Gartner has recently released their application delivery controller (ADC) magic quadrant for 2015.* The Magic Quadrant shows that the landscape for ADC vendors continues to change as complimentary differentiating technologies become an essential part of the ADC solution profile. To understand why the ADC Magic Quadrant is still relevant, it is important to know how the ADC landscape has evolved to where we are today.read more
Shamus McGillicuddy is a Senior Analyst for EMA and is a featured guest blogger.
Online retailers have understood the importance of web application performance for a long time, since back when the Amazon was better known as a river than as an e-commerce giant. Enterprises have been a little slower to catch on. Sooner or later, though, all of them will realize that web performance optimization isn’t just for e-commerce apps anymore.read more
A disreputable person enters a bank and walks up to the teller and presents a note asking for the teller to give them all the money. The well trained teller, sets off an alarm, scaring the would-be thief and he runs out of the bank. The budding criminal walks to another branch of the same bank. He walks in and attempts to do the same thing. As long as he is able to avoid the pursuit, the felon-in-training can repeat this process until he is successful. The future outlaw might even make some adjustments before his next attempt to increase his chance of success.read more
It’s very difficult to deliver a commitment level of an application service without a Service Level Agreement (SLA). And it’s impossible to manage an application’s SLA without first gaining visibility into it. Solutions for monitoring application performance and SLA has long been considered a costly and complex task which required inserting hardware probes and/or integrating software agents into every application server.read more
A remote hack-attack on Chrysler Jeeps dominated headlines this past summer when researchers used an exploit to wirelessly control parts of a car’s systems. Initially, they took over the air conditioning, the windshield wipers and the radio. Intrigue grew to concern, however, when those same researchers showed how they could also slow down the car on the highway without any chance for the driver to maintain control. Those revelations led to the first known product recall on a networked car: The Jeep Manufacturer Fiat Chrysler had to update software in more than 1.4 million of its vehicles.read more
The genealogy of the current application delivery controller (ADC) technology is an interesting one that has its roots based on delivering scalability and availability through server load balancing (SLB). Security was a side effect of this function. The ADC has evolved to become an integral component within network security architectures.read more
In the constantly evolving threat landscape attackers are always finding new ways to target their victims. In the last few years we have seen a steady growth in Distributed Reflective Denial of Service attacks, DrDoS. These attacks rely on misconfigured public servers and these public servers can provide an attacker with the amplification in bandwidth needed to take down their targeted site.read more
The headline-making cyber-attack on the German Bundestag lower house of Parliament was recently solved. Reports state that attackers stole unknown amounts of data and government officials are now being forced to spend millions of euros on the cleanup to fix their entire computer system.
The attack (one of the biggest known against the German Government’s IT systems) first became public in May 2015 and while more background information has recently become available, understandably, even this available information is being handled with care.read more