In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.
This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.
A lot of vendors are moving into the data-protection arena, but netForensics has a good head start because of its product history in event correlation and incident detection. What's slightly unusual about the approach is monitoring both HTTP and SQL activity. While competitor Imperva is capable of doing similar monitoring with an additional SecureSphere Web Application Firewall supplementing its database security line, few other database-leakage vendors are taking this more holistic approach to detecting incidents. If netForensics gets it right, it could have a solid product on its hands. Jordan Wiens NWC Contributing Technology Editor
NetForensics this week launched a new enterprise database-monitoring product that can help IT protect Web and database applications from attack.
Working in conjunction with netForensics nFX Open Security Platform, the new nFX Data One provides security monitoring, including the ability to identify and remediate threats and gather data and audit trails for policy enforcement, comliance and security forensics, the vendor said.
Network Computing encourages readers to engage
in spirited, healthy debate, including taking us to task.
However, Network Computing moderates all comments posted to our site,
and reserves the right to modify or remove any content that it determines to be derogatory,
offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM.
Network Computing further reserves the right to disable the profile of any commenter participating
in said activities.