You've requested...

Share this with your colleagues:

Download this next:

CW Buyer's Guide: IPV6 Migration


The transition from IPv4 to IPv6 –and how to manage it.


The switch from IPv4 to IPv6 began on 6 June 2012, but surprisingly few organisations have done enough to prepare for the transition.


The 32-bit IPv4 address space supports 4.3 billion addresses which are rapidly running out – eventually organisations will need to migrate to IPv6.


This guide takes you through the steps you need to take and explains the potential impact on your business.



  • How to manage the IPv6 transition
  • IPv6 migration tips for small firms
  • The value of IPv6 to the enterprise
  • How to upgrade to IPv6



Click on the button below to download this 7 page Computer Weekly Buyer’s Guide

These are also closely related to: "IPv6 - Bridging the Gap to Tomorrow"

  • IPV6 Transition – Why the rush ?

    The internet and telecoms industries have been promoting the migration to IPv6 for the past few years. IPv6-compliant addresses have been available since 1999, but 2011 has witnessed a strong push for the transition to IPv6 from the legacy IPv4 addressing scheme.


    Many industry players - telcos, ISPs, IP backbone providers, Web 2.0 players - have been pressuring enterprises to prepare for the move; the recent World IPv6 Day (8 June 2011) is one example, with suppliers positioning IPv6 as the ""next-generation internet"". But many enterprise customers seem to have little interest in making the transition.


    For enterprises, the first course of action for is to recognise that you will be moving to IPv6, even if you have IPv4 addresses available. Having many years of IPv4 addresses in inventory will not protect against having to move to IPv6 sooner than you think.


    Treat this as you would your disaster recovery plan - create an IPv6 transition plan as soon as possible. This is not just a non-critical, ""make busy"" project; it will become critical to your internal and external communication, especially if you hit a wall that either blocks your employees or your customers from doing business. The plan should have phases so that you can address the IPv6 transition requirement by business unit, services, or region.


    Ovum logo





    Ovum provides clients with independent and objective analysis that enables them to make better business and technology decisions. Combining the ICT expertise of Datamonitor Technology, Butler Group and Ovum, with Datamonitor Group's 350 business analysts and relationships with 18 of the largest 20 global corporations, Ovum is uniquely positioned to provide practical, actionable advice to the technology, telecoms and other business sectors.

  • Windows 2012 Server Network Security



    By Derrick Rountree     


    This book provides the most in-depth guide to deploying and maintaining a secure Windows network. The book drills down into all the new features of Windows 2012 and provides practical, hands-on methods for securing your Windows systems networks, including: secure remote access, network vulnerabilities and mitigations, Windows personal firewall, and network diagnostics and troubleshooting.


    This extract offers an introduction to Windows 8, Windows Server 2012,  and  IPv6.


    Contents includes:


    •             Windows Server 2012 Server Manager

    •             Dashboard

    •             Local Server

    •             Config Export

    •             Notifications

    •             IPv6 Architecture

    •             IPv6 Addressing

    •             IPv6 Notation

    •             IPv6 Address Types

    •             Link-Local Addresses

    •             Unique Local Address

    •             IPv6 Addressing

    •             Stateless Address Autoconfiguration


    Download includes a 30% discount for Computer Weekly Readers on all Syngress books and eBooks



    Click on the button below to download this book extract



    From basic computer security books to highly-advanced hacking eBooks, Syngress brings you high-quality, practical information to help you stay ahead of the competition.


Find more content like what you just read:

  • 4 major cyberattack methods and how to defend against them

    The question is not whether you will be attacked. It's when, by what, and how badly your company's reputation or finances will be damaged. In the world of cybersecurity the wrong time to consider defense is after the attack has occurred. In this white paper, learn about different attack methods and how to protect your company.


  • IPv6 Leakage and DNS Hijacking in Commercial VPN clients

    Services used by hundreds of thousands of people to protect their identity on the web are vulnerable to leaks, according to this report researchers at Queen Mary University of London (QMUL) and others.


  • International domain name homographs: Are you protected?

    Internationalized Domain Names (IDNs) are often abused by cybercriminals to conduct malicious activities, such as phishing or malware distribution. In this new research report, Farsight Security Global Internationalized Domain Name Homograph Report, examine the prevalence and distribution of IDN homographs across the Internet.


  • Don't leave yourself open to a DNS attack

    Explore this report to learn about DNS protection technology adoption trends and find out how you can bolster your network's defense against pervasive threats like phishing attacks.


  • WAN Speak Musings – Volume VI

    Analysts Clive Longbottom and Bernt Ostergaard look at the key issues affecting network design and management in this continuing series of articles.


  • How to mature your cybersecurity governance program

    Today, companies still struggle to adapt risk management strategies to face modern threats, but maturing their cybersecurity governance processes is a step in the right direction. In this e-guide, learn from multiple cybersecurity experts on how your organization can mature its cyber-risk program to decrease vulnerability.


  • A reference architecture for the IoE

    Analyst group Quocirca proposes a basic architecture to help organisations avoid the many pitfalls of embracing the internet of things (IoT).


  • Check the network before moving to the cloud

    Before considering a move to the cloud, it’s important to ensure that your network is free of vulnerabilities that could put your data at risk. This expert resource offers tips on how to make sure your network is secure before extending the network infrastructure. View now to uncover key processes and tools to help detect configuration mistakes.


  • Stop cyberespionage in its tracks with network threat intelligence

    During an investigation into potential cybercriminal activity, there's usually a domain or IP address that serves as your starting point. Find out how to use the world's largest real-time and historical DNS intelligence database to bring new levels of insight to your investigation.


  • Support high-capacity upload & download access on your network

    Every second your business waits for file uploads, downloads, and transfers is lost time, productivity and revenue. In this white paper, find out how you can better support high-capacity, scalable upload and download access on your network with Fiber Internet Access by Spectrum Enterprise.


  • Unified Communication: “It should work as easily as a telephone call!”

    This article in our Royal Holloway Information Security series explains the security implications of unified communication.


  • How to tackle encapsulation and encryption

    How you make a secure, trusted connection over the Internet is one of the key debates as the industry strives for de-perimeterised solutions that it can implement.


  • Network Purchasing Intentions 2013

    This exclusive Computer Weekly/TechTarget research ,based on a survey of over 400 European IT professionals, reveals organisations’ investment plans for networking technology.


  • Damage from cybercrime will total $6 trillion by 2021

    Learn how you can get a network with native security controls that replace obsolete perimeter-based solutions, and protect the assets that are critical to your success in this white paper.


  • Secure enterprise SD-WAN for dummies

    In this For Dummies e-book, find out how to meet the demands for fast, reliable, and dispersed network connectivity by building a secure enterprise SD-WAN strategy.


  • Secure enterprise SD-WAN for Dummies

    Cost, speed, and reliability are all important to consider when designing a network, but balancing all 3 is no easy task—unless you implement SD-WAN. Download Secure Enterprise SD-WAN for Dummies for a step-by-step guide on how to manage and secure digital networks with SD-WAN.


  • Research report: Rapid7 Lab's key findings on security weaknesses

    Measuring the cost and concentration of weaknesses in the public-facing configuration of internet-connected services is increasingly important in the face of growing cybersecurity threats. In this research report, explore Rapid7 Lab's key findings as they measured the current levels of exposure and resiliency in 453 of the 2017 Fortune 500 list.


  • The dangers of IoT botnets vs. traditional botnets

    Gartner estimates that there will be 20 billion connected devices by 2020. Access this resource to learn about the history of IoT botnets and how the rise of connected devices can bring upon the rise of dangerous bot attacks.


  • Top 10 IT security stories of 2018

    The discovery of the Meltdown and Spectre microprocessor vulnerabilities, and several similar vulnerabilities in the months that followed, were probably the single most challenging developments for enterprise IT security teams in 2018. Here's a look back over Computer Weekly's top 10 IT Security stories of 2018.


  • IT in Europe: Next-Generation Network Management Techniques

    This issue examines how network managers can simplify their management tools gather from the network through the use of protocols like NetFlow and IPFIX and hardware like matrix switches. Learn how network managers are adopting new tools that give them better control over virtualized infrastructure, cloud environment and multi-vendor networks.


  • Best practices for scaling networking operations cost-effectively

    Download this white paper to learn how you can build a scalable, robust, and agile data center network—without breaking the bank—by using fixed form factor switches (FFF) and disaggregated network operating systems in a leaf/spine Clos architecture.


  • The state of application security: Data protection, bots, and strategy

    Download this white paper on web application security for a summary of current global perceptions on the state of application attacks, and insights on how to best identify and mitigate threats in the future.


  • Windows Server 2012 Security from End to Edge and Beyond

    This extract from the book Windows Server 2012 Security from End to Edge and Beyond shows you how to plan your platform security requirements and gives you the critical questions to ask.


  • 72-page eBook on all of your container networking questions

    Adopting containers is exciting for any developer, but it's important to take networking issues into consideration. Download this 72-page eBook to answer any questions throughout your container adoption journey.


  • Ways to solve DNS security issues in your organization

    Few aspects of the internet are as crucial as the domain name system. A DNS failure could bring the internet to a halt. What approach are you taking to protect and secure DNS in your organization? Download this handbook for insights into effective DNS security approaches.


  • Printer security: How to harness built-in security features

    Multi-function printers (MFPs) have become a cybersecurity blind spot within many organizations. This white paper offers practical guidance for IT professionals to harness the built-in security features of leading MFPs and adopt further, enhanced data protection capabilities. Read on to learn more.


  • Computer Weekly – 3 May 2016: How high-speed rail is accelerating innovation

    In this week's Computer Weekly, we find out how HS2, the UK's planned high-speed railway, is developing its IT from scratch and having to predict the future. We hear from DevOps experts who try to bust some of the myths around continuous software delivery. And our latest buyer's guide analyses graph databases. Read the issue now.


  • 7 models for the ZFS cluster high availability plug-in

    This paper will introduce you to a stable, enterprise-class plug-in—RSF-1—which provides assured high availability for ZFS clusters, even in the event of a failure. To see what the plug-in does, how to use it, and 7 functional models, continue reading below.


  • Special Report on Cisco

    This special nine-page report from Computer Weekly, updated for 2014, analyses the challenges facing Cisco, its financial performance, the services it offers, its place in the IT market and its future strategy.


  • MicroScope January 2014: A special issue looking at software defined networking

    The first issue of 2014 provides some insight in managed services, software defined networking, security and data centres


  • CW buyer's guide: context-aware security

    This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.


  • Minimize risks on your network with DNS protection

    Learn about Neustar and their approach to DNS and security. Tap into this resource to find out how you can maintain network performance while tightening security for key areas, like DDoS protection and identity assurance.


  • Take your storage to the next level with predictive analytics

    In this white paper, learn about a storage platform that combines analytics and management expertise with a cloud-based delivery model, to provide better insights into storage environments.


  • Computer Weekly Network IT case studies

    Jennifer Scott takes a look at what made the winning entries stand out from the crowd in the Computer Weekly European User Awards.


  • Software-Defined Networking Strategies for Campus WANs

    In this E-Guide from, explore some of the issues associated with troubled OpenFlow switches, which vendors carry them, and details about a strategy that will not cause you the issues these other switches do.


  • Computer Weekly – 31 May 2016: The rise of machine intelligence

    In this week's Computer Weekly, we look at how machine intelligence is becoming increasingly commoditised – and what it means for enterprise IT. After Three's takeover of O2 was blocked, we look at the future for the UK's mobile operators. And we find out about attempts to address some of the fundamental flaws of the internet. Read the issue now.


  • How SD-WAN and digital transformation are reshaping the network

    In this Frost & Sullivan e-book, learn about the top trends shaping global SD-WAN adoption, the impact of digital transformation on enterprise networks, SD-WAN vendor selection criteria, and more.


  • Closing the print security gap

    This report provides an overview of the inherent risks when operating an insecure print environment and discusses the current market landscape while recommending some best practices for adopting an integrated information and print security strategy.


  • How Gatwick improved Wi-Fi performance

    Find out how Gatwick simplified their network architecture while also managing to provide more data links for efficient communications throughout the airport.


  • HPC and AI – The bandwidth bottleneck explored

    This guide presents a highly scalable software-defined storage system designed to meet the latency and IOPS requirements of high-performance computing and deep learning workloads. For an architectural overview, use case examples, and the cluster design, read on here.


  • Enterprise cloud applications – can we trust them?

    This article in our Royal Holloway Security Series examines the more significant risks involved when an enterprise uses line-of-business applications hosted in the cloud.


  • Jericho Forum - the vision

    Jericho Forum aims to develop and influence information and communications technology(ICT) security standards.  These will facilitate the secure interoperation of ICT to support collaboration and commerce over open networks, within and between organisations, based on a security architecture and design approach entitled de-perimeterisation.


  • Information security trends

    This report from CompTIA, based on original research, assesses the current trends in information security.


  • How to secure printer endpoints

    Attackers seize on the lack of attention given to printer security relative to other devices and peripherals on enterprise networks. This IDC resource highlights the vulnerable nature of printers in enterprise networks and provides steps to reduce the risk they pose to the business.


  • E-Guide: Choosing enterprise wireless LAN equipment

    802.11N has solidified and a new product generation has emerged, the time is right for enterprises to pursue broader WLAN deployment. Purchases should be driven by technical requirements that map business needs onto product capabilities. To help you complete that step, we have compiled a list of common enterprise WLAN requirements.


  • Research report: Explore key data loss prevention vendors

    This research report provides an analysis of the market for data loss prevention, revealing top players, trail blazers, specials and mature players. Data loss prevention solutions provide electronic data supervision and management to help organizations prevent non-compliant information sharing. In this research report, explore key vendors.


  • Secure internet routing

    This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.