Timeline For Facebook Pages Takes Getting Used To
Businesses that use Facebook for marketing and to connect to customers may learn to love Timeline for Facebook Pages. But designers and developers of custom tabs will have to scramble to adjust over the next 30 days.
SSD, Scale-Out Architecture To Grow
As SSD capacity continues to increase and prices drop, use of SSD for enterprise Tier 1 applications is going to become more and more common. At the same time, enterprises are adopting scale-out architectures. It's an exciting time to be involved in enterprise storage.
RSA Chief Tells Enterprises: Make Security And Privacy Protection Top Priorities
While RSA, EMC's security division, has acknowledged it has a lot of work to do to repair its reputation after the 2011 hack attack that exposed information on 77 million customer accounts, the company says a new study shows a troubling lack of attention to security and privacy risks among directors and top executives at Global 2000 companies. Presented at the RSA Conference 2012 in San Francisco, the study calls for companies to "establish a tone from the top" to make security and privacy prote
EMC Rolls Out 5 GRC-Centered Security Services
EMC's consulting arm is introducing five security and risk management advisory services. "When you look at the services and the way we set this up, it's very much a reflection of our need to provide our customers with end-to-end solutions... framed under the broader umbrella of GRC--governance, risk and compliance," says Mat Allen, senior director, security and risk management global practice, EMC Consulting. "GRC acts as the center point."
RSA: Trio Of Next-Gen Firewalls Try To Keep Up With Evolving Threats
Much of the attention at this week's RSA Conference 2012 will be on the next-generation firewall (NGFW) and how it is getting more sophisticated as the threats to computer networks get more sophisticated. A number of vendors will be making NGFW announcements during the conference in San Francisco, but not all solutions advertised as next-generation firewalls are created equal, says one analyst.
Two Approaches To Network Optimization At RSA
It's a given that complexity grows as networks expand, as more performance demands are placed on networks and as security protections are required. One approach to tackling that complexity is network intelligence optimization, a technology in which a fabric layer sits between the infrastructure layer--the routers and switches--and the network intelligence layer--tools such as intrusion detection, application monitoring and advanced threat protection systems--and knits them all together. At the R
Proofpoint Extends Data Protection To Box File-Sharing Cloud
Data protection vendor Proofpoint is using this week's RSA Conference 2012 to announce it is partnering with the cloud-based file-sharing site Box.com to extend data protection to users of the popular service. Proofpoint already provides data protection as a service for a customer's e-mail, Web and social media communications to prevent sensitive customer or company data from being exposed. Just like social media, employees are choosing themselves to use file-sharing sites to get their work done
Dell Updates EqualLogic Storage Line, Targets Linux And Acquires AppAssure
As part of this week's data center announcements, Dell is unveiling the next generation of its midmarket EqualLogic PS Series storage arrays, featuring 10 Gigabit Ethernet (10GbE) networking bandwidth, with increased storage capacity in a smaller footprint. The company says customers can improve performance for applications and workloads by 69% compared to previous-generation 10GbE EqualLogic arrays. In addition to two new models, Dell is also enhancing its software, and announcing the acquisiti
Dell Data Center Rollout Features Next-Gen Servers, Network Virtualization Architecture
Dell is introducing a new line of servers, storage hardware and a network virtualization architecture framework to meet the expanding demands on data centers to crunch petabytes of data. The company introduced the 12th generation of PowerEdge servers--seven models--some targeted at hyperscale environments, others optimized for server virtualization, and one intended for use in small or remote offices.
Solid State Drives New Wave of Storage System Startups
It was just last year that many of us in the storage chattering class were talking about how the market for mainline storage systems had consolidated after 3Par and Compellent were swallowed up by HP and Dell, respectively, leaving the market with just one or two smaller vendors to keep the big boys honest. That discussion failed to recognize that solid state storage had made the transition to the mainstream, and that there was a new wave of startups building storage systems optimized for flash.
Consolidation, Scale-Out Architectures And Virtualization Drive 2012 Storage Trends
Enterprise storage infrastructure still contains quite a bit of direct-attached storage (DAS), but SMEs are in the process of making the move to consolidated storage, a shift that has already taken place at the Fortune 500 level. Even as storage consolidation catches on in the enterprise, though, there is a trend towards building scale-out storage architectures.
Asigra Updates Cloud Backup, Extends NetApp Partnership
Asigra's Cloud Backup software update, Version 11.2, offers deeper array snapshot integration, increased support for virtualization and mobile devices, increased performance, and service delivery enhancements. In addition, the company is extending its strategic partnership with NetApp to provide what it says is the first fully vetted joint offering from the NetApp Cloud Solutions Team, a data-processing-as-a-service solution that is intended to make it easier for telecommunications companies to
HP Ramps Up Security Focus, Portfolio
This week at the RSA Conference 2012 in San Francisco, HP will explain how it has integrated a number of security acquisitions in recent years and unveil HP EnterpriseView, a set of tools designed to help enterprise executives understand security risks and the business risks associated with them. The company will also be highlighting security technology to protect cloud environments and mobile devices. The HP Enterprise Security Products business unit will incorporate the company's security asse
Toward More Reliable Wireless With AirMagnet Enterprise 10
If the phone isn't ringing, then your wireless users must not be feeling any pain, right? That can be a dangerous assumption in large, complicated wireless networks. Some issues may not be crystallized enough to raise your clients' ire, but the fact remains that performance is degraded. AirMagnet's latest Enterprise version wants to make hard-to-find problems more obvious even as the WLAN gets ever more complex.
Data Dimension Makes Cloud Adoption Easier
Dimension Data has announced a series of cloud services for both public and private clouds that are intended to make it easier for organizations to adopt cloud computing more quickly. The services perform functions associated with planning, design, deployment and management of private, public and hybrid clouds. The new offerings include the Dimension Data Managed Cloud Platform, which helps deliver the cloud services, and Dimension Data CloudControl, a cloud management system that automates prov
PerspecSys: Removing a Key Security Barrier to Public Cloud Adoption
Several months ago, an IT trade publication (which will remain nameless) published an article whose title stated that public cloud security remains "mission impossible." While the article was well-reasoned and backed off from the title's hyperbolic assertion, the damage had already been done. Actually, the title should have been something more like, "Public cloud security is mission possible, but proceed cautiously."
Using MPLS In The Enterprise
In the data center, the MPLS/VPN architecture offers an attractive alternative to increasing the size of Layer 2 domains. Some players in the industry are promoting protocols such as Transparent Interconnection of Lots of Links (TRILL) to solve Spanning Tree Protocol (STP) scalability problems.
What's Next For IBM Security?
IBM's new security mantra for enterprises might be summed up like this: Think big, see small. It's marrying security monitoring, big data analytics, and threat intelligence.
OpTier Tackles APM Silos, Latency Issues
Application performance management (APM) is becoming a critical capability in today's world of cloud-based solutions and the applications-delivered-as-a-service technology model. The market is crowded with dozens of vendors looking to bring APM to the cloud, and OpTier is the latest seeking to stand out from the likes of Compuware, HP and IBM.
5 Schemes For Redeeming Trust In SSL
Web authentication is clearly flawed, but SSL and certificate authorities aren't going away. Here's a guide to the leading proposals to fix the problems.
Cisco And Deloitte Wrong: Good Practices More Impactful Than Vendor Choice
Cisco is fighting back against the notion that a multivendor network can simplify operations and reduce TCO. The networking giant commissioned a report by Deloitte that finds equipment operation costs will increase over the life of a network that uses equipment from disparate vendors. The fact is, one vendor versus multiple vendors is the wrong fight. Sound management practices and smart production selection will have a bigger impact on your IT costs than the number of vendors you use.
Annual e-Discovery Demands, Expenses Skyrocket
The good news is companies are becoming increasingly familiar with predictive coding, but the more unsettling news is they are facing up to $20 million in annual e-discovery expenses. According to the third annual study of streamlining and reducing the cost of e-discovery on inside counsel at mostly Fortune 1000 companies, 81% of respondents are familiar with predictive coding to determine whether a document is appropriate to include in a case, states legal industry analyst Ari Kaplan, who condu
FAST Paper Casts Doubt on SSD Future
At last month's FAST (File and Storage Technologies) conference, researchers from UCSD and Microsoft Research presented a paper, titled "The Bleak Future of NAND Flash Memory" that's put the rosy all-flash-all-the-time future predicted by some in doubt for the long term. The gist of the paper's argument is that the physics of flash, and the researchers' testing, indicate that as flash density increases, the life and performance of flash will degrade to the point that by 2024 flash will no longer
Aruba Networks Swings Big At BYOD And More With ClearPass
Gone are the days of simply providing good signal in the WLAN environment. Guest requirements, the new reality of the BYOD--or bring your own device--model and increasing reliance on the wireless network as a critical resource combine to make life complicated for us in the business of enterprise wireless networking. Aruba Networks is ready to answer the back-end challenges of contemporary wireless with its new ClearPass framework, and the impressive array of features is not limited to use by Aru
AppSense Unveils Smartphone Encryption
DataLocker, which will enable smartphone users to encrypt sensitive information in personal cloud services such as Dropbox, is the first product to come out of the new research arm created by virtualization technology provider AppSense. Intended to create new computing technologies geared toward both end users and IT, the focus of AppSense Labs will be "to research technologies that include cloud, mobile and data, and to build prototype products that bring a consumer experience to IT," according
Virtual Backup Challenges Enterprise IT
Organizations remain challenged when it comes to ensuring data is adequately protected and recoverable, even though advances have been made in backup and data protection technology, industry observers say. Among the reasons cited are that data protection processes don't get reviewed frequently enough, there are few SLA requirements, and there is a lack of visibility into the results of data protection activities.