Network intrusion-prevention specialist Sourcefire will pay a total of $ 21 million, $ 17 million now and $ 4 million to be paid over the next 18 months upon achievement of product delivery milestones, for Immunet, a developer of cloud-based anti-malware technologies. The acquisition is expected to extend Sourcefire’s malware protection to the cloud, and provides the company’s first endpoint protection offering, according to company officials.
Network Computing
Sourcefire To Shell Out $21 Million For Immunet
Comments Off
Categories: General.
SNIA And CompTIA Raise Certification Bar
The association considered the leader in storage certifications, the Storage Networking Industry Association (SNIA), and the association considered the leader in vendor-neutral IT certifications, CompTIA, are joining forces to create a new certification for storage networking and information management. Work started on developing the new certification, CompTIA Storage+ Powered by SNIA, in the third quarter of 2010, according to Rick Bauer of CompTIA’s skills certification department. “Our goal is to have the beta out late-February, early-March,” he says. Following a validation period, the final product is expected in the third or fourth quarter timeframe, he adds.
Network Computing
Comments Off
Categories: General.
Scientists Suggest Microfiche For Long Term Archive
It’s no secret that we, as an industry, are struggling with the challenge of storing digital data for the long term. And now a pair of academics are suggesting that microfiche, that analog medium we’ve been using for decades to store old newspapers, could, with 2D barcodes, be the solution to the long term data storage problem.
Network Computing
Comments Off
Categories: General.
New Citrix Portal Checks Endpoint Software Configuration
Citrix Systems is introducing the Citrix Endpoint Analysis Portal, which is designed to check desktop computers and other devices for the correct configuration of the software applications that they are running. The portal product was developed in partnership with a company called Opswat, which licensed to Citrix its Oesis Framework software development kit (SDK) for ensuring software manageability. The Endpoint Analysis Portal is a free tool for users of the Citrix Access Gateway appliance, which controls access to applications in a secure socket layer (SSL) virtual private network (VPN) environment.
Network Computing
Comments Off
Categories: General.
Wi-Fi Direct Just Might Kill Bluetooth–Are You OK With That?
In late 2010, I blogged about Wi-Fi Direct’s arrival. Though ad hoc wireless networking has been allowed under 802.11 operations since the standard was a baby, it wasn’t exactly easy to execute. Now, Wi-Fi Direct puts a friendly face on device-to-device wireless communications, and some predict that it will seriously horn in on Bluetooth’s place in the grand scheme of personal connectivity. Wi-Fi Direct has higher speeds and longer ranges than Bluetooth, so it’s easy to see why Wi-Fi Direct may be appealing at first blush. But it isn’t the right fit in all cases, and promoting Wi-Fi Direct as the deserving executioner of Bluetooth is a bad move.
Network Computing
Comments Off
Categories: General.
Enterprises Will Tread Cautiously Into VDI In 2011
A new survey shows that many companies are looking into implementing client virtualization–technology that delivers applications to end point computers virtually, rather than from software on a desktop or server. However, the survey says, companies are finding that client virtualization is more complex to implement than they realized, that ROI is difficult to calculate, and that training end users can be a challenge. The survey of IT administrators by enterprise technology provider CDW concludes that companies have to conduct more upfront planning and analysis to have a successful deployment.
Network Computing
Comments Off
Categories: General.
DHS Outlines Critical Infrastructure Protection Plan
The Department of Homeland Security (DHS) plans to ride the momentum of critical infrastructure protection efforts it began last year into 2011. In a blog post, the agency touted some of its accomplishments of the past year and said that the federal government will continue to take steps to protect the electricity grid, power plants and other control systems in the United States as a new year begins. The post comes on the heels of Critical Infrastructure Protection Awareness month, which the agency sponsored in December to highlight its efforts in this area.
Network Computing
Comments Off
Categories: General.
HP Refreshes Mid-Range Thin Clients
Hewlett-Packard is announcing a refresh of its mid-range thin client portfolio, due to start shipping next week. The line of t5500s (t5550, t5565 and t5570) is the lowest priced HP offers, starting at $ 249, and provides easier deployment. The company, which already dominates this market, according to IDC’s “Q310 Enterprise Client Device Tracker,” says that its new products provide significantly improved performance, a wireless option and the ability to support new capabilities such as Citrix HDX. The latter provides network and performance optimizations for a “high-definition” desktop virtualization user experience.
Network Computing
Comments Off
Categories: General.
Dedupe Dos and Don’ts
Data deduplication, at least for backup data, has made it to the mainstream. However, it’s important to remember that the term “data deduplication” applies to a relatively wide range of technologies that all manage to store data once, even when they’re told to store it many times. Since all of these technologies are sensitive to the data being stored, nowhere in IT is the term “your mileage may vary” more true than in dedupe. As 2010 winds down, I figured I’d share a few tips on how to get the most out of deduplication.
Network Computing
Comments Off
Categories: General.
Android Phones Targeted By Trojan
A new Android Trojan that displays some botnet characteristics has emerged from China, Lookout Mobile Security warns. Called Geinimi, the malware can compromise a significant amount of information on a user’s Android smartphone and send it to remote servers, the security developer said in a blog. Once installed on the phone, it could allow the server’s owner to control the mobile device, says Lookout.
Network Computing
Comments Off
Categories: General.
