Startup Cato Networks combines cloud security services and SD-WAN techniques to build a single, logical network optimized for traffic protection.
The post Startup Radar: Cato Networks Offers Unified Security Via SD-WAN appeared first on Packet Pushers.
When I was in the US Air Force, as part of the 438th Communications Group, we had a Group Readiness Center that contained a large board with the airfield equipment status, a safe with various drawers with different classification levels, a couple of encrypted communication systems, and… a couple of strange looking Z200 computers. The screen on these computers were covered with a fine mesh, and the power cables ran through a special cleaning box. What was the point of all this fanciness?
TEMPEST. The ability to gather information about what’s on a computer’s screen by examining the signals transmitted (unintentionally) from the monitor screen, power cable, and other electronics. This might seem odd, but essentially any wire is an antenna that can (and will) carry information from a computer; at some range, these signals can be detected and deciphered in a way that allows you to determine what the computer is processing. Screens are more fruitful, as the older style Cathode Ray Tube (CRT) displays essentially shoot a stream of electrons onto a piece of glass, some of which must leak, and hence can be picked up and decoded to see what’s on the screen from quite a distance Continue reading
The post Worth Reading: Classifying data structures security appeared first on 'net work.
SDxCentral contributing analyst, Lee Doyle, takes a look at how service providers are building on the business benefits for NFV and the full list of factors involved.
Version 6.2 of the storage product boosts efficiency via data reduction and erasure coding.
Software-defined networking wins high marks for ROI and TCO in survey of early adopters.
Emerging WiFi standards could provide unlimited connectivity for the expected flood of IoT devices.
Get a sneak peek at what’s coming up at the ONUG Spring Conference, where IT executives & vendors will focus on issues including network automation, security, & open hybrid cloud.
Daniel Dib wrote a great series of BGP-related blog posts well worth reading.
Daniel is looking at BGP from the WAN/ISP perspective; if you want to know more about running BGP in the data center, watch the videos I recorded with Dinesh Dutt a few days ago.
A return to our sporadic series of networking war stories. This time it’s fun with dedicated backup networks, DNS auto-registration, and Active Directory. Thank God it’s a lot easier these days with virtualisation. But back then…
Back in the olden days we had a dedicated tape drive connected to each server. Daily/weekly backups were written to the local tape drive using a SCSI connection. Someone would walk around the servers each day and change the tapes. It was simple, and it worked, but it doesn’t scale.
Two things happened – server numbers started exploding, and Gigabit Ethernet became practical. That meant that it became practical to have centralised ‘backup’ servers connected to tape drives, and to stream backup data across the network. Much better scale – we only needed to install an agent on each server, and the centralised backup servers needed to have enough tapes + tape drives. This also gave us much better central control & visibility of our backups.
Of course, we were worried about the impact of streaming large backup files across the network. We didn’t want that to affect production traffic, so we installed dedicated backup Continue reading