Riverbed Technology is well known as the de facto standard for WAN optimization and pioneered that market. Maybe there were a few vendors with solutions out before Riverbed, but it was the company that defined and evangelized that market.However, the WAN market changed and over the past few years. The industry has seen the meteoric rise in software-defined WANs (SD-WAN), and Riverbed had fallen behind many of the startups in the space.Over the past year, Riverbed has been aggressively rebuilding its portfolio, including the acquisition of Ocedo, to better align with SD-WAN and has come roaring back. At its Disrupt event this week, the company made a number of announcements, indicating just how far the company has come in the last 24 months.To read this article in full or to leave a comment, please click here
The term “software-defined” has been applied to a number of technologies, including networking, WAN, security, storage and data center. One area it has yet to be associated with is the local area network (LAN). But what exactly does “software-defined” mean and should it extend to the LAN? Just because something runs in software, it doesn’t make it any different than running in hardware.That’s just one component of being software-defined. Other factors including having centralized control, being programmable and agile, and providing visibility to gain new insights. Most important, a software-defined system should be able to automate configuration changes as the applications’ needs change. To read this article in full or to leave a comment, please click here
The term “software-defined” has been applied to a number of technologies, including networking, WAN, security, storage and data center. One area it has yet to be associated with is the local area network (LAN). But what exactly does “software-defined” mean and should it extend to the LAN? Just because something runs in software, it doesn’t make it any different than running in hardware.That’s just one component of being software-defined. Other factors including having centralized control, being programmable and agile, and providing visibility to gain new insights. Most important, a software-defined system should be able to automate configuration changes as the applications’ needs change. To read this article in full or to leave a comment, please click here
A decade ago, security meant a big firewall at a single ingress point. All devices and applications were under IT’s tight control, so they did not create significant security risks. Today, everything has changed. The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology. This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here
A decade ago, security meant a big firewall at a single ingress point. All devices and applications were under IT’s tight control, so they did not create significant security risks. Today, everything has changed. The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology. This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here
A decade ago, security meant a big firewall at a single ingress point. All devices and applications were under IT’s tight control, so they did not create significant security risks. Today, everything has changed. The rise of cloud computing, BYOD, shadow IT, WiFi devices, software defined everything and other trends have blown up the tightly controlled model and created a rather chaotic system. Adding to the challenge is that attackers are getting smarter and targeting IoT systems and end users directly, which often bypasses the security technology. This is why some security experts say there are two types of organizations, those that have been breached and know about it and those that have been breached and don’t know about it. To read this article in full or to leave a comment, please click here
In July of 2012, VMware shocked the world when it shelled out $1.26 billion to purchase software-defined networking (SDN) startup Nicira. The acquisition changed the face of VMware, as it created a big rift between itself and long-time data center partner Cisco. The product, now known as NSX, put VMware squarely in the next-generation network market with one of the top start-ups.+ Also on Network World: NSX, and its new chief, take center stage at VMWorld +To read this article in full or to leave a comment, please click here
When most people think of digital businesses, names like Uber, Tesla and AirBnb come to mind. These companies were born in the digital era and have rapidly disrupted their markets.
Those aren’t the only digital companies, though. A number of other companies in verticals such as education, retail and healthcare have been aggressive with their digital plans.
One such company is Augmedix. The San Francisco-based company simplifies how doctors create electronic health records (EHRs) with a technology-enabled, HIPAA-compliant documentation solution for physicians.
+ Also on Network World: Using IoT-enabled microscopes to fight epidemic outbreaks +To read this article in full or to leave a comment, please click here
When most people think of digital businesses, names like Uber, Tesla and AirBnb come to mind. These companies were born in the digital era and have rapidly disrupted their markets.
Those aren’t the only digital companies, though. A number of other companies in verticals such as education, retail and healthcare have been aggressive with their digital plans.
One such company is Augmedix. The San Francisco-based company simplifies how doctors create electronic health records (EHRs) with a technology-enabled, HIPAA-compliant documentation solution for physicians.
+ Also on Network World: Using IoT-enabled microscopes to fight epidemic outbreaks +To read this article in full or to leave a comment, please click here
An interesting thing happened last week that drove home the importance of network telemetry.My wife saw a calendar invite from Arista where they wanted to pre-brief me on their upcoming telemetry launch. In addition to running ZK Research with me by doing most of the back office work, she is also a cardiac nurse and was interested in the content of the briefing because telemetry is a critical element of her job. In her field, cardiac telemetry is used to constantly monitor the heart and can quickly alert the nurse in real time if something bad is going on. If there’s any problem at all, like arrhythmia, they can use the data to take action and save the patient.To read this article in full or to leave a comment, please click here
An interesting thing happened last week that drove home the importance of network telemetry.My wife saw a calendar invite from Arista where they wanted to pre-brief me on their upcoming telemetry launch. In addition to running ZK Research with me by doing most of the back office work, she is also a cardiac nurse and was interested in the content of the briefing because telemetry is a critical element of her job. In her field, cardiac telemetry is used to constantly monitor the heart and can quickly alert the nurse in real time if something bad is going on. If there’s any problem at all, like arrhythmia, they can use the data to take action and save the patient.To read this article in full or to leave a comment, please click here
The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.In addition to the overall massive size of the security market, another interesting fact is the huge number of vendors that play in it. I believe the 2016 RSA conference had something like over 600 sponsors, with at least 100 being first-time sponsors. No other IT market has that many vendors with start-ups consistently popping up.To read this article in full or to leave a comment, please click here
The IT security market is certainly an interesting one, as it’s so big and so fragmented. Forbes posted a story at the end of last year stating the market is at $75 billion, with it expected to reach $170 billion by 2020. Every business and technology leader I talk to tells me how important security is, so I have no reason to doubt that $170 billion number.In addition to the overall massive size of the security market, another interesting fact is the huge number of vendors that play in it. I believe the 2016 RSA conference had something like over 600 sponsors, with at least 100 being first-time sponsors. No other IT market has that many vendors with start-ups consistently popping up.To read this article in full or to leave a comment, please click here
10 of the coolest sci-fi tech that are almost a realityScience fiction TV shows and movies are filled with cool technology. From Star Trek and its transporter and food replicator—to name just a couple of things—to The Minority Report and its air touch displays and jet packs.Some of that futuristic technology has arrived. For examples, “push to talk” mobile devices are very close to Star Trek like communicators. And the video conferencing depicted in The Jetsons is now available on nearly every home computer.To read this article in full or to leave a comment, please click here
I recall my first conversation with Rowan Trollope, Cisco’s senior vice president and general manager of Internet of Things (IoT) and applications, back in 2012. He joined Cisco to head up the companies Collaboration Business Unit, and it was clear from our first conversation that collaboration under Trollope would be markedly different than it had been.The calling card for Cisco Collaboration has always been great technology, but the usability of the products has been mediocre. So, this became one of the primary focus areas for Trollope. For example, when a user receives an invitation for a WebEx meeting, he or she used to have to scroll all the way down to the bottom of the email and look for a hyperlink to click. Now there’s a big button at the top of the invitation that says “Join WebEx,” making the product significantly more usable, particularly for mobile users.To read this article in full or to leave a comment, please click here
Smart lighting, smart meters, smart building systems and other smart endpoints. It seems every device today is a “smart” device.The level of intelligence for the various devices can vary greatly. For example, a smart automobile must make far more autonomous decisions than, say, a wearable fitness monitor. While the range of devices varies greatly, all smart devices have in one thing in common: they are connected to a network. It’s this vast number of connected endpoints—50 billion by 2020, according to ZK Research—that is the foundation for the Internet of Things (IoT).+ Also on Network World: IoT security threats and how to handle them +To read this article in full or to leave a comment, please click here
F5 Networks held its annual industry analyst conference this week within its user conference, Agility in Chicago. One of the main messages F5 tried to get across to its customer base is that it’s time to rethink security.I agree with that thesis wholeheartedly, and it is consistent with many of the posts I have written in the past year, including one I wrote about defining the new rules of security in a digital world.+ Also on Network World: Review: 5 application security testing tools compared +To read this article in full or to leave a comment, please click here
F5 Networks held its annual industry analyst conference this week within its user conference, Agility in Chicago. One of the main messages F5 tried to get across to its customer base is that it’s time to rethink security.I agree with that thesis wholeheartedly, and it is consistent with many of the posts I have written in the past year, including one I wrote about defining the new rules of security in a digital world.+ Also on Network World: Review: 5 application security testing tools compared +To read this article in full or to leave a comment, please click here
In 2004, there was science fiction movie about a character named Van Helsing. He was a vigilante monster hunter who went around searching for and vanquishing evil monsters such as Mr. Hyde, Dracula and werewolves. If you were evil, there was nowhere to hide. Van Helsing would find you and put an end to you.Accenture and Endgame plan to do the same kind of thing against security threats.Accenture, one of the leading IT, management and consultancy firms, and Endgame, an NSA-centric security solution vendor, are teaming up to offer threat hunting as a service. The new offering will be an Accenture-based managed service that leverages the leading-edge technology and expertise from Endgame.To read this article in full or to leave a comment, please click here
The IT management industry has been highly fragmented with great point products to monitor pieces of infrastructure. There are network management tools, application performance systems and a wealth of other products available to IT buyers.The problem with this model is the point products provide an incomplete view of what and end user might be experiencing. This leads to what I’ve referred to as “swivel chair management” where an engineer plunks himself down in the middle of several management consoles, watches all the activity and tries to correlate the data manually to understand when problems occur. This is difficult, if not impossible, to do because there is simply too much data to try to analyze manually.To read this article in full or to leave a comment, please click here