Andrew Conry Murray


Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

See more from this blogger

Readers Respond: F5 Firewall Challenges Cisco, Check Point

Recently F5 announced it was rolling out homegrown firewall software to run on its Big-IP platform. The move puts F5 in direct competition with security stalwarts such as Check Point, Cisco, Juniper and others. As I wrote in a Network Computing newsletter:

So does the world really need another firewall? F5 wants to capture customers that have already bought into Big-IP with a consolidation story: add our software and spare yourself the hassle of running separate boxes from another vendor. I'm all for competition in the tech market, and I think F5's pitch may resonate. That said, there's always a good argument for not putting all your eggs in one basket (even if that basket runs in a high-availability cluster). Cisco, Check Point and other competitors also won't sit quietly at the thought of customers being poached. What's your take on F5's approach? Are they on to something, or do you feel more comfortable running separate tiers of devices?

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

We got some interesting responses from readers. Check out what they had to say.

One reader responded: I'm not a security expert, but have been in WAN/LAN networking for the last 17 years working with customers and partners, so I have a sense of how this might go. The one consistent theme you hear from the security folks is "layered security." I don't see existing customers of any other product pulling out stuff just to put in F5's product, even if it's great. On new F5 installs, I CAN see customer's considering the FW option IF it might save them some money AND they're not hugely invested in another product. I can't see F5 pushing this too hard, though, in Cisco shops, since they've found a very comfortable niche in what I'll call the 'Cisco ecosystem.'

The minute Cisco starts seeing any measurable impact to their share, you can bet they will be hammering their loyal VARs to quash this (and they are the most loyal foot soldiers in the land) before it gains too much steam. All in all, impact will be fractional percentages of market share, mainly at the expense of other firewall-only vendors. Cisco's channel is way too formidable for this to be a concern. Now if only HP had a true firewall product, there you might see more impact. They should have picked up Sonic Wall before Dell did. Perhaps they'll wake up and look at Fortinet.

One last thought: enterprises that are compromised for rack space, particularly in remote office deployments, might find this F5 product attractive.

[ Join us at Interop Las Vegas for access to 125+ IT sessions and 300+ exhibiting companies. Register today! ]

Reader Gonzalo Cervantes was more bullish on F5's move:

I think F5 is going in the right direction. Layer 7 firewalls go hand-in-hand with the application delivery controller functions. For the most part, if you are trying to balance some application, you may want to protect it while you're at it, and F5 is packaging those functions. It comes down to: Will F5 do it right? A10 is coming out with similar code for their AX platform, but the question is the same: Will it be done right?

I agree with the 'putting all the eggs in one basket' argument, but HA clustering allows you to deal with a single point of failure.

Frank Antico, who works for Cisco Systems, also had an opinion.

This is because they are going after a consolidation approach for virtualization. Cisco is the only vendor in the market that can deliver Hyper-V bypass with its Nexus 1000v for VMware virtual environments, with our Nexus switching for the data center and vpath and rise API, we can apply firewall and load balancing at network speeds to a virtual environment.

I would imagine F5 is trying to compete with us, but it is hard when they don't have the network footprint and the level of integration we bring for virtual environments.

You can join in the conversation any time by commenting below, or by reaching out to Network Computing on Twitter at @networkcomputing. Click here to subscribe to the newsletter.


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers