Michael Cooney

Author Archives: Michael Cooney

Cisco goes to the cloud with broad enterprise security service

Cisco has unveiled a cloud-based security platform it says will go a long way in helping customers protect their far-flung networked resources.Cisco describes the new SecureX service as offering  an open, cloud-native system that will let customers detect and remediate threats across Cisco and third-party products from a single interface. IT security teams can then automate and orchestrate security management across enterprise cloud, network and applications and end points.Network pros react to new Cisco certification curriculum “Until now, security has largely been piecemeal with companies introducing new point products into their environments to address every new threat category that arises,” wrote Gee Rittenhouse senior vice president and general manager of Cisco’s Security Business Group in a blog about SecureX.To read this article in full, please click here

Juniper bolsters wireless security; fights against encrypted malicious threats

Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats.With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network via campus, WAN or data center. The moves are part of Juniper's grand Connected Security platform that includes a variety of security products including its next-generation firewalls that promise to protect networked resources across infrastructure and endpoints.To read this article in full, please click here

Cisco goes to the cloud with broad enterprise security service

Cisco has unveiled a cloud-based security platform it says will go a long way in helping customers protect their far-flung networked resources.Cisco describes the new SecureX service as offering  an open, cloud-native system that will let customers detect and remediate threats across Cisco and third-party products from a single interface. IT security teams can then automate and orchestrate security management across enterprise cloud, network and applications and end points.Network pros react to new Cisco certification curriculum “Until now, security has largely been piecemeal with companies introducing new point products into their environments to address every new threat category that arises,” wrote Gee Rittenhouse senior vice president and general manager of Cisco’s Security Business Group in a blog about SecureX.To read this article in full, please click here

Juniper bolsters wireless security; fights against encrypted malicious threats

Juniper is filling out its enterprise security portfolio this week by integrating support for its Mist wireless customers and adding the capability for customers to gain better visibility and control over encrypted traffic threats.With the new additions, Juniper is looking to buttress its ability to let users secure all traffic traversing the enterprise network via campus, WAN or data center. The moves are part of Juniper's grand Connected Security platform that includes a variety of security products including its next-generation firewalls that promise to protect networked resources across infrastructure and endpoints.To read this article in full, please click here

Google Cloud moves to aid mainframe migration

Google Cloud this week bought a mainframe cloud-migration service firm Cornerstone Technology with an eye toward helping Big Iron customers move workloads to the private and public cloud. Google said the Cornerstone technology – found in its G4 platform – will shape the foundation of its future mainframe-to-Google Cloud offerings and help mainframe customers modernize applications and infrastructure.[Get regularly scheduled insights by signing up for Network World newsletters.] “Through the use of automated processes, Cornerstone’s tools can break down your Cobol, PL/1, or Assembler programs into services and then make them cloud native, such as within a managed, containerized environment” wrote Howard Weale, Google’s director, Transformation Practice, in a blog about the buy.To read this article in full, please click here

Cisco: IoT traffic is taking over; 5G, WiFi 6 are ascending

If the industry needed more evidence that IoT devices and applications are taking over the world, Cisco this week said that by 2023 machine-to-machine communications will make up 50% or about 14.7 billion of all networked connections compared to 33% (6.1 billion) in 2018 and 3.1 percent in 2017.The  M2M findings were just a part of Cisco’s annual forecast of networking trends now called the Cisco Annual Internet Report. The report replaces the Visual Networking Index (VNI) Forecast and looks at everything from 5G and Wi-Fi growth to broadband trends collected from actual network traffic reports and independent analyst forecasts.To read this article in full, please click here

Multicloud, security integration drive massive SD-WAN adoption

Increasing cloud adoption as well as improved network security, visibility and manageability are driving enterprise software-defined WAN (SD-WAN) deployments at a breakneck pace.According to research from IDC, software- and infrastructure-as-a-service (SaaS and IaaS) offerings in particular have been driving SD-WAN implementations in the past year, said Rohit Mehra, vice president, network infrastructure at  IDC. Read about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT For example, IDC says that its recent surveys of customers show that 95% will be using SD-WAN technology within two years, and that 42% have already deployed it. IDC also says the SD-WAN infrastructure market will hit $4.5 billion by 2022, growing at a more than 40% yearly clip between now and then.To read this article in full, please click here

Arista snatches-up SDN-pioneer Big Switch Networks

Arista confirmed what had been rumored for the past few weeks, that it has acquired software-defined networking (SDN) and cloud-software vendor Big Switch Networks for an undisclosed amount.The move gives Arista a package of software technology that should complement Arista’s drive to meld data-center and campus networks with the multicloud deployments. To read this article in full, please click here

Cisco patches a security glitch affecting routers, switches and phones

Cisco has issued fixes for five security glitches that can be found in a wealth of its networked enterprise products – from switches and routers to web cameras and desktop VoIP phones.  The problems center around vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) that could let remote attackers take over the products without any user interaction. While no public exploit has been found, an attacker simply needs to send a maliciously crafted CDP packet to a target device located inside the network to take advantage of the weakness, Cisco stated.Cisco’s CDP is a Layer 2 protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby, according to Cisco. It enables management of Cisco devices by discovering networked devices, determining how they are configured, and letting systems using different network-layer protocols learn about each other, according to Cisco.To read this article in full, please click here

Cisco patches a security glitch affecting routers, switches and phones

Cisco has issued fixes for five security glitches that can be found in a wealth of its networked enterprise products – from switches and routers to web cameras and desktop VoIP phones.  The problems center around vulnerabilities in the implementation of the Cisco Discovery Protocol (CDP) that could let remote attackers take over the products without any user interaction. While no public exploit has been found, an attacker simply needs to send a maliciously crafted CDP packet to a target device located inside the network to take advantage of the weakness, Cisco stated.Cisco’s CDP is a Layer 2 protocol that runs on Cisco devices and enables networking applications to learn about directly connected devices nearby, according to Cisco. It enables management of Cisco devices by discovering networked devices, determining how they are configured, and letting systems using different network-layer protocols learn about each other, according to Cisco.To read this article in full, please click here

IBM’s CEO Virginia Rometty to be replaced by its cloud, Red Hat chiefs

If anyone was still wondering how serious IBM is about being a major cloud player that question was resoundly answered this week when its current cloud and cognitive-software leader Arvind Krishna and Red Hat CEO Jim Whitehurst to be CEO and president, respectively, to replace long-time CEO Virginia Rometty.Krishna, 57, was a principal architect of IBM’s $34 billion acquisition of Red Hat last year and is currently IBM’s senior vice president of Cloud and Cognitive Software, which has become the company’s palpable future.   [Get regularly scheduled insights by signing up for Network World newsletters.] The Red Hat acquisition not only made Big Blue a bigger open-source and enterprise-software player, but mostly it got IBM into the lucrative hybrid-cloud business, targeting huge cloud competitor Google, Amazon and Microsoft among others. Gartner says that market will be worth $240 billion by next year.To read this article in full, please click here

IBM’s CEO Virginia Rometty to be replaced by its cloud, Red Hat chiefs

If anyone was still wondering how serious IBM is about being a major cloud player that question was resoundly answered this week when its current cloud and cognitive-software leader Arvind Krishna and Red Hat CEO Jim Whitehurst to be CEO and president, respectively, to replace long-time CEO Virginia Rometty.Krishna, 57, was a principal architect of IBM’s $34 billion acquisition of Red Hat last year and is currently IBM’s senior vice president of Cloud and Cognitive Software, which has become the company’s palpable future.   [Get regularly scheduled insights by signing up for Network World newsletters.] The Red Hat acquisition not only made Big Blue a bigger open-source and enterprise-software player, but mostly it got IBM into the lucrative hybrid-cloud business, targeting huge cloud competitor Google, Amazon and Microsoft among others. Gartner says that market will be worth $240 billion by next year.To read this article in full, please click here

Cisco offers on-prem Kubernets-as-a-Service to challenge public cloud

Cisco says it will offer a Kubernetes-based “container-as-a-service” for its HyperFlex hyperconverged infrastructure (HCI) environment.The turnkey system, called HyperFlex Application Platform (HXAP), is Kubernetes at its core and includes all manner of integrated tools such as container networking, storage, a load balancer and more to let customers install, manage, and maintain a complete platform for cloud-native application development, Cisco stated.See predictions about what's big in IT tech for the coming year. HyperFlex is Cisco’s HCI that offers computing, networking and storage resources in a single system.To read this article in full, please click here

Cisco offers on-prem Kubernets-as-a-Service to challenge public cloud

Cisco says it will offer a Kubernetes-based “container-as-a-service” for its HyperFlex hyperconverged infrastructure (HCI) environment.The turnkey system, called HyperFlex Application Platform (HXAP), is Kubernetes at its core and includes all manner of integrated tools such as container networking, storage, a load balancer and more to let customers install, manage, and maintain a complete platform for cloud-native application development, Cisco stated.See predictions about what's big in IT tech for the coming year. HyperFlex is Cisco’s HCI that offers computing, networking and storage resources in a single system.To read this article in full, please click here

Cisco offers on-prem Kubernetes-as-a-Service to challenge public cloud

Cisco says it will offer a Kubernetes-based “container-as-a-service” for its HyperFlex hyperconverged infrastructure (HCI) environment.The turnkey system, called HyperFlex Application Platform (HXAP), is Kubernetes at its core and includes all manner of integrated tools such as container networking, storage, a load balancer and more to let customers install, manage, and maintain a complete platform for cloud-native application development, Cisco stated.See predictions about what's big in IT tech for the coming year. HyperFlex is Cisco’s HCI that offers computing, networking and storage resources in a single system.To read this article in full, please click here

Cisco offers on-prem Kubernetes-as-a-Service to challenge public cloud

Cisco says it will offer a Kubernetes-based “container-as-a-service” for its HyperFlex hyperconverged infrastructure (HCI) environment.The turnkey system, called HyperFlex Application Platform (HXAP), is Kubernetes at its core and includes all manner of integrated tools such as container networking, storage, a load balancer and more to let customers install, manage, and maintain a complete platform for cloud-native application development, Cisco stated.See predictions about what's big in IT tech for the coming year. HyperFlex is Cisco’s HCI that offers computing, networking and storage resources in a single system.To read this article in full, please click here

Cisco software fortifies industrial IoT security

Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco’s extensive IIoT networking portfolio. More about edge networkingTo read this article in full, please click here

Cisco software fortifies industrial IoT security

Cisco is looking to better protect myriad edge-attached IoT devices with new security software that promises to protect industrial assets in one of the most disparate of network environments.The company rolled out what it called an overarching security architecture for Industrial IoT (IIoT) environments that includes existing products but also new software called Cisco Cyber Vision, for the automated discovery of industrial assets attached to Cisco’s extensive IIoT networking portfolio. More about edge networkingTo read this article in full, please click here

Cisco helps IT and DevOps troubleshoot hybrid-cloud apps

Cisco has taken the wraps off of new tools it says will boost on-premises or cloud application performance by helping IT and devops work together to automate and more quickly resolve software problems.The new tools include a package from Cisco AppDynamics that lets customers track the key components users interact with as they use enterprise applications. Cisco paid $3.7 billion for AppDynamics three years ago for its application-performance monitoring and problem-resolution automation technology.  The idea was to develop products and applications that would give customers better end-to-end visibility of the IT infrastructure, including cloud, devices, security, network, compute and applications.To read this article in full, please click here

Cisco helps IT and DevOps troubleshoot hybrid-cloud apps

Cisco has taken the wraps off of new tools it says will boost on-premises or cloud application performance by helping IT and devops work together to automate and more quickly resolve software problems.The new tools include a package from Cisco AppDynamics that lets customers track the key components users interact with as they use enterprise applications. Cisco paid $3.7 billion for AppDynamics three years ago for its application-performance monitoring and problem-resolution automation technology.  The idea was to develop products and applications that would give customers better end-to-end visibility of the IT infrastructure, including cloud, devices, security, network, compute and applications.To read this article in full, please click here

1 2 3 62