BYOD Policy Creation

BYOD or Bring-Your-Own-Device is more than shifting devices to employees.  It has complex and unexpected implications that you should define before implementation.  The following are some key components of a successful BYOD strategy: Device Choice for BYOD Employees wanting choice is the primary motivator for a BYOD strategy.  The employee may have a smartphone or tablet […]

BYOD Policy Creation (Part 2)

In our last post, we spoke about BYOD device choice and trust policies.  In this posting, we will discuss some other subjects to consider in your BYOD policy creation. App Design and Control Your trust and device management rules will obviously affect your apps strategy for BYOD.  Employees will expect internal apps to be supported […]

BYOD Management Software

BYOD could be the single largest disruptive force in networking today, creating a host of IT challenges.  It used to be that IT-managed devices were the only ones allowed on your network. IT ruled and was the gatekeeper.  Today, millions of WiFi enables smartphones and tablets are connecting to enterprise networks. Each user might have […]

MDM and BYOD Strategies

MDM and BYOD is being driven by the power of today’s smartphones and tablets.  Employees want to use their own devices on corporate networks.    MDM, or Mobile Device Management and BYOD, or Bring-Your-Own-Device and  are strategies that are vital to the security of your IT infrastructure and the satisfaction of your employees.  In fact, 63% of companies in North America […]

MPLS Networks – What is MPLS? Why MPLS?

Understand MPLS networks with this post that provides a link to a Cisco presentation explaining MPLS in great detail.  There are 119 slides with narration that run almost two hours.  But if you want a deep explanation, this is an excellent presentation to view. I suggest full screen mode so you can view the presentation slides better. […]

WAN Optimization and Data Duplication

Data deduplication is one of the most significant technologies to impact the data storage industry. By identifying redundant data segments and storing only a single instance of information, this technology dramatically reduces storage space and allows more data to be protected over time. Data deduplication has also made its ways into the ranks of the networking community. More […]

MPLS Implementation Management

Some companies choose not to make any carrier changes to their network simply because of inertia.  They have limited resources and can’t even imagine how they could handle a network migration. Outsourcing the MPLS implementation process is a sensible thing to consider.  It doesn’t cost a great deal of money and it makes the process very simple.  Remember: […]

WAN Acceleration Solutions- Best Practices

Businesses have become more dependent on IT Services delivered over Wide Area Networks to communicate over a geographically diverse enterprise network.  Whether your WAN is based on MPLS, VPLS, or and IP-Sec VPN over the internet, optimizing network performance can offer a variety of benefits.  Besides much better performance, WAN Optimization can control the growth of […]

On-Demand Cloud Services – Self-Managed IaaS

 The SD-WAN-Experts On-Demand Cloud Services is a self-managed, multi-tenant public cloud infrastructure that provides the flexible compute resources, memory and storage necessary to complete projects such as test and development, proof of concept, training, bursting or other short-term needs. This new service offers the benefit of not requiring customers to invest in building and managing their own […]

Cisco FabricPath – Layer 2 networks that work like Layer 3 MPLS

A problem has surfaced in recent years when bandwidth needed to be shifted from WAN to LAN and data centers wanted to switch frames as quickly as possible. Network administrators were faced with two options: Either leave the network running Spanning-Tree with one out of two uplinks working or use Portchannels between switches to augment […]