You've requested...

Download this next:

Focus: Campus local area networks (LAN)

Whether a university buzzing with Gen Z students carrying multiple devices, who have never known a life offline or a large enterprise headquarters spanning multiple buildings with a Millennial workforce that expects the latest and greatest standards of connectivity, the demands now being placed on campus local area networks (LANs) are massive.

And just as datacentres did in the past, campus LANs are coming to be defined more and more by virtualisation and software-based controls. Alongside this trend, LAN hardware continues to improve in its capabilities, as network managers try to keep up with the intense demand

In this e-guide we will explore some of the key trends driving the market for campus LANs and ask how to implement one, find out how one user went about building a network from the ground up on a brand-new site, and look in-depth at some of the active suppliers in the market.

First, we look at how to go about designing and implementing a modern campus LAN, taking into account advances in software-defined and automation.

Then, we will take you behind the scenes at the UK’s University of Northampton to discover how the IT team was able to take advantage of a move to a brand new campus to deploy the latest and greatest networking technology in support of a new model of learning for a new generation of students.

Delving deep into the infrastructure itself, tech evangelist Paul Ryan reveals how copper-based LANs are increasingly unfit for purpose in a digital business, and argues in favour of upgrading to fibre-based passive optical LANs.

Finally, enterprise IT and network design specialist Andrew Froelich looks at some of the key suppliers in the campus LAN space, running the rule over technology from HPE, Huawei and Juniper Networks.

These are also closely related to: "How to Cloud-Enable Your Enterprise"

  • Safeguarding Cloud Infrastructure from Wireless Threats

    The cloud infrastructure powering today's digital services is vulnerable to wireless threats that bypass traditional security measures. Rogue access points, Bluetooth devices, and cellular transmitters can infiltrate secure data centers and exfiltrate data.

    This solution brief from Bastille Networks outlines a comprehensive approach to wireless airspace defense. Key highlights include:

    • Wireless threats like data exfiltration and disruption
    • Bastille's tiered architecture of sensors, concentrators, and a centralized fusion center
    • Advanced capabilities like cellular device tracking, Bluetooth pairing visibility, and threat signature analysis

    To learn more, read the full solution brief.

  • Computer Weekly - 17 August 2021: How to choose between SIEM and SOAR

    In this week’s Computer Weekly, our new buyer’s guide examines the use of SIEM and SOAR to improve IT security, and asks which you should use, and when? We look at what you need to know about NVMe over Fabrics, the emerging storage networking technology. And we find out how Oracle customers are introducing its Fusion Cloud suite. Read the issue now.

Find more content like what you just read:

  • Strengthen Your Incident Response with Endace and Cisco

    When a threat enters your network, you need to investigate it quickly. Endace and Cisco have teamed up to help you do so. Read this overview to learn how you can enhance your incident response by integrating EndaceProbe’s network packet history with Cisco Stealthwatch.

    Download

  • Splunk for the Public Sector

    In Splunk for the Public Sector, Splunk shares five use cases showing how Security and IT teams use Splunk to help achieve mission success. Download your complimentary copy and discover how Splunk drives resilience for organizations across the public sector.

    Download

  • CW EMEA October 2024: Legally bionic

    In Sweden, the legal profession has begun a discussion around the use of artificial intelligence in the sector, in response to the increasing use of AI tools at law firms.

    Download

  • Oracle cloud applications exhibit pragmatic adoption curve

    Oracle prides itself on the full suite of the business applications it offers in the cloud, arguably ahead of its closest rival, SAP – which has prioritised building on its in-memory database Hana over the cloud per se, though its S/4 Hana ERP system is increasingly delivered over the cloud, too.

    Download

  • CW APAC, May 2022: Trend Watch: Datacentres

    In this handbook, focused on datacentres in the Asia-Pacific region, Computer Weekly looks at the shift towards colocation facilities.

    Download

  • Boosting incident response with rapid network analytics

    As soon as a security incident occurs in your network, you want answers: What is it? How did it happen? And how can it be resolved? By leveraging Plixer’s Scrutinizer and EndaceProbe, you can rapidly unlock those answers and enhance your incident response. Download this overview to learn more.

    Download

  • AI’s role in threat detection & response

    Cyberthreats are fast moving and constantly evolving. Because of this, quick threat detection and response capabilities are critical for security teams. This white paper explores how AI technology can be key to achieving those capabilities. Browse to learn more.

    Download

  • Automating and Accelerating Incident Response

    Security alert overload: Are you and your security team living in this state? If so, then you know that it’s exhausting—but you may not know the cause of it. One common cause of alert overload is the lack of integration of various security tools. Read this white paper to access guidance for overcoming that challenge.

    Download

  • Quocirca: Selecting a cloud printing platform

    As IT teams are faced with managing printing across a hybrid workplace, cloud printing platforms offer a way of tracking, monitoring and securing print in the office and at home. With untrusted devices, such as home printers, posing a threat to IT security, cloud print platforms that support zero-trust environments should be deployed.

    Download

  • All-Flash: The Essential Guide

    This guide offers a comprehensive survey of the all-flash array market. We look at all-flash products from the big six storage vendors and the startups and specialists. Plus, we give the lowdown on all-flash vs hybrid flash arrays and all-flash vs server-side PCIe SSD.

    Download

  • Computer Weekly – 4 April 2023: Revitalising UK digital government

    In this week's Computer Weekly, as the UK plummets down the international rankings for digital government, can its £400m identity system revitalise the UK's digital strategy? Read the issue now.

    Download

  • The technological evolution of IT industry leaders: Part one

    This first part of this e-guide explores the technological evolution of Oracle, Cisco and Dell throughout the past two decades, including the technologies that have risen to the forefront, from real-time analytics and data management to Cisco's edge computing ambitions.

    Download

  • CW Middle East - July-September 2022: UAE citizens embrace new digital technologies

    A survey shows that people in the United Arab Emirates believe next-generation technologies such as 3D printing and artificial intelligence will become widespread in the country. Also read how the UAE has improved its security posture amid mounting cyber threats.

    Download

  • Computer Weekly – 4 July 2023: How data is beating heart disease

    In this week's Computer Weekly, we find out how a new data strategy is helping the British Heart Foundation to raise money and support medical research. We examine the benefits of using AI in advanced malware detection. And we reveal why the Information Commissioner is under fire for weak responses to serious data breaches. Read the issue now.

    Download

  • Tools for supporting your security analysts

    To ensure that your security incident investigations are successful, your analysts need access to definitive evidence. Download this overview to learn how, by leveraging Cisco and Endace tools, you can deliver that evidence to your analysts.

    Download

  • How to evaluate Exabeam and Splunk for your SIEM needs

    This guide compares Exabeam and Splunk SIEM solutions in six key areas: cost, staffing, analytics, and cloud architecture. Exabeam offers prepackaged security models, automated incident response, and behavior-based detection without needing specialized expertise. Use this guide to find the SIEM solution that best fits your organization's needs.

    Download

  • Computer Weekly - 1 February 2022: How Ocado pushes technological boundaries

    In this week's Computer Weekly, we talk to Ocado's CTO about how the e-commerce company pushes technological boundaries. Our latest buyer's guide looks at the importance and technical challenges of data integration. There's a growing dispute over the use of end-to-end encryption – we look at the differing perspectives. Read the issue now.

    Download

  • How to Stay Ahead of Emerging Threats

    As cybercriminals develop more sophisticated attacks, you must develop stronger defenses. IBM Security and Endace have partnered to help you do so. Dig into this overview to learn how, by combining IBM QRadar with EndaceProbe Analytics Platforms, you can speed and strengthen your security incident response.

    Download

  • Augment your network monitoring with Endace

    Though they deliver great power, advancing networks also present monitoring challenges. Endace’s response to these challenges is Network History. How does Network History work? It records copies of the packets that traverse your network, allowing you to gain insights from them when an attack strikes. Learn more about the tool in this overview.

    Download

  • Computer Weekly – 28 November 2023: Datacentres or green belt? Why the UK has to choose

    In this week's Computer Weekly, we examine the minefield around datacentre planning permission across the UK, after government blocked a major development next to the M25. The metaverse is making inroads into the industrial world – is this the real future for the technology? And we analyse the trends changing the app market. Read the issue now.

    Download

  • Detecting and Preventing the Most Challenging Cyberthreats

    Because of the colossal costs of security breaches, rapid and accurate incident response is imperative for businesses in every industry. This means that many organizations must augment their present strategies. Browse this overview to learn how Palo Alto Networks and Endace can help your business do so.

    Download

  • Emerging Trends and New Developments in Software-Defined Networks

    In this e-guide, Computer Weekly sits down with with senior IT managers from a number of multi-national companies to discuss the latest trends and newest developments in the world of software-defined networks.

    Download

  • How to resolve security incidents up to 20 times faster

    Today’s cyber landscape brims with threats. Therefore, your organization’s incident response has to be rapid. This overview explores how your business can resolve security incidents up to 20 times faster by leveraging Corelight and Endace solutions. Continue on to learn more.

    Download

  • Technology for Accelerating Your Security Investigations

    Once a security incident occurs in your network, you need your investigation to be seamless, speedy and successful. Check out this overview to learn how Fortinet and Endace can help you achieve each of the three Ss.

    Download

  • A Computer Weekly buyer's guide to API management

    Application programming interfaces define the correct way for a developer to request services from an operating system. In this 14-page buyer's guide, Computer Weekly looks at how they provide connectivity, the key role of digital bonding, and the importance of keeping APIs up to date and secure.

    Download

  • Discover the power of multimodal AI for your business

    Integrating diverse data streams like images, audio, and text can revolutionize business decision-making with multimodal AI. Learn how to boost your business IQ and drive efficiency by implementing this transformative technology. Read the full white paper to get started.

    Download

  • The Total Cost Of Ownership (TCO) For The Consumer Tablet You’re Thinking About Buying For Caregivers Is Nearly Twice As Much As A Rugged Healthcare Tablet.

    What can you expect when you purchase ‘good enough’ consumer tablets — instead of rugged purposebuilt healthcare tablets? Find out in this infographic.

    Download

  • Computer Weekly – 14 August 2018: Infrastructure under attack

    In this week's Computer Weekly, we look how a honeypot designed to look like an electricity substation was sold on the dark web to infiltrate a secure operational system. We also take a look at how Google is finding a way into the enterprise cloud and we investigate why simulation models need to co-exist with AI-based models. Read the issue now.

    Download

  • Top 10 Australian IT stories of 2020

    Against all odds, the Australian people and businesses proved their mettle, becoming one of the first countries in the world to emerge from the pandemic. Companies pivoted quickly and adopted new business models while supercharging digitisation initiatives at an unprecedented pace. Here are Computer Weekly's top 10 Australia IT stories of 2020:

    Download

  • Rugged handheld computers purpose-built for healthcare

    Healthcare workers need to be employed with devices that are not only reliable but feature-packed, time-conservative and mobile. So, what can you expect when you purchase consumer smartphones — instead of rugged handheld computers purpose-built for healthcare? Download this infographic to find out.

    Download

  • Top 10 network stories of 2018

    2018 was the year when software-defined networking, and more specifically software-defined WANs, took centre stage. We look back at a transformative year for the world of the network manager. Here are Computer Weekly's top 10 networking stories of 2018.

    Download

  • Computer Weekly – 31 May 2022: Trial and error – why the law on computer evidence must change

    In this week's Computer Weekly, the Post Office IT scandal highlighted the problem with computer evidence – we examine the need for legal reform. We assess the nuclear option for sustainable datacentre power. And we find out how IT experts can improve their soft skills and boost their career prospects as a result. Read the issue now.

    Download

  • MicroScope – May 2021: Exploring digital metamorphosis

    Digital transformation is the buzz phrase, but is it more a question of evolution? In this issue, experts weigh in on digitisation and its effect on the world of work. Also read about local broadband providers aiming to improve internet connection and productivity, and find out how to tackle sales in a post-pandemic landscape

    Download

  • Computer Weekly – 17 January 2023: How PepsiCo works with tech startups to drive growth

    In this week's Computer Weekly, we talk to food and drinks giant PepsiCo, about how it works with tech startups to drive growth and digital transformation. Our latest buyer's guide examines the key elements of a composable business. And with all the chatter about ChatGPT, we look at the implications of generative AI. Read the issue now.

    Download

  • Royal Holloway: Driverless vehicle security for military applications

    Existing attacks and risk assessment frameworks within civilian autonomous vehicles (AVs) can be used to review security of military AVs deployed for logistics purposes in a desert warzone environment.

    Download

  • RSA Conference 2020 guide: Highlighting security's human element

    The theme of the 2020 RSA Conference was the human element, and the event promised once more to live up to its reputation as the place "where the world talks security. This RSA Conference 2020 guide is your single stop to find all the latest breaking news and expert insights from one of the cybersecurity world's biggest annual gatherings.

    Download

  • CW Benelux ezine February 2017

    In this quarter's CW Benelux ezine, we ask whether the Netherlands is suffering from digital delusion and if it is losing ground in the digital world.

    Download

  • A Computer Weekly E-Guide to Network Management & Monitoring

    Covid has introduced many new things to many spheres of activity, in terms of networking it has actually acted as an accelerant to phenomena that were just gaining momentum before the first lockdowns and stay at home orders were being made. SD WAN, SASE and in particular digital transformation are key examples of that.

    Download

  • Compare SIEM solutions: 5 key factors to consider for your security

    This guide compares Exabeam and Microsoft Sentinel in five areas: third-party integration, correlation rules, platform limitations, search functionality, and UEBA. It highlights Exabeam's strengths in diverse security environments beyond Microsoft's, with broader log parsing and analytics. Read the Guide to find the best SIEM for your needs.

    Download

  • Computer Weekly: Data Danger

    In this week's issue we investigate the hidden threats lurking in every company and discuss what options CIOs and heads of security have to limit damage. We also look at three ways CIOs can fund digital initiatives. Plus, with the shift from traditional desktop IT, what is the future of Windows in a multi-device world?

    Download

  • CW Europe – March 2017

    Technology advancements in recent years have brought about huge social challenges. Artificial intelligence and big data, for example, have gained the serious attention of policy makers across the world.

    Download

  • Gain Accurate Network Visibility with EndaceFlow

    As cyberthreats advance and increase, your organization requires both reliable and accurate visibility into your network. EndaceFlow, a high-performance NetFlow Generator, can help you achieve that. Dig into this overview to learn more.

    Download

  • SaaS ERP mushrooms during Covid crisis, up to a point

    In this e-guide we look at the migration of business applications to the cloud, under the discipline of the Covid crisis; we examine the question of who is winning the cloud ERP wars; and offer a case study of one large, complex company, Vodafone, that gives a counter example of how cloud still has limits when it comes to ERP.

    Download

  • Transforming Threat Intelligence into Actionable Insights

    A leading UK financial services organization transformed its cyber threat intelligence (CTI) operations with EclecticIQ Intelligence Center, empowering proactive, actionable threat intelligence. Learn how they achieved early warning and produced meaningful reports for multiple stakeholders in the full case study.

    Download

  • Computer Weekly - 18 May 2021: The real-life consequences of ransomware attacks

    In this week's Computer Weekly, after a ransomware attack shut a major US oil pipeline, we examine the real-life consequences for organisations facing similar threats. We ask the experts for their top tips in reducing datacentre running costs. And we hear how data science skills are helping government make better decisions. Read the issue now.

    Download

  • A Computer Weekly Buyers Guide to IoT

    In these uncertain times, making solid predictions for the year ahead looks like a definition of a mug's game. While this has been the fuel for the fire for the boom in applications such as video conferencing as used to support remote working, the same really can be said for the internet of things (IoT).

    Download

  • Computer Weekly – 16 January 2024: All eyes are on the Post Office scandal – at last

    In this week's Computer Weekly, 15 years since we first revealed the plight of subpostmasters, and four years since their High Court victory, the UK public and government are getting behind the victims, thanks to a TV dramatisation of the scandal. We look at plans to quash convictions and analyse Fujitsu’s role in the scandal. Read the issue now.

    Download