previously known as OpenDNS -- to enterprise-grade platforms such as Cloudflare Gateway.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;h3&gt;Access controls and monitoring&lt;/h3&gt;
 &lt;p&gt;Implement strict access controls and continuously monitor and detect misconfigurations, as well as identify suspicious activity, such as unauthorized changes. Optimize DNS by deploying &lt;a name="_6ltpqyhx8ywd"&gt;&lt;/a&gt;role-based access control on your authoritative DNS servers or DNS provider to restrict access to only designated sysadmins, developers or IT executives. Access should be unique, with multi-factor authentication enforced.&lt;a name="_pewyl1yqy3id"&gt;&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Wisdom Ekpotu is a DevOps engineer and technical writer focused on building infrastructure with cloud-native technologies.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The internet would be different today without DNS anchoring digital communications. Companies can take some basic steps to ensure they can protect and maintain this vital protocol.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/storage_g1197646065.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tutorial/How-to-optimize-DNS-for-reliable-business-operations</link>
            <pubDate>Thu, 12 Feb 2026 17:30:00 GMT</pubDate>
            <title>How to optimize DNS for reliable business operations</title>
        </item>
        <item>
            <body>&lt;p&gt;Enterprises poised to increase their spending on AI networking infrastructure have a new option in 102.4 Tbps switching silicon to feed AI's insatiable appetite for speed and scale.&lt;/p&gt; 
&lt;p&gt;Cisco introduced its G300 AI networking chip and corresponding Nexus 9000 and 8000 switches this week as a competitive counterweight to &lt;a href="https://www.techtarget.com/searchnetworking/news/366635872/HPE-Discover-Barcelona-2025-unveils-AI-networking-advances"&gt;HPE and Broadcom&lt;/a&gt;, which combined forces late last year. The product of that partnership, the HPE Juniper Networking QFX5250 switch featuring Broadcom's Tomahawk 6 silicon, is due to ship this quarter. Now, Cisco's alternatives -- new liquid-cooled N9364-SG3 &amp;amp; Cisco 8132 switches -- are set for delivery in the second half of this year.&lt;/p&gt; 
&lt;p&gt;"With ongoing supply challenges in the market, Cisco provides an alternative to Broadcom's chips and helps satisfy the need for vendor diversity, particularly among hyperscalers," said Sameh Boujelbene, an analyst at Dell'Oro Group. "Cisco also has incumbency, which matters especially for enterprise customers. … That means it has trusted support relationships, and a natural upgrade path into AI networking without customers having to introduce a new vendor."&lt;/p&gt; 
&lt;div class="imagecaption alignRight"&gt;
 &lt;img src="https://cdn.ttgtmedia.com/rms/onlineimages/boujelbene_sameh.jpg" alt="Sameh Boujelbene, analyst, Dell'Oro Group"&gt;Sameh Boujelbene
&lt;/div&gt; 
&lt;p&gt;Cisco also claims that customers won't have to rip and replace hardware to keep up with the rapid pace of AI development. The G300, like the previous generation of G200 chips, supports adaptive packet processing, which means IT organizations can use new network features without having to buy new chips.&lt;/p&gt; 
&lt;p&gt;"Programmability allows a single Silicon One G300 hardware platform to serve multiple roles across front-end, back-end and scale-out deployments, reducing SKU numbers, simplifying operations and lowering development costs," Boujelbene said. "It also extends the life of existing infrastructure. ... In a rapidly evolving AI landscape, that flexibility helps future-proof investments."&lt;/p&gt; 
&lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/cisco_g300-f.jpg"&gt;
 &lt;img data-src="https://www.techtarget.com/rms/onlineimages/cisco_g300-f_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/cisco_g300-f_mobile.jpg 960w,https://www.techtarget.com/rms/onlineimages/cisco_g300-f.jpg 1280w" alt="Cisco G300 AI networking chip and N9364-SG3 / Cisco 8132 switch chassis." data-credit="Cisco" height="187" width="560"&gt;
 &lt;figcaption&gt;
  &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Cisco's G300 AI networking chip and high-end switches support 102.4 Tbps performance for data center scale-across workloads.
 &lt;/figcaption&gt;
 &lt;div class="main-article-image-enlarge"&gt;
  &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
 &lt;/div&gt;
&lt;/figure&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Cisco expands AgenticOps, Data Fabric"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Cisco expands AgenticOps, Data Fabric&lt;/h2&gt;
 &lt;p&gt;Cisco's new network hardware addresses infrastructure for AI, while an expansion this week of the AgenticOps software features included with its Nexus One operating system addresses AI for infrastructure.&lt;/p&gt;
 &lt;p&gt;New features due out over the next quarter will support autonomous troubleshooting, including root cause analysis and remediation; continuous network optimization; and trusted validation, which predicts the effects of infrastructure changes.&lt;/p&gt;
 &lt;p&gt;Here, too, Cisco faces competition from HPE, which also updated its Aruba and Juniper Mist line of AIOps products in December. HPE and Cisco have both taken steps to unify and cross-pollinate separate network management and AIOps products previously -- HPE began integrating and sharing data between Aruba and Juniper Mist AIOps tools, while last June, &lt;a href="https://www.techtarget.com/searchnetworking/opinion/Cisco-Live-2025-set-the-tone-for-AI-security-in-networking"&gt;Cisco introduced the AgenticOps concept&lt;/a&gt; and its Deep Network Model for data.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    Enterprises like the ability to augment what their staff is doing and allow junior team members to take on more advanced tasks. It allows cost savings and will eventually lead to self-driving networks.
   &lt;/figure&gt;
   &lt;figcaption&gt;
    &lt;strong&gt;Alan Weckel&lt;/strong&gt;Analyst, 650 Group
   &lt;/figcaption&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;Cisco officials at this month's &lt;a href="https://www.techtarget.com/searchitoperations/news/366638794/AI-security-worries-stall-enterprise-production-deployments"&gt;AI Summit event&lt;/a&gt; acknowledged a "trust deficit" among enterprises contemplating agentic automation, but analysts say that trust deficit is waning as AI agent-driven automation tools proliferate.&lt;/p&gt;
 &lt;p&gt;"Enterprises like the ability to augment what their staff is doing and allow junior team members to take on more advanced tasks," said Alan Weckel, an analyst at 650 Group. "It allows cost savings and will eventually lead to self-driving networks. While HPE, with both Aruba and Juniper, had a lead, Cisco has been closing the gap."&lt;/p&gt;
 &lt;p&gt;HPE is primarily focused on self-driving networks, but Cisco is taking a broader, more holistic approach that also supports AI security automation and advanced data management for observability based on Splunk, said Jim Frey, an analyst at Omdia.&lt;/p&gt;
 &lt;p&gt;"Cisco is broadening the AgenticOps strategy and using it as a collection point across multiple product lines," Frey said. "It started out in the campus and branch part of the business around Meraki and WiFi deployments. … Now it's added all the Catalyst products and it's moving into the data center, too, and connecting to Splunk with AI Canvas. Cisco has a pretty good broad vision of what this can do and how it can bring things together."&lt;/p&gt;
 &lt;p&gt;The next step will be for Cisco to incorporate AgenticOps into its UCS server products as well, Frey said.&lt;/p&gt;
 &lt;div class="imagecaption alignRight"&gt;
  &lt;img src="https://cdn.ttgtmedia.com/rms/onlineimages/frey_jim.jpeg" alt="Jim Frey, analyst, Omdia"&gt;Jim Frey
 &lt;/div&gt;
 &lt;p&gt;The &lt;a href="https://www.techtarget.com/searchitoperations/news/366630300/Cisco-Splunk-strategy-shift-unveiled-with-Data-Fabric"&gt;Cisco Data Fabric&lt;/a&gt; project, which was launched last September and proposes a unified data lake and UI to drive data center AI agent automation, has also made strides over the last five months, according to Mangesh Pimpalkhare, senior vice president and general manager of Splunk Platform.&lt;/p&gt;
 &lt;p&gt;Cisco released a natively integrated AI Canvas for Splunk Platform to early adopter customers and made a new foundational AI model for time-series data available on Hugging Face late last year, Pimpalkhare said during a press briefing Feb. 5.&lt;/p&gt;
 &lt;p&gt;"There's the next evolution of that [model] … coming on February 18," Pimpalkhare said. "And then we are also making some great progress on the federated search … working with several data lakes that's on track over the next couple of months. And then last but not least, I'm really excited about our machine data lake that should be in alpha in the next two months as well."&lt;/p&gt;
&lt;/section&gt;              
&lt;section class="section main-article-chapter" data-menu-title="Enterprise AI networking purchases poised for takeoff"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Enterprise AI networking purchases poised for takeoff&lt;/h2&gt;
 &lt;p&gt;Until now, the &lt;a href="https://www.techtarget.com/searchcloudcomputing/news/366638851/Cloud-infrastructure-suffers-AI-growing-pains"&gt;AI infrastructure boom&lt;/a&gt; has largely been driven by public cloud and neocloud providers, but enterprises are increasingly showing significant interest in AI data center updates, according to recent IDC research.&lt;/p&gt;
 &lt;p&gt;Specifically, enterprises are increasingly emphasizing the ability to scale networks across data centers rather than scaling network hardware up and out within data centers to support AI workloads, according to IDC analyst Paul Nicholson. That's where &lt;a href="https://www.techtarget.com/searchnetworking/news/366632593/Cisco-Silicon-One-touts-efficiency-breakthrough-with-AI-chip"&gt;Cisco P200 chips&lt;/a&gt; and switches and Broadcom's Jericho4 will fit in.&lt;/p&gt;
 &lt;p&gt;"In IDC's AI in Networking Special Report in December 2025, scale-across topped the three technologies with around a third more respondents stating it was a critical capability for evaluating offerings and capabilities of data center networking vendors, in a multi-selection question," Nicholson said.&lt;/p&gt;
 &lt;p&gt;The &lt;a target="_blank" href="https://my.idc.com/getdoc.jsp?containerId=US53938025&amp;amp;pageType=PRINTFRIENDLY" rel="noopener"&gt;survey of 500 respondents&lt;/a&gt; also found that around 90% of enterprises planned to increase the bandwidth both in and among data centers for AI workloads by 11% to 20% in the next year. But more organizations -- over one-third -- planned to expand data center interconnect bandwidth by more than 50%, a larger increase than that planned for bandwidth within data centers in the next year.&lt;/p&gt;
 &lt;p&gt;"Scale-across is contributing to this, along with inference and connecting data for AI," Nicholson said. "This is likely led by several factors -- for example, competition for data center resources, including power and cooling, cost and expansion considerations, access to remote data and sovereign requirements."&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Beth Pariseau, a senior news writer for Informa TechTarget, is an award-winning veteran of IT journalism. Have a tip? &lt;/i&gt;&lt;a href="mailto:beth.pariseau@informatechtarget.com?subject=News%20tip"&gt;&lt;i&gt;Email her&lt;/i&gt;&lt;/a&gt;&lt;i&gt;.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Cisco's entrée into 102.4 Tbps silicon boasts in-place programmability and new AgenticOps features as enterprise AI infrastructure spending ramps up.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/maze_g676210320.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/news/366639036/Cisco-G300-AI-network-chip-AgenticOps-parry-Broadcom-HPE</link>
            <pubDate>Wed, 11 Feb 2026 14:37:00 GMT</pubDate>
            <title>Cisco G300 AI network chip, AgenticOps parry Broadcom, HPE</title>
        </item>
        <item>
            <body>&lt;p&gt;Contact centers sit at the intersection of customer experience, brand trust and operational efficiency. As customer expectations rise and AI becomes embedded in service operations, the challenges facing contact centers have grown more complex -- and more consequential.&lt;/p&gt; 
&lt;p&gt;Customer service has moved beyond single-channel support, with contact centers now expected to manage interactions across voice and digital channels while maintaining consistency, context and speed. Contact centers have &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Call-center-vs-contact-center-Whats-the-difference"&gt;evolved beyond mere call-handling hubs&lt;/a&gt; into sophisticated, multichannel engagement centers that play a vital role in shaping customer experiences. With the advent of digital transformation, contact centers now integrate various communication platforms, including phone calls, email, chat, social media and video conferencing.&lt;/p&gt; 
&lt;p&gt;The commercial landscape for businesses and customers is rapidly changing, &lt;a href="https://www.techtarget.com/searchcustomerexperience/feature/Important-contact-center-AI-features-and-their-benefits"&gt;driven by technological advancements&lt;/a&gt;, evolving customer expectations and the increasing importance of personalized service. Enterprises are under pressure to deliver consistent, high-quality customer interactions over different modes of communication, while managing costs and maintaining operational efficiency.&lt;/p&gt; 
&lt;p&gt;Customer interactions now span multiple channels, yet customers expect consistent context, personalization and responsiveness regardless of how they engage. This complex environment necessitates a strategic approach to managing contact centers, addressing inherent challenges and &lt;a href="https://www.techtarget.com/searchcustomerexperience/How-to-choose-a-contact-center-software-system"&gt;using technology to enhance customer service capabilities&lt;/a&gt;.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Key contact center challenges and remedies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key contact center challenges and remedies&lt;/h2&gt;
 &lt;p&gt;Providing different modes of interaction is among the many challenges for modern contact centers. Other issues include agent attrition, increased customer expectations, ever-growing customer queues, generalization of content, barriers to understanding and security.&lt;/p&gt;
 &lt;h3&gt;1. Meeting customer expectations&lt;/h3&gt;
 &lt;p&gt;Customers expect quick, personalized and seamless interactions across all channels. They also expect an interaction in one channel to be consistent with the experience they've had in other channels. They increasingly demand high levels of service and are less tolerant of delays, repeating their information and impersonal responses.&lt;/p&gt;
 &lt;p&gt;Advanced CRM systems and AI-driven analytics can help understand, contextualize and anticipate customer needs, &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-comprehensively-personalize-the-customer-experience"&gt;enabling more personalized and consistent interactions&lt;/a&gt;. Regularly updating service protocols to align with customer feedback is equally important.&lt;/p&gt;
 &lt;p&gt;Meeting these expectations increasingly depends on how well organizations unify customer data and govern AI-assisted interactions across channels, not just on agent performance alone.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/addressing_the_demands_of_todays_complex_contact_centers-f.png 1280w" alt="Contact center challenges and remedies" height="487" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;For every challenge confronting contact centers, there's a remedy.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;2. High contact volumes and longer wait times&lt;/h3&gt;
 &lt;p&gt;Managing the high volumes of customer contacts, especially during peak times, can lead to long wait times and customer dissatisfaction. When customers call into contact centers of certain businesses, the first response they might typically get is a recording, "We're currently experiencing high call volumes" -- at least during normal business hours. This kind of experience, exacerbated by limited staffing and inefficient call routing, frustrates customers.&lt;/p&gt;
 &lt;p&gt;Implementing intelligent call routing and queuing systems can optimize resource allocation and reduce wait times. Most new systems &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-manage-remote-call-center-agents"&gt;enable contact center agents to work from home&lt;/a&gt;, which increases the flexibility of companies deploying agents globally. Self-service options, such as chatbots and automated responses, can reduce contact volumes, but they also raise expectations for the quality and efficiency of the interactions that reach live agents.&lt;/p&gt;
 &lt;p&gt;Chatbots can handle routine types of interactions, like password resets, quick orders and simple questions, but complex situations that require empathy and understanding are still best left to humans. Improvements in machine learning and AI can also help mitigate high contact volumes and wait times and provide customers with other ways to resolve their queries independently.&lt;/p&gt;
 &lt;h3&gt;3. Personalization shortfalls and content generification&lt;/h3&gt;
 &lt;p&gt;Generic responses and interactions usually fail to meet customer expectations for personalized service. This lack of personalization inevitably results in decreased customer satisfaction and loyalty.&lt;/p&gt;
 &lt;p&gt;Using &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Customer-interaction-analytics-spurs-better-business-results"&gt;customer data and analytics to tailor interactions&lt;/a&gt; and recommendations can improve personalization, but doing so effectively requires strong data governance and consistent context across channels. Training call center agents to express empathy and use customer information effectively during their interactions is especially important. New large language models can improve the quality of agent responses by combining the specifics of customer data with best practices in knowledge bases.&lt;/p&gt;
 &lt;h3&gt;4. Language barriers&lt;/h3&gt;
 &lt;p&gt;Contact centers often serve a diverse, global customer base. Language barriers can impede effective communication, leading to misunderstandings and frustration. Any enterprise that aspires to be global must deal with this issue. Even companies that see themselves as local will become global when they put their presence on the web.&lt;/p&gt;
 &lt;p&gt;Hiring multilingual agents and providing language training can bridge communication gaps. Additionally, real-time translation services and AI-powered language tools have come a long way and can facilitate smoother interactions.&lt;/p&gt;
 &lt;h3&gt;5. Agent attrition&lt;/h3&gt;
 &lt;p&gt;High turnover rates among contact center agents &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Why-contact-centers-have-high-turnover-and-how-to-combat-it"&gt;pose a significant challenge&lt;/a&gt;. Increased job openings and competition for talent in good economies can only make this problem worse. Attrition is usually costly, impacting operational efficiency and the quality of customer interactions. Factors contributing to high attrition include job stress, lack of career advancement opportunities and inadequate compensation.&lt;/p&gt;
 &lt;p&gt;In many environments, tool sprawl and cognitive overload also contribute to burnout, making technology simplification as important as compensation and career development.&lt;/p&gt;
 &lt;p&gt;Good customer service is vital to retention and brand loyalty. &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Best-practices-for-call-center-agent-training-programs"&gt;Implementing comprehensive training programs&lt;/a&gt;, offering competitive salaries and creating clear career progression paths can help reduce attrition. Providing a supportive work environment and recognizing agent contributions also play a crucial role in retaining talent. Technology has made it possible for more agents to work remotely, enabling companies to find the best qualified representatives wherever they're located.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/average_call_center_agent_salaries-f.png 1280w" alt="Contact center agent salaries in the U.S." height="403" width="560"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Contact center agents in some regions demand higher than average salaries.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
 &lt;h3&gt;&amp;nbsp;6. Lack of subject matter expertise&lt;/h3&gt;
 &lt;p&gt;Agents often face complex queries requiring specialized knowledge. As the "first line of defense" in resolving customer inquiries, it's often difficult, if not impossible, for contact center agents to achieve mastery or even appear to be knowledgeable in all aspects of company products. The result could be incorrect or inadequate information conveyed to the customer.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/answer/5-ways-to-improve-call-center-agent-performance"&gt;Continuous training and access to a centralized knowledge base&lt;/a&gt; can empower remote work agents with the necessary information to handle complex queries effectively. Encouraging collaboration and knowledge sharing among agents can also enhance overall understanding.&lt;/p&gt;
 &lt;h3&gt;7. Quantitative and qualitative performance metrics&lt;/h3&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Top-7-call-center-agent-performance-metrics-to-track"&gt;Accurately measuring and analyzing contact center performance&lt;/a&gt; is essential for continuous improvement. Traditional metrics often don't fully capture the quality of customer interactions or agent performance since measuring customer satisfaction can often be subjective.&lt;/p&gt;
 &lt;p&gt;Adopting a comprehensive set of KPIs that include quantitative &lt;i&gt;and&lt;/i&gt; qualitative metrics can provide a more accurate picture of performance. Incorporating customer feedback and sentiment analysis into performance reviews can also provide valuable insights and a more holistic view of contact center effectiveness.&lt;/p&gt;
 &lt;h3&gt;8. Data access vs. protection&lt;/h3&gt;
 &lt;p&gt;Contact centers store and handle sensitive customer information, making data security a foundational requirement for customer trust rather than a secondary compliance concern. As the types and frequency of interactions increase, breaches are becoming more frequent and consequential, leading to significant financial and reputational damage. More sophisticated deep fakes are rendering voice recognition ineffective as a method of customer verification.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/Call-center-security-best-practices-to-protect-customer-data"&gt;Implementing comprehensive cybersecurity measures&lt;/a&gt;, including encryption, multifactor authentication, and regular security audits, safeguard customer data. Sensitive customer data can be better protected through advanced security protocols, security tools such as system scanners with &lt;a href="https://www.techtarget.com/searchcustomerexperience/tip/How-to-train-agents-on-call-center-fraud-detection"&gt;data loss prevention, and fraud detection&lt;/a&gt;. Most companies need to adopt zero trust architectures and principles, and agents need to be trained on data protection protocols. It should be standard practice to have a culture of security awareness, including periodic companywide security training.&lt;/p&gt;
 &lt;p&gt;Across these challenges, AI increasingly acts as both a solution and a source of new complexity, raising the bar for data quality, governance and trust in contact center operations.&lt;/p&gt;
 &lt;figure class="main-article-image full-col" data-img-fullsize="https://www.techtarget.com/rms/onlineImages/crm-contact_centers.jpg"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineImages/crm-contact_centers_mobile.jpg" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineImages/crm-contact_centers_mobile.jpg 960w,https://www.techtarget.com/rms/onlineImages/crm-contact_centers.jpg 1280w" alt="Multifunctional contact centers" height="288" width="559"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Contact centers are evolving into complex facilities that meet business and customer needs.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;                                 
&lt;section class="section main-article-chapter" data-menu-title="Build on flexibility, scalability and humanity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Build on flexibility, scalability and humanity&lt;/h2&gt;
 &lt;p&gt;Addressing contact center challenges requires more than incremental tooling changes. As customer expectations rise and AI reshapes service interactions, contact centers must balance efficiency with empathy, automation with oversight, and data access with security. Organizations that approach these challenges strategically -- rather than tactically -- are better positioned to turn their contact centers into long-term assets rather than ongoing cost centers.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&lt;/b&gt;&lt;i&gt;&amp;nbsp;This article has been updated to reflect the changing nature of modern contact center challenges.&lt;/i&gt;&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Jerald Murphy is senior vice president of research and consulting at Nemertes Research. He has more than three decades of technology experience, including neural networking research, integrated circuit design, computer programming, global data center designing and CEO of a managed services company.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Modern contact centers face persistent challenges around customer expectations, staffing and data access. Addressing them requires more than incremental operational fixes.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/chatbot_g1250576636.jpg</image>
            <link>https://www.techtarget.com/searchcustomerexperience/tip/Contact-center-challenges-and-how-to-overcome-them</link>
            <pubDate>Wed, 11 Feb 2026 00:00:00 GMT</pubDate>
            <title>8 contact center challenges and how to address them</title>
        </item>
        <item>
            <body>&lt;p&gt;Organizations often frame network modernization initiatives as mere IT upgrades. However, in reality, they are essential business continuity imperatives that drive improved services and reduced risks.&lt;/p&gt; 
&lt;p&gt;This article evaluates the business case for network modernization. It addresses the risks of legacy network components, protocols and processes, and examines key technologies driving network modernization.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The risks of legacy networks"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The risks of legacy networks&lt;/h2&gt;
 &lt;p&gt;Organizations sometimes continue to use legacy network components and services to support business processes long after their standard lifecycle indicates they &lt;a href="https://www.techtarget.com/searchnetworking/tip/5-steps-to-achieve-network-infrastructure-modernization"&gt;should be retired&lt;/a&gt;. These legacy systems severely limit scalability, visibility and responsiveness. They also add significant friction to automating hybrid and cloud-based environments.&lt;/p&gt;
 &lt;p&gt;Specific risks of legacy networking include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchnetworking/feature/The-effects-of-network-downtime-and-ways-to-fix-it"&gt;Network downtime&lt;/a&gt; due to hardware failure.&lt;/li&gt; 
  &lt;li&gt;Poor performance due to limited hardware, out-of-date drivers and slow media.&lt;/li&gt; 
  &lt;li&gt;Difficult monitoring and troubleshooting capabilities.&lt;/li&gt; 
  &lt;li&gt;Inability to support digital transformation initiatives.&lt;/li&gt; 
  &lt;li&gt;Critical security exposure that modern components already address.&lt;/li&gt; 
  &lt;li&gt;Limited observability.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These risks and limitations manifest in common, real-world enterprise scenarios such as outages during peak demand, failed disaster recovery, ransomware attacks and data exfiltration.&lt;/p&gt;
 &lt;p&gt;These concerns translate into severe financial, reputational and operational negatives, something few organizations can ignore in today's flexible marketplace and compliance-aware economy.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Technologies driving network modernization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Technologies driving network modernization&lt;/h2&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/opinion/The-top-5-predictions-for-networking-technology-trends-in-2020"&gt;Established and emerging technologies&lt;/a&gt; drive network capabilities, offering faster recovery, simplified management, automated scalability and comprehensive resilience. Modern technologies offer essential improvements.&lt;/p&gt;
 &lt;p&gt;Key technology examples include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Software-defined networking.&lt;/li&gt; 
  &lt;li&gt;Network as a service.&lt;/li&gt; 
  &lt;li&gt;Edge-based networking.&lt;/li&gt; 
  &lt;li&gt;Cloud-based networking.&lt;/li&gt; 
  &lt;li&gt;Network automation.&lt;/li&gt; 
  &lt;li&gt;AI-driven monitoring and management.&lt;/li&gt; 
  &lt;li&gt;Zero-trust and modern security frameworks.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;When implementing these technologies, organizations should aim to shift away &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Move-from-reactive-to-predictive-cloud-management-with-AI"&gt;from reactive to proactive operations&lt;/a&gt; that identify and prevent issues before they occur. This isn't an IT project, but a strategic goal that establishes network modernization as a business enabler rather than a cost center.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Best practices for network modernization"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Best practices for network modernization&lt;/h2&gt;
 &lt;p&gt;As organizations begin to modernize their networks, it's important to establish guidelines to achieve the best results. Best practices organizations can follow include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Align network strategies -- including modernization -- with business objectives.&lt;/li&gt; 
  &lt;li&gt;Include network modernization in &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/How-to-maintain-network-continuity-in-a-DR-strategy"&gt;continuity planning&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Prioritize security, automation and cloud readiness.&lt;/li&gt; 
  &lt;li&gt;Encourage collaboration between executive leadership and IT teams.&lt;/li&gt; 
  &lt;li&gt;Standardize and simplify the network environment.&lt;/li&gt; 
  &lt;li&gt;Integrate security throughout the network lifecycle.&lt;/li&gt; 
  &lt;li&gt;Invest in IT skills development and talent retention.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Network modernization for business continuity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Network modernization for business continuity&lt;/h2&gt;
 &lt;p&gt;Once organizations tie network modernization directly to operational agility and resilience, the benefits become apparent.&lt;/p&gt;
 &lt;p&gt;Modern network services, components and performance support uninterrupted productivity during peak periods and crises through &lt;a target="_blank" href="https://blog.ipspace.net/2020/11/fast-failover-challenge/" rel="noopener"&gt;faster failover&lt;/a&gt;, improved visibility and adaptive performance. These capabilities are foundational to long-term continuity planning and enterprise risk management. They are also essential to general business operations.&lt;/p&gt;
 &lt;p&gt;Partner network architects with executive leadership to position network modernization as a strategic imperative and competitive advantage rather than a one-time project.&lt;/p&gt;
 &lt;p&gt;It's essential to translate technical benefits into business outcomes -- reduced operational risk, improved productivity and long-term cost efficiency -- to secure alignment, funding and organizational momentum. Conduct a &lt;a href="https://www.techtarget.com/searchcloudcomputing/tutorial/How-to-perform-an-application-modernization-assessment"&gt;modernization readiness assessment&lt;/a&gt; that evaluates resilience, scalability, security and recovery capabilities in the context of modern business requirements.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to TechTarget Editorial, The New Stack and CompTIA Blogs.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Network modernization is a business continuity imperative, reducing risks from legacy systems while boosting performance, security and operational resilience.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/strategy_a249685661.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/Why-network-modernization-is-crucial-for-business-continuity</link>
            <pubDate>Wed, 04 Feb 2026 11:30:00 GMT</pubDate>
            <title>Why network modernization is crucial for business continuity</title>
        </item>
        <item>
            <body>&lt;p&gt;Whether people believe in AI or not, nearly everyone agrees that AI requires high-quality data.&lt;/p&gt; 
&lt;p&gt;AI models must have access to high-quality data for training and inference. As IT organizations apply AI to infrastructure and operations, they find that bad data can shatter their AI hopes and dreams.&lt;/p&gt; 
&lt;p&gt;Enterprises Management Associates recently found hard evidence that supports this truism. We &lt;a target="_blank" href="https://www.enterprisemanagement.com/product/ai-driven-netops-how-enterprises-are-embracing-intelligent-network-management-solutions-2/" rel="noopener"&gt;surveyed&lt;/a&gt; 458 IT professionals about their efforts to apply AI to network operations. Only 44% were confident that the quality of their network data would support these efforts.&lt;/p&gt; 
&lt;p&gt;This confidence gap should not be ignored. EMA research found that low confidence in network data correlated with lower rates of the following criteria:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;User adoption of AI tools.&lt;/li&gt; 
 &lt;li&gt;User trust in AI tools.&lt;/li&gt; 
 &lt;li&gt;ROI expectations for AI tools.&lt;/li&gt; 
 &lt;li&gt;Rates of overall success with AI-driven NetOps.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;section class="section main-article-chapter" data-menu-title="How packets and config data limit AI"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How packets and config data limit AI&amp;nbsp;&lt;/h2&gt;
 &lt;p&gt;IT organizations generally maintain a wide variety of data about their networks. In EMA's experience, these data stores are generally disorganized. They are siloed, often proprietary and sometimes of dubious quality. However, certain classes of data are particularly challenging to &lt;a href="https://www.techtarget.com/searchnetworking/feature/How-AI-in-the-NOC-will-transform-network-operations"&gt;AI-driven NetOps&lt;/a&gt; ambitions -- packets and config data.&lt;/p&gt;
 &lt;p&gt;A deep analysis of EMA survey data revealed that data confidence is particularly low in enterprises that consider configuration data and packets as essential to their AI-driven NetOps projects. In other words, a strategic focus on config and packet data leads to failure.&lt;/p&gt;
 &lt;p&gt;EMA suspects that this is a &lt;a href="https://www.informationweek.com/data-management/11-irritating-data-quality-issues"&gt;data quality issue&lt;/a&gt;. IT organizations must improve their approach to acquiring, managing and using this data.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Do better than ad hoc packet capture"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Do better than ad hoc packet capture&lt;/h2&gt;
 &lt;p&gt;Many organizations take an ad hoc approach to packet capture. They collect packets only in reaction to events that require deep analysis. This data capture might be triggered by an event or engineers might manually capture the data. In either case, it leads to an incomplete record of traffic.&lt;/p&gt;
 &lt;p&gt;Continuous packet capture is a better approach. It should also be done systematically, where packets are gathered from strategic points on the networks. Ad hoc capture typically occurs in one location relevant to a specific investigation.&lt;/p&gt;
 &lt;p&gt;Furthermore, packets are expensive to capture and store. Network teams should consider using metadata derived from these packets. AI tools need access to raw packets for &lt;a href="https://www.techtarget.com/searchnetworking/tutorial/Examine-a-captured-packet-using-Wireshark"&gt;forensic analysis&lt;/a&gt;, but packet metadata is valuable across a variety of AI use cases. Network teams should use packet visibility tools that can generate rich metadata.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Adopt a source of truth for configs"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Adopt a source of truth for configs&lt;/h2&gt;
 &lt;p&gt;As an analyst who focuses on network infrastructure and operations, I have heard many horror stories about config data chaos.&lt;/p&gt;
 &lt;blockquote class="main-article-pullquote"&gt;
  &lt;div class="main-article-pullquote-inner"&gt;
   &lt;figure&gt;
    If you have a multi-vendor network and use multiple network tools to manage it, I guarantee you have a data problem.
   &lt;/figure&gt;
   &lt;i class="icon" data-icon="z"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/blockquote&gt;
 &lt;p&gt;A network architect at a global pharmaceutical company once told me that none of his 1,000 routers were compliant with his company's config standards. Each router had &lt;a href="https://www.networkcomputing.com/network-management/preventing-network-outages-in-complex-enterprise-environments"&gt;unique deviations&lt;/a&gt; from the golden config. He had a network automation tool that could fix the issue, but he wasn't allowed to push a global change, so the routers remained 1,000 unique snowflakes.&lt;/p&gt;
 &lt;p&gt;Another network architect told me his company didn't have any configuration standards on its network. When it was time for him to &lt;a target="_blank" href="https://www.enterprisemanagement.com/product/the-network-source-of-truth-how-engineering-teams-establish-and-use-these-critical-tools-2/" rel="noopener"&gt;establish a source of truth&lt;/a&gt; for his network configuration, he ran a discovery tool that pulled config files from every device. His assumption was that the network's state was the intended standard. However, the next step of his process was to validate the config reality against business application priorities, security policies and compliance requirements. He quickly discovered that the product network was not aligned with any of these requirements.&lt;/p&gt;
 &lt;p&gt;One theme across the two examples above is complexity. Establishing a good data store of config information is a long and painful project, but it must be done if config data is strategic to your goals for agentic operations.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Next steps for agentic AI data management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Next steps for agentic AI data management&lt;/h2&gt;
 &lt;p&gt;Agentic NetOps has a data problem. If you have a multi-vendor network and use multiple network tools to manage it, I guarantee you have a data problem. It might not be purely about packets or config data -- the landmines could be anywhere, and you're probably already aware of many of them.&lt;/p&gt;
 &lt;p&gt;My analysis of EMA's survey data revealed five steps network professionals can take to correct this course.&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Know why you're adopting AI. &lt;/b&gt;EMA data shows a clear correlation between understanding the business value of AI-driven NetOps and confidence in network data. Know why you're doing this. Get buy-in from the data owners and ensure the data is correct.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Spend.&lt;/b&gt; Budget limitations correlate strongly with data uncertainty. Your organization will need to invest in tools and expertise to discover, audit, clean and organize this data.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Establish or work with an AI center of excellence.&lt;/b&gt; Knowing how to evaluate AI tools is essential to success, and confidence in evaluation capabilities correlates strongly with data confidence. As you evaluate tools, you'll see how they work with network data.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Demand openness, support of industry standards and deep integration from vendors&lt;/b&gt;. Data quality problems hide in the dark. Integrations and open standards light up that darkness.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Request AI vendors offer tools to continuously audit and verify AI outcomes.&lt;/b&gt; This builds trust in AI tools, but it should also help you identify any &lt;a href="https://www.techtarget.com/searchenterpriseai/tip/How-to-identify-and-manage-AI-model-drift"&gt;data quality drift&lt;/a&gt;.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;&lt;i&gt;Shamus McGillicuddy is vice president of research for the network management practice at Enterprise Management Associates (EMA). He has more than 20 years of experience in the IT industry and has written extensively about the network infrastructure market. Prior to joining EMA, McGillicuddy was the news director for Informa TechTarget's SearchNetworking site.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>EMA's NetOps survey finds only 44% trust their network data for AI. Packet and config data create major risk, so teams must standardize, invest and audit.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/maze_g824298136.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/post/Data-quality-gaps-undermine-the-promise-of-agentic-NetOps</link>
            <pubDate>Tue, 27 Jan 2026 14:15:00 GMT</pubDate>
            <title>Data quality gaps undermine the promise of agentic NetOps</title>
        </item>
        <item>
            <body>&lt;p&gt;5G's high-performance, low-latency wireless connectivity is steadily integrating with and being intelligently managed by SD-WAN architectures. The result is flexible, high-capacity, and application-aware WANs for distributed enterprises, despite challenges in availability and initial cost.&lt;/p&gt; 
&lt;p&gt;5G is profoundly shaping WAN services by offering wireless connectivity with performance characteristics -- including high speed, ultra-low latency and massive connection density -- that rival or surpass traditional wired connections like broadband and MPLS. This enables a fundamental shift in how organizations build and operate their WANs, primarily by accelerating the adoption of wireless WAN and integrating tightly with software-defined WAN (SD-WAN) architectures.&lt;/p&gt; 
&lt;p&gt;Organizations now use 5G as a reliable primary or secondary WAN link for fixed locations, providing rapid deployment -- for temporary or pop-up sites, for example -- and resilience. Meanwhile, 5G's low latency and high capacity unlock new enterprise use cases at the edge, such as advanced IoT, real-time &lt;a href="https://www.techtarget.com/searchdatacenter/definition/edge-computing"&gt;edge computing&lt;/a&gt; and high-quality mobile workforce connectivity. Features like &lt;a href="https://www.techtarget.com/whatis/definition/network-slicing"&gt;network slicing&lt;/a&gt; promise tailored performance and security for diverse applications.&lt;/p&gt; 
&lt;p&gt;The market for integrated 5G and SD-WAN isn't tracked as a single metric, but its growth is undoubtedly a major accelerator of the SD-WAN market, which was estimated to be worth $7.1 billion in 2025, according to Future Market Insights.&lt;/p&gt; 
&lt;p&gt;The market direction is one of strong and rapid expansion, with the overall SD-WAN sector projected to grow at a compound annual growth rate exceeding 31% in the next decade. This significant growth is directly driven by using 5G for both primary and diverse backup connectivity that enables high-performance, flexible and rapidly deployed branch and edge networks.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Power couple: The potential role of SD-WAN in enterprise 5G"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Power couple: The potential role of SD-WAN in enterprise 5G&lt;/h2&gt;
 &lt;p&gt;The role of SD-WAN in 5G networks has significantly matured from a simple pairing to today's critical, integrated platform. The benefits have advanced from nice-to-have resilience to must-have performance for distributed enterprises.&lt;/p&gt;
 &lt;p&gt;The core function remains SD-WAN's intelligent management of multiple links, but its capabilities have evolved to directly take advantage of 5G's advanced features in the following ways:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Becoming a primary WAN fabric.&lt;/b&gt; SD-WAN is now routinely used to orchestrate 5G as the primary, high-bandwidth connection for fixed branch offices, such as retail, quick-service restaurants and remote sites, often replacing costly MPLS or serving as a superior alternative to basic broadband. It's all powered by the wire-like performance of midband (C-band) 5G and SD-WAN's ability to ensure zero-touch provisioning over cellular for fast, scalable deployment.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Convergence to SASE.&lt;/b&gt; The 5G SD-WAN combination is now largely framed within the secure access service edge (&lt;a href="https://www.techtarget.com/searchnetworking/definition/Secure-Access-Service-Edge-SASE"&gt;SASE&lt;/a&gt;) architecture, which unifies and simplifies network and security management in a SaaS platform. The SD-WAN function manages the high-performance 5G transport, while integrated security services, such as zero-trust network access (&lt;a href="https://www.techtarget.com/searchnetworking/tip/The-basics-of-zero-trust-network-access-explained"&gt;ZTNA&lt;/a&gt;), secure the traffic, which is essential for the hybrid workforce and massive numbers of IoT devices connecting over 5G.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Application-specific slicing.&lt;/b&gt; The growing ability of "5G-aware" SD-WAN to integrate with 5G standalone (&lt;a href="https://www.techtarget.com/searchnetworking/definition/5G-standalone-5G-SA"&gt;5G SA&lt;/a&gt;) network slicing is a major evolution. It enables the SD-WAN controller to classify traffic, such as real-time industrial automation data or remote surgery telemetry, and dynamically steer it onto a dedicated 5G slice that assures specific, mission-critical quality of service (QoS) for ultra-low latency or high reliability.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Enabling edge computing.&lt;/b&gt; The low latency of 5G combined with SD-WAN can help accelerate edge computing implementations. SD-WAN directs traffic to the nearest edge computing location for processing, further reducing the round-trip time for applications such as connected vehicles, real-time analytics for oil and gas fields, and AI-driven factory operations.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;figure class="main-article-image half-col" data-img-fullsize="https://www.techtarget.com/rms/onlineimages/networking-brave_new_world_5G.png"&gt;
  &lt;img data-src="https://www.techtarget.com/rms/onlineimages/networking-brave_new_world_5G_half_column_mobile.png" class="lazy" data-srcset="https://www.techtarget.com/rms/onlineimages/networking-brave_new_world_5G_half_column_mobile.png 960w,https://www.techtarget.com/rms/onlineimages/networking-brave_new_world_5G.png 1280w" alt="5G and SD-WAN benefits" height="375" width="279"&gt;
  &lt;figcaption&gt;
   &lt;i class="icon pictures" data-icon="z"&gt;&lt;/i&gt;Together, 5G and SD-WAN can bring reliable connectivity to branch offices and remote employees.
  &lt;/figcaption&gt;
  &lt;div class="main-article-image-enlarge"&gt;
   &lt;i class="icon" data-icon="w"&gt;&lt;/i&gt;
  &lt;/div&gt;
 &lt;/figure&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5G and SD-WAN synergy: Benefits of using them together"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G and SD-WAN synergy: Benefits of using them together&lt;/h2&gt;
 &lt;p&gt;SD-WAN is rapidly becoming the standard technology for organizations seeking to intelligently manage and steer traffic across multiple WAN links. It can enhance the security, reliability and performance of internet connections, enabling organizations to increase their WAN bandwidth capacity while keeping costs reasonable.&lt;/p&gt;
 &lt;p&gt;SD-WAN functionality continues to evolve, extending its capabilities beyond the WAN to areas including LAN and Wi-Fi. Furthermore, native security features are advancing to reduce the attack surface alongside continuous improvement in traffic management. As telecom providers introduce comprehensive software-defined branch services, they can offer organizations end-to-end traffic visibility that spans from the user device and LAN all the way through the WAN to the cloud environment.&lt;/p&gt;
 &lt;p&gt;In addition, high-speed 5G connections provide IT organizations with another flexible WAN option to integrate into their SD-WAN architecture. 5G is valued for being simple and quick to provision, offering crucial link diversity that helps protect against physical cable disruptions, such as outages caused by cable cuts. 5G presents a cableless alternative to traditional transports, such as MPLS, DSL and broadband cable, that is often easier to purchase, deploy and manage.&lt;/p&gt;
 &lt;p&gt;A core advantage of SD-WAN is its capacity for simple, unified management of different network links for purposes such as redundancy, load balancing and traffic segmentation. Beyond its role as a primary WAN transport, 5G can also serve as an out-of-band management capability, ensuring access to network resources via external means.&lt;/p&gt;
 &lt;p&gt;The integration of 5G and SD-WAN provides a suite of advantages for modern networking, beginning with easy link provisioning and reasonable cost. This combination offers crucial connectivity diversity for both branch offices and work-from-home locations while delivering enhanced link redundancy and QoS. Organizations can employ active-active connections with performance characteristics -- specifically bandwidth and latency -- that are comparable to those of traditional MPLS. Furthermore, the combined architecture can enable better application performance through network slicing, alongside improved security, visibility and traffic management. Finally, it offers integral support for edge computing environments and more functionality for remote sites.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/QZCmsHdMwdg?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Downsides of 5G and SD-WAN"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Downsides of 5G and SD-WAN&lt;/h2&gt;
 &lt;p&gt;The primary obstacles for organizations wanting to use 5G wireless technology for SD-WAN connectivity are availability and cost. Carrier deployment schedules remain a significant concern, as many organizations might find that 5G rollout timelines don't align with their needs. The lack of consistent availability forces some businesses to hold off on adoption or explore other options while waiting for carriers to expand into their required areas of operation. However, the broadening availability of 5G SA is driving improvement in this area.&lt;/p&gt;
 &lt;p&gt;Even where 5G is available, performance can be a letdown. Customers are sometimes disappointed with signal strength because 5G signals often struggle to penetrate building obstructions, such as concrete walls. To overcome this, businesses might need to invest in a retrofit, adding external antennas to their networking closets, which can introduce an unexpected build-out expense.&lt;/p&gt;
 &lt;p&gt;The initial cost of 5G can reduce the anticipated savings. Like any new technology, high starting prices help operators offset their large capital and operational expenditures. As a result, organizations that adopt 5G early, with the goal of reducing WAN costs, might be disappointed. Many organizations are choosing to wait until increased competition among carriers drives down the cost of enterprise-grade, fixed 5G connectivity.&lt;/p&gt;
 &lt;p&gt;Another challenge is the lack of vendor consistency, as not all SD-WAN providers sell a fully unified offering that integrates 5G connectivity, which forces organizations to piece together disparate hardware and management tools. Such complexity makes deployment and long-term network management more difficult compared with using a single, cohesive SD-WAN platform.&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="5G and SD-WAN key use cases"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G and SD-WAN key use cases&lt;/h2&gt;
 &lt;p&gt;Mature use cases fall into the following three categories:&lt;/p&gt;
 &lt;ol type="1" start="1" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Manufacturing and automation.&lt;/b&gt; 5G's reliable, low-latency connections are used for factory automation, with SD-WAN steering critical operational technology traffic into a guaranteed network slice to ensure real-time control and monitoring.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hybrid and remote work.&lt;/b&gt; The 5G SD-WAN combination is a mature networking option for high-performance, secure home offices. SD-WAN devices in homes and remote locations use 5G as an always-on, high-speed connection, ensuring business-critical applications such as VoIP and video conferencing are prioritized, secured via ZTNA and dynamically routed for the best performance.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Fleet mobility.&lt;/b&gt; Ruggedized SD-WAN appliances with multi-SIM 5G connectivity are becoming the standard for logistics, emergency services and connected farms, providing reliable, high-bandwidth connections on the move, with dynamic carrier switching for uninterrupted service.&lt;/li&gt; 
 &lt;/ol&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="Recommendations for IT leaders"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Recommendations for IT leaders&lt;/h2&gt;
 &lt;p&gt;As 5G services become more widespread and as carriers broaden their unlimited data plans, the role of cellular wireless in SD-WAN will shift in a positive direction. While most organizations currently use wireless only as a backup circuit during outages of primary wired connections or drops in performance, 5G is poised to become a strong, primary alternative for SD-WAN connectivity.&lt;/p&gt;
 &lt;p&gt;IT leaders should take note of the successful integration of 4G and 5G already demonstrated by SD-WAN vendors. They should consider 5G for pop-up or temporary locations and, as unlimited data plans materialize, include it as a serious option in their connectivity packages alongside traditional links such as MPLS and internet broadband.&lt;/p&gt;
&lt;/section&gt;   
&lt;section class="section main-article-chapter" data-menu-title="What's next for 5G and SD-WAN?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What's next for 5G and SD-WAN?&lt;/h2&gt;
 &lt;p&gt;As 5G technology expands and becomes increasingly available and reliable, it offers new possibilities for SD-WAN branch connectivity. Businesses are actively exploring how to take advantage of 5G's high speeds and low latency, particularly for real-time and latency-sensitive applications such as voice and video unified communications. Over time, remote offices can adopt 5G services as their primary connectivity link, reserving a traditional wired medium for backup or to offload data that isn't sensitive to latency.&lt;/p&gt;
 &lt;p&gt;Moreover, the 5G SD-WAN combination is expected to see far greater use in temporary and mobile scenarios. The combination provides the reliable connectivity needed for applications like freight asset tracking and setting up networks quickly for special events.&lt;/p&gt;
 &lt;p&gt;Over the next 12 months, organizations can improve their implementation of 5G with SD-WAN by following a secure, managed hybrid strategy and by integrating 5G as a high-speed link alongside wired connections while consolidating security into a single platform, such as SASE. They must actively optimize traffic steering policies to use 5G's low latency for applications like real-time voice and video, ensuring the SD-WAN fabric dynamically manages performance based on application needs rather than link type.&lt;/p&gt;
 &lt;p&gt;Finally, IT decision-makers should pilot 5G in specific use cases, such as pop-up sites or remote assets, to measure its true signal reliability and cost-effectiveness before committing to a wide-scale rollout to minimize unforeseen installation and performance issues.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Ron Westfall is vice president and practice leader for infrastructure and networking at HyperFRAME Research, where he covers topics such as hybrid cloud, AI, security, edge computing, wired and wireless networking, 5G and IoT.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>5G's performance advantages and improved integration with SD-WAN make the combination an increasingly powerful and affordable networking option for distributed enterprises.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g1294273513.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/5G-and-SD-WAN-pair-is-a-game-changer-for-branch-connectivity</link>
            <pubDate>Tue, 20 Jan 2026 09:00:00 GMT</pubDate>
            <title>How 5G and SD-WAN work together to empower enterprises</title>
        </item>
        <item>
            <body>&lt;p&gt;For more than three decades, the Simple Network Management Protocol has remained a foundational component of network operations. Its longevity is not accidental. SNMP emerged in the late 1980s as a practical answer to an urgent need for a simple, vendor-neutral way to manage rapidly growing IP networks.&lt;/p&gt; 
&lt;p&gt;The Internet Engineering Task Force has upgraded SNMP three times to keep pace with evolving technical, security and business requirements.&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;SNMPv1.&lt;/b&gt; Offered lightweight request-response models with basic failure and performance monitoring, but suffered from security concerns.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;SNMPv2.&lt;/b&gt;&amp;nbsp; Offered enhanced error handling, added the ability to handle higher-speed links, and improved scalability and performance.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;SNMPv3.&lt;/b&gt; Introduced a security-oriented architecture with user authentication, encryption and granular access control.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Despite frequent claims that SNMP is a legacy protocol, modern deployments tell a different story. &lt;a target="_blank" href="https://datatracker.ietf.org/wg/snmpv3/documents/" rel="noopener"&gt;SNMPv3&lt;/a&gt; integrates with security-sensitive environments and cloud-based network management platforms. It continues its role as a lowest-common-denominator telemetry layer that underpins many modern observability platforms.&lt;/p&gt; 
&lt;p&gt;Understanding why companies continue to use SMMP clarifies why it's not obsolete; rather, it's a mature, proven and vendor-neutral tool that lets enterprises maintain visibility, retain resilience and make informed decisions in today's complex operating environments.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Modern SNMP capabilities and technical maturity"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Modern SNMP capabilities and technical maturity&lt;/h2&gt;
 &lt;p&gt;SNMP lets organizations oversee device discovery, configuration monitoring, fault detection and performance trending across routers, switches, servers and IoT devices. Most enterprise-grade infrastructure components &lt;a href="https://www.techtarget.com/searchnetworking/tip/4-categories-of-network-monitoring"&gt;expose rich operational data&lt;/a&gt; through SNMP without forcing users to rely on proprietary agents or tooling.&lt;/p&gt;
 &lt;p&gt;Security is a key driver of SNMP's evolution, particularly with SNMPv3. It offers strong authentication, message integrity and optional Data Encryption Standard or Advanced Encryption Standard encryption. Through access control lists and role-based access control, organizations can define who can view or modify specific objects.&lt;/p&gt;
 &lt;p&gt;Isolated management planes help separate SNMP monitoring traffic from production traffic. These improvements enable SNMP to operate effectively in today's regulated and &lt;a href="https://www.techtarget.com/searchnetworking/feature/Choosing-ZTNA-vendors-amid-zero-trust-confusion"&gt;zero-trust network environments&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;While security is crucial, SNMPv3's evolution also includes performance enhancements that enable it to keep pace with modern network scalability and management requirements. Enhancements include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Optimized device polling.&lt;/li&gt; 
  &lt;li&gt;Bulk configuration options.&lt;/li&gt; 
  &lt;li&gt;Multi-gigabit and terabit interface support.&lt;/li&gt; 
  &lt;li&gt;Event-driven traps.&lt;/li&gt; 
  &lt;li&gt;Reduced overhead.&lt;/li&gt; 
  &lt;li&gt;Large device inventory support.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;That said, SNMP isn't a singular or isolated deployment. Instead, it integrates with modern network management and observability platforms. Cloud-based network monitoring tools, API-driven dashboards and centralized analytics engines consume SNMP metrics alongside logs and other streaming telemetry to build alerting pipelines, trigger automated responses and &lt;a href="https://www.techtarget.com/searchitoperations/tip/Top-AIOps-use-cases-and-challenges"&gt;inform AIOps platforms.&lt;/a&gt;&lt;/p&gt;
 &lt;p&gt;SNMP isn't a legacy protocol, but a strategic source of operational intelligence.&lt;/p&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="Why SNMP still matters today"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why SNMP still matters today&lt;/h2&gt;
 &lt;p&gt;Even as enterprises add modern observability and AIOps platforms, SNMP remains a compelling proposition. Reasons for SNMP's continued usage include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Compatibility.&lt;/li&gt; 
  &lt;li&gt;Neutrality.&lt;/li&gt; 
  &lt;li&gt;Efficiency.&lt;/li&gt; 
  &lt;li&gt;Flexibility&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Compatibility&lt;/h3&gt;
 &lt;p&gt;The most essential component of SNMP's continued relevance is its universal device compatibility. Nearly every type of network infrastructure device supports SNMP in some form. This broad coverage provides a single, consistent telemetry plane for collecting operational data without deploying agents or adopting device-specific -- and often proprietary -- tools.&lt;/p&gt;
 &lt;h3&gt;Neutrality&lt;/h3&gt;
 &lt;p&gt;As an open, vendor-neutral standard, SNMP enables organizations to avoid lock-in with specific agents or closed monitoring systems, offering long-term stability and portability. This compatibility gives organizations greater freedom in their procurement decisions.&lt;/p&gt;
 &lt;h3&gt;Efficiency&lt;/h3&gt;
 &lt;p&gt;SNMP delivers clear operational advantages. Its lightweight design minimizes network overhead, which makes it well-suited for large-scale and distributed deployments. It offers predictable, well-documented and mature tooling. It is also familiar to many network professionals, some of whom have worked with it for decades.&lt;/p&gt;
 &lt;p&gt;SNMP's maturity translates directly into several advantages, including:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Easier integrations with legacy and cutting-edge technologies.&lt;/li&gt; 
  &lt;li&gt;Quicker onboarding for new network administrators.&lt;/li&gt; 
  &lt;li&gt;Existing documentation and best practices provide battle-tested deployment guidelines.&lt;/li&gt; 
  &lt;li&gt;Faster troubleshooting with fewer surprises or unanticipated situations.&lt;/li&gt; 
  &lt;li&gt;Lower operational risk with greater flexibility.&lt;/li&gt; 
  &lt;li&gt;Greater cost-effectiveness and ROI than proprietary tools.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Flexibility&lt;/h3&gt;
 &lt;p&gt;SNMP isn't limited to on-premises deployments. It's uniquely effective in hybrid, edge and cloud-based settings. It also offers strong advantages in multi-vendor environments, where consistency and interoperability are crucial. SNMP is the common visibility layer across these otherwise fragmented architectures.&lt;/p&gt;
 &lt;p&gt;No discussion of tools is complete without acknowledging cost. While SNMP is not open source, it's an open standard, so there is no licensing fee to use SNMP. Any vendor or organization can implement it freely. SNMP is also free from vendor control, enabling organizations to avoid lock-in or expensive licensing.&lt;/p&gt;
 &lt;p&gt;Most network devices and server OSes support SNMP as part of their base firmware, which makes it one of the lowest-cost network monitoring tools available. If desired, organizations can choose to pay for more advanced monitoring platforms that offer enhanced management features and observability built on SNMP data collection.&lt;/p&gt;
&lt;/section&gt;               
&lt;section class="section main-article-chapter" data-menu-title="SNMP implementation in modern architectures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;SNMP implementation in modern architectures&lt;/h2&gt;
 &lt;p&gt;Expect to deploy SNMP across your organization's entire architecture, including enterprise, hybrid cloud, and SD-WAN and edge environments. Benefits include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Enterprise architectures&lt;/b&gt;. Serves as a reliable and consistent visibility layer across increasingly scalable, dynamic and distributed environments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Hybrid cloud deployments&lt;/b&gt;. Extends on-premises monitoring to cloud-adjacent platforms, including virtual appliances, VPN gateways and cloud-managed network services.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;SD-WAN and edge environments.&lt;/b&gt; Enables centralized monitoring of performance and fault data from branch devices without adding overhead and complexity.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Most organizations pair SNMP with complementary data sources -- among them &lt;a href="https://www.techtarget.com/searchnetworking/definition/streaming-network-telemetry"&gt;streaming telemetry&lt;/a&gt;, log data and network traffic flow records -- to build a complete picture that displays baselines and deviations.&lt;/p&gt;
 &lt;p&gt;SNMP's strengths revolve around providing structured, periodic measurements that anchor higher-volume, event-driven telemetry. Examples include device health, availability and interface traffic data. This monitoring supports incident detection, informs capacity planning and identifies long-term trends.&lt;/p&gt;
 &lt;p&gt;When incidents occur, SNMP &lt;a href="https://www.techtarget.com/searchsoftwarequality/tip/How-to-handle-root-cause-analysis-of-software-defects"&gt;simplifies root-cause analysis&lt;/a&gt;, distinguishing device, link and application-level issues to improve resolution times and reduce business disruptions. Its records are also useful for service-level agreement (SLA) audits.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Security best practices for SNMP"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Security best practices for SNMP&lt;/h2&gt;
 &lt;p&gt;Any comprehensive SNMP deployment must address security considerations. Extensive guidance is available to help administrators build an effective yet secure SNMP layer.&lt;/p&gt;
 &lt;p&gt;Standard SNMP security best practices include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Use SNMPv3 only, disabling any v2 and v1 functionality or backward compatibility on all devices. This configuration avoids the use of cleartext credentials.&lt;/li&gt; 
  &lt;li&gt;Enforce strong authentication and control credentials using a secrets manager.&lt;/li&gt; 
  &lt;li&gt;Enforce strong data encryption.&lt;/li&gt; 
  &lt;li&gt;Use role-based access to enforce the principle of least privilege, ensuring devices and administrators have only the permissions and access they require.&lt;/li&gt; 
  &lt;li&gt;Segment network traffic using dedicated management networks.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="The value of SNMP for organizational uptime"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The value of SNMP for organizational uptime&lt;/h2&gt;
 &lt;p&gt;Newer monitoring and observability technologies continue to emerge, but they often introduce additional layers of complexity, cost and operational risk. In contrast, SNMP provides a proven, predictable foundation offering core visibility and control across diverse environments.&lt;/p&gt;
 &lt;p&gt;Instead of competing with other observability approaches, SNMP complements them. It serves as a standard and well-understood data source for AI-driven analytics, AIOps platforms and systems that consume streaming telemetry. It is a critical component of long-term planning.&lt;/p&gt;
 &lt;p&gt;SNMP offers a significant business value by reducing the likelihood of costly outages and helping to avoid contractual penalties through the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Enhanced uptime through early fault detection.&lt;/li&gt; 
  &lt;li&gt;Greater service availability.&lt;/li&gt; 
  &lt;li&gt;Enhanced regulatory and SLA compliance.&lt;/li&gt; 
  &lt;li&gt;Proactive capacity management.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;SNMP's technical value centers on its inherent operational resilience. SNMP's pull-based model and simplicity keep it available when more complex monitoring and troubleshooting tools fail.&lt;/p&gt;
 &lt;p&gt;Reliability traits of SNMP include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;A lightweight, standardized design.&lt;/li&gt; 
  &lt;li&gt;Minimal failure points.&lt;/li&gt; 
  &lt;li&gt;Functions when more sophisticated systems fail based on its simple design&lt;/li&gt; 
  &lt;li&gt;Faster triage during significant outages or service failures.&lt;/li&gt; 
  &lt;li&gt;Supports data-driven decision-making under pressure.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;        
&lt;section class="section main-article-chapter" data-menu-title="SNMP's role in the modern network"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;SNMP's role in the modern network&lt;/h2&gt;
 &lt;p&gt;Due to its simplicity, standardization and cross-platform capabilities, SNMP provides leaders with multiple reasons to view it as a low-risk strategic investment that protects other investments.&lt;/p&gt;
 &lt;p&gt;SNMP also preserves operational continuity, provides a stable backbone for current and future technologies and stabilizes monitoring during other network transformation projects, such as data center refreshes, SD-WAN transitions, and hybrid and multi-cloud deployments.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to InformaTechTarget, The New Stack and CompTIA Blogs.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>The Simple Network Management Protocol is almost 40 years old. Despite its age, it remains essential today, ensuring efficient and reliable network management.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/toolGearArrow_g473747386.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/Why-SNMP-remains-relevant-in-enterprise-network-management</link>
            <pubDate>Thu, 15 Jan 2026 17:00:00 GMT</pubDate>
            <title>Why SNMP remains relevant in enterprise network management</title>
        </item>
        <item>
            <body>&lt;p&gt;Dynamic Host Configuration Protocol is a critical network function that enables virtually all IP business operations across on-premises, cloud, edge and IoT environments.&lt;/p&gt; 
&lt;p&gt;Network administrators use &lt;a href="https://www.techtarget.com/searchnetworking/tip/A-guide-to-Windows-DHCP-server-configuration"&gt;DHCP to allocate IP addresses&lt;/a&gt; to network devices. While most routers, switches, firewalls and servers have manually assigned, static IP addresses, DHCP handles IP addressing for the vast majority of network devices.&lt;/p&gt; 
&lt;p&gt;The reliability and resilience of a DHCP infrastructure are directly tied to business continuity, digital transformation and scalability. DHCP failures appear to be &lt;a href="https://www.techtarget.com/searchnetworking/feature/The-effects-of-network-downtime-and-ways-to-fix-it"&gt;network downtime&lt;/a&gt;, making them difficult, costly and time-consuming to identify root causes.&lt;/p&gt; 
&lt;p&gt;Examples of DHCP failure manifestations include the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Warehouse and sales workstations can't access the inventory database.&lt;/li&gt; 
 &lt;li&gt;Marketing and sales workstations can't access CRM tools.&lt;/li&gt; 
 &lt;li&gt;Service desk techs can't access the help desk ticketing system.&lt;/li&gt; 
 &lt;li&gt;Users cannot access file servers, printers, email or web resources.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Once businesses understand DHCP's critical role in network communication, it becomes impossible not to consider regularly assessing its health, security and availability. This article covers the business risks, technical evaluation, metrics and governance necessary to regularly review DHCP as a risk-reduction strategy.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The consequences of DHCP failures"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The consequences of DHCP failures&lt;/h2&gt;
 &lt;p&gt;Many organizations underestimate the effects of DHCP failures until they occur. DHCP is a simple and reliable service that has been battle-tested and is well-understood by administrators. Many approaches exist for minimizing failures, mitigating security risks and handling scalability. A solid annual review of the DHCP infrastructure helps ensure these approaches are in place, configured correctly and working as expected.&lt;/p&gt;
 &lt;p&gt;A major DHCP outage at a company headquarters or branch location could be catastrophic. &lt;a href="https://www.techtarget.com/searchnetworking/tip/How-to-configure-multiple-DHCP-scopes-on-one-Windows-server"&gt;DHCP servers maintain a pool of available IP addresses&lt;/a&gt; for client devices. Client systems request the temporary use, or &lt;i&gt;lease&lt;/i&gt;, of an address, thereby placing the client on the same network segment as the services it needs to access. The client renews this address configuration at regular intervals -- hourly, daily or weekly depending on the environment.&lt;/p&gt;
 &lt;p&gt;If client systems can't obtain or renew their IP address configuration, they default to a standard Automatic Private IP Address configuration on the 169.254.0.0 subnet, which likely prevents them from communicating with essential network services. These services include authentication, routing and &lt;a href="https://www.techtarget.com/searchnetworking/tip/The-role-of-name-resolution-in-networking"&gt;name resolution&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;Business consequences of these failures include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Email and collaboration system outages due to clients and servers losing network access.&lt;/li&gt; 
  &lt;li&gt;Loss of Internet connectivity for all affected employees and systems.&lt;/li&gt; 
  &lt;li&gt;Downtime for internal applications, such as HR, finance and CRM systems.&lt;/li&gt; 
  &lt;li&gt;Downtime for internal data operations, such as file access and printing.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Several operational and finance risks can accrue from these incidents, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Lost productivity and idle staff.&lt;/li&gt; 
  &lt;li&gt;Customer dissatisfaction.&lt;/li&gt; 
  &lt;li&gt;Increased help desk volume.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchnetworking/tip/Troubleshooting-a-DHCP-server"&gt;Troubleshooting time&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Potential regulatory or compliance exposure.&lt;/li&gt; 
  &lt;li&gt;Missed service-level agreements with resulting penalties.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;These consequences illustrate how critical DHCP is to an organization's daily operations.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="How to conduct an annual DHCP assessment"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;How to conduct an annual DHCP assessment&lt;/h2&gt;
 &lt;p&gt;The importance of an annual DHCP assessment is evident. The next question is how to conduct an efficient and comprehensive evaluation. Consider the following four steps to organize the task.&lt;/p&gt;
 &lt;h3&gt;1. Review network infrastructure and architecture&lt;/h3&gt;
 &lt;p&gt;Begin by understanding the existing DHCP infrastructure using the following checklist:&lt;/p&gt;
 &lt;ol class="default-list"&gt; 
  &lt;li&gt;Inventory all DHCP servers, including those that are on-premises, virtual and cloud-based.&lt;/li&gt; 
  &lt;li&gt;Identify DHCP services running on traditional servers -- Linux or Windows -- and on routers.&lt;/li&gt; 
  &lt;li&gt;Verify supported OS versions, patch levels and vendor support status.&lt;/li&gt; 
  &lt;li&gt;Review DHCP scope design, IP address utilization and subnet sizing.&lt;/li&gt; 
 &lt;/ol&gt;
 &lt;p&gt;It's crucial to assess existing DHCP scopes. Scopes contain a specified number of available addresses. For example, a branch office DHCP server might have a scope with 100 IP addresses. If an organization deploys 100 new tablets to employees at a branch office site to supplement their existing laptops, the scope will not have enough IP addresses to handle these devices. DHCP is directly tied to business agility and innovation.&lt;/p&gt;
 &lt;h3&gt;2. Validate configuration and policy&lt;/h3&gt;
 &lt;p&gt;Once the network team understands the infrastructure, it's time to evaluate DHCP's configuration. Check the following settings:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Audit lease times, reservations and exclusions for alignment with current uses.&lt;/li&gt; 
  &lt;li&gt;Validate DHCP options such as DNS servers, gateways and Network Time Protocol (NTP).&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchnetworking/tip/Configure-DHCP-failover-for-Windows-Server"&gt;Confirm DHCP failover&lt;/a&gt; and split-scope configurations for accuracy and functionality.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Inaccuracies in these settings affect client devices leasing IP addresses from the misconfigured DHCP server.&lt;/p&gt;
 &lt;h3&gt;3. Confirm security and access controls&lt;/h3&gt;
 &lt;p&gt;Security and access controls are critical to DHCP. Unauthorized changes to a network's IP address management can be catastrophic. Verify the following security configurations:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Review administrative access and role-based permissions.&lt;/li&gt; 
  &lt;li&gt;Check for protections against &lt;a href="https://www.techtarget.com/searchnetworking/tip/What-is-a-rogue-DHCP-server"&gt;rogue DHCP servers&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Validate &lt;a href="https://www.techtarget.com/searchwindowsserver/tutorial/Use-advanced-DHCP-logging-techniques-for-troubleshooting"&gt;DHCP logging&lt;/a&gt;, including centralization, auditability and access. Ensure these settings match security and compliance requirements.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;4. Evaluate operational readiness&lt;/h3&gt;
 &lt;p&gt;Standard testing ensures proper operational readiness and day-to-day functionality. Verify the following functionality and capabilities:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Test the &lt;a href="https://www.techtarget.com/searchDataBackup/tutorial/How-to-back-up-a-Windows-DHCP-server"&gt;DHCP database backup and restore functionality&lt;/a&gt;.&lt;/li&gt; 
  &lt;li&gt;Review change management and incident records from the past year.&lt;/li&gt; 
  &lt;li&gt;Confirm documentation accuracy and ownership.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;In addition to verifying existing operational readiness, evaluate the DHCP infrastructure's ability to support upcoming initiatives, expansions and general growth.&lt;/p&gt;
&lt;/section&gt;                 
&lt;section class="section main-article-chapter" data-menu-title="Monitor DHCP health indicators"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Monitor DHCP health indicators&lt;/h2&gt;
 &lt;p&gt;Evaluating the workload and trends surrounding DHCP enables administrators to predict service expansion and network coverage.&lt;/p&gt;
 &lt;p&gt;Key DHCP performance and configuration metrics include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Address scope utilization, including room for growth.&lt;/li&gt; 
  &lt;li&gt;Address scope exhaustion, indicating DHCP failed to grow with utilization.&lt;/li&gt; 
  &lt;li&gt;Lease request and renewal success and failure rates.&lt;/li&gt; 
  &lt;li&gt;DHCP server response time and error rates.&lt;/li&gt; 
  &lt;li&gt;Service tickets indicating that DHCP client devices receive incorrect DNS, NTP or other settings from DHCP servers.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Several measurement techniques are available to network professionals. They can typically rely on built-in or native tools, but &lt;a target="_blank" href="https://www.isc.org/dhcp-tools/" rel="noopener"&gt;external utilities&lt;/a&gt; also exist. Consider the following services:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Built-in dashboards and log files.&lt;/li&gt; 
  &lt;li&gt;SNMP, flow data and API-based telemetry.&lt;/li&gt; 
  &lt;li&gt;Client tests to validate real-world behavior.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Emphasize trend analysis during this phase to identify capacity or design risks before incidents occur. Many of these statistics can be tied back to standard business KPIs, such as uptime, mean time to repair and UX.&lt;/p&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Risk mitigation strategies for DHCP resilience"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Risk mitigation strategies for DHCP resilience&lt;/h2&gt;
 &lt;p&gt;DHCP offers numerous risk mitigation options that enable your organization to address potential issues before they become major outages. These mitigations are the same techniques you find with other essential network services.&lt;/p&gt;
 &lt;p&gt;Evaluate the following approaches to determine whether they are already in place or would help reduce risk in a DHCP infrastructure.&lt;/p&gt;
 &lt;p&gt;&lt;b&gt;Redundancy and high availability&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Establish active/active or active/passive DHCP failover configurations.&lt;/li&gt; 
  &lt;li&gt;Design distributed environments for DHCP coverage and HA.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Evaluate disaster recovery plans&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Establish documented recovery objectives for DHCP services, including Recovery Time Objective and Recovery Point Objective targets.&lt;/li&gt; 
  &lt;li&gt;Include DHCP in broader network disaster recovery planning.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Review alerting processes&lt;/b&gt;&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Integrate DHCP into centralized monitoring tied to standard network operations workflows.&lt;/li&gt; 
  &lt;li&gt;Generate proactive alerts for scope exhaustion, service stoppage and failover events.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;A resilient DHCP infrastructure directly reduces outage frequency and duration, helping organizations avoid costly and disruptive interruptions.&lt;/p&gt;
&lt;/section&gt;          
&lt;section class="section main-article-chapter" data-menu-title="Long-term planning for DHCP management"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Long-term planning for DHCP management&lt;/h2&gt;
 &lt;p&gt;DHCP is a business-critical service rather than a background utility. It must include formal governance, annual assessments and deliberate risk mitigation. Network leaders must consider DHCP health as part of business agility and risk discussions.&lt;/p&gt;
 &lt;p&gt;Recommended governance tasks include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Annual review cadence tied to resilience planning.&lt;/li&gt; 
  &lt;li&gt;&lt;a href="https://www.techtarget.com/searchnetworking/tutorial/Network-documentation-and-auditing"&gt;Clear documentation standards&lt;/a&gt; and ownership.&lt;/li&gt; 
  &lt;li&gt;Standard configuration baselines.&lt;/li&gt; 
  &lt;li&gt;Change management procedures aligned with internal frameworks.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Consistent DHCP reviews strengthen network stability, improve incident response and support long-term business continuity while avoiding compliance penalties and downtime. Treating DHCP as an essential service can offer positive results and prevent negative outcomes.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to TechTarget Editorial, The New Stack and CompTIA Blogs.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>DHCP is vital for IP address allocation across networks, ensuring business continuity. Regular assessments mitigate risks, enhance resilience and prevent costly outages.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/check_g1211896141.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/The-role-of-DHCP-reviews-for-business-continuity</link>
            <pubDate>Thu, 15 Jan 2026 16:15:00 GMT</pubDate>
            <title>The role of DHCP reviews for business continuity</title>
        </item>
        <item>
            <body>&lt;p&gt;Modern networking continues to evolve into a business enabler capable of connecting services and products with consumers. Critical factors that drive this evolution in 2026 include the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;Rising pressure on resilience, security, sustainability and cost control.&lt;/li&gt; 
 &lt;li&gt;Acceleration of cloud, AI and edge-driven business models.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Decisions matter now more than ever in future-proofing network environments and enabling the technologies that rely on them to work seamlessly and efficiently.&lt;/p&gt; 
&lt;p&gt;This article provides insights into how organizations can steer toward the network technologies that are planned to most significantly shape the industry in 2026.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="What matters most for 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;What matters most for 2026&lt;/h2&gt;
 &lt;p&gt;Networking personnel don't need to look too long to find lists of revolutionary ideas, &lt;a href="https://www.techtarget.com/searchcio/news/366633313/Gartner-unveils-top-technology-trends"&gt;upcoming technical innovations&lt;/a&gt; and streamlined existing deployments touted to transform the industry. However, rather than examining the same common trends, networking leaders should focus on a curated set of trends that most support their specific organizational needs.&lt;/p&gt;
 &lt;p&gt;Selection criteria include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Enterprise readiness.&lt;/b&gt; The preparedness of a business network in deploying new technology.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;ROI.&lt;/b&gt; The expected business and financial return on the investment in new networking technology.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Operational maturity.&lt;/b&gt; The efficiency with which an enterprise network team can deliver, manage and support new technology once implemented.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="Top networking trends expected to shape 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Top networking trends expected to shape 2026&lt;/h2&gt;
 &lt;p&gt;Network trends to watch in 2026 range from AI to network as a service to wireless and more. As network leaders evaluate these trends, it's also important to keep UX, security and business agility in mind.&lt;/p&gt;
 &lt;h3&gt;NaaS goes mainstream&lt;/h3&gt;
 &lt;p&gt;The as-a-service model offers a subscription-based approach that turns what used to be massive Capex into predictable Opex. It also shifts responsibility to service providers, eliminating many of the headaches and maintenance tasks related to device ownership. Cloud-managed networking offers the same benefits as other cloud-hosted services.&lt;/p&gt;
 &lt;p&gt;&lt;a href="https://www.techtarget.com/searchnetworking/feature/Enterprises-consider-NaaS-adoption-for-business-agility"&gt;NaaS adoption&lt;/a&gt; trends include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Telco-managed deployments.&lt;/li&gt; 
  &lt;li&gt;Vendor-specific platforms.&lt;/li&gt; 
  &lt;li&gt;Integrated hyperscalers.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Organizations with multi-site enterprise locations, large remote workforces or rapid deployment needs that require comprehensive network coverage might be particularly motivated to explore NaaS.&lt;/p&gt;
 &lt;h3&gt;AIOps goes from visibility to autonomous operation&lt;/h3&gt;
 &lt;p&gt;AI has its hands in everything, and network operations is no exception. Modern networks frequently connect on-premises, multi-cloud and worldwide capabilities, raising their complexity and scope beyond what modern network teams can effectively support. AI, and specifically AIOps, can help organizations easily &lt;a href="https://www.techtarget.com/searchcloudcomputing/tip/Move-from-reactive-to-predictive-cloud-management-with-AI"&gt;shift from reactive troubleshooting to proactive supervision&lt;/a&gt; in these complex environments.&lt;/p&gt;
 &lt;p&gt;Fundamental benefits of AIOps include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Machine learning-based anomaly detection.&lt;/li&gt; 
  &lt;li&gt;Root-cause analysis.&lt;/li&gt; 
  &lt;li&gt;Self-healing capabilities.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;AIOps partners with existing network administrators to improve troubleshooting, optimize performance, prevent outages and plan capacity requirements. The result is &lt;a href="https://www.techtarget.com/searchdisasterrecovery/tip/How-to-calculate-and-reduce-MTTR"&gt;reduced mean time to repair&lt;/a&gt; and improved adherence to service-level agreements. It also improves staff efficiency, leaving time and energy for innovation.&lt;/p&gt;
 &lt;h3&gt;The shift to edge-based, distributed network architectures&lt;/h3&gt;
 &lt;p&gt;Latency-sensitive workloads continue to push networking beyond the capabilities of centralized data centers. Combining distributed compute resources with localized network intelligence offers a key benefit.&lt;/p&gt;
 &lt;p&gt;Common adoption environments include the manufacturing, retail and healthcare industries. These industries benefit from the deployment of smart infrastructures that can support the heavy demands of their workloads, including real-time analytics, &lt;a href="https://www.techtarget.com/whatis/definition/What-is-AI-inference"&gt;AI inference&lt;/a&gt; and industrial IoT services.&lt;/p&gt;
 &lt;p&gt;Distributed architectures that use edge compute and network resources benefit from more than performance; deployments are typically cost-effective when combined with a well-architected, modern WAN design.&lt;/p&gt;
 &lt;h3&gt;Secure access service edge and security-driven networking&lt;/h3&gt;
 &lt;p&gt;Networking and security are converging into a single control plane, ending the concept of security as an add-on or related feature. Network deployments rely on the same &lt;a href="https://www.techtarget.com/searchsecurity/tip/Explaining-the-differences-between-SASE-vs-SSE"&gt;SASE, security service edge and zero-trust security models&lt;/a&gt; as other services, which eliminate many vulnerabilities and improve an organization's overall security posture. SASE is crucial in SaaS services and secure remote access, particularly in cloud-first and hybrid environments.&lt;/p&gt;
 &lt;p&gt;Network security initiatives offer plenty of benefits, such as the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Tool consolidation.&lt;/li&gt; 
  &lt;li&gt;Reduced breach risk.&lt;/li&gt; 
  &lt;li&gt;Improved compliance.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;SASE and network security are crucial to aligning security outcomes with network investments.&lt;/p&gt;
 &lt;h3&gt;Private 5G for enterprise connectivity&lt;/h3&gt;
 &lt;p&gt;Fiber-optic communication lines offer several benefits, including speed and security advantages. However, a modern wireless service such as private 5G is a credible and cost-effective alternative that organizations might want to consider.&lt;/p&gt;
 &lt;p&gt;Private 5G is an especially useful connectivity choice in locations where mobility and performance requirements combine to make a wireless-first approach logical, such as business campuses, remote locations and logistics hubs.&lt;/p&gt;
 &lt;p&gt;Private 5G use cases include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Rapid site deployments.&lt;/li&gt; 
  &lt;li&gt;Redundancy.&lt;/li&gt; 
  &lt;li&gt;Operational technology connectivity, including industrial control systems, supervisory control and data acquisition deployments, and other sensors or robotics.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;In addition to scalability and flexibility, expect cost-benefit opportunities from faster rollouts and straightforward management costs.&lt;/p&gt;
 &lt;h3&gt;Wi-Fi 7 and the evolution of enterprise LANs&lt;/h3&gt;
 &lt;p&gt;LAN performance is critical for hybrid work, dense environments, &lt;a href="https://www.techtarget.com/searchnetworking/tip/Top-use-cases-for-5G-augmented-and-virtual-reality"&gt;augmented reality and virtual reality applications&lt;/a&gt;, and mobile collaborative teams. Wi-Fi 7, which is based on the IEEE 802.11be standard, updates architectures to support Multi-Link Operations.&lt;/p&gt;
 &lt;p&gt;MLO improves speeds and delivers more consistent performance to users. This benefits enterprises by enabling predictable application performance, even in interference-prone and dense environments. It represents a shift toward application-aware networking rather than traditional connectivity.&lt;/p&gt;
 &lt;p&gt;Benefits of MLO include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Improved user satisfaction.&lt;/li&gt; 
  &lt;li&gt;Reduced performance-related troubleshooting.&lt;/li&gt; 
  &lt;li&gt;Increased productivity.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Expect major rollouts across flexible and fast-moving enterprises in 2026. Organizations planning to implement Wi-Fi 7 should align deployment with their normal LAN refresh cycle and focus on high-density locations for optimal results.&lt;/p&gt;
 &lt;h3&gt;The roadmap to 6G&lt;/h3&gt;
 &lt;p&gt;While it's true that many developments will occur in 2026, some advancements will continue beyond the year. One crucial example is 6G, which offers ultra-low latency AI-based networking. &lt;a target="_blank" href="https://omdia.tech.informa.com/om124494/6g-progress-2024-standardization-use-cases-and-uncertainties" rel="noopener"&gt;6G remains in the research stage&lt;/a&gt;, but it's essential to continue monitoring standards and making long-term plans for its adoption to stay ready for the future.&lt;/p&gt;
&lt;/section&gt;                                   
&lt;section class="section main-article-chapter" data-menu-title="Network planning considerations for 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Network planning considerations for 2026&lt;/h2&gt;
 &lt;p&gt;As networking leaders evaluate which trends fit into their organizations' requirements, it's important they keep in mind the following essential themes that cut across these technologies:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Sustainability and energy-efficient networking.&lt;/li&gt; 
  &lt;li&gt;API-driven network capabilities.&lt;/li&gt; 
  &lt;li&gt;Digital twins for planning and risk modeling.&lt;/li&gt; 
  &lt;li&gt;Talent development and retention around automation, cloud networking and AI literacy.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;It's also important to follow best practices during the deployment of any new technology. Key practices include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Focus on architectures rather than individual technologies.&lt;/li&gt; 
  &lt;li&gt;Prioritize trends that improve resilience, agility and cost transparency.&lt;/li&gt; 
  &lt;li&gt;Align network investments with business strategies.&lt;/li&gt; 
  &lt;li&gt;Do not neglect talent development and retention.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;em&gt;Damon Garn owns Cogspinner Coaction and provides freelance IT writing and editing services. He has written multiple CompTIA study guides, including the Linux+, Cloud Essentials+ and Server+ guides, and contributes extensively to TechTarget Editorial, The New Stack and CompTIA Blogs.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Networking is a key business enabler in 2026, driven by the need for greater efficiency, security and resilience. Top trends for the year include NaaS, AIOps, Wi-Fi 7 and more.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/container_g1128254725.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/opinion/The-top-5-predictions-for-networking-technology-trends-in-2020</link>
            <pubDate>Tue, 13 Jan 2026 16:00:00 GMT</pubDate>
            <title>The top networking trends shaping business in 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;Network mapping tools are specialized software applications designed to represent the structure and connectivity of a computer network visually. These tools automate the process of network mapping, which involves the discovery and documentation of all devices or nodes within a network, their configuration and the way they communicate with each other.&lt;/p&gt; 
&lt;p&gt;By automatically detecting hardware such as routers, switches, servers and endpoints, these tools create diagrams or maps that illustrate how different components interact with each other. This visualization helps IT administrators and network engineers &lt;a href="https://www.techtarget.com/searchnetworking/tip/Top-network-monitoring-best-practices"&gt;monitor performance&lt;/a&gt;, identify bottlenecks, troubleshoot issues and plan for future scalability.&lt;/p&gt; 
&lt;p&gt;Most modern network mapping tools offer more than visualization, as they also include &lt;a href="https://www.techtarget.com/whatis/definition/real-time-monitoring"&gt;real-time monitoring&lt;/a&gt;, analytics, and reporting to track traffic, detect anomalies and support capacity planning. For hybrid environments spanning on-premises, cloud, and remote systems, these tools provide essential visibility and control, helping ensure security, compliance as well as operational efficiency.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Why should you use network mapping tools?"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Why should you use network mapping tools?&lt;/h2&gt;
 &lt;p&gt;Network mapping tools have become essential components of modern IT infrastructure management. Key reasons why organizations should use these tools include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Enhanced visibility.&lt;/li&gt; 
  &lt;li&gt;Faster troubleshooting and issue resolution.&lt;/li&gt; 
  &lt;li&gt;Proactive monitoring.&lt;/li&gt; 
  &lt;li&gt;Smarter planning and optimization.&lt;/li&gt; 
  &lt;li&gt;Enhanced security and compliance.&lt;/li&gt; 
  &lt;li&gt;Integration with monitoring and analytics.&lt;/li&gt; 
  &lt;li&gt;Change management.&amp;nbsp;&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Enhanced visibility&lt;/h3&gt;
 &lt;p&gt;Network mapping tools offer enhanced visibility by delivering a clear, real-time overview of the entire infrastructure, including devices, connections and data flow. This visibility is essential for understanding &lt;a href="https://www.techtarget.com/searchnetworking/tip/6-types-of-enterprise-networking-topologies"&gt;different network topologies&lt;/a&gt;, especially in hybrid or multi-site environments. Without mapping, hidden or forgotten devices can cause security risks or operational inefficiencies.&lt;/p&gt;
 &lt;h3&gt;Faster troubleshooting and issue resolution&lt;/h3&gt;
 &lt;p&gt;Network mapping tools simplify the process of diagnosing and resolving network issues by providing a visual representation of the entire infrastructure. This visualization enables IT staff to pinpoint problems quickly, identifying the exact device, link, or segment experiencing a failure or bottleneck, without manually tracing cables or combing through complex configuration logs. By graphically illustrating the connections and dependencies among all devices, the map also enables &lt;a href="https://www.techtarget.com/searchsoftwarequality/tip/How-to-handle-root-cause-analysis-of-software-defects"&gt;faster root cause analysis&lt;/a&gt;, clearly showing which upstream and downstream components are affected.&lt;/p&gt;
 &lt;h3&gt;Proactive monitoring&lt;/h3&gt;
 &lt;p&gt;Many network mapping tools include monitoring capabilities that alert administrators to device failures, performance degradation or configuration changes before they affect business operations.&lt;/p&gt;
 &lt;h3&gt;Smarter planning and optimization&lt;/h3&gt;
 &lt;p&gt;Network mapping aids capacity planning by uncovering usage patterns and performance metrics, enabling organizations to make informed decisions regarding scaling, infrastructure upgrades and resource allocation.&lt;/p&gt;
 &lt;h3&gt;Enhanced security and compliance&lt;/h3&gt;
 &lt;p&gt;Network mapping is crucial for enhancing security and compliance because it automatically identifies unauthorized devices, misconfigured equipment and potential vulnerabilities across the infrastructure. Furthermore, the detailed documentation generated by mapping tools is essential for demonstrating compliance with major industry regulations, such as GDPR, HIPAA and ISO standards, enabling security teams and auditors to quickly review the network's topology for any gaps or risks.&lt;/p&gt;
 &lt;h3&gt;Integration with monitoring and analytics&lt;/h3&gt;
 &lt;p&gt;Many network mapping tools integrate with monitoring platforms to provide real-time updates, alerts and analytics. This combination ensures continuous network health tracking and proactive problem detection.&lt;/p&gt;
 &lt;h3&gt;Change management&lt;/h3&gt;
 &lt;p&gt;Before implementing network changes, administrators can use network mapping tools to understand dependencies and predict the effect of modifications, reducing the risk of unintended outages or performance degradation.&lt;/p&gt;
&lt;/section&gt;                 
&lt;section class="section main-article-chapter" data-menu-title="Key features of network mapping tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Key features of network mapping tools&lt;/h2&gt;
 &lt;p&gt;Professional network mapping tools are designed to streamline network management through automation, visualization and actionable insights. Common features found in modern network mapping tools include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Automated discovery.&lt;/li&gt; 
  &lt;li&gt;Real-time updates.&lt;/li&gt; 
  &lt;li&gt;Performance monitoring.&lt;/li&gt; 
  &lt;li&gt;Dependency mapping.&lt;/li&gt; 
  &lt;li&gt;Reporting and documentation.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;h3&gt;Automated discovery&lt;/h3&gt;
 &lt;p&gt;Network mapping tools automatically detect devices across a network using protocols such as SNMP, ICMP, CDP, LLDP or WMI. This eliminates the need for manual inventory, ensuring that every device, including routers, switches, servers and endpoints, is accurately represented.&lt;/p&gt;
 &lt;h3&gt;Real-time updates&lt;/h3&gt;
 &lt;p&gt;Modern tools continuously monitor the network and automatically update maps when devices are added, removed or reconfigured. This ensures that IT teams always have an accurate, up-to-date view.&lt;/p&gt;
 &lt;h3&gt;Performance monitoring&lt;/h3&gt;
 &lt;p&gt;Network mapping tools often include performance monitoring capabilities. They track vital metrics such as &lt;a href="https://www.techtarget.com/searchnetworking/tip/How-to-calculate-network-bandwidth-requirements"&gt;network bandwidth usage&lt;/a&gt;, latency, uptime and device health. Many platforms also feature alerting systems that notify administrators about bottlenecks, outages or unusual patterns, enabling faster responses and minimizing disruptions.&lt;/p&gt;
 &lt;h3&gt;Dependency mapping&lt;/h3&gt;
 &lt;p&gt;Network mapping tools also provide dependency mapping, which highlights upstream and downstream connections between devices and applications. By showing how a failure in one area affects others, dependency mapping significantly improves root cause analysis and reduces downtime. A 2024 Oxford Economics &lt;a target="_blank" href="https://www.oxfordeconomics.com/resource/the-hidden-costs-of-downtime-the-400b-problem-facing-the-global-2000/" rel="noopener"&gt;study&lt;/a&gt; found that downtime costs Global 2000 enterprises $400 billion a year -- a $200 million average annual loss for each company.&amp;nbsp;When IT teams can quickly see the ripple effect of issues, they can address them with precision.&lt;/p&gt;
 &lt;h3&gt;Reporting and documentation&lt;/h3&gt;
 &lt;p&gt;Many network mapping tools also offer reporting and documentation functions. These can generate detailed inventories and reports for audits, compliance checks or strategic planning. Historical data comparisons are often available as well, helping organizations track how their networks evolve and providing valuable insights for capacity planning.&lt;/p&gt;
&lt;/section&gt;             
&lt;section class="section main-article-chapter" data-menu-title="8 network mapping tools"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;8 network mapping tools&lt;/h2&gt;
 &lt;p&gt;The following popular network mapping tools are commonly used by organizations:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;Auvik.&lt;/li&gt; 
  &lt;li&gt;EdrawMax.&lt;/li&gt; 
  &lt;li&gt;ManageEngine OpManager.&lt;/li&gt; 
  &lt;li&gt;Microsoft Visio.&lt;/li&gt; 
  &lt;li&gt;Nmap.&lt;/li&gt; 
  &lt;li&gt;Paessler PRTG Network Monitor.&lt;/li&gt; 
  &lt;li&gt;SolarWinds Network Topology Mapper (NTM).&lt;/li&gt; 
  &lt;li&gt;UVexplorer.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;&lt;b&gt;Editor's note:&amp;nbsp;&lt;/b&gt;&lt;i&gt;This list was compiled based on Informa TechTarget's independent research and is in alphabetical order and not ranked.&lt;/i&gt;&lt;/p&gt;
 &lt;h3&gt;Auvik&lt;/h3&gt;
 &lt;p&gt;Auvik is a cloud-based network mapping and monitoring tool that provides real-time visibility into network performance. It's especially beneficial for IT teams and managed service providers, offering features such as traffic analysis, configuration management and remote access. Auvik's user-friendly interface requires minimal training, making it accessible for teams seeking efficient network management options.&lt;/p&gt;
 &lt;h3&gt;EdrawMax&lt;/h3&gt;
 &lt;p&gt;EdrawMax is a versatile diagramming tool that enables users to create network diagrams for &lt;a href="https://www.techtarget.com/searchnetworking/feature/7-types-of-networks-and-their-use-cases"&gt;LAN, WAN and cloud networks&lt;/a&gt;. It features a drag-and-drop interface and offers templates for various types of network visuals, making it easy to design professional-looking diagrams. Users can export their diagrams in multiple formats, which is useful for sharing and presentations.&lt;/p&gt;
 &lt;h3&gt;ManageEngine OpManager&lt;/h3&gt;
 &lt;p&gt;ManageEngine OpManager is a network monitoring and management tool that helps IT teams monitor the health, performance, and availability of their network devices, servers and applications. It provides real-time dashboards, alerts, and network mapping to visualize connectivity and detect issues quickly across complex infrastructures.&lt;/p&gt;
 &lt;h3&gt;Microsoft Visio&lt;/h3&gt;
 &lt;p&gt;Visio is a diagramming and visualization tool that enables users to create detailed network maps and IT infrastructure diagrams. It offers templates and drag-and-drop functionality to represent devices, connections and network layouts visually. Widely used by IT professionals, Visio helps plan, document and communicate network structures clearly and efficiently.&lt;/p&gt;
 &lt;h3&gt;Nmap&lt;/h3&gt;
 &lt;p&gt;Nmap is a free, open source tool used to discover and map devices on a network. It identifies active hosts, open ports, running services, and OSes, helping IT teams &lt;a href="https://www.techtarget.com/searchnetworking/tip/How-to-use-Nmap-to-scan-a-network-for-documentation"&gt;visualize network topology &lt;/a&gt;and assess security risks. Widely used for network management, troubleshooting and security auditing, Nmap provides detailed insights into how devices are connected and identifies potential vulnerabilities.&lt;/p&gt;
 &lt;h3&gt;Paessler PRTG Network Monitor&lt;/h3&gt;
 &lt;p&gt;Paessler PRTG Network Monitor is a comprehensive monitoring tool that also includes integrated network mapping capabilities. It can automatically discover devices on a network and incorporate them into structured maps, while providing a drag-and-drop editor for customization. Paessler also offers real-time monitoring and alerts, making it ideal for teams that need both comprehensive network monitoring and visual mapping of their infrastructure.&lt;/p&gt;
 &lt;h3&gt;SolarWinds NTM&lt;/h3&gt;
 &lt;p&gt;SolarWinds NTM is a tool designed for discovering and visualizing network topologies. It automates network discovery using protocols such as SNMP, ICMP and WMI, and generates detailed network maps and segmentation diagrams. The tool also helps organizations maintain up-to-date diagrams for compliance purposes. SolarWinds NTM is ideal for organizations that require detailed, accurate and compliant network visualizations.&lt;/p&gt;
 &lt;h3&gt;UVexplorer&lt;/h3&gt;
 &lt;p&gt;UVexplorer is a network discovery and mapping tool designed for simplicity and efficiency, particularly for small to medium-sized enterprises. It captures detailed device inventories and generates clear network maps, providing insights into network structure and connectivity. UVexplorer supports both on-premises and server-based deployments.&lt;/p&gt;
 &lt;p&gt;&lt;em&gt;Kinza Yasar is a technical writer for WhatIs and has a background in computer networking.&lt;/em&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Network mapping tools are specialized software applications designed to represent the structure and connectivity of a computer network visually, helping teams monitor performance.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/arvr_g1273484747.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/feature/network-mapping-tools-to-optimize-IT-infrastructure</link>
            <pubDate>Thu, 08 Jan 2026 15:30:00 GMT</pubDate>
            <title>8 network mapping tools to optimize IT infrastructure</title>
        </item>
        <item>
            <body>&lt;p&gt;Networking professionals can expect hiring to remain strong in 2026, but the networking job market continues to undergo significant change. It will become further divided, favoring advanced and niche skills over lower-level positions.&lt;/p&gt; 
&lt;p&gt;Demand for entry-level roles that focus solely on manual configuration will further shrink due to automation, while demand for high-level architects who can design secure, &lt;a href="https://www.datacenterknowledge.com/ai-data-centers/why-scale-out-data-center-architecture-falls-short-in-the-age-of-ai"&gt;AI-ready networks&lt;/a&gt; will skyrocket.&lt;/p&gt; 
&lt;p&gt;With those advanced skills in demand, qualified networking pros can expect to be rewarded accordingly. The U.S. Bureau of Labor Statistics lists computer network architects as the third top salary level on its ranking of top demand and pay in IT, with a national average salary of $130,390. According to the same report, 179,200 IT pros&amp;nbsp;were &lt;a target="_blank" href="https://www.bls.gov/ooh/computer-and-information-technology/computer-network-architects.htm" rel="noopener"&gt;employed in the network architect role&lt;/a&gt;.&lt;/p&gt; 
&lt;p&gt;High wages come with high expectations. More companies will look to hire network pros who can actively drive business efficiency and adapt to increasingly volatile economic and market trends, said Kanani Breckenridge, CEO and executive recruiter at San Diego-based recruiting agency Kismet Search.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="Technology-driven changes in the job market"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Technology-driven changes in the job market&lt;/h2&gt;
 &lt;p&gt;AI continues to drive the biggest changes in the networking job market. Demand is now so great that &lt;a href="https://www.hrdive.com/news/employers-pay-premiums-for-ai-skills/741556/"&gt;AI is a baseline skill expectation&lt;/a&gt; in nearly every IT job segment.&lt;/p&gt;
 &lt;p&gt;That alone is creating a wave of new complexity and a corresponding demand for networking pros who can architect and optimize legacy systems. According to Matthew Baden, managing director and tech recruitment at recruiting firm The Search Experience, most legacy systems weren't originally designed for AI-scale workloads.&lt;/p&gt;
 &lt;p&gt;"AI is forcing networks to handle exponentially more load, and IT pros need to be responsible for building systems that can cope with that demand," he said. "They're not building AI applications – they're building the networks that make those applications possible. That's where the new skill demand will sit."&lt;/p&gt;
 &lt;p&gt;The jobs won't go away, but they will evolve. People who lean into specialization will be best positioned for the new market, Baden said.&lt;/p&gt;
 &lt;p&gt;Still, automation is performing many entry-level tasks, said Don Welch, vice president for IT and global CIO at New York University.&lt;/p&gt;
 &lt;p&gt;"We still own, install and maintain our networking," Welch said. "In the future, we may outsource it or rely more on public networks. The market for skilled engineers is still strong. With the easy work being done, we still need great engineers."&lt;/p&gt;
 &lt;p&gt;There has also been a huge uptick in the importance of cybersecurity within networking, Baden said. Security has become inseparable from networking work -- it's not just about keeping the network running; it's about safeguarding it.&lt;/p&gt;
 &lt;p&gt;Zero trust, secure access service edge (SASE) and integration with security platforms are major technologies throughout 2025 that will continue into the next year.&lt;/p&gt;
&lt;/section&gt;         
&lt;section class="section main-article-chapter" data-menu-title="Skills for networking pros in 2026"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;&lt;a name="_Hlk216425576"&gt;&lt;/a&gt;Skills for networking pros in 2026&lt;/h2&gt;
 &lt;p&gt;According to Baden, networking pros should focus on top skill areas in 2026. Examples include the following:&lt;/p&gt;
 &lt;ul type="disc" class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Automation and orchestration&lt;/b&gt;. Build, optimize and manage cloud-native and hybrid cloud environments.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;AI and machine learning fundamentals.&lt;/b&gt; Understand how AI and ML systems drive network demands and how to support them from an infrastructure perspective.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cybersecurity.&lt;/b&gt; Safeguard networks through security technologies such as zero trust, firewalls and SASE. This &lt;a href="https://www.techtarget.com/searchsecurity/tip/Benefits-and-challenges-of-NetOps-SecOps-collaboration"&gt;crossover between networking and cybersecurity&lt;/a&gt; is expected to carry some of the highest demand and salaries.&lt;/li&gt; 
  &lt;li&gt;&lt;b&gt;Cloud and hybrid networking skills.&lt;/b&gt; Particularly edge computing and IoT skills, where non-internet-native devices will become connected and require secure and scalable infrastructure.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;p&gt;Breckenridge agreed, saying multi-cloud networking, zero-trust security and automation are now non-negotiable skills.&lt;/p&gt;
 &lt;p&gt;"Kubernetes networking, SASE and Python-driven deployments are the clearest differentiators," Breckenridge said. "More specialized capabilities -- like designing high-performance AI networks using InfiniBand or &lt;a href="https://www.techtarget.com/searchstorage/definition/Remote-Direct-Memory-Access"&gt;[&lt;/a&gt;Remote Direct Memory Access] -- will see fast-growing demand and command the highest salaries as enterprises scale their GPU infrastructure."&lt;/p&gt;
&lt;/section&gt;     
&lt;section class="section main-article-chapter" data-menu-title="Salary and benefits trends for networking professionals"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Salary and benefits trends for networking professionals&lt;/h2&gt;
 &lt;p&gt;Because automation is already defining operational excellence, blended skills and titles are driving the biggest salary jumps, Breckenridge said. Engineers who can bridge network, cloud and security responsibilities are in the highest demand.&lt;/p&gt;
 &lt;p&gt;Observability and performance tuning across hybrid systems are becoming core expectations for IT pros, especially for uptime-critical industries. Higher salaries are also being offered to network engineers who can bridge infrastructure, app performance and security, as they enable business uptime. The closer the role is to revenue protection, the higher the potential income, Breckenridge said.&lt;/p&gt;
 &lt;p&gt;Certifications will continue to differentiate candidates, especially in large enterprises and service providers, Breckenridge said. The market is rewarding hybrid skillsets and specialization over total time in the field. A focused expert in cloud security or automation with five years of hands-on work will often out-earn a generalist with a decade of experience. The certifications that will move the needle are advanced, role-based ones &lt;a href="https://www.techtarget.com/whatis/feature/10-top-artificial-intelligence-certifications-and-courses"&gt;closely tied to AI&lt;/a&gt;, automation, cloud and security subjects.&lt;/p&gt;
 &lt;p&gt;AI and cybersecurity experience can turn an $80,000 generalist into a $140,000 specialist, Baden said, because these areas sit closest to risk and growth. Years of experience matter more when they're tied to specialization rather than when someone has spent a long time in generalist work.&lt;/p&gt;
 &lt;p&gt;"Candidates earning the largest premiums are the ones who can show real exposure to building or supporting AI and ML-heavy infrastructure. Even understanding the network demands of AI -- without writing a line of ML code -- will be a meaningful differentiator for a potential hirer," Baden said.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Professional development strategies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Professional development strategies&lt;/h2&gt;
 &lt;p&gt;To thrive in the networking sector, Breckenridge said IT pros should embrace AI and automation in their current day-to-day work as much as possible and build cloud-native and security skills to expand their capabilities.&lt;/p&gt;
 &lt;p&gt;"Shift your mindset from hardware upkeep to networking as software, including learning enough code to design and own automation," she said. "The more you bridge traditional infrastructure with cloud-native architecture and modern security, the more indispensable you'll be long-term."&lt;/p&gt;
 &lt;p&gt;The most important thing is to lean into the areas where network work is expanding. These include AI, automation and cybersecurity, Baden said. These three skills will future-proof a networking career more than any other factor. Even modest exposure in each area will help network pros build their profiles into ones that companies are actively recruiting.&lt;/p&gt;
 &lt;p&gt;"Networking pros should also continue building their own professional networks -- not just socially, but through communities where people are sharing early knowledge about AI-native systems, hybrid architectures and the evolving cyber landscape," Baden said. "The people who stay plugged into these shifts are the ones who can upskill fastest."&lt;/p&gt;
 &lt;p&gt;Ultimately, long-term career stability comes from being the person who understands how modern systems work together. The deeper the specialization, the stronger the career resilience, Baden said.&lt;/p&gt;
 &lt;p&gt;In addition, networking pros constantly learn new tools and technologies, and &lt;a href="https://www.techtarget.com/searchnetworking/tip/Effective-soft-skills-for-network-engineers"&gt;work on their soft skills&lt;/a&gt;, Welch said. As important as it is to have the right technical skills, employers are interested in networking pros who can be teammates, are curious and eager to learn and are problem solvers.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;David Weldon is a freelance writer in the Boston area who covers topics related to IT, data management, infosec, healthcare tech and workforce management.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Hiring for networking jobs will remain strong in 2026, but will favor niche skilled positions over lower-level or generalist roles. Learn in-demand skills for networking pros this year.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/wfh_g1217542241.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/feature/Networking-pros-face-strong-job-market-greater-demands</link>
            <pubDate>Wed, 07 Jan 2026 12:15:00 GMT</pubDate>
            <title>Advanced skills drive networking job market in 2026</title>
        </item>
        <item>
            <body>&lt;p&gt;Fixed wireless access, or FWA, is still relatively new and in the early stages of its growth. However, as growth opportunities in more traditional wireless technologies slow down due to the ubiquity of mobile devices, service providers are turning to new areas, such as FWA, that still have significant upside.&lt;/p&gt; 
&lt;p&gt;Essentially, FWA is the technology that enables wireless carriers to enter into the broadband business and compete with wireline broadband from cable television and telephone companies.&lt;/p&gt; 
&lt;p&gt;"FWA is expanding the competitive playing field for home and business users. This threatens longstanding and traditional wireline services [but] also potentially expands the entire sector," said Jeff Kagan, an Atlanta-based wireless analyst.&lt;/p&gt; 
&lt;p&gt;In general terms, 5G FWA is a wireless network infrastructure that is based on the latest cellular technology, &lt;a href="https://www.techtarget.com/searchnetworking/definition/5G"&gt;5G&lt;/a&gt;, and installed in a fixed location, such as a business or home. The idea is that the FWA device stays in the same location and connects to the same set of towers or antennas during its entire lifecycle. This is in contrast to roaming, where the device moves around, according to Beth Cohen, an advanced networking and security product strategist at Verizon.&lt;/p&gt; 
&lt;p&gt;Cohen said 5G FWA offers several benefits, including the following:&lt;/p&gt; 
&lt;ul class="default-list"&gt; 
 &lt;li&gt;&lt;b&gt;Simplified installation&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; "Far and away the most attractive feature for temporary use cases," she said. "Stand it up and tear the service down in minutes."&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Addresses the last-mile problem&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; "This one is for the telecoms. Last-mile fiber and fiber in sparsely populated areas have always been expensive and difficult to deploy," Cohen said. "The fewer locations that can buy the services, the less profitable it is to install." FWA offers a lower-cost alternative by providing a centralized architecture for bringing fiber to the towers and FWA from the towers to users.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Satellite a&lt;/b&gt;&lt;b&gt;lternative&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; In rural areas, when FWA is available, it is cheaper, more reliable and has far more capacity. It represents a win-win all around, Cohen said.&lt;/li&gt; 
 &lt;li&gt;&lt;b&gt;Wireless b&lt;/b&gt;&lt;b&gt;ackup&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; 5G FWA provides low-cost failover service for commercial locations.&lt;/li&gt; 
&lt;/ul&gt; 
&lt;section class="section main-article-chapter" data-menu-title="U.S. FWA market growth and trends"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;U.S. FWA market growth and trends&lt;/h2&gt;
 &lt;p&gt;The growth potential in the 5G FWA market is impressive, especially as the technology continues to improve. Potential improvements include the ability to harness higher radio frequencies, deploy radio repeaters and develop new technologies, said Peter Rysavy, president of Rysavy Research.&lt;/p&gt;
 &lt;p&gt;The success of FWA could boil down to the quality, connectivity, reliability, speed and latency of FWA services.&lt;/p&gt;
 &lt;p&gt;The initial rollout a couple of years ago went well, with many signups on the consumer and commercial sides, according to Cohen. However, service uptake has slowed down a bit since then, and the loss of federal funding for rural buildouts will slow it further.&lt;/p&gt;
 &lt;p&gt;"The bait-and-switch of providing LTE instead of 5G in some areas, and difficulties related to signal strength and antenna locations -- all issues that can be overcome in time -- set back the more rapid and widespread deployments," Cohen said.&lt;/p&gt;
 &lt;p&gt;An October report from Omdia, an Informa TechTarget company, predicted that global FWA subscriptions will more than double by 2030. The report highlighted strong momentum across markets led by India and the U.S. and identified FWA as the fastest-growing broadband access technology.&lt;/p&gt;
 &lt;p&gt;Telecom provider Ericsson estimated FWA lines will grow from 160 million at the end of 2024 to 350 million by 2030, with 80% of this growth attributed to 5G, said Roy Chua, founder and principal at AvidThink, a research and advisory firm. He said most operators in four of six regions now offer FWA, and there is a growing shift toward speed-tiered pricing.&lt;/p&gt;
 &lt;p&gt;Chua added that the financial disclosures of telecom operators in the U.S. still show strong FWA momentum. T-Mobile maintained its position as the leader in the FWA market with over 7.3 million customers. In Q2 2025 alone, the carrier added 454,000 FWA lines.&lt;/p&gt;
 &lt;p&gt;"Within the U.S. market, T-Mobile and Verizon Wireless have been the most aggressive from the mobile operator side, while AT&amp;amp;T is focused on fiber first and then FWA," said Earl Lum, president of EJL Wireless Research. "I think things are slowing down now as capacity for FWA is dwindling for T-Mobile, since they are using C-Band [midband] spectrum and not &lt;a href="https://www.techtarget.com/searchnetworking/definition/millimeter-wave-MM-wave"&gt;mmWave&lt;/a&gt; like Verizon Wireless," Lum said.&lt;/p&gt;
 &lt;p&gt;Meanwhile, Verizon reached 5.1 million FWA subscribers in Q2 2025 by adding 275,000 new lines. AT&amp;amp;T surpassed 1 million subscribers in Q2 2025, with 203,000 net additions in the quarter.&lt;/p&gt;
 &lt;p&gt;Every mobile network operator has a different approach to 5G FWA, Rysavy said. For example, T-Mobile has focused on midband spectrum, while Verizon works on mmWave. Over time, each method of providing FWA will garner millions of users, he said.&lt;/p&gt;
 &lt;p&gt;Enterprises and consumers can both benefit from FWA; however, currently, most interest in FWA deployment focuses on how it can provide connectivity to individual users. A strong FWA connection can enable individuals to connect to enterprise networks, especially in remote areas with limited connectivity options.&lt;/p&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="FWA enterprise use cases"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;FWA enterprise use cases&lt;/h2&gt;
 &lt;p&gt;Cohen said one of the best use cases is FWA installations that serve as low-cost and effective backups to wireline connections for retail and other companies with large numbers of small locations spread over long distances. "It is a very attractive option for construction sites," she said.&lt;/p&gt;
 &lt;p&gt;Other &lt;a href="https://www.techtarget.com/searchnetworking/tip/FWA-use-cases-for-next-generation-connectivity"&gt;significant use cases&lt;/a&gt; include the following:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Retail sites&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; Stores and restaurants can deploy FWA to provide reliable, hassle-free wireless internet, ensuring secure failover to prevent business operations from being interrupted by outages, Chua explained. Businesses with multiple branch offices, including food chains, banks and retail stores that require connectivity for point-of-sale machines and Wi-Fi can have a single mobile provider across all locations, assuming FWA is available in those locations -- or even dual FWA providers if more reliability is needed.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Logistics hubs&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; &lt;a href="https://www.techtarget.com/searchnetworking/feature/5G-driving-IoT-innovation-Key-use-cases-and-applications"&gt;Businesses with IoT-enabled machines&lt;/a&gt; monitoring operations in remote locations where wired networks aren't feasible can use fixed wireless access points to maintain uninterrupted, secure connectivity, Chua said.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Temporary sites&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; FWA can be deployed quickly by people without specialized skills, providing fast and reliable internet for short-duration events such as movie premieres and pop-up stores. FWA might also be a suitable option for companies that frequently relocate their offices or use temporary setups, he said.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Disaster recovery&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; Enterprises with critical connectivity needs, such as financial institutions and healthcare facilities, can &lt;a href="https://www.techtarget.com/searchnetworking/tip/5G-and-SD-WAN-pair-is-a-game-changer-for-branch-connectivity"&gt;use FWA as a WAN failover option&lt;/a&gt;. The router automatically switches the entire location's traffic to the mobile network when primary wired connections fail, Chua explained.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;       
&lt;section class="section main-article-chapter" data-menu-title="Fiber vs. FWA: Trade-offs for businesses"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Fiber vs. FWA: Trade-offs for businesses&lt;/h2&gt;
 &lt;p&gt;To decide whether to go the 5G FWA route, organizations should consider it from several perspectives, Cohen said.&lt;/p&gt;
 &lt;p&gt;"For businesses, it really is apples and oranges. If the business has access to fiber, while it might be more expensive -- although they are usually comparable -- fiber is the better technology in terms of throughput and reliability until we have a good solution for network slicing to better control capacity," she said.&lt;/p&gt;
 &lt;p&gt;Deployment time might be a concern to a business in the short term, but generally once fiber is in, it just works, she said.&lt;/p&gt;
 &lt;p&gt;"Wireless is a bit fussier to deploy because you need to find the location on the site with optimal signal strength to figure out the best location for the connectivity equipment," Cohen said. "For kiosks, construction sites, pop-ups and other temporary installations, FWA is perfect."&lt;/p&gt;
 &lt;p&gt;From the telecom provider perspective, FWA infrastructure is still cheaper to install than fiber, particularly in less densely populated areas, she said. Telecoms must also ensure there is sufficient capacity to support the number of subscribers. That has been a problem for carriers with less disciplined practices around how to best share the network between mobile and FWA traffic.&lt;/p&gt;
 &lt;p&gt;Chua explained the pros and cons of each option in a head-to-head comparison:&lt;/p&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Cost&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; "FWA often wins on upfront and near-term capex by avoiding make-ready and pole and permit work. Fiber capex is higher but can be amortized over its long life," he said.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Performance&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; Chua called fiber the "reference" for low latency and high reliability. It has the lowest latency among fixed access types, while FWA latency varies by RF conditions and network loads.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Throughput&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; "Modern 5G FWA commonly delivers 100-300-plus Mbps with continued gains from midband carrier aggregation or &lt;a href="https://www.techtarget.com/searchnetworking/definition/What-is-5G-Advanced-5GA-or-55G"&gt;5G-Advanced&lt;/a&gt;. However, fiber can scale to multi-Gbps symmetrically," he said.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Time&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;to&lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt;service&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; FWA typically deploys in days, while fiber can take weeks or even months due to right-of-way issues and make-ready work, Chua said.&lt;/li&gt; 
 &lt;/ul&gt;
 &lt;ul class="default-list"&gt; 
  &lt;li&gt;&lt;b&gt;Where each one fits&lt;/b&gt;&lt;b&gt;.&lt;/b&gt; "Choose FWA for speed to open, temporary sites, hard-to-serve or rural areas or as a diverse failover. Choose fiber for long-term, high-density campuses, latency-sensitive workloads, or guaranteed service level agreements requiring deterministic performance," he said.&lt;/li&gt; 
 &lt;/ul&gt;
&lt;/section&gt;            
&lt;section class="section main-article-chapter" data-menu-title="Benefits and challenges of FWA strategies"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Benefits and challenges of FWA strategies&lt;/h2&gt;
 &lt;p&gt;Despite its growing popularity, 5G FWA brings challenges, such as fundamental design and coverage constraints.&lt;/p&gt;
 &lt;p&gt;"I think the most significant challenge is that the wireless networks were designed for fixed locations and relatively steady traffic volumes using a hub and spoke model for service delivery," Cohen explained. "Mobile networks are designed for far more devices, but those devices move around and are far more spread out, and each device creates less traffic."&lt;/p&gt;
 &lt;p&gt;For now, coverage typically follows the same locations as mobile coverage maps and uses the same towers. Telecom providers might need to rethink that approach if they're serious about expanding their FWA footprints. They need to treat it almost as a separate and distinct use case with its own traffic patterns, she said.&lt;/p&gt;
 &lt;p&gt;Spectrum limitations, particularly for midband spectrum, are the greatest constraints for FWA, which limits the number of customers an operator can support, Rysavy said. Operators can densify their networks with more cell sites and small cells, but doing so is expensive, and the permitting process can be time-consuming.&lt;/p&gt;
 &lt;p&gt;Ultimately, while FWA offers benefits in cost and flexibility, it is still a young technology, and some users will have a better experience than others, according to Kagan, but everything will improve going forward.&lt;/p&gt;
&lt;/section&gt;      
&lt;section class="section main-article-chapter" data-menu-title="Future outlook of FWA"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;Future outlook of FWA&lt;/h2&gt;
 &lt;p&gt;Cohen said she expects FWA to grow in the next two to five years, as consumers and businesses recognize its value. This is especially the case as providers expand services to rural areas that are ill-served by pretty much anything else, and enterprise customers see the value in the flexibility FWA delivers.&lt;/p&gt;
 &lt;p&gt;"While it needs some more infrastructure on the ground as compared to satellite communications, it has the potential for far more bandwidth capacity and far less cost for those hard to get to areas in the world," Cohen said.&lt;/p&gt;
 &lt;p&gt;FWA technology and performance will also continue to improve as operators gain access to more spectrum, smart antennas become more sophisticated, and AI dynamically manages radio resources for optimum efficiency, Rysavy explained. Operators will be able to offer more customers ever greater performance.&lt;/p&gt;
 &lt;p&gt;At this stage, 5G FWA and private wireless appear to have a strong growth window ahead, but things can change in wireless, and they always do, Kagan said.&lt;/p&gt;
 &lt;p&gt;"It looks like, at least for the next several years, these sectors will remain on the growth track," he said. "That does not mean growth will be smooth and flawless."&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;David Weldon is a business and technology writer in the Boston area who covers topics related to data management, information security, healthcare technology, educational technology and workforce management.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>FWA continues to grow globally, especially in the U.S. and India, as more companies learn its advantages for extending broadband to rural areas.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/map_globe_g1310544349.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/answer/5G-fixed-wireless-access-market-grows-in-the-US</link>
            <pubDate>Wed, 07 Jan 2026 10:45:00 GMT</pubDate>
            <title>U.S. 5G fixed wireless access market: What leaders need to know</title>
        </item>
        <item>
            <body>&lt;p&gt;5G has become the default technology for cellular wireless networks. Thanks to its ability to offer WAN-like speeds, 5G can support the bandwidth needs of augmented reality (AR) and virtual reality (&lt;a href="https://www.techtarget.com/whatis/definition/virtual-reality"&gt;VR&lt;/a&gt;), serving as the basis of new applications that provide immersive experiences for businesses and their customers.&lt;/p&gt; 
&lt;section class="section main-article-chapter" data-menu-title="The impact of 5G-enabled AR/VR"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The impact of 5G-enabled AR/VR&lt;/h2&gt;
 &lt;p&gt;5G also provides high bandwidth and low latency to mobile devices, enabling them to run AR and VR applications that deliver demonstrable business value. 5G's theoretical ability to support up to 10 Gbps data rates opens the doors to AR and VR applications that are simply not feasible on 4G and older technologies. However, device and coverage constraints can still limit usability in some situations.&lt;/p&gt;
&lt;/section&gt;  
&lt;section class="section main-article-chapter" data-menu-title="5 industry use cases for 5G augmented and virtual reality"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5 industry use cases for 5G augmented and virtual reality&lt;/h2&gt;
 &lt;p&gt;5G use cases for AR and VR are numerous and often industry-specific. They include scenarios for customer service and support, employee engagement, customer engagement and others. Let's explore five common ways AR and VR can take advantage of 5G.&lt;/p&gt;
 &lt;h3&gt;1. Customer service and support&lt;/h3&gt;
 &lt;p&gt;Today, most customer engagement consists of emails, phone calls or text messages with contact center agents. By taking advantage of 5G's speed, along with AR and VR applications on mobile devices, companies can provide customers with real-time guidance and demonstrations.&lt;/p&gt;
 &lt;p&gt;For example, a customer trying to assemble a complex piece of equipment can get help from AR that overlays instructions on top of the live image of the equipment captured by the camera on a mobile or wearable device. A product expert can then guide the customer toward completing the necessary steps.&lt;/p&gt;
 &lt;p&gt;Another opportunity is using AR for product demonstrations. For example, customers can use AR apps to overlay images of clothes onto images of themselves to see how they look. Or they can see how a paint color looks before applying it. Anyone looking to remodel a kitchen can view an overlay of the final design on top of their current kitchen. AR can even take measurements to ensure proper fit.&lt;/p&gt;
 &lt;p&gt;Additionally, salespeople can use the technology to walk customers through various aspects of a product before purchase. Imagine using VR goggles to take a guided tour of a new vehicle without having to visit a showroom.&lt;/p&gt;
 &lt;p&gt;In each case, combining the right hardware with 5G technologies opens possibilities for improving the customer experience and increasing sales.&lt;/p&gt;
 &lt;div class="youtube-iframe-container"&gt;
  &lt;iframe id="ytplayer-0" src="https://www.youtube.com/embed/esUhTF9fk-w?autoplay=0&amp;amp;modestbranding=1&amp;amp;rel=0&amp;amp;widget_referrer=null&amp;amp;enablejsapi=1&amp;amp;origin=https://www.techtarget.com" type="text/html" height="360" width="640" frameborder="0"&gt;&lt;/iframe&gt;
 &lt;/div&gt;
 &lt;h3&gt;2. Healthcare&lt;/h3&gt;
 &lt;p&gt;The healthcare opportunities are numerous. Instructors can use VR to demonstrate new procedures or techniques to medical students, doctors and nurses remotely, wherever they are, thus saving on travel costs. Instructors can also use AR on top of live procedures to point out steps and points of interest. Or they can use VR to bring remote participants into an operating or examination room, enabling them to observe and ask questions.&lt;/p&gt;
 &lt;p&gt;For patient care, AR and VR over 5G offer opportunities to enhance telemedicine, providing healthcare professionals with the ability to conduct remote examinations, highlight areas of concern to patients and even walk patients through procedures before their appointments.&lt;/p&gt;
 &lt;p&gt;5G-enabled AR and VR devices, such as wearable glasses, enable medical care professionals to include remote experts directly in the examination room, potentially saving time, money and, ultimately, lives. Consider, for example, surgeons who run into a problem during a procedure. Using a 5G-enabled wearable device, they can easily show a remote specialist what they are seeing. The specialist can then use AR to guide the surgeon during the procedure.&lt;/p&gt;
 &lt;h3&gt;3. Meetings and employee engagement&lt;/h3&gt;
 &lt;p&gt;AR and VR meeting applications already exist, such as Cisco Webex integrated with the Apple Vision Pro mixed-reality headset, enabling users to join immersive, virtual reality meetings while wearing the headset. 5G expands the options for immersive meetings so that participants can join from virtually anywhere.&lt;/p&gt;
 &lt;p&gt;Employees might also use VR for virtual engagement outside of meetings, such as for social and team-building scenarios. One example is Accenture's Nth Floor project that &lt;a target="_blank" href="https://www.accenture.com/us-en/insights/technology/going-beyond-extended-reality" rel="noopener"&gt;provides a metaverse&lt;/a&gt; for employees to engage with one another, regardless of location.&lt;/p&gt;
 &lt;h3&gt;4. Training and education&lt;/h3&gt;
 &lt;p&gt;AR and VR over 5G offer the potential to deliver &lt;a href="https://www.techtarget.com/searchunifiedcommunications/feature/Training-with-VR-could-lead-to-broader-enterprise-adoption"&gt;high-quality immersive education and training&lt;/a&gt; to remote participants anywhere in the world. Teaching scenarios that require in-person instruction today, such as lab experiments, can be done using VR and AR, making education more accessible and less costly.&lt;/p&gt;
 &lt;p&gt;The cost of training field personnel on new products and techniques can be reduced by eliminating the need to bring field workers to in-person training classes or dispatch trainers to conduct in-person training in the field. The use of AR and VR over 5G for training is especially attractive to industries operating in remote locations, such as mines, drilling sites and other areas that lack access to high-speed wired networks.&lt;/p&gt;
 &lt;h3&gt;5. Next-generation wearable devices&lt;/h3&gt;
 &lt;p&gt;Today, most wearable devices are expensive and bulky or require tethering to a mobile phone for data access and local processing. With its high data-transfer rates, 5G enables devices to take advantage of cloud-based processing and offloading of graphical tasks, potentially reducing the cost and complexity of wearables while increasing flexibility and battery life.&lt;/p&gt;
&lt;/section&gt;                     
&lt;section class="section main-article-chapter" data-menu-title="5G AR and VR limitations"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;5G AR and VR limitations&lt;/h2&gt;
 &lt;p&gt;Despite the many potential benefits of using AR and VR over 5G, limitations do exist. The biggest limitation is the availability of 5G, especially in remote areas.&lt;/p&gt;
 &lt;p&gt;The FCC currently estimates that about 96% of homes and small businesses now &lt;a target="_blank" href="https://www.fcc.gov/news-events/blog/2025/05/20/broadband-data-collection-shows-access-high-speed-internet-services" rel="noopener"&gt;have access&lt;/a&gt; to 5G, with most having access to at least 35 Mbps download and 3 Mbps upload speeds. However, dead spots are possible, and true universal coverage might require &lt;a href="https://www.techtarget.com/searchnetworking/feature/A-deep-dive-into-the-differences-between-5G-and-Wi-Fi-6"&gt;supplementing 5G with Wi-Fi&lt;/a&gt;.&lt;/p&gt;
 &lt;p&gt;5G availability can even be limited in urban areas, &lt;a href="https://www.techtarget.com/searchnetworking/tip/Indoor-5G-gets-a-boost-as-small-cells-come-to-the-rescue"&gt;especially within buildings&lt;/a&gt;. And available bandwidth is likely to be limited by the number of 5G users who are all contending for network resources at any given time. 5G AR and VR applications are also likely to be constrained by the processing power and battery life of mobile devices.&lt;/p&gt;
&lt;/section&gt;    
&lt;section class="section main-article-chapter" data-menu-title="The future of 5G and AR/VR"&gt;
 &lt;h2 class="section-title"&gt;&lt;i class="icon" data-icon="1"&gt;&lt;/i&gt;The future of 5G and AR/VR&lt;/h2&gt;
 &lt;p&gt;5G will continue to enable growth in AR and VR use cases in the next few years. The forthcoming rollout of &lt;a href="https://www.techtarget.com/searchnetworking/definition/What-is-5G-Advanced-5GA-or-55G"&gt;5G-Advanced&lt;/a&gt; and the expected arrival of &lt;a href="https://www.techtarget.com/searchnetworking/definition/6G"&gt;6G&lt;/a&gt; in the 2030s will continue to make 5G a viable &lt;a href="https://www.techtarget.com/searchnetworking/definition/WAN-wide-area-network"&gt;WAN&lt;/a&gt; alternative, as well as increase the bandwidth and performance available to AR and VR-capable mobile devices.&lt;/p&gt;
 &lt;p&gt;Running AR and VR over 5G offers significant potential to deliver new and innovative capabilities to customers and employees, in addition to reducing the costs of training and customer service. Organizations should take a proactive approach to identify applicable use cases while recognizing potential constraints on the applications they envision.&lt;/p&gt;
 &lt;p&gt;&lt;i&gt;Irwin Lazar is president and principal analyst at Metrigy, where he leads coverage on the digital workplace. His research focus includes unified communications, VoIP, video conferencing and team collaboration.&lt;/i&gt;&lt;/p&gt;
&lt;/section&gt;</body>
            <description>Many industries will reap major benefits from integrating augmented and virtual reality technology with 5G. But beware of limitations in 5G coverage and mobile device capabilities.</description>
            <image>https://cdn.ttgtmedia.com/rms/onlineimages/arvr_a230499787.jpg</image>
            <link>https://www.techtarget.com/searchnetworking/tip/Top-use-cases-for-5G-augmented-and-virtual-reality</link>
            <pubDate>Mon, 05 Jan 2026 12:50:00 GMT</pubDate>
            <title>5G and AR/VR: Industry use cases and impacts, explained</title>
        </item>
        <title>Search Networking Resources and Information from TechTarget</title>
        <ttl>60</ttl>
        <webMaster>webmaster@techtarget.com</webMaster>
    </channel>
</rss>
