Browse Definitions:

SearchEnterpriseWAN

IT professionals in almost every industry rely on SearchEnterpriseWAN.com for industry news, technical tips and valuable best practices on designing a Wide Area Network, optimizing application performance across the WAN, WAN Security and VPN usage, or selecting managed services so they can keep their networks up to date and cope with constant change.

View the complete archive of Enterprise WAN Management news, research and expert advice.

Go to:  SearchEnterpriseWAN

Recently on  SearchEnterpriseWAN

VPN

A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

More Highlights
  • virtual private network

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • Integrated Services Digital Network

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

  • ISDN

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

Definitions
  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

Browse EnterpriseWAN Topics

Telecom Services

Telecommunication carrier services often make up the largest portion of an enterprise's IT budget, so choosing the right services is critical. The options are many and relationships can be complex, especially when a distributed network spans multiple countries or continents. This section presents the latest on the available choices, including purchasing bandwidth like T1 lines, managed services, and emerging services like SaaS and cloud computing, as well as best practices on how to evaluate the services you're receiving and negotiating with telecom providers.

Recent Definitions

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • Network Address Translation (NAT)

    A NAT (Network Address Translation or Network Address Translator) is the virtualization of Internet Protocol (IP) addresses.

  • managed service provider (MSP)

    A managed service provider (MSP) is a company that remotely manages a customer's IT infrastructure.

Highlights

More Telecom Services Topics

Back to Top

VPNs/Security

Here you'll find advice and news to help you design, manage and troubleshoot secure VPNs and remote access and to ensure that your WAN is protected from threats that lurk on the Internet or target the applications you're running. Our resources provide information about IPsec and SSL VPN design, setup and configuration, secure remote access, and Web and application security.

Recent Definitions

  • virtual private network (VPN)

    A virtual private network creates an encrypted connection over a less secure network when the network infrastructure cannot provide enough security to connected systems.

  • Network Address Translation (NAT)

    A NAT (Network Address Translation or Network Address Translator) is the virtualization of Internet Protocol (IP) addresses.

  • dynamic multipoint VPN (DMVPN)

    A dynamic multipoint virtual private network (DMVPN) is a secure network that exchanges data between sites without needing to pass traffic through an organization's headquarter VPN server or router.

Highlights

More VPNs/Security Topics

Back to Top

WAN Design

Network design is the basis for every WAN and the most crucial part to get right. Here we cover best practices and strategies for WAN design, including considerations for WAN capacity planning and bandwidth management, branch office network design, network disaster recovery planning methods, WWAN and mesh network planning and VPN design.

Recent Definitions

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation work and testing.

  • frame relay

    Frame relay is an affordable way to transmit switched-packet data within LANs and WANs.

  • bandwidth

    Definition: Learn what bandwidth is and how the term is used as a synonym for signal frequency range, data transfer rate and capacity.

Highlights

More WAN Design Topics

Back to Top

Infrastructure

Equipping your WAN with the right network hardware and technology is essential to providing your users with the connectivity, services and applications they need. Here you'll find resources on WAN network hardware and infrastructure, WAN protocols and IP networking, including IPv6. You'll learn how to build a WAN that meets today's complex networking challenges.

Recent Definitions

  • WAN (wide area network)

    A wide area network (WAN) is a geographically distributed telecommunications network that interconnects multiple local area networks (LANs).

  • ISDN (Integrated Services Digital Network)

    ISDN (Integrated Services Digital Network) is a set of CCITT/ITU standards for digital transmission over ordinary telephone copper wire, as well as over other media.

  • File Transfer Protocol (FTP)

    File Transfer Protocol (FTP) is a client-server standard used to transfer files between computers over the Internet using control and data channels.

Highlights

More Infrastructure Topics

Back to Top

Optimization/Application Performance

WAN optimization can help ensure efficient and fast applications delivery on the network. Learn how WAN optimization and application acceleration can help manage traffic on the WAN, how to understand and manage application performance, how to monitor the WAN to prevent application bottlenecks, and how to manage applications and systems remotely.

Recent Definitions

  • Space Communications Protocol Specifications (SCPS)

    Space Communications Protocol Specifications (SCPS) are designed to improve communications reliability, error checking, efficiency and performance in ground, manned craft and satellite inter-communications.

  • byte caching

    Byte caching is a method of reducing the amount of repetitious data that is sent back and forth in a network as a means of streamlining network performance.

  • leaky bucket algorithm

    The leaky bucket algorithm is used to implement traffic policing and traffic shaping in Ethernet and cellular data networks. The algorithm can also be used to control metered-bandwidth Internet connections to prevent going over the allotted bandwidth for a month, thereby avoiding extra charges.

Highlights

More Optimization/Application Performance Topics

Back to Top

-ADS BY GOOGLE

SearchCompliance

  • PCAOB (Public Company Accounting Oversight Board)

    The Public Company Accounting Oversight Board (PCAOB) is a Congressionally-established nonprofit that assesses audits of public ...

  • cyborg anthropologist

    A cyborg anthropologist is an individual who studies the interaction between humans and technology, observing how technology can ...

  • RegTech

    RegTech, or regulatory technology, is a term used to describe technology that is used to help streamline the process of ...

SearchSecurity

  • email spam

    Email spam, or junk email, is unsolicited bulk messages sent through email with commercial, fraudulent or malicious intent.

  • distributed denial of service (DDoS) attack

    A distributed denial-of-service attack occurs when an attack originates from multiple computers or devices, usually from multiple...

  • application whitelisting

    Application whitelisting is the practice of identifying applications that have been deemed safe for execution and restricting all...

SearchHealthIT

  • athenahealth Inc.

    Based in Watertown, Mass., athenahealth Inc. is a leading vendor of cloud-based EHRs for small to medium-sized physician ...

  • Affordable Care Act (ACA or Obamacare)

    The Affordable Care Act (ACA) is legislation passed in 2010 that changed how uninsured Americans enroll in and receive healthcare...

  • HIPAA Privacy Rule

    The Standards for Privacy of Individually Identifiable Health Information, commonly known as the HIPAA Privacy Rule, establishes ...

SearchDisasterRecovery

  • disaster recovery as a service (DRaaS)

    One approach to a strong disaster recovery plan is DRaaS, where companies offload data replication and restoration ...

  • data recovery

    Data recovery restores data that has been lost, accidentally deleted, corrupted or made inaccessible. Learn how data recovery ...

  • disaster recovery plan (DRP)

    A company's disaster recovery policy is enhanced with a documented DR plan that formulates strategies, and outlines preparation ...

SearchStorage

  • yottabyte (YB)

    A yottabyte is a measure of theoretical storage capacity and is 2 to the 80th power bytes, or, in decimal, approximately 1,000 ...

  • Kilo, mega, giga, tera, peta, exa, zetta and all that

    Kilo, mega, giga, tera, peta, exa, zetta are among the list of prefixes used to denote the quantity of something, such as a byte ...

  • brontobyte

    A brontobyte is a measure of memory or data storage that is equal to 10 to the 27th power of bytes.

SearchSolidStateStorage

  • SSD caching

    SSD caching, also known as flash caching, is the temporary storage of data on NAND flash memory chips in a solid-state drive so ...

  • NVDIMM (Non-Volatile Dual In-line Memory Module)

    An NVDIMM (non-volatile dual in-line memory module) is hybrid computer memory that retains data during a service outage.

  • NAND mirroring

    NAND mirroring has been proposed to break the security in certain portable devices that use NAND flash memory for encryption.

SearchCloudStorage

  • RESTful API

    A RESTful application program interface breaks down a transaction to create a series of small modules, each of which addresses an...

  • cloud storage infrastructure

    Cloud storage infrastructure is the hardware and software framework that supports the computing requirements of a private or ...

  • Zadara VPSA and ZIOS

    Zadara Storage provides block, file or object storage with varying levels of compute and capacity through its ZIOS and VPSA ...

Close