Should security systems be the network?

Should security systems be the network?

Small enterprises can get away with using security gear as their network infrastructure, but can larger ones, and is it a good idea?

3 ways to reach the cloud and keep loss and latency low

3 ways to reach the cloud and keep loss and latency low

Performance of cloud-based apps that create lots of network traffic can be hurt by network loss and latency, but there are options to address them.

4 ways to better secure your network infrastructure

4 ways to better secure your network infrastructure

Must-do initiatives include eliminating generic credentials, regularly auditing IT admin accounts, and deploying MFA for infrastructure access.

Don’t let automation break change management

Don’t let automation break change management

Reliable change-management practices are critical to expanding network automation.

How to manage scripts that manage network automation

How to manage scripts that manage network automation

By following these four best coding practices, writers of scripts that automate networking chores can reduce errors, track changes, and ensure the code can be readily maintained as it evolves.

The case for declarative network automation

The case for declarative network automation

Some network teams are finding power and simplicity in the shift from telling devices what to do—imperative programming—to describing what they should be—declarative programming.

Zero trust requires network visibility

Zero trust requires network visibility

AI and machine-learning techniques are imperative in a zero-trust environment that depends on analysis of the behavior of every device, person, or system using the network.

Use zero trust to fight network technical debt

Use zero trust to fight network technical debt

Adopting a zero-trust approach can be the impetus IT teams need to expose technical debt and make sure all network components are capable of enforcing security controls.

Zero trust requires clear architecture plans before changing core systems

Zero trust requires clear architecture plans before changing core systems

Successful enterprises approach zero trust carefully, with the big picture in mind, before making changes to network access, data management or application engineering.

5G wireless WAN will have benefits beyond 4G WWAN

5G wireless WAN will have benefits beyond 4G WWAN

Cellular WAN connectivity has solid enterprise use cases with 4G, and as 5G rolls out, will become more attractive for its speed, reliability, and price.

How wireless WAN can make SD-WAN more agile and resilient

How wireless WAN can make SD-WAN more agile and resilient

WWANS can augment SD-WANs with failover, redundancy, and rapid set-up.

Rethinking the WAN: Zero Trust network access can play a bigger role

Rethinking the WAN: Zero Trust network access can play a bigger role

COVID-induced work-from-home prompted WAN innovations that demonstrate VPNs and SD-WAN aren’t the only good options.

Software-defined perimeter + Zero Trust: A good place to start

Software-defined perimeter + Zero Trust: A good place to start

Software-defined perimeter can be an important part of Zero Trust that enforces network access, but first plan the Zero Trust architecture and the changes that means for the network and security.

Load More