Archive

Category Archives for "Networking"

10 must-ask questions for evaluating EDR tools

Endpoint detection and response (EDR) products give IT staff visibility into endpoints for detecting malicious activity, analyzing data and providing appropriate response. EDR is part of a burgeoning security market, peppered with well-known vendors such as Carbon Black, Cisco, CrowdStrike and FireEye.To read this article in full or to leave a comment, please click here(Insider Story)

10 must-ask questions for evaluating EDR tools

Endpoint detection and response (EDR) products give IT staff visibility into endpoints for detecting malicious activity, analyzing data and providing appropriate response. EDR is part of a burgeoning security market, peppered with well-known vendors such as Carbon Black, Cisco, CrowdStrike and FireEye.Anyone looking at EDR today has come across the term "threat hunting," the process of searching through voluminous amounts of data to find signs of a threat actor or emerging attack rather than relying on known threat signatures. It's a combination of threat intelligence and big data analytics. Threat hunting is a critical component of a comprehensive EDR solution and a key differentiator from endpoint protection platforms (EPPs), with which they are often confused.To read this article in full or to leave a comment, please click here(Insider Story)

Back up all your data to your NAS box without installing any software

If you know anything about NAS (Network Attached Storage), you know that it’s a great centralized backup receptacle for your PCs. If you didn’t know, we just told you. Actually, the name is bit of a giveaway: NAS is storage that you attach via ethernet or Wi-Fi and access across the network. What that doesn’t tell you is that most NAS boxes have the smarts of a PC, with a full-blown app environment that includes extensive backup abilities.But there are two things that even NAS-aware users might not realize: First, many NAS boxes are perfectly capable of backing up data from PCs running any type of operating system (e.g., Windows, OS X, or Linux) from anywhere, using nothing more than their integrated utilities. All you need to do is configure the PC to give up its data, and then use the NAS box to grab it.To read this article in full or to leave a comment, please click here

Back up all your data to your NAS box without installing any software

If you know anything about NAS (Network Attached Storage), you know that it’s a great centralized backup receptacle for your PCs. If you didn’t know, we just told you. Actually, the name is bit of a giveaway: NAS is storage that you attach via ethernet or Wi-Fi and access across the network. What that doesn’t tell you is that most NAS boxes have the smarts of a PC, with a full-blown app environment that includes extensive backup abilities.But there are two things that even NAS-aware users might not realize: First, many NAS boxes are perfectly capable of backing up data from PCs running any type of operating system (e.g., Windows, OS X, or Linux) from anywhere, using nothing more than their integrated utilities. All you need to do is configure the PC to give up its data, and then use the NAS box to grab it.To read this article in full or to leave a comment, please click here

5 fatal flaws that dog the new Windows 10

Windows 10 will get better in the forthcoming Creators Update. That isn’t a hollow promise or more marketing drivel. It’s a straightforward observation, comparing the most egregious parts of the current version, Win10 1607 Anniversary Update, with near-final betas of the next version, 1703. While it’s too early to gauge 1703’s stability, the feature improvements are very real.To read this article in full or to leave a comment, please click here(Insider Story)

AMD busts Ryzen performance myths, clearing Windows 10 from blame

Ryzen performance is the mystery that has launched a thousand conspiracy theories, performing like a champ in productivity and content creation tasks but occasionally delivering fewer frames than you'd expect in games. AMD debunked most of those conspiracy theories in a blog post Monday night. For starters, the company said Windows 10’s scheduler isn’t guilty. Internet hardware detectives had started to focus their blame on Windows 10 scheduler, the part of the operating system that doles out work to each individual core or thread in a chip. Many believe Windows 10 scheduler is throwing out work to the wrong cores or threads, hobbling performance.To read this article in full or to leave a comment, please click here

7 tips for developing a powerful data disaster plan

Data disasterImage by ThinkstockThe massive amount of data enterprises deal with today has resulted in them facing many difficult challenges. Among these challenges are not only various types of data disasters themselves, but the difficulties associated with developing a strong plan to deal with and recover from such disasters. These plans need to be able to both recover growing amounts of data from an increasingly larger set of applications, and do so in alignment with service level agreements that meet the needs of their business.To read this article in full or to leave a comment, please click here

Continuous authentication: Why it’s getting attention and what you need to know

User authentication is one of the basic components of any cyber security program. Identifying an individual based on a username, password or other means helps companies ensure that the person is who he or she claims to be when accessing a system, application or network.But in some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in. The concept is still relatively new, and experts say few products yet exist in the market. But it’s gaining more attention as companies look for ways to prevent unauthorized access to their critical business data.To read this article in full or to leave a comment, please click here

Continuous authentication: Why it’s getting attention and what you need to know

User authentication is one of the basic components of any cyber security program. Identifying an individual based on a username, password or other means helps companies ensure that the person is who he or she claims to be when accessing a system, application or network.But in some cases traditional authentication processes are not enough to provide strong security throughout a user work session. That’s where continuous authentication comes in. The concept is still relatively new, and experts say few products yet exist in the market. But it’s gaining more attention as companies look for ways to prevent unauthorized access to their critical business data.To read this article in full or to leave a comment, please click here

Windows Vista has just 30 days to live

In a month’s time, Microsoft will put Windows Vista to rest once and for all. If you’re one of the few people still using it, you have just a few weeks to find another option before time runs out.After April 11, 2017, Microsoft will no longer support Windows Vista: no new security updates, non-security hotfixes, free or paid assisted support options, or online technical content updates, Microsoft says. (Mainstream Vista support expired in 2012.) Like it did for Windows XP, Microsoft has moved on to better things after a decade of supporting Vista.As Microsoft notes, however, running an older operating system means taking risks—and those risks will become far worse after the deadline. Vista’s Internet Explorer 9 has long since expired, and the lack of any further updates means that any existing vulnerabilities will never be patched—ever. Even if you have Microsoft’s Security Essentials installed—Vista’s own antivirus program—you’ll only receive new signatures for a limited time.To read this article in full or to leave a comment, please click here

How to get diversity initiatives right

Despite the increased attention paid to diversity in tech, problem persists, according to new research from job search site Indeed, and that's negatively impacting companies' bottom lines. Addressing the issue requires a focus not only on diversity, but on inclusion to create a welcoming environment where talent can truly thrive.Indeed polled 1,002 U.S. technology workers in December 2016, and found that 24 percent of respondents felt they had been personally discriminated against at their current company. In addition, almost half (45 percent) of women said they witnessed non-inclusionary behavior, with 34 percent reporting they have been made personally uncomfortable. Over half (64 percent) of non-white respondents have felt personally uncomfortable, compared to 24 percent of respondents who identify as white.To read this article in full or to leave a comment, please click here

IDG Contributor Network: NGINX ups the web app performance ante

NGINX isn’t what I’d call a sexy company. Its products are, by definition, solid and steady—and they need to be.NGINX offers an application delivery platform that powers a massive proportion of the world’s websites. Some 300 million sites rely on NGINX for its load balancing, web and mobile acceleration, security controls, application monitoring, and management needs. More than half of the internet’s busiest websites rely on NGINX, including Airbnb, Box, Instagram, Netflix, Pinterest, SoundCloud and Zappos.But NGINX, while undeniably having a huge footprint, isn’t alone in the space and needs to keep innovating to gain and retain market share. And so it does with the announcement of its latest release, NGINX Plus Release 12. R12 looks to upgrade NGINX’s load balancer, content cache and web server offerings to increase reliability, security and scale for its customers.To read this article in full or to leave a comment, please click here

MapR unveils platform for IoT analytics at the edge

At Strata + Hadoop World in San Jose, Calif., Tuesday, MapR Technologies took the wraps off a new small footprint edition of its Converged Data Platform geared for capturing, processing and analyzing data from internet of things (IoT) devices at the edge.MapR Edge, designed to work in conjunction with the core MapR Converged Enterprise Edition, provides local processing, aggregation of insights at the core and the ability to then push intelligence back to the edge.To read this article in full or to leave a comment, please click here

MapR unveils platform for IoT analytics at the edge

At Strata + Hadoop World in San Jose, Calif., Tuesday, MapR Technologies took the wraps off a new small footprint edition of its Converged Data Platform geared for capturing, processing and analyzing data from internet of things (IoT) devices at the edge.MapR Edge, designed to work in conjunction with the core MapR Converged Enterprise Edition, provides local processing, aggregation of insights at the core and the ability to then push intelligence back to the edge.To read this article in full or to leave a comment, please click here

10 ways Google improved its cloud at NEXT

Google cloud is seen by analysts as an up and comer. Company executives will even admit that the past few years Google has not had everything it needs to compete for enterprise customers in the IaaS public cloud market against Amazon Web Services, Microsoft Azure and even IBM.But they will also tell you that Google is ready now.+MORE FROM NETWORK WORLD: Google Cloud President of Customers talks courting enterprises, competing with Amazon and Microsoft +Last week Google held NEXT, its user conference where the company introduces new cloud features and users get to learn about the cloud platform.To read this article in full or to leave a comment, please click here

It’s time to turn on HTTPS: the benefits are well worth the effort

After Edward Snowden revealed that online communications were being collected en masse by some of the world's most powerful intelligence agencies, security experts called for encryption of the entire web. Four years later, it looks like we've passed the tipping point. The number of websites supporting HTTPS -- HTTP over encrypted SSL/TLS connections -- has skyrocketed over the past year. There are many benefits to turning on encryption, so if your website not yet support the technology it's time to make the move. Recent telemetry data from Google Chrome and Mozilla Firefox shows that over 50 percent of web traffic is now encrypted, both on computers and mobile devices. Most of that traffic goes to a few large websites, but even so, it's a jump of over 10 percentage points since a year ago.To read this article in full or to leave a comment, please click here