Northbound applications, Southbound applications, SDN security applications, SDN management applications, Layer 4-7 network services, Network automation and orchestration, Service Provider SDN applications
SDN control plane, Network hardware and SDN, SDN network virtualization, Network overlay software, SDN WAN, Campus LAN SDN, Software-defined data center, Software-defined storage, SDN testing, Service provider networks and SDN
A10 gives users more ammunition in the never-ending battle to combat DDoS attacks.
User Activity Monitoring is as important as asset monitoring for enterprise network security, finds research from Enterprise Management Associates.
The Border Gateway Protocol does a lot of wonderful things. But there are steps you should take to ensure your IP routing is secure.
Provisioning and deploying a WAN and VPN is an everyday function for engineers. But can you do that for an office 4,000 miles away without leaving your office?
Successful MPLS migration takes careful consideration. Robert Sturt offers some advice about the steps you should consider before making the move.
Quality of service and service-level agreements are just a few of the considerations enterprises must keep in mind when assessing global MPLS providers.
Helping customers decide how, when and if to move workloads to the cloud is a critical value-add for partners, says David Stewart, solutions architect at 2nd Watch.
So far, Helion has been generally well-received by HP partners and customers alike. According to partners, the platform reduces the risks for solution providers looking to make the move to cloud.
Partners must develop a balanced portfolio between on-premises and cloud-based offerings and endure the recurring revenue model's cash flow trough, says Tintri's Americas channel chief.
Social customer service is engaging customers where they gather online. Expert Lisa Durant explains how to best handle these online interactions.
Speedshare, a new cloud-based service, allows business users to browse the Web or an application simultaneously, without any downloads or plug-ins.
When does bulk licensing make sense? When is it cheaper than buying individual licenses? Expert Carrie Higbie tells you how to avoid paying too much for your UC software licenses.
With an IBM partnership yet to materialize, Apple wants enterprises to buy into its products, but whether it offers solid IT support and services remains to be seen.
BlackBerry's return to QWERTY keyboard devices and improvements to BES 12 are steps in the right direction, but is it too little, too late for many IT shops that have already moved on?
Android's popularity makes it a prime target for hackers and attackers. Fortunately, there are plenty of security features to keep devices safe.
We built a data center several years ago and are refreshing the IT equipment in it. Should I worry about how big and heavy my new cabinets will be for the existing structure?
The Open-IX data center certification aims at resiliency through self-declared certification and an annual renewal process, rather than proprietary oversight.
Old ways of securing physical networks are giving way to logical techniques. The change in traffic to an East-West, data-center-centric, software-defined-network model necessitates a new security plan.