Make Technologies Announces New ISV Suite
Make Technologies, a leading provider of legacy application modernization technologies, today announced the launch of its innovative Make Technologies ISV Suite for independent software vendors. ISV Suite includes everything a software company needs to reinvent its products and stay ahead in its market.
Enterprise Social Networks And Security Risks
While attending UBM TechWeb's Enterprise 2.0 Conference in Boston last week, I heard lots of conversations about the benefits and potential pitfalls of enterprise social networking. One theme that I heard repeated more than a few times was that enterprise social networks can create a greater security risk.
Zenoss Prescribes Cure For The Common Cloud
Zenoss Service Dynamics both unifies and automates impact and root cause analysis for IT services that span private and public IT infrastructures. It gives service providers and enterprises visibility into the health of their hybrid IT services from a single console that is easy to configure and automatically updated in real time as workloads migrate and relationships change, states the company.
ServiceNow Makes Help Desk Social
ServiceNow.com, which delivers service desk functionality in a SaaS model, now includes a runbook automation process pack for Amazons Elastic Compute Cloud, more updates to its ServiceNow IT service management platform services, and two new applications--one for data certification and one for giving users better access to managed documents. The company's ServiceNow Live feature has also been improved to add more social media capability.
Can Windows Servers Do WAN Optimization?
Certeon hopes to bring WAN optimization to the masses with aCelera Enterprise for Windows. But can a server app provide enough performance for enterprise data center links as workloads move to the cloud?
GreenSQL Brings Enterprise Edition To Database Activity Monitoring Market
GreenSQL has introduced an enterprise edition of its database activity monitoring (DAM)/database firewall product. The new release features data masking and high availability, in addition to other features available in the GreenSQL Pro product, including reporting, auditing, user rights management and support for multiple database instances.
Verizon Launches Service Based On Data Breach Report Methodology
Verizon Business is offering an security incident analysis service based on the Verizon Incident Sharing framework (VerIS), the foundation of its highly regarded annual Data Breach Investigation Report (DBIR). The aim of the service is to generate metrics of an organization’s security incidents over time to discover the root causes of vulnerability and take preventive measures.
Proprietary Is Not A Four Letter Word
Proprietary technologies are not inherently bad, but you do have to watch for vendors that interchange standards-based features with proprietary features in a fanciful shell game.
Viridity Tools Up For Emerging DCIM Market
Next month, Viridity Software will start shipping EnergyCenter 2.0, its data center infrastructure management (DCIM) software that has been enhanced to help customers connect equipment utilization and business value to power consumption, which the company says can reduce power and cooling costs by up to 50%.
Securing What You Don't Own
What do you do when the laptops, smartphones and tablets accessing company resources are owned by employees? You may find that traditional methods of security and management will be much harder to implement.
Former CA Security Business Emerges As Standalone Company
CA technologies sold off its Internet security business unit to the venture capital firm Updata Partners, which formed a new company called Total Defense that officially opens its doors Monday. Total Defense will focus on selling malware protection and intrusion prevention technology to both the consumer and business markets.
IBM Boosts Social Software Compliance
Partnership with Actiance brings management and archiving of social posts to IBM Connections, allowing for compliance monitoring and efficient audit trails.
Follow Amazon Example In User Account Management
Organizations that manage sensitive customer information have largely done their users a disservice by using links in emails. While they are trying to be helpful by providing links, the critical side effect is that users get used to clicking on them, and that is one way of facilitating phishing.
Cisco To Post Retail PCI Primer
Cisco announced it will put online the second generation of its retail PCI solutions that have been reviewed by a PCI Qualified Security Assessor. Due out at the end of the month, the validated Cisco PCI Solution for Retail 2.0 is intended to provide retailers with a simpler way to become compliant or incorporate modular elements on an as-needed basis.
RADIUS Is The Secure WLAN’s Best Friend
When the topic of high-quality wireless networking comes up, its trendy to bandy about notions of blazing throughput and Star Trek-sounding features like "beam forming" and "band steering." But before a client gets to benefit from the growing magic built into the contemporary wireless network, it probably needs to be scrutinized under the lens of “triple A”: authentication, authorization and accounting. This is where the often unsung hero called RADIUS comes in.
What Did IPv6 Day Teach Us?
Despite a quiet test, experts say most enterprise networks are not yet ready to handle IPv4 and IPv6 at the same time.
Fluke Networks Builds A Tablet For IT
Tablets invading the workplace has mainly been seen as a problem for IT. But what about a tablet designed for IT and specifically for network management? That’s the idea behind Fluke Network’s OptiView XG, a management tablet loaded with Fluke Network’s network analysis and testing tools, and with the hardware needed to monitor any wired or wireless network.
Vint Cerf's Internet Safety
At the Internet Society INET conference, there was wide-ranging discussion on a variety of topics, from Net neutrality to privacy. A highlight was Vint Cerf's keynote in the afternoon. He focused on the importance of safety mechanisms for those using the Internet--safety in terms of being protected from abusive behavior and safety in terms of the ability to speak freely and, where and when needed, remain anonymous. These are big issues in the international theater.
NitroSecurity SIEM Now Incorporates Smart Grid Data
NitroSecurity has extended its critical infrastructure Security Information and Event Management (SIEM) capabilities to incorporate and analyze smart grid data, helping utilities identify potential security issues in hundreds of thousands of vulnerable home and business endpoints and their supporting systems in the
Managing IT Resources Via Twitter
In an attempt to give operations personnel an easier-to-use and more familiar interface, in addition to the ability to respond to network management issues more easily from remote locations, Enterasys Networks has added a user interface module--called Isaac--to its network management software that gives users access to the software via popular social media applications such as Facebook, Twitter, LinkedIn and Salesforce.com Chatter.
Trend Micro Augments Network-Based Malware Detection, Releases Threat Intelligence Tool
The latest version of Trend Micro’s Threat Management System (TMS) adds sandboxing technology to its set of its network-based malware detection engines. Trend Micro has also introduced a threat intelligence product to correlate and analyze log information from its endpoint and network security tools to improve threat detection and incident response.
OpenFlow And Network Value
The announcement of OpenFlow has some people in networking optimistic that we are about to see a significant change in innovation and progress on network management. OpenFlow is a nascent networking specification that has three key elements: a software controller, the OpenFlow protocol and a client on the network device. It’s important to comprehend that all three elements combine to create a single coherent solution.
Survey Shows 3 of 4 Companies Suffer Data Loss
Research released this week by the Ponemon Institute reveals that more than three out of four organizations surveyed have experienced some kind of data loss within the last year. Some of the data loss occurred because of negligence on the part of an employee or a technical glitch, but an increasing percentage of the data breaches were the result of malicious criminal activity, underscoring the need for increased attention to DLP security.
EAPeak Tests Wireless Networks For Authentication Weaknesses
A free new tool from security vendor SecureState may make it possible for wireless network administrators and security consultants to verify how strong their wireless authentication is and whether it is possible for attackers to easily penetrate their networks. EAPeak is a simple Python toolkit that will monitor access attempts to a wireless network and track how clients are attempting to authenticate.
Cyveillance Social Engineering Appliance Detects Targeted Email Attacks
Cyveillance is offering an appliance designed to detect and stop spear phishing and other email-based social engineering attacks against enterprise targets. The Social Engineering Protection Appliance (SEPA) combines generic and vertical-specific phishing protection with custom
analysis based on information available on the Internet about the organization and its individuals.
WhatsUp Gold Gets Makeover
The network management division of Ipswitch is unveiling the new and improved WhatsUp Gold suite of network, server and application monitoring software. While more than 100,000 small and midsize business networks worldwide already use WUG solutions, version 15 is drawing rave reviews from early adopters, says Pat Loring, VP of sales, North America.
Six Reasons It's Blame IPv6 Day
As far as I am concerned, it's not World IPv6 Day. It's Blame IPv6 Day. This is a good opportunity to take any new technology (OK, IPv6 is not new, but it might as well be) and use it as the whipping boy it deserves to be. It's IPv6's turn. So, lets get started!
On IPv6 Day, Survey Shows Lack Of Preparedness For IP Address Switch
A survey of IT professionals shows a lack of education and preparedness for the transition from the IPv4 system of IP addresses to the new IPv6 standard. The survey, by Infoblox, shows that 80% of about 2,400 respondents feel they are not educated enough on the subject to perform an IPv6 migration, half don’t know which of their network elements support IPv6 today, and 70% are concerned about whether they can successfully implement an IPv6 deployment.
Six Benefits Of IPv6
With IPv6, everything from appliances to automobiles can be interconnected. But an increased number of IT addresses isn't the only advantage of IPv6 over IPv4. In honor of World IPv6 Day, here are six more good reasons to make sure your hardware, software, and services support IPv6.
Enterprises Not Ready For IPv6
World IPv6 Day tests readiness for the next-generation Internet protocol, but less than a quarter of business IT departments have begun to implement it, according to CompTIA.
Avaya Plans $1 Billion IPO
The offering would value Avaya at around $5 billion, or about 40% less than its private equity owners paid four years ago.
Aerohive Takes Another Swing At Controller-Based WLAN
As Aerohive ramps up its new cloud-based HiveOS and HiveManager 4.0 versions, the company continues to try to reach feature parity with WLAN market leaders and deliver functional innovation to differentiate itself from the pack.
Digium Intros Switchvox 5.0 For SMBs
The IP-based unified communications platform adds fixed mobile convergence for up to six phones of any kind, as well as additional APIs for third-party application development and integration.
ExtraHop Addresses 2,048-bit SSL Decryption Performance Penalty
It's still early days for 2,048-bit SSL (Secure Sockets Layer) encryption/decryption, but privately held ExtraHop Networks, a specialist in network-based application performance management (APM) solutions, is betting it won't take long for the significantly more secure standard to be adopted, with major implications for application monitoring. The next step up from 1,024-bit encryption is approximately 4.3 billion times more secure, requiring 4 to 8 times mo
HP Contends For IT Heavyweight Crown
While HP has led the IT market for some time on a revenue basis, its latest announcements continue the company's evolution from its commodity PC, server and printer roots to the enterprise roost that has been ruled by IBM since the dawn of the information age. HP is announcing a number of Converged Infrastructure solutions that bundle hardware, software and services, targeted at what the company calls the Instant-On Enterprise. Having kicked sand in Cisco's face with its network announcements la
Infineta Launches 10 Gbps WAN Optimization
Startup intends to differentiate itself from Riverbed and Blue Coat by focusing on enterprise clouds and using hardware-based acceleration to generate inter-data center links at wire speed.
Two Approaches To Taming Big Data
If today's data-centers aren't already drowning in data they will be soon, but two vendors, San Jose-based Infineta Systems and its nearby neighbor, Santa Clara-based Silver Peak Systems, are launching wide area network optimization solutions that will at least address, if not 'solve' the problem. According to a recent IDC study sponsored by EMC, the amount of data will grow 44 times by 2020.
Brocade In Dell's Sights?
Dell has established a beachhead in three of the four primary layers of the stack--storage, servers, and services. Networking is the crucial missing piece.
Ethernet Switch Sales Decline
Consolidation seems to be behind the decrease, as Cisco says overall Internet traffic will jump 400% in four years while the Dell'Oro Group says 10-Gbps top-of-rack switches will top $1 billion in sales this year.
Calling It: Dell Acquires Brocade
A Canaccord Adams report, "Dell Looks Poised for a Networking Move," seems to have merit, and industry insiders are claiming to have heard about the deal. The company is dramatically cutting expenses, and the Dell Storage Forum is going on next week, a perfect venue to announce the acquisition.
A Simple Question With A Complicated Answer: How Fast Should My WLAN Be?
Ethernet speeds are typically easy to discuss. Connection options jump between powers of 10, and range from 10 Mbps to 10 Gbps. (Forget about 40 Gbps for this discussion; it breaks my pattern.) But the question “What kind of speed should I get on the wireless network?” is a whole different animal. To the uninitiated, this is a reasonable question that should be met with a simple response. But to those of us responsible for providing a plausible answer, the question starts the mind ra
New Research: IT Automation
Our survey shows we're still mired in manual processes and failing to exploit third-party providers. That's no way to achieve a services focus.