You've requested...

Share this with your colleagues:

Download this next:

CW Buyer's Guide: IPV6 Migration


The transition from IPv4 to IPv6 –and how to manage it.


The switch from IPv4 to IPv6 began on 6 June 2012, but surprisingly few organisations have done enough to prepare for the transition.


The 32-bit IPv4 address space supports 4.3 billion addresses which are rapidly running out – eventually organisations will need to migrate to IPv6.


This guide takes you through the steps you need to take and explains the potential impact on your business.



  • How to manage the IPv6 transition
  • IPv6 migration tips for small firms
  • The value of IPv6 to the enterprise
  • How to upgrade to IPv6



Click on the button below to download this 7 page Computer Weekly Buyer’s Guide

These are also closely related to: "IPv6 - Bridging the Gap to Tomorrow"

  • IPV6 Transition – Why the rush ?

    The internet and telecoms industries have been promoting the migration to IPv6 for the past few years. IPv6-compliant addresses have been available since 1999, but 2011 has witnessed a strong push for the transition to IPv6 from the legacy IPv4 addressing scheme.


    Many industry players - telcos, ISPs, IP backbone providers, Web 2.0 players - have been pressuring enterprises to prepare for the move; the recent World IPv6 Day (8 June 2011) is one example, with suppliers positioning IPv6 as the ""next-generation internet"". But many enterprise customers seem to have little interest in making the transition.


    For enterprises, the first course of action for is to recognise that you will be moving to IPv6, even if you have IPv4 addresses available. Having many years of IPv4 addresses in inventory will not protect against having to move to IPv6 sooner than you think.


    Treat this as you would your disaster recovery plan - create an IPv6 transition plan as soon as possible. This is not just a non-critical, ""make busy"" project; it will become critical to your internal and external communication, especially if you hit a wall that either blocks your employees or your customers from doing business. The plan should have phases so that you can address the IPv6 transition requirement by business unit, services, or region.


    Ovum logo





    Ovum provides clients with independent and objective analysis that enables them to make better business and technology decisions. Combining the ICT expertise of Datamonitor Technology, Butler Group and Ovum, with Datamonitor Group's 350 business analysts and relationships with 18 of the largest 20 global corporations, Ovum is uniquely positioned to provide practical, actionable advice to the technology, telecoms and other business sectors.

  • Internet dedicated services: Connect to applications simply & securely

    Your business thrives on speed and agility. Your Internet connections should too.

    Learn about Verizon’s Internet offerings in this white paper. Find out how they can help you get:

    • Predictable, dedicated bandwidth
    • Availability and reach, around the globe
    • 24x7 proactive monitoring
    • Both IPv4 and IPv6 protocols support
    • And more 

Find more content like what you just read:

  • Windows 2012 Server Network Security

    This book chapter offers an introduction to Windows 8 and Windows Server 2012 network security and  IPv6. It includes a 30% discount code for Computer Weekly readers.


  • Proving ownership of IPv6 addresses

    In this article in our Royal Holloway security series, we examine the mechanisms that have been invented to allow Internet Protocol version 6 (IPv6), which replaces IPv4, users to prove their rightful ownership of an address, preventing others from using it falsely, as well as showing some of the ways in which these measures are incomplete.


  • 4 major cyberattack methods and how to defend against them

    The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.


  • IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.


  • International domain name homographs: Are you protected?

    Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.


  • Don't leave yourself open to a DNS attack

    Explore this report to learn about DNS protection technology adoption trends and find out how you can bolster your network's defense against pervasive threats like phishing attacks.


  • WAN Speak Musings – Volume VI

    Analysts Clive Longbottom and Bernt Ostergaard look at the key issues affecting network design and management in this continuing series of articles.


  • How to mature your cybersecurity governance program

    Today, companies still struggle to adapt risk management strategies to face modern threats, but maturing their cybersecurity governance processes is a step in the right direction. In this e-guide, learn from multiple cybersecurity experts on how your organization can mature its cyber-risk program to decrease vulnerability.


  • Secure SD-WAN strategy: Step-by-step guide

    In this For Dummies e-book, find out how to meet the demands for fast, reliable, and dispersed network connectivity by building a secure enterprise SD-WAN strategy.


  • A reference architecture for the IoE

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).


  • Check the network before moving to the cloud

    Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.


  • Stop cyberespionage in its tracks with network threat intelligence

    During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.


  • 5 signs of malicious activity your organization may be overlooking

    If given even the smallest window of opportunity, cybercriminals will exploit any Internet service or infrastructure to support their campaigns. Security and IT admins play critical roles in monitoring networks for indicators of malicious activity. In this infographic, explore 5 signs of malicious activity your organization may be overlooking.


  • High performance IP network for the quality conscious

    Dive into this short brochure to learn about IP Transit, high performance IP network for the quality conscious.


  • Unified Communication: “It should work as easily as a telephone call!”

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.


  • Windows Server 2019 vs. 2008 R2, 2012 R2, and more

    Inside, discover what Windows Server 2019 brings to the table – and how to build a hardware strategy that capitalizes on its fresh hybrid cloud focus. Plus, see how this version compares to the previous 2008 R2, 2012 R2, and 2016 offerings.


  • How to tackle encapsulation and encryption

    How you make a secure, trusted connection over the Internet is one of the key debates as the industry strives for de-perimeterised solutions that it can implement.


  • Network Purchasing Intentions 2013

    This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.


  • Damage from cybercrime will total $6 trillion by 2021

    Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.


  • Using syslog-ng pattern database to classify and analyze log messages

    Log messages can be used to detect security incidents, operational problems, policy violations, and are useful in auditing and forensics situations. Read this white paper to find out how system logging can help ease the burden of system administrators and see how you can simplify your logging architecture with syslog-ng.


  • The dangers of IoT botnets vs. traditional botnets

    Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.


  • Private IP: Is it right for your business?

    In the midst of digital transformation, businesses large and small are realizing that they need a new way to connect to the Internet. That's where Private IP can help. Learn about Private IP and if it could be right for you in this white paper.


  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.


  • IT in Europe: Next-Generation Network Management Techniques

    This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.


  • Best practices for scaling networking operations cost-effectively

    Download this white paper to learn how you can build a scalable, robust, and agile data center network—without breaking the bank—by using fixed form factor switches (FFF) and disaggregated network operating systems in a leaf/spine Clos architecture.


  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.


  • How SDS simplifies scaling across the hybrid cloud

    To unlock the ability to run petabyte-scale, data-rich services like web applications, VOD, active archives, compliance archives, and private and hybrid clouds, download this datasheet. It explains how software-defined storage can streamline and simplify hybrid cloud data management.


  • What SaaS providers need to know about performance and application security

    Users today want faster, more personalized interactions when they use a SaaS app. It’s possible to build such experiences if you use the right tools. Download this white paper to learn what Cloudflare has to offer.


  • Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation

    In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.


  • Special Report on Cisco

    This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.


  • How to properly implement log management

    In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.


  • MicroScope January 2014: A special issue looking at software defined networking

    The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres


  • CW buyer's guide: context-aware security

    This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.


  • Spot DNS issues before they impact your end users

    DNS is part of your network's backbone, and as a result, it's inherently tied to your network's performance, its security, and – ultimately – the user experience that it delivers. Find out how you can effectively monitor DNS performance across all of your locations so that you can identify and resolve issues before they negatively impact end users.


  • Don't fall in a security stack trap

    In this white paper, learn how organizations commonly fall into security stack traps, strategies for re-thinking the security stack, and the benefits of a streamlined security architecture based on best-in-practice frameworks.


  • Minimize risks on your network with DNS protection

    Learn about Neustar and their approach to DNS and security. Tap into this resource to find out how you can maintain network performance while tightening security for key areas, like DDoS protection and identity assurance.


  • Computer Weekly Network IT case studies

    Jennifer Scott takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.


  • Software-Defined Networking Strategies for Campus WANs

    In this E-Guide from, explore some of the issues associated with troubled OpenFlow switches, which vendors carry them, and details about a strategy that will not cause you the issues these other switches do.


  • Computer Weekly – 31 May 2016: The rise of machine intelligence

    In this week's Computer Weekly, we look at how machine intelligence is becoming increasingly commoditised – and what it means for enterprise IT. After Three's takeover of O2 was blocked, we look at the future for the UK's mobile operators. And we find out about attempts to address some of the fundamental flaws of the internet. Read the issue now.


  • Closing the print security gap

    This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy.


  • How Gatwick improved Wi-Fi performance

    Find out how Gatwick simplified their network architecture while also managing to provide more data links for efficient communications throughout the airport.


  • 29 pg. guide: Nutanix AHV cluster and scripting best practices

    Inside this 29-page eBook, learn best practices for running Oracle databases on Nutanix AHV clusters, as well as tips and ESXi settings recommendations for iSCSI, networking, Linux OS, and more.


  • Enterprise cloud applications – can we trust them?

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.


  • Jericho Forum - the vision

    Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation.


  • Information security trends

    This report from CompTIA, based on original research, assesses the current trends in information security.


  • E-Guide: Choosing enterprise wireless LAN equipment

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.


  • Head-to-head all-flash comparison for OLTP workloads

    This resource offers a comparison of two all-flash array platforms tested on OLTP workloads so you can choose the AFA that best meets your company's storage requirements. Download now for the complete head-to-head comparison.