Tips
Tips
-
How to secure your home Wi-Fi network in 7 steps
When securing your home Wi-Fi, update devices regularly, change passwords consistently, turn off unused services and inspect outdoor network equipment. Continue Reading
-
Hybrid network vs. hybrid network infrastructure
Hybrid networks and hybrid network infrastructure blend different kinds of equipment, geographic locations, network ownership and technology disciplines. Continue Reading
-
Routed optical networking tactic could be game changer
A new routing architecture could help eliminate management and service headaches stemming from routing IP traffic on optical networks. Continue Reading
-
How to prepare networks for the return to office
Network teams should evaluate their UC strategies, VPN capacity and even air conditioning requirements as employees start to return to office environments. Continue Reading
-
How to set up a home network -- a 7-step guide
From understanding hardware components to managing network performance and security, this guide teaches networking newbies how to set up a home network. Continue Reading
-
Network-as-a-service business model options take shape
As network as a service gains traction, enterprises and service providers must consider multiple deployment models. SD-WAN, SASE, SDN and policy management could all play a role. Continue Reading
-
Ansible vs. Terraform vs. Vagrant: What's the difference?
Ansible, Terraform and Vagrant are common infrastructure automation platforms with specific use cases, benefits and drawbacks. But choosing a platform doesn't need to be confusing. Continue Reading
-
8 remote access security risks and how to prevent them
Enterprises face myriad remote access security concerns, but training and clear communication can help them bolster their security programs for the long term. Continue Reading
-
4 attributes key to network-as-a-service model
For a network-as-a-service model to work for the enterprise, it needs to offer four key attributes: an application-specific, elastic, secure and personalized VPN. Continue Reading
-
Wi-Fi 6 vs. Wi-Fi 6E: Spectrum, not hype, is key difference
The extended spectrum of Wi-Fi 6E sounds promising. But, when assessing Wi-Fi 6 vs. Wi-Fi 6E, organizations should pay close attention to radio frequency characteristics. Continue Reading
-
Network capacity planning best practices for return to office
As workers grow comfortable enough to return to the office, network teams will need to plan in advance to make sure the network is ready and ensure proper performance. Continue Reading
-
Wi-Fi 6 rollout requires careful review of network devices
Wi-Fi 6 is just one part of the overall enterprise network. Organizations need to evaluate several network components to ensure a smooth Wi-Fi 6 deployment. Continue Reading
-
Common network vulnerabilities and how to prevent them
It's not possible to eliminate all network vulnerabilities, but network teams can implement best practices to limit potential attacks and protect their networks. Continue Reading
-
SASE options for the branch of one -- work from anywhere
More than ever, enterprises need to support individual employees that make up a branch of one. These setups require reliable connectivity, application performance and security. Continue Reading
-
Modern network infrastructure design taps security, flexibility
As workers return to office settings, organizations may have to update their on-premises network infrastructure design to improve scalability and connectivity. Continue Reading
-
How cloud-based network monitoring tools expand visibility
Organizations have become even more distributed and virtual in the wake of COVID-19. Cloud-based network monitoring is well suited to keep tabs on network performance. Continue Reading
-
Best practices for VPN traffic monitoring
VPNs are still a critical part of many enterprise remote access strategies. Networks teams that monitor VPN traffic should look at factors like application usage and overhead. Continue Reading
-
5 basic steps for effective cloud network security
In hybrid infrastructures, old network security systems won't work. Enterprises must adopt effective cloud network security strategies to keep their assets safe. Continue Reading
-
Perform a network health check with network testing
Network engineers can use myriad network testing approaches to ensure their networks are efficient and reliable. The key is incorporating them into a regular maintenance cycle. Continue Reading
-
Why 5G will redefine WWAN and SD-WAN
The nexus of 5G, WWAN and SD-WAN promises to usher in an array of custom tools and services for enterprises. Continue Reading
-
Key tasks in a network maintenance checklist
Network technologies and devices might change over time, but certain maintenance tasks, such as data backup and device inventory, will always be essential for network teams. Continue Reading
-
NOC performance metrics for optimal operation
NOC best practices include using standardized network designs and automation. But don't forget to identify performance metrics that help track and measure operational success. Continue Reading
-
5 steps to conduct network penetration testing
Enterprises that want to ensure competent network security strategies should look at how they can implement penetration testing, considering red teams and physical pen tests. Continue Reading
-
5 benefits of Wi-Fi 6 for enterprise networks
In a perfect world, Wi-Fi 6 could introduce several benefits to business networks. But real-world conditions could curb the wireless technology's true potential. Continue Reading
-
Open RAN architecture gives operators options, challenges
Open RAN architecture could give telecom operators more flexibility as they deliver enterprise-grade 5G services. But making the RAN a virtual function takes careful planning. Continue Reading
-
How to build a private 5G business case
As you build a private 5G business case, be sure to include private 5G's benefits and challenges, as well as how to prove its ROI. Here's everything you need to know. Continue Reading
-
7 steps for a network and IT security foundation
Enterprises should make it a habit to review their IT security systems, following steps that include network segmentation, multifactor authentication and security education. Continue Reading
-
A work-from-home reimbursement policy for network tech
A work-from-home reimbursement plan should drive better network and internet connectivity rates for remote workers and not just offset employees' existing bills. Continue Reading
-
How to secure remote access for WFH employees in 4 steps
The global pandemic caused mayhem on network security environments. Enterprises need to bring rigor back to their systems and tighten security for remote workers. Continue Reading
-
Top tips to provide IT support for remote workers
To support employees working from home, network teams should carefully monitor VPN traffic, review firewall rules and rely on remote access support software. Continue Reading
-
Weighing the advantages of private 5G vs. carrier 5G
Considering private 5G vs. carrier 5G for your interior networking? No single option fits all, but here are some factors you should consider. Continue Reading
-
SASE hype includes SD-WAN, but does it need to?
Much of the hype around Secure Access Service Edge features the importance of SD-WAN with SASE, but do the two need each other to thrive? Research says probably not. Continue Reading
-
How to monitor home network traffic for added security
When addressing home network monitoring, track all connected devices, and take advantage of open source tools, like packet capture, to sniff out malicious traffic. Continue Reading
-
The tradeoffs and cost of network redundancy
Network redundancy costs vary depending on enterprise use cases, but the determining tradeoff usually depends on how long a company can sustain network downtime. Continue Reading
-
How the SolarWinds vulnerability affects networking
The SolarWinds attack resulted in a bevy of network vulnerabilities, like masked traffic and backdoor access. Network teams should take the time to review their security strategies. Continue Reading
-
10 network security tips in response to the SolarWinds hack
From perimeter protection to persistent patching, enterprises should regularly review, update and test their network security plans, especially in response to the SolarWinds hack. Continue Reading
-
Considerations for SASE management and troubleshooting
SASE opens new territory for network and security management and troubleshooting. Ultimately, teams should look for system usability and visibility into traffic flows and policies. Continue Reading
-
SASE challenges include network security roles, product choice
Secure Access Service Edge blends network and security functions. While this integration has its benefits, enterprises still need to address some SASE challenges. Continue Reading
-
Myths and realities of a Wi-Fi 6 upgrade
Despite the promise of high data rates, longer client battery life and more efficient radio techniques, enterprises need to weigh Wi-Fi 6's limitations. Continue Reading
-
How to calculate SASE return on investment and costs
SASE return on investment will vary for each organization, depending on use cases and architecture requirements. But the metrics used to determine ROI and cost factors are the same. Continue Reading
-
Top 5 SASE use cases balance network connectivity, security
Secure Access Service Edge can enhance network performance and security controls for remote sites. Discover some of the other top SASE use cases and deployment options. Continue Reading
-
Setting up and using a home VLAN to segment network traffic
Virtual LANs can help homeowners segment their network traffic for enhanced control and security. Network analyst John Fruehe takes you inside his home VLANs. Continue Reading
-
How SASE convergence affects network and security roles
Most enterprises have siloed departments, but SASE's convergence of network and security functions could disrupt those constructs and drive more communication between teams. Continue Reading
-
Software-defined home offerings drive remote productivity
Say hello to software-defined home, a 'branch of one' package that combines professional-grade Wi-Fi, security, SD-WAN and centralized management for remote workers. Continue Reading
-
How to calculate a subnet mask from hosts and subnets
IP addressing and subnetting are important and basic elements of networks. In this article, learn how to calculate a subnet mask based on the required number of subnets and hosts. Continue Reading
-
With SASE, security and networking tech come together
SD-WAN, SASE or some combination of the two -- which approach will deliver the best and most secure network connectivity in your organization going forward? Continue Reading
-
Cloud automation use cases for managing and troubleshooting
Cloud automation use cases highlight the benefits these tools can provide to companies evaluating how best to manage and troubleshoot their cloud connections. Continue Reading
-
Implementing an SDP architecture for added network security
A key component of a software-defined perimeter requires client authentication before connection, while also making a network's internals invisible to outsiders. Continue Reading
-
What network managers need to know about SaaS optimization
When strategizing SaaS optimization tactics, network management teams should consider their traffic steering preferences and geographically dispersed access points. Continue Reading
-
How service mesh enables microservices networking
As microservices applications grow more popular, IT teams need to enable reliable networking between them for proper communication. That's where service mesh comes in. Continue Reading
-
How to use ChatOps to automate network tasks
Integrating team collaboration chat systems with network automation results in the ability to automate tedious workflows, enabling faster problem resolution and streamlined operations. Continue Reading
-
Why networks should apply security by design principles
Security by design incorporates security and risk management directly into network architecture, using segmentation and Agile infrastructure design. Continue Reading
-
How and why to implement Wi-Fi QoS
Quality of service, as network pros know, prioritizes apps as they cross the network. But Wi-Fi QoS needs to be considered, too, in relation to the overall network. Continue Reading
-
How COVID-19 will reshape 2021 enterprise network spending
COVID-19 has shifted enterprise network spending. Campus LAN traffic may never be the same, but companies are earmarking funds to better support the remote workforce. Continue Reading
-
How to ensure a scalable SASE architecture
Don't assume all SASE architecture is the same, especially when it comes to scalability. Enterprises should consider distance to vendor PoPs, office locations and agent onboarding. Continue Reading
-
Compare low-power Wi-Fi protocols and their roles in IoT
Wi-Fi means more than faster speeds. Low-power Wi-Fi will help companies improve the efficiency of their IoT deployments, thanks to longer signal range and power consumption features. Continue Reading
-
How to build a resilient network design
Everything fails eventually, even in networking. Enterprises can prepare for network failure by building resilience and redundancy into their network infrastructure design. Continue Reading
-
Global company weighs 5G for manufacturing, IoT analytics
Global manufacturer Sanmina is studying the benefits of deploying 5G on its manufacturing floor to improve the speed of IoT and analytics data exchanges to the cloud. Continue Reading
-
What's involved in VPN maintenance and management?
Before an organization's VPN is up and running, IT teams must address four important aspects of VPN maintenance and management to keep abreast of transforming security concerns. Continue Reading
-
How and when to establish enterprise 5G partnerships
Enterprises that buy 5G public services, procure network slices or build their own private 5G networks need to establish the right partnerships for mobile services, equipment and software. Continue Reading
-
Home SD-WAN will redefine next-generation WAN
The need for home-office SD-WAN won't end when the pandemic does. Learn how best to provide this essential tech to your organization's at-home employees. Continue Reading
-
Best practices to maintain VPN security
Enterprises looking to maintain VPN security should focus on proper endpoint security and authentication, VPN server security and documentation for security policies. Continue Reading
-
Benefits of intent-based networking for modern networks
Intent-based networking can benefit network teams working remotely with increased workloads due to COVID-19. Benefits include reduced human error and automated manual tasks. Continue Reading
-
3 SD-WAN cloud connectivity options to explore
Enterprises can connect their SD-WAN infrastructure to cloud providers' platforms using three methods: back-to-back access, private PoP connections and internet VPN. Continue Reading
-
3 DDoS mitigation strategies for enterprise networks
Enterprises can choose from three major approaches to mitigate DDoS attacks on their networks: Buy from an ISP, do it themselves or use a CDN service. Continue Reading
-
The benefits of building a network automation lab
Network teams can build network automation labs to create a safe environment to test and validate automation tasks before running them in production networks. Continue Reading
-
How to select and set up SD-WAN and DIA
When evaluating different options for SD-WAN and direct internet access, IT teams can't forget to consider application performance, network uptime and support for each option. Continue Reading
-
How to secure a home network for remote workforces
Remote workers rarely achieve the same network security at home that offices provide. Yet, with the right tools, remote workers can efficiently learn how to secure a home network. Continue Reading
-
How to set up a new business network
Building a new network can be complicated, but IT teams can ease the design process and future management by choosing the right architecture and documenting each decision. Continue Reading
-
Gain SD-branch benefits through automation, orchestration
SD-branch technology is evolving, but don't put off learning about what this tool can do now and the advantages it will deliver in the near future. Continue Reading
-
What to know about VPN termination
Network teams make several decisions when designing a secure VPN. One of those is where in the network, logically, they will terminate the VPN tunnels. Continue Reading
-
Network traffic pattern shifts reflect COVID-19 changes
The novel coronavirus pandemic spurred initial changes in network traffic patterns, but other trends are playing important roles in perpetuating permanent traffic shifts. Continue Reading
-
How to build a network monitoring business case
As network teams construct a business case for a new network monitoring tool, they should include a cost comparison of alternative tools and a strong defense for the selected tool. Continue Reading
-
Network engineer career advice amid the COVID-19 pandemic
As COVID-19 dramatically affects the global economy, people may ask, 'What's next for my career?' No one is sure, but these tips can help network engineers feel and stay secure. Continue Reading
-
A guide on how to learn network automation
Being a network professional means being a lifelong learner. So learn what network automation skills are essential and how best to acquire them quickly. Continue Reading
-
Pair programming pros and cons for network automation
Pair programming is an Agile software development technique that reduces bugs and produces better software. Can pair programming work between networking experts and programmers? Continue Reading
-
Remote access best practices emphasize security, ease of use
COVID-19 has forced companies to determine the best way to keep remote employees supported. Not sure which way to proceed? Consider these remote access best practices. Continue Reading
-
Remote work infrastructure requires on-prem network changes
Demilitarized zone, network access control and VPN termination points are some of the on-premises components that need to be addressed in a remote work infrastructure. Continue Reading
-
The pros and cons of SD-WAN and remote access
SD-WAN could be a compelling option for enterprises that require remote access for mission-critical jobs. But IT teams should be aware of cost, training and implementation barriers. Continue Reading
-
5 needed product features to fix network management issues
Virtualization and public cloud monitoring are among five top network management issues facing companies as they assess tools designed to oversee increasingly complex networks. Continue Reading
-
How ISPs and operators ensure network quality in a pandemic
COVID-19 has caused a spike in remote workers, increased internet usage and traffic surges. Here's how ISPs and telecom operators plan for continuity and quality during the pandemic. Continue Reading
-
Tips to improve network visibility and security
Network visibility and security can be tricky, especially with the range of products available. These tips help teams pinpoint potential vulnerabilities and gauge the tools they need. Continue Reading
-
Why configuration management is important for networks
Configuration management is essential to keep accurate network configuration records and to help organizations avoid potential challenges or problems within their networks. Continue Reading
-
Evolution of cellular 5G backhaul architecture faces challenges
Backhaul has become trendy again and for good reason. 5G backhaul architecture means network architects will have to reconsider how their networks can handle 1 Gbps speeds. Continue Reading
-
How Wi-Fi experts can help during times of crisis management
When faced with disaster response, wireless network professionals can volunteer their Wi-Fi skills and advise friends and family about home network security. Continue Reading
-
Overview of network management tasks and best practices
Network management encompasses a range of tasks and processes. Explore 10 crucial tasks and accompanying best practices to ensure a resilient and functional network. Continue Reading
-
How SASE architecture integrates with network infrastructure
SASE architecture offers a compelling value proposition, as it converges networking and security services onto a single cloud platform. Explore how it works with existing infrastructure. Continue Reading
-
Software-based routing on its way to become the new normal
SD-WAN took the networking world by storm, and software-based routing aims to do the same in the router market. Here's what to expect from the move to software. Continue Reading
-
Why SASE adoption requires a paradigm shift
Enterprises preparing to adopt Secure Access Service Edge should understand how the architecture presents organizational and architectural challenges for network and security teams. Continue Reading
-
How to manage the surge in remote video internet traffic
As more people work from home and create more internet traffic, enterprise network managers should adjust bandwidth levels and consider connectivity upgrades. Continue Reading
-
802.3cg standard extends single-pair Ethernet range and speed
IEEE 802.3cg is a single-pair Ethernet standard that aims to support speeds up to 10 Mbps, extend Ethernet range up to 1,000 meters and offer multidrop capabilities. Continue Reading
-
How supporting a remote workforce stresses the network
Make sure your network can support a remote workforce by analyzing 12 potential issues that can cause stress on your network, including VPN concentrator capacity and traffic routing. Continue Reading
-
Before deploying SD-WAN, assess your underlay network components
If enterprises are to reap the benefits of SD-WAN, they better pay attention to the SD-WAN underlay network. Learn what you should take into consideration. Continue Reading
-
How to handle vendor code bugs in enterprise Wi-Fi networking
Too many features in Wi-Fi devices can breed some serious code bugs. One coping mechanism is to seek help from fellow customers and network integrators. Continue Reading
-
The convergence of networking and security at the edge
Networking and security are converging with offerings like SD-WAN and SD-branch. But enterprises and vendors must overcome IT silos that delay innovation and decision-making. Continue Reading
-
Plan a VPN and remote access strategy for pandemic, disaster
Disasters and pandemics occur unexpectedly, affecting companies, workers and networks alike. Plan a remote access strategy that covers VPN requirements, bandwidth demands and licenses. Continue Reading
-
Ansible limitations for network automation
Ansible can be a powerful tool for network automation, but users should be aware of its limitations with debugging, performance, complex data structures and control flow. Continue Reading
-
What do 2G and 3G sunset dates mean for business customers?
A 2G and 3G shutdown probably won't affect businesses much, but embedded IoT devices may see some problems as these two older cellular technologies fade away. Continue Reading
-
An introduction to network automation with Ansible
Ansible is one of the most popular open source network automation tools. Network pros can use it to perform basic network automation tasks, like collecting ARP table data. Continue Reading
-
Watch for these 6 wireless networking trends in 2020
No doubt you've heard about 5G and Wi-Fi 6. But don't forget other wireless trends emerging in 2020, such as CBRS, dynamic spectrum sharing and Open RAN. Continue Reading