Network World Security

Author Archives: Network World Security

IBM brings hybrid-cloud app services to z/OS mainframes

IBM has introduced a service for its mainframe customers to create a cloud environment for developing and testing applications.Wazi as a Service can be used to create z/OS infrastructure instances for development and testing z/OS application components in a virtualized, containerized sandbox. The instances would run on Red Hat OpenShift on x86 hardware. The service also includes access to z/OS systems and integrates with modern source-code management platforms such as GitHub and GitLab. [ Get regularly scheduled insights by signing up for Network World newsletters. ]To read this article in full, please click here

Cisco puts app-performance tools in the cloud

Cisco is taking aim at better controlling the performance and development of core applications with a new AppDynamics cloud service and open-source development tools.AppDynamics Cloud is a cloud-native service designed to let enterprises observe applications and take action to remediate performance problems.   [ Get regularly scheduled insights by signing up for Network World newsletters. ] Available by the end of June, the service is built to observe distributed and dynamic cloud-native applications at scale, wrote chief marketing officer of Cisco AppDynamics, Eric Schou in a blog about the new offering.To read this article in full, please click here

Cisco moves Catalyst, Nexus management to the cloud

Cisco is taking a big step toward cloud-management of both its Catalyst campus and Nexus data-center equipment.At the Cisco Live customer event this week, the company rolled out two cloud-based management services that provide more options for enterprises to support hybrid workforces. [ Get regularly scheduled insights by signing up for Network World newsletters. ] Catalyst management in the cloud The first service, Cloud Management for Cisco Catalyst, lets customers manage and troubleshoot Catalyst 9000 switching and wireless campus and branch devices from the company’s cloud-based Meraki dashboard, which can manage and troubleshoot a wide variety of devices and networks from a single screen. According to Cisco, Catalyst customers can run a CLI command with information about their organization, and it will move management of that device over to the Meraki cloud.To read this article in full, please click here

RSA: Intel reference design to accelerate SASE, other security tasks

Intel has introduced a reference design it says can enable accelerator cards for security workloads including secure access service edge (SASE), IPsec, and SSL/TLS.The upside of the server cards would be offloading some application processing from CPUs, effectively increasing server performance without requiring additional server rack space, according to Intel. [ Get regularly scheduled insights by signing up for Network World newsletters. ] The announcement was made at RSA Conference 2022, and details were published in a blog post by Bob Ghaffardi, Intel vice president and general manager of the Enterprise and Cloud Division.To read this article in full, please click here

RSA: Cisco launches SASE, offers roadmap for other cloud-based services

Cisco made a variety of security upgrades at the RSA Conference designed to move security operation to the cloud, improve its Secure Access Service Edge offering and offer new simplified security end point control.The biggest piece of the Cisco roll out was a new overarching security platform called the Cisco Security Cloud will include unified management and policies, and offer open APIs to help grow a multivendor security ecosystem. Cisco defines the  Security Cloud as a “multi-year strategic vision for the future of security.” It is an ongoing journey that began several years ago and Cisco will continue delivering upon the key tenets of this vision with a consistent roadmap. The cloud will be made up of existing products like Umbrella and offerings from Duo, other features will be developed in the future.To read this article in full, please click here

Who is selling Zero Trust Network Access (ZTNA) and what do you get?

The last few years have seen an explosion of interest in Zero Trust Network Access (ZTNA). The zero trust approach replaces the perimeter defense model with a "least privilege" framework where users authenticate to access specific data and applications, and their activities are continuously monitored.ZTNA gained a boost in the wake of the COVID-19 pandemic, with more employees working remotely. The old perimeter defense model, exemplified by VPNs, provides a secured internet connection that gives remote users privileges as if they were on an internal private network. This doesn't match up with a zero trust mindset; and to make things worse, many organizations found that their infrastructure couldn't handle the traffic loads created by large numbers of remote workers connecting via VPN. To read this article in full, please click here

The problem with mobile and app voting

It's the day after the 2020 Iowa caucuses, and the Iowa Democratic Party has yet to announce the winner. The app that precinct leaders were supposed to use to report final tallies recorded inconsistent results. Party leaders blamed a "coding issue" within the app, not a hack or attack. Computerworld's Lucas Mearian joins Juliet to discuss the problem with mobile voting and how this snafu may affect the reputation of app voting in the future.

1 6 7 8 9 10 22