Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Security Channel

News and Analysis

Heartbleed's Network Effect

The crypto bug likely will have a long-lasting impact on internal servers, clients, and VPN networks.

More News and Analysis

More News and Analysis in Security Channel »


Cloud-Based Security Helps Aspen Fend Off Malware

Cloud security service cuts down on malware infections and provides relief for small network team in Colorado.

More Architectures

More Architectures in Security Channel »

Reviews & Workshops

Digital Hoarding: Do We Have a Problem?

Approximately 2.8 zettabytes of data were created and stored in 2012, and that number is expected to increase 50-fold by the end of the decade. When does data storage turn into data hoarding, and what are the consequences?

More Reviews & Workshops

More Reviews & Workshops in Security Channel »



Building an Information Security Policy Part 4: Addresses and Identifiers

April 21, 2014 01:10 PM
Posted by Natalie Timms

Proper traffic identification through techniques such as IP addressing and VLANs are the foundation of a secure network.

See all blogs by Natalie Timms

| Full Post

Tags: information security policy, IP addressing, VLANS, secure network, VRF, IPv6

Channel: Security,


SDN Strategies Part 4: Big Switch, Avaya, IBM,VMware

April 18, 2014 11:59 AM
Posted by Kurt Marko

This series on SDN products concludes with a look at Big Switch's updated SDN strategy, VMware NSX, IBM's hybrid approach, and Avaya's focus on virtual network services.

See all blogs by Kurt Marko

| Full Post

Tags: SDN strategies, SDN products, Big Switch, VMware NSX, IBM, Avaya, OpenFlow

Channel: Cloud Computing, Networking & Mgmt, Security, Virtualization,


Networking, Security, And Grand Unified Theory

April 11, 2014 12:08 PM
Posted by Tom Hollingsworth

With a system that can address both networking and security in NSX, Martin Casado of VMware is borrowing an idea from the world of physics.

See all blogs by Tom Hollingsworth

| Full Post

Tags: VMware, NSX, Martin Casado, OpenStack, firewalls, IPS, Interop

Channel: Next Gen Network, Security, Virtualization,


The Software-Defined Data Center: Potential Game Changer

March 31, 2014 11:35 AM
Posted by Andrew Froehlich

The SDDC is poised to bring revolutionary changes by providing flexibility to data center storage, switching, security and other infrastructure components.

See all blogs by Andrew Froehlich

| Full Post

Tags: software-defined data center, SDDC, VMware, server virtualization, data center storage.

Channel: Next Gen Network, Security, Virtualization,


How Virtualization Can Simplify Your BYOD Strategy

March 17, 2014 12:08 PM
Posted by Bill Kleyman

Virtualization technologies can help enterprise IT teams support the new user-centric model created by IT consumerization.

See all blogs by Bill Kleyman

| Full Post

Tags: BYOD strategy, virtualization technologies, IT consumerization, network virtualization, private cloud

Channel: Data Center, Networking & Mgmt, Next Gen Network, Security, Wireless, Private Cloud,


Network Engineers: Don't Be The Dinosaur

March 13, 2014 12:37 PM
Posted by Ethan Banks

Network pros can't stick with their old ways of working if they want to have a future in the world of software-defined networking.

See all blogs by Ethan Banks

| Full Post

Tags: network engineer, networking pros, SDN, software-defined networking, firewalls, SDN controller

Channel: Networking & Mgmt, Security, Virtualization, Interop,

Next >>

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013

TechWeb Careers