Archive

Category Archives for "Networking"

Monitor cloud services for compliance, security from a single view

Moving to the cloud is supposed to reduce the headaches for IT administrators, but often it has the opposite effect of increasing their workload, especially around security and visibility. Not only do they have to make sure on-premises systems adhere to regulatory compliance, but that their cloud services do as well.Security specialist Qualys addresses these issues of security and visibility with its new app framework, CloudView, which complements existing Qualys services for security, compliance and threat intelligence with real-time monitoring of all enterprise cloud services from a single dashboard.+ Also on Network World: 18 free cloud storage options + "Accelerated cloud adoption requires new adaptive security solutions that support fast-moving digital transformation efforts," said Philippe Courtot, Qualys CEO, in a statement. "Our new CloudView and its apps add unparalleled visibility and continuous security of all cloud workloads to provide customers complete cloud security in a single, integrated platform and drastically reduce their spend."To read this article in full or to leave a comment, please click here

Monitor cloud services for compliance, security from a single view

Moving to the cloud is supposed to reduce the headaches for IT administrators, but often it has the opposite effect of increasing their workload, especially around security and visibility. Not only do they have to make sure on-premises systems adhere to regulatory compliance, but that their cloud services do as well.Security specialist Qualys addresses these issues of security and visibility with its new app framework, CloudView, which complements existing Qualys services for security, compliance and threat intelligence with real-time monitoring of all enterprise cloud services from a single dashboard.+ Also on Network World: 18 free cloud storage options + "Accelerated cloud adoption requires new adaptive security solutions that support fast-moving digital transformation efforts," said Philippe Courtot, Qualys CEO, in a statement. "Our new CloudView and its apps add unparalleled visibility and continuous security of all cloud workloads to provide customers complete cloud security in a single, integrated platform and drastically reduce their spend."To read this article in full or to leave a comment, please click here

Top network monitoring software and visibility tools

Networking performance monitoring and diagnostics (NPMD) software, whether running as an independent appliance or embedded in networking equipment, can help stave off productivity issues for internal corporate users as well as those interacting with the network from the outside.But with ever-increasing traffic on corporate networks, users attempting to optimize connections to the cloud and new Internet of Things devices bombarding the network, enterprises and network performance monitoring vendors face growing challenges.+ ALSO ON NETWORK WORLD: 7 must-have network tools +To read this article in full or to leave a comment, please click here

Top network monitoring software and visibility tools

Networking performance monitoring and diagnostics (NPMD) software, whether running as an independent appliance or embedded in networking equipment, can help stave off productivity issues for internal corporate users as well as those interacting with the network from the outside.But with ever-increasing traffic on corporate networks, users attempting to optimize connections to the cloud and new Internet of Things devices bombarding the network, enterprises and network performance monitoring vendors face growing challenges.+ ALSO ON NETWORK WORLD: 7 must-have network tools +To read this article in full or to leave a comment, please click here

A New Hippocratic Oath: “First, do no harm… to me or my healthcare data”

I was recently invited to contribute a paper on personal data in the healthcare context to a journal on the Privacy and Security of Medical Information published by Springer-Nature. The paper, “Trust and ethical data handling in the healthcare context” examines the issues associated with healthcare data in terms of ethics, privacy, and trust, and makes recommendations about what we, as individuals, should ask for and expect from the organisations we entrust with our most sensitive personal data.

It's a topical subject, from an Internet Society perspective, because the Internet appears to offer some attractive solutions to pressing problems that confront people and governments, around the globe.

Robin Wilton

IDG Contributor Network: Why companies are building application-specific edge delivery networks

There’s a trend emerging among many Internet-based companies that I find intriguing: they are creating their own edge delivery networks. Why? So that they can service their applications via these networks to enable greater resilience and performance for their users.Rather than the standard, garden-variety content delivery networks (CDNs), these edge delivery networks are tailored specifically for the applications they’ve been built to service. In some cases, this means the edge networks leverage highly specific connectivity to regional internet service providers or between application facilities; in other cases, it means placing specialized hardware tuned to specific needs of the application in delivery facilities around the world. And most importantly, these networks are operating application-specific software and configurations that are customized beyond what’s possible in general-purpose, shared networks.To read this article in full or to leave a comment, please click here

IDG Contributor Network: Why companies are building application-specific edge delivery networks

There’s a trend emerging among many Internet-based companies that I find intriguing: they are creating their own edge delivery networks. Why? So that they can service their applications via these networks to enable greater resilience and performance for their users.Rather than the standard, garden-variety content delivery networks (CDNs), these edge delivery networks are tailored specifically for the applications they’ve been built to service. In some cases, this means the edge networks leverage highly specific connectivity to regional internet service providers or between application facilities; in other cases, it means placing specialized hardware tuned to specific needs of the application in delivery facilities around the world. And most importantly, these networks are operating application-specific software and configurations that are customized beyond what’s possible in general-purpose, shared networks.To read this article in full or to leave a comment, please click here

Mist uses AI to improve wireless network performance

A couple of months ago I was having dinner with a fairly well-known Silicon Valley executive who predicted that success for an IT vendor is based on two things: having lots of data and a robust artificial intelligence (AI) engine to discover new insights.If that is true, then Mist Systems seems to be in a strong position, as the company’s solutions were designed to use AI to solve some of the bigger challenges in Wi-Fi today.This week the wireless network company announced several new access points, as well as use cases, for its solution. Specifics are as follows:Introduction of client service-level expectations (SLE) In telecommunications, the concept of a service-level agreement (SLA) is a threshold that service providers are contracted to meet. The SLE from Mist is similar, although more proactive than a carrier’s SLA. With Mist, administrators can use data to set, monitor and enforce things that impact performance pre and post connection. Examples of this are time to connect, failed connection attempts, roaming, coverage, capacity and AP uptime. The SLEs can be monitored in real time and watched over time to provide up-to-the minute insight as to the health of Wi-Fi.To read this article Continue reading

True random numbers are here — what that means for data centers

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.And the bad guys worked at breaking the encryption.We used longer keys and better algorithms.And the bad guys kept at it. And life went on.But something recently changed all that. No, not yesterday or last week. But it was only back in November of last year that something called the Entropy Engine won an Oscar of Innovation award for collaborators Los Alamos National Laboratory and Whitewood Security. This Entropy Engine is capable of delivering as much as 350 Mbps of true random numbers—sufficient to feed an entire data center with enough random data to dramatically improve all cryptographic processes.To read this article in full or to leave a comment, please click here

True random numbers are here — what that means for data centers

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.And the bad guys worked at breaking the encryption.We used longer keys and better algorithms.And the bad guys kept at it. And life went on.But something recently changed all that. No, not yesterday or last week. But it was only back in November of last year that something called the Entropy Engine won an Oscar of Innovation award for collaborators Los Alamos National Laboratory and Whitewood Security. This Entropy Engine is capable of delivering as much as 350 Mbps of true random numbers—sufficient to feed an entire data center with enough random data to dramatically improve all cryptographic processes.To read this article in full or to leave a comment, please click here

True random numbers are here — what that means for data centers

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.And the bad guys worked at breaking the encryption.We used longer keys and better algorithms.And the bad guys kept at it. And life went on.But something recently changed all that. No, not yesterday or last week. But it was only back in November of last year that something called the Entropy Engine won an Oscar of Innovation award for collaborators Los Alamos National Laboratory and Whitewood Security. This Entropy Engine is capable of delivering as much as 350 Mbps of true random numbers—sufficient to feed an entire data center with enough random data to dramatically improve all cryptographic processes.To read this article in full or to leave a comment, please click here

True random numbers are here — what that means for data centers

For many decades, the term “random numbers” meant “pseudo-random numbers” to anyone who thought much about the issue and understood that computers simply were not equipped to produce anything that was truly random.Manufacturers did what they could, grabbing some signals from the likes of mouse movement, keyboard activity, system interrupts, and packet collisions just to get a modest sampling of random data to improve the security of their cryptographic processes.And the bad guys worked at breaking the encryption.We used longer keys and better algorithms.And the bad guys kept at it. And life went on.But something recently changed all that. No, not yesterday or last week. But it was only back in November of last year that something called the Entropy Engine won an Oscar of Innovation award for collaborators Los Alamos National Laboratory and Whitewood Security. This Entropy Engine is capable of delivering as much as 350 Mbps of true random numbers—sufficient to feed an entire data center with enough random data to dramatically improve all cryptographic processes.To read this article in full or to leave a comment, please click here