Archive

Category Archives for "Networking"

Extend Your Organization’s Reach with Software-Defined Wide Area Networking

Ashwath Nagaraj Ashwath Nagaraj is co-founder and CTO of Aryaka, responsible for building the company’s vision and technology since its inception in 2009. He previously founded Allegro Systems; a security startup acquired by Cisco in 2001. Ashwath was also a founder of Assured Access Technologies, which developed WAN access and aggregation products. AAT was acquired by Alcatel in 1999. He holds 17 patents in storage, security, architecture and networking. Business today moves at the speed of 1s and 0s, flashing through the internet into our computers, mobile phones, tablets and smart speakers. Digital Transformation is an undeniable driving force behind business success, and organizations that can’t adapt to the needs of their customers and the demands of their industry will get left behind. It has been eons (in internet terms) since just having a website was enough to be competitive. If your organization has mastered SEO, incorporated server virtualization, adapted to today’s mobile-first mentality — for both employees and customers — and are looking at the next step you can take to compete, SD-WAN is the next logical step. SD-WAN (software-defined wide area network) at first glance appears to be an almost impossible chimera of “cheaper, faster and better” at Continue reading

Announcing VMware NSX Distributed IDS/IPS

Six years ago, VMware pioneered the concept of micro-segmentation to stop the internal, lateral spread of malware. We then launched the NSX Service-defined Firewall, an internal firewall that’s built into the hypervisor, distributed, and application aware. Shortly thereafter we introduced NSX Intelligence to automate security rule recommendations, streamlining the deployment of micro-segmentation.

Now we are announcing that we will be taking internal security to the next level by introducing optional Intrusion Detection and Prevention (IDS/IPS) for our Service-defined Firewall. Built on the same philosophy, the new NSX Distributed IDS/IPS will allow enterprises to fortify applications across private and public clouds.

VMware’s Security Is Intrinsic. Here’s What That Means.

Intrinsic Security is security that’s built in, not bolted on. And that makes it better.

Intrinsic Security Built in not Bolted On

When security is bolted on, it’s never as good as built-in security. Imagine an apartment building where you add the alarm system, the security cameras, and the fire escape after the fact. It looks awkward and doesn’t work that well, either.

Security Built in Differently

But when you design those things in upfront, the effect is completely different. Everything just works better, as parts of a whole system. The same thing is true for security.

More importantly, when you build in Continue reading

Silver Peak Puts Office 365, Azure on The Fast Lane

The integrations aim to improve application performance for enterprises using Office 365 and reduce...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Sprint Losses Widen as Future Hangs on Merger

Every important measure of financial performance is down, including active accounts, revenue, net...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Former Contrail CEO Launches Volterra With $50M, 30 Customers

Volterra’s cloud-native, SaaS-based platform can be deployed across multiple public clouds and...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

Microsoft Azure Arc Arcs Data Across AWS, Google Cloud

The preview launch continues the broader industry push to help enterprises deal with “cloud...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

This 12-course bundle will teach you how to be an ethical hacker for $39

It seems like there’s a new data breach every month, and as hackers ramp up their efforts to steal our private info, it’s only natural to feel afraid. What can you do to fight back? Oddly enough, the best way to prevent cybersecurity attacks is by fighting fire with fire. As an ethical hacker, you can make a living by exploiting cybersecurity vulnerabilities, and this $39 bundle will show you how.To read this article in full, please click here

The Week in Internet News: Russian Law Allows Country to Disconnect from Internet

Walking away: A Russian law that allows the country to disconnect from the outside Internet in the case of a cyberwar has gone into effect, PC Mag reports. The law allows the government there to serve up its own approved version of the Internet to residents. Some critics say the law could make the entire Internet more open to attacks.

Gone missing: The Internet has lost its soul by pushing commercial interests ahead of the public good, argues Janet Abbate, a professor of science, technology, and society at Virginia Tech in a column at the Washington Post. “Expanding access to the Internet, combined with looser government regulations, ultimately produced a situation no one foresaw or intended,” she writes. “On today’s Internet, conspiracy theories run rampant, identities can be faked and our real-life elections are vulnerable to manipulation. A network designed for spreading truth became a profit-driven industry, a public sphere that threatens to undermine the public good.”

Into middle age: There were a lot of recent articles about an important Internet milestone in late October. Ars Technica notes that the original ARPANET had just four nodes when it launched in 1969. “The first letters transmitted, sent from UCLA to Stanford Continue reading

Network Break 259: Fortinet Buys Endpoint Security Company; Arista Shares Squashed By Cloud Titan

The latest Network Break covers Fortinet's acquisition of endpoint security company EnSilo, digs into Gigamon's new network detection and response product, covers Extreme Networks' launch of ExtremeCloud IQ, reports on the latest tech financial results, and more.

The post Network Break 259: Fortinet Buys Endpoint Security Company; Arista Shares Squashed By Cloud Titan appeared first on Packet Pushers.

The Project Jengo Saga: How Cloudflare Stood up to a Patent Troll – and Won!

The Project Jengo Saga: How Cloudflare Stood up to a Patent Troll – and Won!
The Project Jengo Saga: How Cloudflare Stood up to a Patent Troll – and Won!

Remember 2016? Pokemon Go was all the rage, we lost Prince, and there were surprising election results in both the UK and US. Back in 2016, Blackbird Technologies was notorious in the world of patent litigation. It was a boutique law firm that was one of the top ten most active patent trolls, filing lawsuits against more than 50 different defendants in a single year.

In October 2016, Blackbird was looking to acquire additional patents for their portfolio when they found an incredibly broad software patent with the ambiguous title, “PROVIDING AN INTERNET THIRD PARTY DATA CHANNEL.” They acquired this patent from its owner for $1 plus “other good and valuable consideration.” A little later, in March 2017, Blackbird decided to assert that patent against Cloudflare.

As we have explained previously, patent trolls benefit from a problematic incentive structure that allows them to take vague or abstract patents that they have no intention of developing and assert them as broadly as possible. Instead, these trolls collect licensing fees or settlements from companies who are otherwise trying to start a business, produce useful products, and create good jobs. Companies facing such claims usually convince themselves that settlements Continue reading

SDxCentral’s Top 10 Articles — October 2019

AT&T Offloads $1.95B; Cisco Warns IBN Is Coming; AWS Makes It Rain; HPE Takes On VMware;...

Read More »

© SDxCentral, LLC. Use of this feed is limited to personal, non-commercial use and is governed by SDxCentral's Terms of Use (https://www.sdxcentral.com/legal/terms-of-service/). Publishing this feed for public or commercial use and/or misrepresentation by a third party is prohibited.

A VPN service that gets around the Great Firewall of China legally

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here

An SD-WAN service that gets around the Great Firewall of China legally

The saying goes that China is the world’s factory. For many companies around the world, their products or components of their products are produced in mainland China. At the same time, China’s population of more than a billion people makes it one of the world’s largest consumer markets. Thus, for either production or sales, many companies want to do business in China and have established facilities there.On the networking front, this means that multinational companies need to extend their wide area network into China to support their large or rapidly growing operations—and that’s easier said than done.[Get regularly scheduled insights by signing up for Network World newsletters.] Many organizations had done this using VPNs, but in early 2018, the Chinese government placed restrictions on IPsec traffic to basically block it from going in and out of the country. The Ministry of Industry and Information Technology (MIIT) said these restrictions are in accordance with the China Cross-border Data Telecommunications Industry Alliance (CDTIA), which was created to regulate cross-border data communication.To read this article in full, please click here

Intel unveils new Xeon E-2200 line for entry level servers

Intel is relaunching the Xeon E-2200 line, which it first introduced in May for workstations, as a low-end server processor for simpler tasks. The new chips are socket-compatible with the older E-2100 line so existing servers can be upgraded.Intel makes no bones about it, the Xeon E-2200 processors are for entry-level servers, coming in 4-core and 6-core designs as well as a new 8-core product capable of hitting 5.0 GHz with Intel’s Turbo Boost Technology 2.0.[Get regularly scheduled insights by signing up for Network World newsletters.] The Xeon E-2288G and E-2278G CPUs are the new high-end models with eight cores and 16 threads, a boost over the six-core count of the E-2100. The E-2200 is meant for single-socket systems with a maximum memory capacity of 128GB.To read this article in full, please click here