Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • Windows Server 2012 - 10 key features for IT pros

    The release of Windows Server 2012 is just around the corner, with the initial code due to be sent to manufacturing this month and general availability coming in September.

  • Top 10 best new features of Windows Server 8

    Microsoft claims 300 new and improved features in Windows Server 8, but after a few days in Redmond watching demos and stepping through lab sessions, we wonder whether the marketing guys accidentally left off a zero.

  • A guide to Network Access Control authentication

    In the network access control products we tested, authentication varies from very strong to very weak, and every point in-between. When starting down your path of evaluating NAC products, decide very early what kind of authentication mechanism you want, if any.

  • Is your network in gold medal shape?

    As the Winter Olympics get under way, it's time to take stock of your network and check that it's in the best possible shape to deal with current demands.

  • DHCPv6 gets a welcome

    But is it one less reason to adopt IPv6?

  • Getting the NAC of futurology

    A new name for an old concept, the technology and process behind network access control is evolving fast.

  • Networking: Back to basics

    A quick primer on hubs, switches and routers, and which ones operate at which OSI levels.

  • Network security is virtually here

    You might think that talk of virtualised network security is a virtual step too far, but Extreme's Scott Lucas begs to differ.

  • Network access quarantine control

    We explain the standard tools in Windows Server 2003 that will help you to keep infected remote and mobile PCs from damaging the rest of your network.

  • Opinion: The benefits of ubiquitous Linux

    Linux continues to make highly visible inroads into IT infrastructure, and will increasingly provide a viable platform for business-critical, end-to-end enterprise applications.

Featured White Papers

BYOD and the Network Infrastructure

While most BYOD headlines focus on wireless access and mobile device management, network teams know there is much more to accommodating and managing BYOD than that. Everything about BYOD begins with network connectivity ? an IP address, a DHCP lease and a DNS record query ? but the network also must handle the dynamic requirements of personal devices to make sure they work like traditional desktops and laptops. Download this white paper to help you deal with all dynamic and critical networks challenges, including five common to BYOD.
Download whitepaper

Understanding Network Access Control

Network access control is a term that is highly used, but not clearly defined. By understanding the reasons for pursuing a network access control solution, by assessing what needs to be accomplished, and by determining how the solution is to be implemented and used, organizations give themselves a much better chance of uncovering the right technology for their environment.
Download whitepaper

Understanding Network Access Control

Through a comprehensive series of business and technical questions, this paper helps you define and understand your organization?s needs in relation to network access control.
Download whitepaper

Proteus: IP Address Management Built Right

This paper discusses the evolution of IPAM technology toward the use of purpose-built appliances. Proteus? features are discussed in the context of current IPAM solutions and future network considerations. The new approaches to this technology that Proteus embodies are explained in terms of the integration of business processes that it enables.
Download whitepaper

Network Access Control Technologies and Symantec Compliance on Contact

Network Access Control (NAC) is a process designed to reduce security incidents and increase compliance by enforcing IT security policies as a prerequisite for network access. Although ?Network Access Control? is a newly defined category, Symantec has blazed the trail in network access control technologies through the introduction of IPSec VPN and Gateway Enforcement solutions in 2001 and subsequently adding Self-Enforcement, On-Demand agents, and 802.1x LAN Enforcement in 2003. The expansion of enforcement methods continued through 2005 with the introduction of DHCP Enforcement and integration with Cisco?s Network Admission Control solution. In 2006 Symantec maintained our growth pattern by offering Enforcer appliances and a Microsoft® DHCP plug-in solution to further enable enterprise deployments.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map