IBM, Akamai Partner To Speed Cloud Apps
Combining Akamai's network and IBM's DataPower appliances lets businesses and cloud service providers bypass the Internet and accelerate the delivery of applications.
The Future Of Networking On Display At Interop
Saying there is a lot of change in networking is like saying the sun is hot. Virtually every aspect of networking in the LAN and the WAN is developing new core protocols and technologies to meet growing demand. Networking isn't just about bigger, faster, denser. The changes are about smarter networking that discovers optimal paths from point to point, ensuring zero packet loss. The changes are being driven by (and are driving) server, storage and network virtualization. And the changes are about
Distributed Core And East-West Routing--The Network Is Changing
Applications and data center infrastructures are changing, and this puts a strain on conventional IT architecture. A number of recent announcements have really put this in perspective, with key network infrastructure components devolving from a centralized "hub and spoke" model to one that might even deserve to be called "cloud." Two key harbingers of this change are the shift from "North-South" to "all direction" network traffic and the decentralization of network device intelligence.
Microsoft Heats Up IPv4 Market
The $7.5 million acquisition of 666,624 IPv4 addresses from Nortel shows that there's a growing market for the dwindling commodity.
Force 10 Lays Out Standards-Based Next Generation Networking Vision
Force 10 is the latest networking vendor to announce a comprehensive vision for data center networking. Dubbed Open Cloud Networking, the idea is to use standard protocols to interconnect networking gear paired with their Open Automation capabilities, and offer integration and interoperation with network management and systems orchestration management servers. The company's announcement includes additional automation features and new hardware to support the vision. Force 10 is not the first to t
Data Centers: Who's On First?
For the fourth installment in NETWORK COMPUTING's five-part examination of the changes transforming the data center, we start with the shot heard around the IT world, when in March 2009, network powerhouse Cisco announced that it was taking on its server/data center rivals--HP, IBM and Sun (now Oracle)--with its Unified Computing System strategy, a.k.a. Project California. In a video supporting the March 16 announcement, John Chambers said, "It isn't just a new technology, it's an approach to vi
LabTech Software Unveils New Features, Tools In Release Of LabTech 2011 Remote Monitoring And Management Software
LabTech Software, a powerful and robust Remote Monitoring, Management (RMM) and Automation solution for managed services, today announced the release of LabTech 2011, with new features and enhancements highlighting LabTech's commitment to the channel. The company's continuing and rapid development of new features that resonate with current and future partners have put LabTech even further ahead of competitors in speed and capabilities. Learn more about LabTech's next waves of innovation in the L
HP Beefs Up Consulting To Help Clients Better Align IT And Business Strategies
HP on Monday introduced a package of a half-dozen IT consulting services whose goal is to help client firms better align their business and IT strategies. The HP Strategic IT Advisory Services portfolio is designed to help CIOs better achieve business goals through effective use of information technology. "We view there to be a gap between business consulting and technology consulting. There's been a lot of talk in the past about business-IT alignment, and we view that as critical," says Brad Bo
Virtela Offers Cloud-Based Solution To Manage Mobile Devices
The increasing use of employees' personal mobile devices on corporate networks has prompted Virtela Technology Services to introduce a cloud-delivered mobile device management (MDM) service. The service delivers a network connection to smartphones, tablet computers and other devices, monitors usage of voice and data plans, and archives text messages.
Dell Enhances Popular Kace Management Appliance
Acquired less than a year ago, the Dell Kace K1000 Management Appliance line, which combines general system management features with specific endpoint security features, is getting a face-lift. The most significant updates to version 5.3 include easier license management, new Dell warranty integration and an improved Windows agent that simplifies deployment to Windows-based systems.
Facebook Tools For Building Brands
HyperArts' Tim Ware is teaching businesses how to use reveal tabs, iFrames, and other development tools to lure fans and market companies.
BufferBloat And The Collapse Of The Internet
It seems that every few years there's yet another prognosticator that the Internet is about to collapse. Once it was the stellar growth in bandwidth demand driven by the phenomenal increase in Internet-connected devices. At other times, it was the lack of Net neutrality (see this video). Still other times, it was sinister attacks on BGP or the fact that we've run out of IPv4 addresses.
Cisco 'Primes' Its Borderless Networks Portfolio
Cisco is expanding its Borderless Networks portfolio--the architecture that incorporates routing, switching, mobility, security and wide-area network (WAN) optimization--with new security, management and video capabilities. Highlights include the Cisco Identity Services Engine (ISE), the centralized policy engine for the Cisco TrustSec solution that enforces a context-aware access security policy, distinguishes between organization-owned and personal user devices, and automates security with net
Criminals Cast Wide Net: Verizon Reports More Numerous But Smaller Breaches
Cyber criminals have apparently switched gears dramatically, eschewing big data breaches in favor of more low-risk attacks against poorly defended targets. The 2011 Verizon Data Breach Investigations Report shows a precipitous drop in the number of records stolen--from 141 million in 2009 to 4 million in 2010, even as the caseload of breaches investigated increased more than six-fold.
Sourcefire Enhances, Extends IPS Protection To SMEs
Best known for Snort, its free, open-source network intrusion prevention and detection system (IDS/IPS), Sourcefire Inc. is enhancing and broadening the for-profit portion of its IPS portfolio. The company has announced a new version of its software, Sourcefire 4.10, with enhanced awareness and third-party interoperability for the Next-Generation Intrusion Prevention System (NGIPS); Sourcefire 8000 Series Appliances, a modular and scalable high-speed platform for enterprise customers; and Source
PacketMotion Extends Activity Monitoring To VMware Environments
Enterprises will be able to monitor activity within VMware environments with the release of PacketMotion's PacketSentry Virtual Probe, a virtual machine version of its security appliance. Like the physical appliance, Virtual Probe collects and analyzes network traffic for anomalous user behavior and enforces corporate policy for security and regulatory compliance.
HP Plans To Help Companies Lessen Application Backlog
As part of integrating its 2008 purchase of the Electronic Data Systems services company, now known as HP Enterprise Services, Hewlett-Packard announced a combination of seven products and services intended to help user organizations transform applications.
Ceelox Provides Biometric Identity Access To Cloud Applications
Ceelox, Inc. announced today that the company has created a solution for secure login to cloud applications using biometrics. Ceelox ID Online utilizes a fingerprint authentication and the OpenID protocol to provide an Internet server-based biometric software application. This enables users to securely authenticate without the threat of having their credentials, i.e. user name and password, compromised or stolen by eliminating the feasibility of any replay attack. Once Ceelox ID Online grants ac
Raising The Bar: Security Comes of Age With O-ISM3
The Open Group's new information security management standard, Information Security Management Maturity Model (O-ISM3), has been crafted to enable the creation of information security management (ISM) systems that are fully aligned with any organization's business mission and compliance needs, regardless of size, context and resources. Compatible with other ISM industry standards--such as the ISO2700x series, Information Technology Infrastructure Library (ITIL) and COBIT--O-ISM3 is a comprehensi
Solid State Storage First Step: SSD As Cache
Though it's reliable and can boost performance, storage managers still struggle to properly apply solid state technology for maximum benefit without the need to rearchitect storage infrastructure.
McAfee IPS Beefs Up Reputation-Based Detection, Adds Virtualization Traffic Visibility
The latest version of McAfee's Network Security Platform intrusion prevention system (IPS) features enhanced reputation-based threat detection and the ability to analyze traffic between virtual machines. The new virtualization capability is enabled through a partnership with Reflex Systems, which provides products for traffic monitoring, policy enforcement and configuration management within virtual environments.
Putting Controller-Based Networks' Security Risk In Context
OpenFlow is starting to gain some buzz in the industry, with a demonstration at the upcoming Interop show in Las Vegas and vendors starting to adopt the protocol. However, as others begin to learn about OpenFlow and controller-based networking, complaints about single points of failure and single targets of attack get fired off in an almost knee-jerk reaction. Let's stop and take a breath. Single points of failure and single points of attack are common issues in networking and, frankly, have bee
Three Firewalls Flunk Stability Tests, NSS Labs Reports
Three of six leading firewalls crashed during stability tests, and five of six failed to stop an attack that allows an intruder to gain access as a trusted internal user, according to results released by NSS Labs. Fortinet, Juniper Networks and SonicWall appliances all failed under stress tests, while CheckPoint Software Technologies, Cisco Systems and Palo Alto Software firewalls continued to operate and received passing grades.
Zyrion 'Contains' Hybrid Clouds
A specialist in business service management (BSM) and network performance monitoring, Zyrion is beefing up its cloud capabilities with business service container technology enhancements to its Traverse network management platform. Officially created in 2007, when NetScout acquired Network General, the company's roots in infrastructure management go back to 1990, and it currently has more than 100 customers.
With HP, Egenera Poised For Explosive Growth
Not so long ago, Engera, a developer of an open converged infrastructure and unified computing solution, was considered at best a marginal player with an "opportunity to become less irrelevant." Fast forward to February, and the company reported its best financial year on record, with software orders doubling quarter over quarter. Its software sales were up 200 percent year over year, with the average PAN (Processing Area Network) Manager order size doubling during that time frame.
Four Steps On The Path To IPv6
Does this remind you of Y2K? The hard reality that the Internet is running out of IPv4 addresses recently hit the Wall Street Journal and New York Times. You know what comes next: business executives get to wondering just how this IPv6 thing will impact their businesses.
InteropNet's IPv6 Plans
One of the more interesting aspects of attending Interop is seeing the demonstrations that the InteropNet team is putting on. At the upcoming show, the InteropNet is running several IPv6 capable networks that are supporting both exhibitors and attendees. This marks the first show since Interop returned its Class A address space to ARIN in 2010. If you are at Interop, check out the various InteropNet locations offering IPv6. I caught up with some of the InteropNet team by phone to talk about IPv6
Internap Takes Accelerated IP Internet Traffic Accelerator Service Global
A year ago, Internap Network Services announced its Accelerated IP Internet traffic accelerator service (XIP), which the company claimed could improve performance of enterprise Web applications by up to 400 percent by eliminating some of the belt-and-suspenders reliability protection provided by TCP. The company is now announcing that the service is available worldwide, after having been tested in several cities during the past year.
DevOps: May Help, May Not
DevOps is one of the ongoing trends that is shaping IT organizations by merging developers and operations staff into dedicated or shared teams, with the goal of breaking down the barriers between the two groups to improve communications, speed application delivery time, and better design applications and the systems on which they run. However, you do need to set your expectations on what DevOps can provide. Your organization may already be efficient and well-run.
Utilities Don't Consider Security To Be A Strategic Priority, Ponemon Study Shows
Utility and energy industry executive management hasn't fully bought into IT security, according to a Ponemon Institute survey of IT and security practitioners in these critical infrastructure companies. Fewer than half the respondents said that security is a strategic priority across the enterprise, and only 29 percent said that their C-level executives fully understand and appreciate security initiatives.
Sophisticated Targeting, Spike In Web Attacks Highlight Symantec Threat Report
Web-based attacks nearly doubled in 2010, and criminals are now making use of social networks and other information sources to launch targeted attacks against both enterprises and small and midsize businesses, according to the Symantec Internet Security Threat Report. Symantec reports a 93 percent increase in Web-based attacks, driven by the proliferation of attack toolkits that put sophisticated malicious software in the hands of a broad base of criminals.
Enterasys Launches Latest Network Switches
Enterasys Networks has announced the K-Series, a new family of edge switches, as well as the A4, a new model of stackable switch. The devices are managed with the Enterasys Network Management Suite.
HP Prescribes Cure For Information Management Malaise
Setting the stage for the next evolution of the Instant-On Enterprise, which it started talking about late last year, HP is updating its information management (IM) portfolio, in part based on a customer survey indicating that 70 percent of organizations lack a holistic approach to managing business-critical information and instead are focused on managing infrastructure.
Add A Dash of Trellia To Thicken The Mobile Management Stew
And I thought that the Wi-Fi space could be fast moving ... It seems like every time I turn around of late, there is yet another mobility management vendor with a story to tell. Given that one analyst report after another hammers us with the fact that mobile devices are taking over the world, it makes sense that the management of these devices is a growth market unto itself. The latest player in this space that I've gotten wind of is Trellia Networks. Like its competitors, Trellia answers many o
EMC Acquires NetWitness To Investigate Network Security Breaches
EMC on Monday announced the acquisition of NetWitness, a company whose technology monitors computer networks to detect and re-mediate security threats while also automating the process of investigating security incidents. NetWitness will operate as part of EMC's security business, RSA. Coincidentally, the acquisition closed on April 1, the same day RSA disclosed that its own systems were the target of a phishing attack. RSA categorized the event as an Advanced Persistent Threat (APT).
Tenuous Chains Of Trust In Digital Certificates
Hot on the heels of RSA suffering an attack of unknown origin and resulting in a loss of unknown data with an unknown impact, news that certificate authority Comodo issued nine fraudulent certificates that browser vendors and OS vendors have had to issue a patch for highlights the fragility of the security systems that protect your data in transit across the Internet. In Comodo's case, neither the root CA nor any of Comodo's systems were compromised, according to its own incident report. Rather,
Cisco Faces Uphill Battle Selling Data Center Servers
Servers take center stage in the second of NETWORK COMPUTING 's four-part series on the changes transforming the data center. Server sales came back with a bang last year, rising 15.3 percent in the fourth quarter, the highest growth rate in three years and capping the fourth consecutive quarter of year-over-year growth.