Login
Password
Sources on this Page

> Headlines by Category

 Home / Technology / Networking & Communications / LAN / WAN

You are using the plain HTML view, switch to advanced view for a more complete experience.

What is intent-based networking?
Apcela advises how to build a hybrid IT platform for better performance and stronger security

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe

To state the obvious, enterprises are moving their applications to the cloud, and this movement is happening at an accelerating pace. Many technology chiefs are working under a “cloud-first policy,” which means that if an application can be deployed as a service, then that should be the first choice for the way to go.

While the applications themselves are moving to the cloud, the application delivery infrastructure is still stuck in the enterprise data center. Under the existing network architecture that most enterprises still have today, all traffic comes back to the enterprise data center before going out to the cloud. The on-premises data center is where the switching and routing, security, and application delivery controllers reside. This infrastructure is architected for a bygone era when applications were all in the data center.

To read this article in full or to leave a comment, please click here

6 things you need to know about virtual private networks

A virtual private network is a secure tunnel between two or more computers on the internet, allowing them to access each other as if on a local network. In the past, VPNs were mainly used by companies to securely link remote branches together or connect roaming employees to the office network, but today they're an important service for consumers too, protecting them from attacks when they connect to public wireless networks. Given their importance, here's what you need to know about VPNs:

VPNs are good for your privacy and security

Open wireless networks pose a serious risk to users, because attackers sitting on the same networks can use various techniques to sniff web traffic and even hijack accounts on websites that don't use the HTTPS security protocol. In addition, some Wi-Fi network operators intentionally inject ads into web traffic, and these could lead to unwanted tracking.

To read this article in full or to leave a comment, please click here

Post Selected Items to:

Showing 10 items of 144

home  •   advertising  •   terms of service  •   privacy  •   about us  •   contact us  •   press release design by Popshop •   © 1999-2017 NewsKnowledge