Recent Posts

Categories

See all

Archives

See all

TNP Blog

The Network Pro

Recent Posts

Next Generation Firewall Technology: What is it and How does it Help Businesses?

When it comes to firewall protection, the usual port & protocol identification no longer seems to be the norm. According to a survey conducted by Tech Target – one of the prime resources in Networking, Cloud Computing, Business applications, and

Read more

How to Choose a UTM Solution

UTM (Unified Threat Management) systems are the norm of the day to counter the ever-growing complex security threats that businesses have to combat with. Managing multiple vendors, each with a wide array of products, is asking for a little too much

Read more

Mobile Computing & Video Over Mobile Trends: What’s Coming Our Way?

As to what happened until now, it’s already overwhelming. Businesses find it difficult to the changes that Internet witnesses. Add Hardware, Virtual Computing, Nano Computing, Laptops, Ultra Books, Web Applications, and Operating systems for each

Read more

Wireless Network Security: Go everywhere, But Play Safe

Mobility has caught on with enterprises and its executives too. Companies and small businesses are looking to send their folks all over the world and have them connected though wireless networks. Wi-fi is now ubiquitous. They are convenient, they

Read more

BYOD (Bring Your Own Device): Are you on Mobile Yet?

Is mobile device integration and use for your enterprise at the top of your agenda? If it isn’t you should consider this: According to research from IDC, the smartphone market alone (we aren’t talking about the mobile applications and web-based apps

Read more

Top 5 Cloud Computing Trends in 2012

Mobile, applications, the ever expanding realm of cloud, super networks such as 10 GbE and the 40GbE – technology is getting more and more exciting as the years go by. The year 2011 has seen its share of developments. What’s coming up in the year

Read more

5 Dangerous Threats You Should Watch Out For in 2012

Predicting is one thing that I should be steering clear of. While writing this article, we thought about this a million times. However, some truths don’t change and prediction might just be a weak word for it. Perhaps, we should incorporate this as

Read more

40 GbE (Gigabit Ethernet): Is It the Next Best Thing after 10 GbE network?

Technology moves faster than the rate at which we blog, or sometimes we think so. In the not so distant past, we wrote about 10GbE (10 Gigabit Ethernet) as the next destination for networks to reach. We heralded it as the future of networks and as

Read more

How to Keep Mobile and Wireless Security on a Tight Leash

Important financial information, crucial customer records, and all that your business stands for is at risk if you don’t give security the due importance it demands. Your mobile devices and wireless networks are a part of your IT assets. Putting

Read more

Enterprise Security: A Heads Up for the Wide Gaping Hole In IT Management

Previously, we wrote about “4 Potentially Dangerous Online That Wreak Havoc ” where we wrote about “Social Engineering attacks”, “Malware”, “Denial Of Service Attacks” and “Identity Theft”. We also had a couple of other posts on security such as

Read more

Recent Posts

Categories

See all

Archives

See all