Consumerization

Wired LAN News

View All News

Wired LAN Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Wired LAN Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • As 2018 IT budgets rise, network upgrades become priority

    A new TechTarget survey reveals network upgrades in 2018 are an amalgam of legacy and emerging technologies, as Wi-Fi fever spikes and network automation efforts grow. Continue Reading

  • Application delivery controllers evolve to meet new demands

    ADC devices have evolved to deliver a wide range of functionality, including web application firewall, denial-of-service protection, SSL offload and scalable performance. Continue Reading

  • SDN components transform the LAN

    Full software-defined networking is elusive in the local area network, but SDN components can help create a LAN that is more flexible and programmable. Users are beginning to explore what SDN elements like centralized management of policies and roles and automated configuration can do to improve documentation, application integration, network monitoring and security.

    In this month's cover story, we consider how "SDN-lite" components can change the LAN.

    In addition to software driving LAN improvements, software is also furthering advancements in the cloud. In another feature, enterprise experts describe how they are moving toward 100% unified communications in the cloud by retooling IT's focus and building enterprise users' confidence in the technology.

    Finally, in this month's Subnet Q&A, read about first responders in California who have found they are better able to fight wildfires and resolve medical emergencies with a stronger Wi-Fi network and greater communications capabilities.

     Continue Reading

View All Evaluate

Manage Wired LAN

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Wired LAN Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • How to detect and defend against a TCP port 445 exploit

    The WannaCry TCP port 445 exploit returned the spotlight to Microsoft's long-abused networking port. Network security expert Kevin Beaver explains how to detect and defend such attacks. Continue Reading

  • Device diversity complicates endpoint management

    The proliferation of mobile devices in the enterprise presents a number of challenges for desktop administrators. Legacy, PC-oriented approaches to device management are no longer adequate because they treat all devices the same.

    There was a time when all the devices on a corporate network actually were the same -- the pre-smartphone days. Back then IT only needed the one method of managing and securing the corporate-owned devices. Today employees use smartphones, tablets, hybrid laptops and other devices for work; IT must now manage and secure multiple device types and operating systems, and they have to deploy applications too. But because devices are usually employee-owned these days, admins have to find ways to hook into endpoints without disrupting users' personal applications and data. How can they do it? With security and acceptable use policies, as well as mobile device management.

     Continue Reading

  • How do I grant users outside the LAN access to OWA?

    Our company has users who reside outside the local area network. What's the best way to grant those users access to Outlook Web App? Continue Reading

View All Problem Solve