What You Need to Know about Migrating to Windows Server 2012 R2

In a previous post, we warned you of the impending end-of-support deadlines for Microsoft Windows Server 2003. After July 14, 2015, Microsoft will no longer issue security patches and updates for this popular platform. Organizations that continue using Windows Server

Windows Server 2003 Support Ends in Just Three Months. Are You Ready?

Microsoft Windows Server 2003 has long been a very secure and reliable server operating system, which is why it is still used by a large number of small businesses and large enterprises. Organizations have been hesitant to migrate to a

What vSphere 6 Means for the Hybrid Cloud

Last month, VMware released the latest edition of vSphere, which promises to set the standard for virtualization solutions for the hybrid cloud while providing a foundation for the software-defined data center (SDDC). VMware vSphere 6 boasts more than 650 new

New HP Solutions Support the Open-Source Networking Movement

Hewlett-Packard (HP) recently unveiled a line of open-network switches for large, web-scale deployments. The two new software-independent, white box switches, or brite box switches, are geared toward the complex, heavy data workloads of cloud, mobile, big data and social media

The Evolution of the Firewall and Why It Is Still Essential

The first firewalls were introduced about 25 years ago, long before computers were found in every home and office, and before the first Internet browser software was introduced. Back then, the firewall guarded the perimeter of the corporate network, protecting

The DDoS Attack Threat: Is Your Network at Risk?

Distributed Denial of Service (DDoS) attacks are on the rise. In its Q4 2014 State of the Internet Security Report, Akamai reported that the number of DDoS attacks almost doubled compared to the fourth quarter of 2013, and the average

You’ve Identified Vulnerabilities in Your Network. Now What?

In a previous post, we discussed why vulnerability assessments are critical to network security. A vulnerability assessment can detect weaknesses that are missed by network security systems, which is why vulnerability assessments are now required for regulatory compliance in a

How to Get Vulnerability Assessments Right

In a previous post, we discussed how the latest Payment Card Industry Data Security Standard, known as PCI 3.0, is a prime example of how regulatory compliance has become a primary driver for vulnerability assessments. Despite more stringent regulations in

Why Regular Vulnerability Assessments Are a Critical Part of Security

In 2013, the Payment Card Industry Security Standards Council (PCI SSC) introduced PCI 3.0, the latest version of the PCI Data Security Standard. A core driver behind PCI 3.0 is the desire to increase PCI compliance among retailers by making

Is It Time for a Network Refresh?


Network bandwidth requirements are increasing rapidly. On average, bandwidth consumption doubles every 10 months. Data volumes in the data center double every 18 months. The number of devices accessing the network doubles every 30 months. Is your network infrastructure built