Get your company's research in the hands of targeted business professionals.
Local Area Networking
A Local Area Network (LAN) is a computer network covering a local area, like a home, office, or group of buildings. Current LANs are most likely to be based on switched IEEE 802.3 Ethernet running at 10, 100 or 1,000 Mbit/s or on Wi-Fi technology . The defining characteristics of LANs in contrast to WANs are: their much higher data rates; smaller geographic range; and that they do not require leased telecommunication lines.
White Paper Published By: ScriptLogic
Published Date: Aug 18, 2011
One of the biggest complexities in desktop management is the fact that no organization has a single desktop configuration and need. There should and there is a better way. Download this whitepaper to find out more.
This white paper describes the surveillance video multicasting technology, highlights the benefits of IGMP as well as its integration in Korenix devices for assuring high quality video communication in surveillance applications.
Guests, contractors, vendors, business partners, and other temporary users require and expect certain level of network access within organizations that they visit. Corporate network access has been typically open; internal LAN connections have seldom required authentication. Today however, regulatory and other security concerns demand that organizations adopt a more secure posture towards these short-term users.
White Paper Published By: TamoSoft
Published Date: Sep 28, 2007
This white paper examines the problems related to the deployment and usage of software-based network monitoring solutions, methods of achieving network traffic visibility in various network configurations that include hubs, switches, routers, etc.
While 802.1X has a growing presence, it's still immature and may not provide all the policy enforcement features commonly required in most organizations. This white paper focuses on the 802.1X standard for authentication and access control and how it compares to the Nevis approach for LAN security.
The ability to monitor, track and report usage based on actual user identity and applications provides for quicker reaction time, easier reporting for compliance, as well as more visibility into the network. Learn about a complete line of solutions for effective identity-based policy enforcement.
Companies are yearning for a solution to guard their network from security risks such as external or untrusted users, and unmanaged endpoints on their internal LAN. NAC technology works well, but a strategic solution is required to fully address the problem of the dissolving network perimeter.
Session Initiation Protocol (SIP) represents the third wave of Internet usage after SMTP (email) and HTTP (Web). Download this free guide now and learn why all firewalls will need to be SIP capable in order to support the wide-scale deployment of enterprise person-to-person communications.
White Paper Published By: Neterion
Published Date: Dec 05, 2006
Virtualization is a key strategy for simplifying deployment of IT resources and maximizing their utilization. Specifically, virtualization refers to the concept of abstracting physical resources such as compute cycles, data storage, and network bandwidth, and then provisioning and sharing these resources amongst multiple applications.
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
White Paper Published By: Opalis
Published Date: Nov 06, 2006
This white paper describes how automating IT processes greatly reduces operational costs and improves service delivery. Learn how to standardize best practices and integrate data center and operations tools without the management burden associated with scripts and home-grown programs.
This paper addresses several issues organizations should consider when analyzing the efficacy and costs of NAC solutions and looks at a complementary alternative technology based on TNT’s Identity™, which helps address and overcome some limitations of NAC solutions.