Named data networking: names the data instead of data locations

Named data networking: names the data instead of data locations

Will NDN kill the cloud, just like content delivery networks (CDN) kill latency?

The role of open source in networking

The role of open source in networking

SD-WAN vendors use open source as the foundation of their solutions and then add additional functionality over the baseline.

The cloud-based provider: Not your grandfather’s MNS

The cloud-based provider: Not your grandfather’s MNS

Ideally, meeting the business objectives of speed, agility and cost containment boil down to two architectural approaches: the legacy telco versus the cloud-based provider.

Zero trust: The transition from legacy to cloud-native

Zero trust: The transition from legacy to cloud-native

To undergo the transition from legacy to cloud-native application environments you need to employ zero trust.

Can TLS 1.3 and DNSSEC make your network blind?

Can TLS 1.3 and DNSSEC make your network blind?

DNS & ISN encryption are likely to present numerous problems to the network operations, optimization and SD-WAN vendors.

Getting smarter about managing the SD-WAN last-mile

Getting smarter about managing the SD-WAN last-mile

New last-mile management services eliminate key challenge to SD-WAN deployment.

Zero-trust security adds necessary ingredients

Zero-trust security adds necessary ingredients

Let's face it: VPNs are no longer in vogue. Users do not want to spend the time setting them up, and network admins are increasingly moving to a zero-trust model, which ensures a high level of security while empowering users to work...

The future of cloud interconnects

The future of cloud interconnects

Mission critical cloud applications require sharp elbows.

Self-healing SD-WAN removes the drama of high-availability planning

Self-healing SD-WAN removes the drama of high-availability planning

No more complex high-availability decision making.

Introducing Named Data Networking

Introducing Named Data Networking

No more IP addresses.

Identity awareness: it’s more than just a packet

Identity awareness: it’s more than just a packet

Routing must reflect business context.

The WAF backed by artificial intelligence (AI)

The WAF backed by artificial intelligence (AI)

Web application firewalls backed by artificial intelligence and machine learning are beginning to surface as major successes against DDoS attacks and the application DDoS world.

Zero Trust Networking (ZTN): don’t trust anything

Zero Trust Networking (ZTN): don’t trust anything

I don’t even want you to knock on my door! Let’s craft a new story.

The rise of EVPN in the modern data center

The rise of EVPN in the modern data center

Layer 2 networks: what you learn from watch and learn.

The future of devops for network engineers

The future of devops for network engineers

Script-driven approach is a playground. Let’s finally mature.

Securing microservice environments in a hostile world

Securing microservice environments in a hostile world

If you build bridges you have to go where the water is.

Scalable groups tags with SD-Access

Scalable groups tags with SD-Access

An effective security posture starts with the right visibility.

A primer on closed-loop automation

A primer on closed-loop automation

The shortest path to achieving intent-based networking.

The rise of artificial intelligence DDoS attacks

The rise of artificial intelligence DDoS attacks

The leaves may change color, but the roots are the same. Are you ready for AI-based DDoS attacks?

SD-WAN: Hardening external connectivity

SD-WAN: Hardening external connectivity

Traditionally, SD-WAN was used to connect internal resources. Nowadays challenges arise as to how we connect external identities such as remote partners and mobile workers from multiple locations.

Load More