Blog

What vSphere 6 Means for the Hybrid Cloud

Last month, VMware released the latest edition of vSphere, which promises to set the standard for virtualization solutions for the hybrid cloud while providing a foundation for the software-defined data center (SDDC). VMware vSphere 6 boasts more than 650 new

New HP Solutions Support the Open-Source Networking Movement

Hewlett-Packard (HP) recently unveiled a line of open-network switches for large, web-scale deployments. The two new software-independent, white box switches, or brite box switches, are geared toward the complex, heavy data workloads of cloud, mobile, big data and social media

The Evolution of the Firewall and Why It Is Still Essential

The first firewalls were introduced about 25 years ago, long before computers were found in every home and office, and before the first Internet browser software was introduced. Back then, the firewall guarded the perimeter of the corporate network, protecting

The DDoS Attack Threat: Is Your Network at Risk?

Distributed Denial of Service (DDoS) attacks are on the rise. In its Q4 2014 State of the Internet Security Report, Akamai reported that the number of DDoS attacks almost doubled compared to the fourth quarter of 2013, and the average

You’ve Identified Vulnerabilities in Your Network. Now What?

In a previous post, we discussed why vulnerability assessments are critical to network security. A vulnerability assessment can detect weaknesses that are missed by network security systems, which is why vulnerability assessments are now required for regulatory compliance in a

How to Get Vulnerability Assessments Right

In a previous post, we discussed how the latest Payment Card Industry Data Security Standard, known as PCI 3.0, is a prime example of how regulatory compliance has become a primary driver for vulnerability assessments. Despite more stringent regulations in

Why Regular Vulnerability Assessments Are a Critical Part of Security

In 2013, the Payment Card Industry Security Standards Council (PCI SSC) introduced PCI 3.0, the latest version of the PCI Data Security Standard. A core driver behind PCI 3.0 is the desire to increase PCI compliance among retailers by making

Is It Time for a Network Refresh?

Sequel-network-refresh

Network bandwidth requirements are increasing rapidly. On average, bandwidth consumption doubles every 10 months. Data volumes in the data center double every 18 months. The number of devices accessing the network doubles every 30 months. Is your network infrastructure built

IP Video Surveillance: Is Your Storage Infrastructure Ready?

As we discussed in our previous post, demand for IP video surveillance is increasing rapidly, as organizations seek to protect against a wide range of physical threats. IP video surveillance also has a number of non-security purposes, including accident and

The Benefits of IP Video Surveillance

The demand for more advanced video surveillance is on the rise as organizations seek to protect people, infrastructure and information from deliberate and accidental threats. According to a new report by MarketsandMarkets, the global video surveillance market is estimated to