Michael Cooney

Author Archives: Michael Cooney

10 competitors Cisco just can’t kill off

In compiling this iteration of our list of competitors Cisco can’t kill off, one thing is clear: The competition is fierce amongst the bigger players.Nearly all the networking giant’s competitors have refreshed their product lines or bought into technology to compete more closely with Cisco. But that’s not to say Cisco has been sitting still by any means.The 10 most powerful companies in enterprise networking 2021 The company has expanded and refreshed its core Catalyst, Nexus and Silicon One networking gear and made major strides in security and software. Going forward, it wants to lead the industry in network-as-a-service.To read this article in full, please click here

Cisco completes purchase of security risk-management firm

Cisco continues to bulk-up its security portfolio, this week closing the deal on risk-based management company Kenna Security for an undisclosed amount.Kenna’s Risk-Based Vulnerability Management system collects and analyzes security data to provide security teams with information about threats so they can prioritize remediation and better understand risks. Read about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The technology will become part of Cisco’s SecureX service that integrates numerous security components. Cisco says the service is an open, cloud-native system to detect and remediate threats across Cisco and third-party products from a single interface. The SecureX dashboard shows operational metrics, triggers alerts to emerging threats, and accelerates threat investigations and incident management by aggregating and correlating global intelligence and local context in one view.  To read this article in full, please click here

Cisco completes purchase of security risk-management firm

Cisco continues to bulk-up its security portfolio, this week closing the deal on risk-based management company Kenna Security for an undisclosed amount.Kenna’s Risk-Based Vulnerability Management system collects and analyzes security data to provide security teams with information about threats so they can prioritize remediation and better understand risks. Read about edge networking How edge networking and IoT will reshape data centers Edge computing best practices How edge computing can help secure the IoT The technology will become part of Cisco’s SecureX service that integrates numerous security components. Cisco says the service is an open, cloud-native system to detect and remediate threats across Cisco and third-party products from a single interface. The SecureX dashboard shows operational metrics, triggers alerts to emerging threats, and accelerates threat investigations and incident management by aggregating and correlating global intelligence and local context in one view.  To read this article in full, please click here

Cisco bolts together enterprise and industrial edge with new routers

Cisco has extended its family of Catalyst networking gear with routers designed to integrate remote, industrial-edge network resources.The new Catalyst 5G Industrial Router family includes three modular routers and a gateway that run Cisco's core operating system, IOS XE, and support a variety of network access technologies such as SD-WAN, Wi-Fi 6, 5G, 4G, Private LTE, FirstNet and Wi-SUN. The ultimate goal is to let customers tie together enterprise networks and SD-WANs with remote operations so IT can build, secure and manage a unified edge.To read this article in full, please click here

Cisco upgrades intent-based-networking performance, security, analytics

Cisco brought new features to its DNA Center network-control platform that promise to improve performance, management analytics and security for its enterprise network customers.The new software features integration of a ThousandEyes agent that bulks-up the platform’s network-intelligence monitoring, a two-fold increase in the number of clients the system can support, and improved security and operational capabilities.NaaS is the future but it's got challenges DNA Center is the heart of Cisco’s intent-based networking strategy and is the vendor’s core-networking control platform supporting myriad services from analytics, network management and automation to assurance setting, fabric provisioning, and policy-based segmentation for wired and wireless enterprise networks. To read this article in full, please click here

Cisco upgrades intent-based-networking performance, security, analytics

Cisco brought new features to its DNA Center network-control platform that promise to improve performance, management analytics and security for its enterprise network customers.The new software features integration of a ThousandEyes agent that bulks-up the platform’s network-intelligence monitoring, a two-fold increase in the number of clients the system can support, and improved security and operational capabilities.NaaS is the future but it's got challenges DNA Center is the heart of Cisco’s intent-based networking strategy and is the vendor’s core-networking control platform supporting myriad services from analytics, network management and automation to assurance setting, fabric provisioning, and policy-based segmentation for wired and wireless enterprise networks. To read this article in full, please click here

Juniper Networks upgrades its Apstra intent-based networking software

Juniper Networks is releasing the latest version of its Apstra intent-based networking software that includes new monitoring features and configuration templates as well as better integration with VMware’s NSX virtualization and security platform.In January, Juniper bought Apstra and its Apstra Operating System (AOS), which was developed from the start to support IBN features. Once deployed, AOS—now just called Apstra—keeps a real-time repository of configuration, telemetry and validation information to ensure the network is doing what customers want it to do. Apstra also includes automation features to provide consistent network and security policies for workloads across physical and virtual infrastructures.To read this article in full, please click here

Juniper Networks upgrades its Apstra intent-based networking software

Juniper Networks is releasing the latest version of its Apstra intent-based networking software that includes new monitoring features and configuration templates as well as better integration with VMware’s NSX virtualization and security platform.In January, Juniper bought Apstra and its Apstra Operating System (AOS), which was developed from the start to support IBN features. Once deployed, AOS—now just called Apstra—keeps a real-time repository of configuration, telemetry and validation information to ensure the network is doing what customers want it to do. Apstra also includes automation features to provide consistent network and security policies for workloads across physical and virtual infrastructures.To read this article in full, please click here

Palo Alto Networks pushes enterprise zero trust

Palo Alto Networks bolstered its security portfolio with products that target enterprise network users looking to make the move to a zero-trust environment.The new capabilities focus on a number of zero trust mechanisms—including  SaaS, cloud and DNS that will be available in June—and will make it significantly easier for organizations to adopt zero-trust security across the enterprise, according to Anand Oswal, senior vice president and general manager with Palo Alto. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key As more people are working from anywhere, they require fast and always-on access to data and applications in the distributed cloud, regardless of location, Oswal said. “An all-encompassing zero-trust approach to network security is critical for safeguarding productivity in the new reality of remote, mobile, and hybrid work,” he said.To read this article in full, please click here

Palo Alto Networks pushes enterprise zero trust

Palo Alto Networks bolstered its security portfolio with products that target enterprise network users looking to make the move to a zero-trust environment.The new capabilities focus on a number of zero trust mechanisms—including  SaaS, cloud and DNS that will be available in June—and will make it significantly easier for organizations to adopt zero-trust security across the enterprise, according to Anand Oswal, senior vice president and general manager with Palo Alto. More about DNS: DNS in the cloud: Why and why not DNS over HTTPS seeks to make internet use more private How to protect your infrastructure from DNS cache poisoning ICANN housecleaning revokes old DNS security key As more people are working from anywhere, they require fast and always-on access to data and applications in the distributed cloud, regardless of location, Oswal said. “An all-encompassing zero-trust approach to network security is critical for safeguarding productivity in the new reality of remote, mobile, and hybrid work,” he said.To read this article in full, please click here

Cisco CEO on security: “There is really no perimeter in the enterprise to defend anymore.”

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Cisco CEO on security: “There is really no perimeter in the enterprise to defend anymore.”

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Cisco CEO: There’s no enterprise perimeter to defend anymore

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Cisco CEO: There’s no enterprise perimeter to defend anymore

Erosion of the traditional network perimeter and the transition to work-from-anywhere have conspired to bring an unprecedented threat level to endpoint devices, users, and applications, Cisco CEO Chuck Robbins told the online audience at the virtual RSA Conference 2021.Such threats are exacerbated by the fact that over 3,500 vendors offer security products and services that many customers patchwork together, creating complexity that makes it hard for many to build an effective security position, Robbins said.Backup lessons from a cloud-storage disaster Against that backdrop, Cisco announced a number of security moves to further integrate and upgrade its own overarching offerings with new features and services.To read this article in full, please click here

Chip shortage will hit IT-hardware buyers for months to years

A shortage of all sorts of processors and other components could affect the availability and price of IT hardware for the next 12 to 18 months, according to CEOs of major tech companies including Intel, IBM, Extreme, Cisco and Juniper.COVID-19 triggered an explosion of the global remote workforce, which created an extraordinary demand for new tech gear. It also forced the shutdown of processor plants, and restarting them and renewing supply chains to their pre-pandemic state will be a lengthy process, according to industry executives and analysts. Beyond the pandemic, a recent fire at a large chip plant in Japan didn’t help.To read this article in full, please click here

Chip shortage will hit IT-hardware buyers for months to years

A shortage of all sorts of processors and other components could affect the availability and price of IT hardware for the next 12 to 18 months, according to CEOs of major tech companies including Intel, IBM, Extreme, Cisco and Juniper.COVID-19 triggered an explosion of the global remote workforce, which created an extraordinary demand for new tech gear. It also forced the shutdown of processor plants, and restarting them and renewing supply chains to their pre-pandemic state will be a lengthy process, according to industry executives and analysts. Beyond the pandemic, a recent fire at a large chip plant in Japan didn’t help.To read this article in full, please click here

IBM moves toward consumption-based mainframe pricing

IBM continues to tweak its venerable mainframe to keep the Big Iron among the talking points in hybrid cloud.About a year ago the company changed its 20-year mainframe software pricing scheme to make it more palatable to hybrid cloud and multicloud users who might be thinking of moving workloads off the mainframe and into the cloud.To read this article in full, please click here

IBM moves toward consumption-based mainframe pricing

IBM continues to tweak its venerable mainframe to keep the Big Iron among the talking points in hybrid cloud.About a year ago the company changed its 20-year mainframe software pricing scheme to make it more palatable to hybrid cloud and multicloud users who might be thinking of moving workloads off the mainframe and into the cloud.To read this article in full, please click here

IBM embraces zero trust with upgraded Cloud Pak service

IBM has taken the wraps off a version of its Cloud Pak for Security that aims to help customers looking to deploy zero-trust security facilities for enterprise resource protection.IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of private or public infrastructure, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.To read this article in full, please click here

IBM embraces zero trust with upgraded Cloud Pak service

IBM has taken the wraps off a version of its Cloud Pak for Security that aims to help customers looking to deploy zero-trust security facilities for enterprise resource protection.IBM Cloud Paks are bundles of Red Hat’s Kubernetes-based OpenShift Container Platform along with Red Hat Linux and a variety of connecting technologies to let enterprise customers deploy and manage containers on their choice of private or public infrastructure, including AWS, Microsoft Azure, Google Cloud Platform, Alibaba and IBM Cloud.To read this article in full, please click here

1 10 11 12 13 14 83