Home
 > Research and Reports > White Papers > Is It Really Part of My Network? Adonis DHCP and MAC-...

Is It Really Part of My Network? Adonis DHCP and MAC-based Security

Source: BlueCat Networks
When Dynamic Host Configuration Protocol (DHCP) was created, the Internet was still mainly a vehicle for scientific collaboration. Indeed, the need for security has grown out of the increased use of the Internet as a commercial medium. That’s why new DHCP issues have come to the forefront that were simply not explored in the early days of the Internet.


Featured publications:

VoIP Introduction
Source: Ziff Davis VoIP uses internet protocol data packets to transfer voice, fax, and other data over the shared network, rather than the traditional public switched telephone network (PSTN), which is based on copper wires carrying analog voice data over the dedicated circuits. VoIP, in contrast to PSTN, uses what is called packet-switched telephony, whereby the voice information travels to its destination in individual network packets across the Internet that are assembled and then converted to voice. Learn the basics of VoIP by reading this white paper, which includes explanations of coding and protocol for VoIP, and a look at quality and myths about VoIP. Read More...
Comparing the Total Cost of Ownership of Business Intelligence Solutions
Source: Birst For many companies, traditional business intelligence (BI) software is costly and resource-intensive. So are open source alternatives that require significant configuration and integration. In contrast, software-as-a-service (SaaS) solutions can reduce the cost of a BI deployment by providing automation and pre-integration. Compare total cost of ownership (TCO) for traditional, open source, and SaaS BI solutions. Read More...
BYOD Without Tears: The Impact and Challenge for Network Engineers
Source: Fluke Networks Bring your own device (BYOD) is as much a sign of cultural change as it is an indicator of prevailing technology trends. But network performance and security concerns can arise when employees want to use their personal devices at work. This white paper looks at the challenges of integrating BYOD with corporate networks in a way that BYOD does not compromise connectivity or performance for established wired and wireless users. Read More...


You may also be interested in these related documents:

Why Product Activation for Software Is Becoming Widespread
Source: Agilis Software Software vendors have used license management for many years. Older approaches, such as key-file-based licensing or dongles, do have a number of drawbacks for both the vendor and the user. Product activation solves many of these problems, so is gaining broad acceptance. Learn more about product activation and licensing management, and why modern product activation systems are superior to other techniques. Read More...
Secure DNS/DHCP Management-An Integrated Solution
Source: BlueCat Networks Dynamic Host Configuration Protocol (DHCP) has been adopted as the dynamic protocol of choice for pain-free management of network resources. The integration of the Domain Name System (DNS) and DHCP into a single network helps overcome traditional barriers to effective resource allocation. Indeed, combining DNS and DHCP enhances information security, thus providing a solution your organization can grow with. Read More...
Adonis: DNS/DHCP for Small to Medium Sized Business
Source: BlueCat Networks Small to medium businesses have typically built their own domain name system (DNS) and Dynamic Host Configuration Protocol (DHCP) services, used Windows DNS/DHCP, or turned to a hosted service provider for these services. This approach may appear to offer tremendous savings, but contains many hidden costs and risks that are not always apparent until a catastrophic loss of service occurs. Read More...

 
comments powered by Disqus



Recent Searches
Others A B C D E F G H I J K L M N O P Q R S T U V W X Y Z

©2014 Technology Evaluation Centers Inc. All rights reserved.