MAC Bridges Reports

Understanding the pros and cons of network virtualization
sponsored by TechTarget Security
EGUIDE: This expert E-Guide from SearchServerVirtualization.com explains the benefits of virtualizing the network. Find out how to utilize this technology to combine multiple networks into a single logical network. Plus, get answers to common questions about network virtualization technology to ensure a smooth transition.
Posted: 29 Nov 2011 | Published: 29 Nov 2011

TechTarget Security

Countering Cyber-Crime with a Sharp Eye and a Clear Plan
sponsored by TechTarget Security
EBOOK: Bigger, more diverse networks mean a bigger attack surface for hackers. Today's networking pros must assess and update network security strategies to account for new vulnerabilities and respond to inevitable attacks.
Posted: 14 Aug 2014 | Published: 21 Aug 2014

TechTarget Security

VXLAN Monitoring: How to Gain Virtual Network Overlay Visibility
sponsored by Ixia
EGUIDE: This expert E-Guide from SearchNetworking.com provides the information you need to gain virtual network overlay visibility for proper VXLAN monitoring. View now to learn more about VXLAN and which readily available tools can help you overcome the visibility hurdle.
Posted: 13 Dec 2012 | Published: 13 Dec 2012

Ixia

Next Generation Network Management Techniques
sponsored by TechTarget Security
EZINE: The February edition of the Network Evolution E-zine explore the latest advances in DevOps and uncover what you need to know for working within the movement. Also read several other featured articles!
Posted: 02 Feb 2012 | Published: 02 Feb 2012

TechTarget Security

Integrating Mobile Access into Your VPN Environment
sponsored by AT&T Corp
WHITE PAPER: Enterprises are increasingly facing the task of integrating a variety of access services and devices onto their Virtual Private Networks (VPN). This white paper takes a closer look at some key issues that arise when bringing access methods into your VPN.
Posted: 31 May 2007 | Published: 07 Jun 2006

AT&T Corp

eGuide: Meshing Virtual Machine and Physical Systems Management
sponsored by Dell EMC and Microsoft
EGUIDE: This paper explains how to provide adequate network redundancy and isolation, how to implement adaptive automation practices for high availability, and how to take advantage of the best tools to eliminate separate virtual and physical management structures.
Posted: 17 Dec 2008 | Published: 17 Dec 2008

Dell EMC and Microsoft

Simplify VMware vSphere* 4Networking with Intel® Ethernet 10 Gigabit Server Adapters
sponsored by Intel
WHITE PAPER: Server virtualization can quickly result in excessively complex network ports if you don't have a plan. This white paper explores the factors that can lead to GbE port bloat, including physical server connection paradigms and security procedures. 
Posted: 05 Jul 2011 | Published: 05 Jul 2011

Intel

Networking Requirements for Bringing iPads in the Classroom
sponsored by TechTarget Security
EGUIDE: Discover the benefits a BYOD or iPad-in-the-classroom program has to offer, and learn why a stable wireless LAN is vital to their success.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

TechTarget Security

Best Practices in Authentication and Access Control
sponsored by Nevis Networks
WHITE PAPER: Read this white paper and learn how the right LAN security solution can streamline user authentication for both wired and wireless LANs.
Posted: 13 Aug 2007 | Published: 01 Aug 2007

Nevis Networks

Tips for your Cloud Network Migration
sponsored by NetFoundry
EGUIDE: In this expert e-guide, get tips from Andrew Froehlich, president of West Gate Networks, and principal analyst John Burke from Nemertes Research on how to execute your cloud network migration.
Posted: 13 Sep 2018 | Published: 13 Sep 2018

NetFoundry