White Papers by Topic: Networking

Resources available: 104

SIP Trunking is Key to Accelerating Unified Communications Deployments

Why you need to ditch traditional trunk lines to reap all of the benefits UC has to offer.

Does your Service Provider Embrace a Customer-Centric Approach to Convergence?

Discover the six features of a successful convergence strategy.

Continuous Systems, Nonstop Operations With Junos Software

High availability (HA) represents one of the most difficult challenges facing today's high-performance networks. Juniper calls its approach to HA "continuous systems". Learn more.

Advancing the Economics of Networking

Aging network systems and old habits have dictated how businesses spend their IT budgets. Juniper Networks® proposes to change this economic model by delivering a new family of solutions that reduce capital and operational expenses, freeing up IT budget dollars and allowing businesses to invest in innovative technologies

Managing to Secure

Many security professionals responsibilities include managing firewalls, worrying about e-mail security, testing and deploying software patches, securing Web caches and gateways and much more. The last thing network security manager’s need is more devices to manage. Learn about the four key components of IPS manageability to consider for effective network-security management.

The 5 Building Blocks of Attack Coverage

When it comes to intrusion prevention – and to detecting and blocking unwanted or malicious network traffic – the focus should be on quality of a solution’s attack coverage, not quantity. Learn about the five building blocks of attack coverage to help determine why one Intrusion Prevention System (IPS) is better than another.

IPS vs IDS: Similar but Polar Opposite Underneath

A common notion is that an Intrusion Prevention System (IPS) is nothing more than an Intrusion Detection System (IDS) deployed in-line with blocking capabilities. Learn why this IPS notion is incorrect and the many critical differences in the nature and priority of IPS and IDS requirements organizations need to consider before making a commitment.

3 Waves, 1 Defense: How IPS Protects

Dating back to ancient Greece, a common military tactic was to launch a “human-wave” attack. Network security attackers today use a version of this ancient military tactic, but have become increasingly sophisticated. Learn how the security threat landscape has evolved and how to determine the best use of network security solutions to block ongoing and future waves of attacks.

The State of Branch Office Networking and IT Consolidation Today

In August 2009, InfoWorld invited IT leaders to participate in a survey on WAN optimization and branch office consolidation and virtualization. The following report represents top-line results of that survey.

eNode B Wraparound Testing: A Comprehensive Guide

This white paper discusses the process of testing the eNode B elements of an LTE deployment, including Ixia’s available test solutions.

©1994-2014 Infoworld, Inc.