Networking

Networking | News, how-tos, features, reviews, and videos

tech spotlight iot intro by  go unlee gettyimages 1174958392 thinkstock 178457492 3x2 2400x1600
broken lock amid binary code and circuits

Coronavirus (COVID-19)

Coronavirus: What companies are ready for our new reality?

One class of companies is already equipped to work in a fully distributed employee model. Another going to have a difficult time adapting to most employees having to work from home. Some won’t survive if this lasts more than a few...

Chain links secure multiple data stream segments.

Review: Achieving enlightened segmentation with Illumio

While segmentation is a powerful defensive tool, it’s also difficult to manage and can easily break applications that need to communicate with other services or the outside world. The Illumio platform solves many of these headaches.

youtube thumbnails template
video

Making the move to 5G: What to know, how to plan for it

Is 5G real? When should you upgrade? How will enterprises benefit and what are the costs and ROI? Analyst Jack Gold joins IDG TECH(talk) hosts Juliet Beauchamp and Computerworld's Ken Mingis to answer those questions and more to help...

secure system / network security policy management

Review: SaltStack brings SecOps to network orchestration and automation

SaltStack Enterprise, and its optional SecOps modules, is one of the only platforms available today that can fully manage complex enterprise environments while also protecting them.

Digital Transformation [DX]  >  dandelion seeds blown by a virtual wind of change

The state of digital transformation in 2020

The lessons learned from a decade of digital transformation provide a roadmap for those embarking on their own initiatives. CIO, Computerworld, CSO, InfoWorld, and Network World team up to dissect that legacy from every angle.

Network World [slideshow] - Top 10 Supercomputers 2018 [slide-01]

Most popular tech stories of 2019

Insider Pro subscribers pick the Top 10 articles published in our debut year.

802.11ax Wi-Fi routers: Aerohive AP650, ASUS Rapture GT-AX11000 and D-Link AX6000

How to secure your router and home network

Many users don't realize it, but their internet router is the most important electronic device in their home and is an attractive target for attackers.

keeping the cloud secure cloud security lock padlock private cloud

VMware amps security with in-house, Carbon Black technology

VMware's Carbon Black platform, along with VMware NSX, VMware Workspace ONE, VMware Secure State and future innovations, will deliver built-in security to networks, endpoints, workloads, identity\ies, cloud and analytics.

network security lock padlock breach

How IT pros deal with SD-WAN security concerns

When baseline SD-WAN security is not enough, enterprises are adopting extra measures such as intrusion prevention, anti-virus, unified threat management and more

youtube thumbnails template
video

What's next for 5G in the U.S.? | TECH(talk)

5G has been getting more and more buzz over the past few months, but very few people have actually experienced its promised high speeds. Customers in the U.S. are still months--if not years--away from widespread 5G coverage. PCWorld's...

tt19 040 state of 5g thumb 2560x1440
video

U.S. government voices concerns about China's involvement in 5G

As the global push toward 5G continues to pick up speed, government officials in the U.S. continue to have concerns about China's growing dominance in the 5G market. One U.S. senator, Sen. Mark Warner, has concerns about Chinese...

network security / network traffic scanning

3 leading network access control products reviewed

Real IT users evaluate network access control solutions: Cisco Identity Services Engine, Aruba ClearPass and ForeScout CounterACT. (Download the 27-page comparison.)

CSO  >  macOS Mojave endpoint security

Reviewing endpoint protection products (and picking the Top 10)

As you add more and more smartphones, laptops, tablets and other wireless devices that need to connect into your network remotely, how do you ensure you're secure? Download this report to evaluate the best options.

000.00 00 22 15.still002
video

What is IPv6?

IPv6 is the latest version of the main communications method that identifies and locates computers and other devices on the internet. It provides more efficient packet handling, improving performance and security. Yet despite this,...

tf19 043 thumb update
video

How tariffs on China affect tech buyers | TECH(feed)

The Trump administration levied tariff on many Chinese-made goods, including lots of tech hardware. Tech industry leaders have come out in opposition to the tariffs, which may result in higher prices. In this episode of TECH(feed),...

Cisco

Security shines at Cisco Live

Cisco's security team highlighted market results, integrated portfolio, and future plans, but there is still some work ahead.

tf19 034 thumb
video

Huawei ban may be delayed, but can the company survive without the U.S.? | TECH(feed)

First the Trump Administration banned business transactions between Huawei and U.S. companies. But now, the White House’s budget director has called for a two-year delay on the ban. If this ban does go into effect, how hard will...

tf19 032 thumb tf4
video

How the U.S. ban on Huawei is affecting business | TECH(feed)

The U.S. ban on Huawei business has already affected small telecom carriers in rural areas. And, unsurprisingly, Huawei responded to the ban with increased legal pressure. This fight is far from over, and Juliet has the latest updates...

Load More
You Might Also Like