John Breeden II

John Breeden II is an award-winning journalist and reviewer with over 20 years of experience covering technology. He is the CEO of the Tech Writers Bureau, a group that creates technological thought leadership content for organizations of all sizes.

12 killer (and free) tools for network engineers

What is Wireshark?

What is Wireshark?

Take a bite out of network performance issues with this open-source tool

  What is Nmap and why do you need it on your network?

What is Nmap and why do you need it on your network?

While there are many monitoring tools available to network administrators for port scanning and network mapping, Nmap is the de facto standard. Here's why.

What is a private cloud?

What is a private cloud?

Private clouds offer a safe haven for applications and data not suited to the public cloud for compliance, regulatory, security or other reasons.

What is Ethernet?

What is Ethernet?

Ethernet protocol connects LANs, WANs, Internet, IoT devices, cloud, Wi-Fi systems into one seamless global communications network

What is a network operations center (NOC)?

What is a network operations center (NOC)?

A NOC is a centralized location where IT professionals can troubleshoot, monitor and optimize enterprise networks

What is the Spanning Tree Protocol?

What is the Spanning Tree Protocol?

Spanning Tree optimizes Ethernet LAN traffic by eliminating loops and re-routing around disabled nodes

Release the monkey! How Infection Monkey tests network security

Release the monkey! How Infection Monkey tests network security

This free, open source penetration testing tool uses real attacks and real techniques to try and exploit its way into a network.

Review: SaltStack brings SecOps to network orchestration and automation

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Review: Blue Hexagon may make you rethink perimeter security

Review: Blue Hexagon may make you rethink perimeter security

This fully functional, fully trained cybersecurity tool is ready on day 1 to spot threats on whatever network it’s charged with protecting.

Review: vArmour flips security on its head

Review: vArmour flips security on its head

Instead of focusing on the bad guys, vArmour identifies good processes and locks them down.

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks

Beat the bad guys at their own game with SafeBreach’s simulated cyberattacks

We reviewed SafeBreach with a test network of thousands of virtual clients. There were data servers and clients, with systems configured for business groups like customer service and accounting.

Load More