9 reasons why the death of the security appliance is inevitable

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Organizations are used to appliances being the workhorse of their protection needs. There are appliances for everything from firewalls, to Intrusion Detection Systems, Web Security Gateways, Email Security Gateways, Web Application Firewalls, and Advanced Threat Protection.

But as crucial as security appliances are today, they are eventually going to die out as they get increasingly less effective, requiring detection to be pushed to the machines that need protection.    Here are the nine reasons why:

To read this article in full, please click here

9 reasons why the death of the security appliance is inevitable

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Organizations are used to appliances being the workhorse of their protection needs. There are appliances for everything from firewalls, to Intrusion Detection Systems, Web Security Gateways, Email Security Gateways, Web Application Firewalls, and Advanced Threat Protection.

But as crucial as security appliances are today, they are eventually going to die out as they get increasingly less effective, requiring detection to be pushed to the machines that need protection.    Here are the nine reasons why:

To read this article in full or to leave a comment, please click here

9 reasons why the death of the security appliance is inevitable

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Organizations are used to appliances being the workhorse of their protection needs. There are appliances for everything from firewalls, to Intrusion Detection Systems, Web Security Gateways, Email Security Gateways, Web Application Firewalls, and Advanced Threat Protection.But as crucial as security appliances are today, they are eventually going to die out as they get increasingly less effective, requiring detection to be pushed to the machines that need protection.    Here are the nine reasons why:To read this article in full or to leave a comment, please click here

9 reasons why the death of the security appliance is inevitable

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.

Organizations are used to appliances being the workhorse of their protection needs. There are appliances for everything from firewalls, to Intrusion Detection Systems, Web Security Gateways, Email Security Gateways, Web Application Firewalls, and Advanced Threat Protection.

But as crucial as security appliances are today, they are eventually going to die out as they get increasingly less effective, requiring detection to be pushed to the machines that need protection.    Here are the nine reasons why:

To read this article in full or to leave a comment, please click here

9 reasons why the death of the security appliance is inevitable

This vendor-written tech primer has been edited by Network World to eliminate product promotion, but readers should note it will likely favor the submitter’s approach.Organizations are used to appliances being the workhorse of their protection needs. There are appliances for everything from firewalls, to Intrusion Detection Systems, Web Security Gateways, Email Security Gateways, Web Application Firewalls, and Advanced Threat Protection.But as crucial as security appliances are today, they are eventually going to die out as they get increasingly less effective, requiring detection to be pushed to the machines that need protection.    Here are the nine reasons why:To read this article in full or to leave a comment, please click here

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won't get days or weeks to root around and grab sensitive corporate data.This enterprise focus on rapid detection and response to various attacks on networks and computers doesn't replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.To read this article in full or to leave a comment, please click here

Face it: Enterprise cyberattacks are going to happen

There are now so many cyberattacks that many enterprises simply accept that hackers and bad actors will find ways to break into their systems.A strategy some large businesses have developed over the past two years has been to quickly identify and isolate these attacks, possibly by shutting down part of a system or network so the hackers won't get days or weeks to root around and grab sensitive corporate data.This enterprise focus on rapid detection and response to various attacks on networks and computers doesn't replace conventional security tools to prevent attacks. Instead, businesses are relying on both prevention software and detection software.To read this article in full or to leave a comment, please click here

Windows 10 S: It’s for enterprise, too

Microsoft may have stuck to its script Tuesday when it unveiled a Windows 10 spin-off aimed at the K-12 educational market, but the new operating system will be enticing to businesses as well, analysts said today."They were very focused on Windows 10 S as an education play, but no question, this will also appeal to enterprises," said Carolina Milanesi of Creative Strategies.Microsoft yesterday announced Windows 10 S -- the "S" isn't a placeholder for something specific, the company maintained -- for school settings. The operating system is Windows 10, but comes with important restrictions, the most notable that users can only install and run apps from Microsoft's Windows Store. This summer, Microsoft will begin testing a version of its Office suite that will be available from the store in September.To read this article in full or to leave a comment, please click here

China will attempt to keep IT products spy-free with security checks

China will start carrying out security checks of IT suppliers in the country, with the intent of keeping out internet products vulnerable to spying and hacking.The new rules, which take effect in June, mean that foreign vendors will face more scrutiny -- including government-mandated background checks, and supply chain vetting -- when selling IT products to China’s major business sectors.On Tuesday, the country’s Cyberspace Administration of China released the new rules, which call for the review of any important internet products and services that relate to the country’s security.To read this article in full or to leave a comment, please click here

IDG Contributor Network: 3 telltale signs it’s a real digital transformation

“Get a digital transformation for only $199.95, but only if you call to order in the next 15 minutes!”OK, so I haven’t seen an ad like this on late night TV—well, at least not yet. The unfortunate truth, however, is that the term “digital transformation” may be the greatest selling tool the enterprise technology industry has created in a generation.Everywhere you turn, someone is selling something using the term "digital transformation." The truth is, many of the things technology companies are selling are incredible new technologies that do, in fact, play a vital role in your digital transformation journey and are worthy of your consideration.To read this article in full or to leave a comment, please click here

FBI’s Comey dangerous definition of “valid” journalism

The First Amendment, the "freedom of speech" one, does not mention journalists. When it says "freedom of the press" it means the physical printing press. Yes, that does include newspapers, but it also includes anybody else publishing things, such as the famous agitprop pamphlets published by James Otis, John Dickinson, and Thomas Paine. There was no journalistic value to Thomas Paine's Common Sense. The pamphlet argued for abolishing the monarchy and for American independence.

Today in testimony before congress, FBI directory James Comey came out in support of journalism, pointing out that they would not prosecute journalists doing their jobs. But he then modified his statement, describing "valid" journalists as those who in possession of leaks would first check with the government, to avoid publishing anything that would damage national security. It's a power the government has abused in the past to delay or censor leaks. It's specifically why Edward Snowden contacted Glenn Greenwald and Laura Poitras -- he wanted journalists who would not kowtow the government on publishing the leaks.

Comey's testimony today was in regards to prosecuting Assange and Wikileaks. Under the FBI's official "journalist" classification scheme, Wikileaks are not real journalists, but instead publish "intelligence porn" and Continue reading

Intel’s new data center chief, a former PC exec, will be hands-on

A top executive responsible for shaping Intel's PC roadmap will now run the company's data center business.Navin Shenoy -- previously senior vice president and general manager of the company's Client Computing Group -- has been appointed the general manager of Intel's Data Center Group (DCG). He will replace the well-respected Diane Bryant, who was group president of DCG.Bryant is taking a leave of absence for six to eight months, and will be given a new position on returning, Intel said in a filing with the U.S. Securities and Exchange Commission on Wednesday.To read this article in full or to leave a comment, please click here

Internet Society Partners with GÉANT – Joining Forces to Mainstream ‘Digital’ in Development in Central Asia

In April 2017, the Internet Society (ISOC) and GÉANT signed a partnership agreement – in the framework of the CAREN3 project – to promote Internet Exchange Points (IXP) in Central Asia with a focus on Kyrgyzstan and Tajikistan. The CAREN3 project supports regional Internet connectivity of National Research and Education Networks (NREN) in Central Asia and is principally funded by the European Union (EU).

Ms. Maarit Palovirta

IDG Contributor Network: Can Ansible be the automation platform for the enterprise? Red Hat thinks so

Red Hat presented a vision during today's keynote address at the Red Hat Summit that it believes Ansible can and will be the foundation for enterprise-wide automation. Red Hat, by the way, recently acquired Ansible.Although the vision appears enticing at first glance, the broad statements about unifying the enterprise data center under Ansible really don't ring true.What is Ansible? Ansible describes its technology in the following way:Ansible is the most popular open source automation tool on GitHub today with more than a quarter million downloads per month. With over 2,400 contributors submitting new modules all the time, rest assured that what you are automating is covered in Ansible already, or will be very soon." Ansible was founded to provide a new way to think about managing systems and applications that better fit this new world. Historically, management vendors and home-grown scripting solutions were created to manage stacks of software on servers. In contrast, Ansible was created to orchestrate multi-tier applications across clouds. From configuration to deployment to zero-downtime rolling upgrades, Ansible is a single framework that can fully automate today’s modern enteprise apps. OUR DIFFERENCE Simple, agentless & powerful. Ansible’s simple, YAML-based automation syntax is quick Continue reading

IDG Contributor Network: Can Ansible be the automation platform for the enterprise? Red Hat thinks so

Red Hat presented a vision during today's keynote address at the Red Hat Summit that it believes Ansible can and will be the foundation for enterprise-wide automation. Red Hat, by the way, recently acquired Ansible.Although the vision appears enticing at first glance, the broad statements about unifying the enterprise data center under Ansible really don't ring true.What is Ansible? Ansible describes its technology in the following way:Ansible is the most popular open source automation tool on GitHub today with more than a quarter million downloads per month. With over 2,400 contributors submitting new modules all the time, rest assured that what you are automating is covered in Ansible already, or will be very soon." Ansible was founded to provide a new way to think about managing systems and applications that better fit this new world. Historically, management vendors and home-grown scripting solutions were created to manage stacks of software on servers. In contrast, Ansible was created to orchestrate multi-tier applications across clouds. From configuration to deployment to zero-downtime rolling upgrades, Ansible is a single framework that can fully automate today’s modern enteprise apps. OUR DIFFERENCE Simple, agentless & powerful. Ansible’s simple, YAML-based automation syntax is quick Continue reading

How to size up a new cloud service like low-priced Wasabi

Saving money may be a good enough reason to try a brand-new cloud storage service -- if it can deliver on its promises.That's the equation some enterprises may use when they look at Wasabi Technologies, an object storage startup that says it offers six times the performance of Amazon's S3 service at one-fifth the price. The service is available globally on Wednesday.The company, started by the co-founders of online backup provider Carbonite, says its single pool of capacity can deliver primary, secondary or archive data at a sustained-read speed of 1.3GB per second, versus 191MB per second at Amazon. Its durability is the same, Wasabi says.To read this article in full or to leave a comment, please click here

Cisco drops critical security warning on VPN router, 3 high priority caveats

Cisco today warned user of a critical vulnerability in its CVR100W Wireless-N VPN router execute that could let an attacker issues arbitrary code or cause a denial of service situation.The company also issues three “High” level impact warnings advisories on its IOS XR Software, Teleprescence and Aironet wireless access point products.On the Critical warning, Cisco said a vulnerability in the Universal Plug-and-Play (UPnP) implementation in the Cisco CVR100W Wireless-N VPN Router could let an unauthenticated, Layer 2–adjacent attacker to execute arbitrary code or cause a denial of service (DoS).To read this article in full or to leave a comment, please click here