For decades IT managers have been deploying application delivery (Layers 4 – 7) and security services as point solutions. The network provided the basic connectivity and each L4-7 had to be configured manually per each application. Virtualizing the compute fabric enabled automation at the configuration stage; however, L4-7 and security were still deployed as point solutions. Each application infrastructure change still required intervention in rewiring the physical network, reconfiguring network nodes and, of course, with testing application integrity end-to-end and performance.read more
Too often we hear about the success of attackers in today’s cyber threat landscape, those who claim leadership in the ongoing information security war. But history proves that the successes of those standing guard are rarely publicized. And in this continuous battle of data protection, we are certain; more attacks are blocked by intelligent solutions than ever before.read more
President Obama’s mention of cyber-security in last night’s State of the Union Address came as no surprise. The Obama camp implemented a novel approach this year of “previewing” the President’s main agenda items through a series of speeches in the week preceding the SOTU. But even without the preview, the comments on cyber-security were rather predictable (and brief).read more
David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.
Let’s face it. DDoS are the big, fat, scary bully of the Internet. When organizations have sufficiently tight security or a would-be attacker doesn’t have the skills to overcome a target’s security, he or she can buy capacity on a bot-net or other delivery vehicle and slam packets from all over the world at the target’s site and application(s).read more
Want to Deliver the Best Possible User Experience in 2015? Consider These 8 Web Performance Resolutions.
In survey after survey, internet users say they want their online experience to be as safe, reliable, and fast as possible. That’s why security, availability, and performance are at the core of everything we do at Radware. And that’s why we’ve compiled this list of resolutions — from managing page bloat to regaining control of rogue third-party scripts — for site owners who want to deliver the fastest possible user experience to their audience.read more
With the information security industry suitably distracted by the attacks against Sony, there was a notable story that slipped quietly under the radar last week. On December 22, the New York Times reported that this summer’s breach at JP Morgan Chase was the result of a single server that got overlooked in a system-wide upgrade of security. Such an oversight is not entirely uncommon for vast enterprises managing tens-of-thousands of assets as part of their corporate network.read more
During the past 12 months, we’ve worked to provide more than application delivery and security solutions. Our goal was (and is) to share knowledge with the IT community so you can assess upcoming trends, implement best practices, and gain insights through our research. Thanks to our readers, partners, customers, and team members for another great year of sharing our thought leadership.
Here’s a look at what resonated the most with our readers this past year. Happy Holidays and we wish you a smart, successful, and secure 2015. Cheers!read more
Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.
In Part 1 of this blog, we looked at the growing adoption of cloud and Software-Defined Datacenter (SDDC), but also the fact that network virtualization choices are many and varied, creating some uncertainty regarding how to proceed. In part 2, we will look at network virtualization options and how to align for best success.read more