This guest blog post is by Jason Matlof, Executive Vice President, LightCyber. We thank LightCyber for being a sponsor. LightCyber’s Magna Active Breach Detection platform is a behavior-based detection system that integrates network and endpoint context and is designed specifically to find active breaches after a threat actor has already penetrated a network. To hear […]
The post Why It’s So Hard To Find Intruders After A Network Penetration appeared first on Packet Pushers Podcast and was written by Drew Conry-Murray.
SDxCentral’s sat down with Kelly Herrell to dive into the Brocade SteelApp and why Brocade acquired the NFV asset.
Over the past four years CloudFlare has helped well over two million websites join the modern web, making us one of the fastest growing providers of IPv6 web connectivity on the Internet. CloudFlare's Automatic IPv6 Gateway allows IPv4-only websites to support IPv6-only clients with zero clicks. No hardware. No software. No code changes. And no need to change your hosting provider.
The story of IPv6 support for customers of CloudFlare is about as long as the story of CloudFlare itself. June 6th, 2011 (four years ago) was the original World IPv6 Day, and CloudFlare participated. Each year since, the global Internet community has pushed forward with additional IPv6 deployment. Now, four years later, CloudFlare is celebrating June 6th knowing that our customers are being provided with a solid IPv6 offering that requires zero configuration to enable. CloudFlare is the only global CDN that provides IPv4/IPv6 delivery of content by default and at scale.
IPv6 has been featured in our blog various times over the last four years. We have provided support for legacy logging systems to handle IPv6 addresses, provided DDoS protection on IPv6 alongside classic IPv4 address space, and provided Continue reading
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Video is everywhere, and growing exponentially. According to a recent report, 35 billion video ads were viewed in December, representing year-over-year growth of more than 100%. And every industry is seeing video growth, which creates a problem for data managers because video challenges storage management in four ways:
If, however, you move video to specialty storage, you’ll achieve five amazing benefits:
To read this article in full or to leave a comment, please click here
OPNFV gets on the scoreboard, albeit a little later than expected.
A new white paper from KulCloud introduces a powerful new software approach to abstract legacy IP routing and forwarding using OpenFlow.
In this edition of featured SDN use cases, Brocade shares how to optimize cloud applications on the enterprise network using Brocade offerings.
The networking space is buzzing about “Bimodal IT.” Simply defined, Bimodal IT is the segmentation of application deployments into cloud (public and/or private). Ben Kepes of Forbes included the concept in a recent deep dive on enterprise IT in the cloud. The network underpinning bimodal initiatives is critical and as Kepes pointed out in his article, tough to achieve if operating a legacy network. Our own Director of Solutions Marketing, Bob Noel, agrees with Kepes and highlights the importance of scalable and agile networks in response to the piece: “Those left to run (Bimodal deployments) on the legacy infrastructure is a fantastic idea that unfortunately has an Achilles heel inhibiting success for the approach…Until there is a fundamental shift in networking, companies will struggle to support Bimodal IT.” What are your thoughts on bimodal IT? Do you agree with Kepes and Bob?
Below please find a few of our top picks for our favorite news articles of the week. Enjoy!
BetaBoston: New Hampshire tries to reclaim tech vibe
By Staff Writer
MANCHESTER, N.H. — In one corner, a guy was hunched over his laptop, working on a pitch for a smartphone app that would allow golfers to Continue reading
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
Organizations are excited about the business value of the data that will be generated by the Internet of Things (IoT). But there’s less discussion about how to manage the devices that will make up the network, secure the data they generate and analyze it quickly enough to deliver the insights businesses need.
Software defined networking (SDN) can help meet these needs. By virtualizing network components and services, they can rapidly and automatically reconfigure network devices, reroute traffic and apply authentication and access rules. All this can help speed and secure data delivery, and improve network management, for even the most remote devices.
To read this article in full or to leave a comment, please click here
This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.
f you’ve been clinging to Windows Server 2003 trying to ignore the fact that Microsoft will officially end support July 14, 2015, you’re playing with fire. One the updates stop, you’ll be exposed to troubling security and compliance risks. Take note that in 2013 alone, 37 updates were issued by Microsoft for Windows Server 2003/R2.
Yet upgrading servers is a resource challenge as well as a mindset issue. The top barrier for migration, according to a survey, is the belief that existing systems are working just fine, and many users worry about software incompatibility.
To read this article in full or to leave a comment, please click here
IT Security today is not about defending a (non-existent) perimeter, but about protecting the organization’s attack surface, which has changed dramatically due to the cloud, mobility, BYOD, and other advances in corporate computing that have caused fundamental shifts in network architecture and operations.
Practically speaking, it means you need to monitor what is occurring inside the firewall just as much (if not more) than what is outside trying to make its way in. Think of it as a post breach mindset based on a “1,000 points of light” model as opposed to a “moat and castle” model of defense.
In theory its evolutionary, but given the accelerated pace in which security organizations have matured, it is not necessarily an easy transition to make. Not only has the threat landscape changed, but there has been constant flux in the leadership, skills, tools and budget required.
To read this article in full or to leave a comment, please click here
The future of security lies in orchestration, Symantec believes