Cisco Systems has unveiled its distributed SecureX architecture, which enables “context aware” security enforcement regardless of infrastructure environment. A key element is inclusion of client information through Cisco’s TrustSec technologies, which enable the transport and reading of context about user, device identity and role, to create and enforce granular policy. The announcement is being made at the RSA Conference.
Network Computing
Cisco Introduces ‘Context Aware’ Security Architecture, Leveraging Client Telemetry
Comments Off
Categories: General.
So, What Is A Backup?
Last week EMC blogger Chuck Hollis started a bit of a firestorm when he questioned the marketing position some vendors are taking that local snapshots make traditional backups unnecessary. As we could expect, a series of EMC haters, employees of other vendors and industry analysts jumped in to add fuel to the fire. I think Hollis did ask a valid question: As technologies advance, what is a backup?
Network Computing
Comments Off
Categories: General.
Infoblox Bridges Management Gap Between Physical And Virtual Networks
Currently addressing the network infrastructure automation and control requirements of large organizations, Infoblox has set its sights on bridging the management gap between physical and virtual networks. Officially launched on Monday, Infoblox IPAM Insight, an IP address management (IPAM) product, started shipping in mid-January on the Infoblox-1102 appliance platform with pricing starting at $ 14,995.
Network Computing
Comments Off
Categories: General.
SonicWALL Unveils Line Of High-Performance Multicore, Next-Gen Firewall Appliances
SonicWALL has announced a series of four high-end, multicore, next-generation firewall appliances, topping out at a 96-core behemoth with clustering options for up to 384 cores. The appliances leverage SonicWALL’s deep packet inspection (DPI) capabilities to apply application intelligence and user identity for fine-grained policy and rule creation, as well as bandwidth and application usage control. The announcement was made at the RSA Conference today.
Network Computing
Comments Off
Categories: General.
EMC Sees Big Opportunity In Big Data
According to an EMC-sponsored IDC report, the amount of data amassed by consumers and businesses is expected to increase by 44 times in this decade. A lot of that information will be what many including EMC is called big data. Obviously, big data requires storage and other products and services that the company provides so it should come as no surprise that, in its recent blizzard of announcements, EMC targeted big data as one of its key markets. Let’s try to understand big data and what it means and then briefly illustrate how EMC is addressing the big data market through its recent acquisitions of Isilon and Greenplum.
Network Computing
Comments Off
Categories: General.
Protegrity Takes Tokenization Beyond PCI
A major player in the token security market, Stamford, Conn.-based Protegrity USA wants to reach beyond its PCI (Payment Card Industry) base–including Visa, MasterCard, Best Buy, Southwest Airlines, Gap and Lowe’s–to the broader personally identifiable information (PII) market. Protegrity Data Security Platform 5.5 is the latest release of Protegrity’s soup-to-nuts enterprise security management solution and extends the company’s tokenization capabilities to additional PII data types, including medical IDs, e-mail addresses, Social Security numbers, dates, addresses and names.
Network Computing
Comments Off
Categories: General.
Solera Networks Adds Network Traffic Classification, Granular Application Awareness
Solera Networks has introduced traffic classification and identification with deep packet inspection, including highly detailed application information and visualized geolocation, to its network analysis platform. Solera OS 5, supporting the DeepSee suite of tools, also features an improved database engine for better performance and dynamic updating of dashboard displays.
Network Computing
Comments Off
Categories: General.
Tufin Firewall Management Suite Supports Palo Alto Networks’ Application-Identity Capabilities
Tufin Technologies has extended its firewall audit and change management capabilities to “next generation” firewalls with support for Palo Alto Networks products. In addition to standard network-based firewall capabilities, Palo Alto enables organizations to create fine-grained policies and rules based on application and user identity using deep packet inspection (DPI) technology.
Network Computing
Comments Off
Categories: General.
Druva Brings App-aware Dedupe To The Laptop
Given the fact that almost half the computers in corporate America are laptops, and a significant amount of data is created on those portable devices, I am constantly amazed at how frequently organizations leave the data on those laptops essentially unprotected. By taking a unique application aware approach to data deduplication, Druva’s Insync may be the best solution to date to this seemingly intractable problem.
Network Computing
Comments Off
Categories: General.
Dell’s New Lineup Combines Consumer Features With Enterprise IT
Dell introduced on Tuesday a sweeping new lineup of laptop, desktop and workstation computers designed to welcome the “consumerization of IT,” while still serving enterprise demands for support of virtualization, cloud computing, security and other IT priorities.
Network Computing
Comments Off
Categories: General.
