Although vendor-written, this contributed piece does not advocate a position that is particular to the author’s employer and has been edited and approved by Network World editors.
Big data is the hot buzzword in security analytics today, but buyers are skeptical because many companies have spent years building “data lakes” only to discover it was impossible to “drain the lake” to get something useful.
And unfortunately, today’s solutions often include expensive clusters coupled with static business intelligence reports and “sexy” dashboards that look good but add little to useful and productive security analytics. Focusing on the analytics and how to use the data (very valuable data) in order to make real time decisions, discover critical patterns, determine on-going and changing security policies and dramatically improve security – ah – that’s useful.
To read this article in full or to leave a comment, please click here
Network Break 71 covers new funding rounds for Big Switch Networks, Cumulus, and Plexxi, as well as Cisco's investment in SD-WAN startup VeloCloud. We also check in on product announcements from Dell and Arista Networks, and discuss potential security issues with medical devices.
The post Network Break 71: Network Startups Get Millions; Medical Device Insecurity appeared first on Packet Pushers.
Network Break 71 covers new funding rounds for Big Switch Networks, Cumulus, and Plexxi, as well as Cisco's investment in SD-WAN startup VeloCloud. We also check in on product announcements from Dell and Arista Networks, and discuss potential security issues with medical devices.
The post Network Break 71: Network Startups Get Millions; Medical Device Insecurity appeared first on Packet Pushers.
The IT Storage market is going through a lot of change. New silicon designs from Intel & Micron branded 3D Xpoint are impacting the short term future of the “all flash array” market. Intel has developed NVMe so that that speed of accessing this fancy new storage can be realised because the 30-year old SCSI/NFS/Fibrechannel protocols […]
The post Talking NVMe, 3DXpoint and Networking appeared first on EtherealMind.
Ivan posted here: I’ll take ownership of the statement because at least it sounds like something I have discussed on the podcast and, sadly, because there aren’t that many networking podcasts. The comment is in relation to the purpose of a stateful firewall when compared to a stateless firewall aka access lists. I do think that […]
The post Response: Doing No Harm appeared first on EtherealMind.
Multiple hierarchies will transform the RAN topology.
The post Worth Reading: Light at the end of the silicon appeared first on 'net work.
Take the Programmable Network Survey and enter to win one of three $300 Amazon Gift Cards.
What would it take to secure BGP? Let’s begin where any engineering problem should begin: what problem are we trying to solve?
In this network—in any collection of BGP autonomous systems—there are three sorts of problems that can occur at the AS level. For the purposes of this explanation, assume AS65000 is advertising 2001:db8:0:1::/64. While I’ve covered this ground before, it’s still useful to outline them:
Does anyone actually still USE Token Ring?