Image Optimization: 10 Do’s & Don’ts for a Better User Experience

As website owners and designers, we want to provide the best user experience to our clients. This often involves massive graphical design with an increasing amount of images on a site. According to HTTP archive, the number of images per page has doubled from 34 to 69 since 2012 until today and image payload has more than tripled itself. The implication of the data is fully visible – websites are indeed becoming more pleasant to the eye.

read more

Does NFV Have a Place in the Enterprise?

Jim Metzler is a Distinguished Research Fellow and Co-Founder of Ashton Metzler & Associates and is a featured guest blogger.

Many people associate NFV exclusively with service providers. That’s understandable because the organizations that are most closely associated with the definition and development of NFV, such as the European Telecommunications Standards Institute (ETSI) and the TM Forum, focus almost exclusively on service providers. The service provider orientation of these organizations shows up in all of their documents.

read more

Are ADCs Another Layer of Defense Against Cyber Attacks?

Application Delivery Controllers (ADCs) were once ubiquitous hardware-based appliances seen in data centers for the sole purpose of load balancing.  However, this role has changed and the use of ADCs has expanded beyond their original purpose in an effort to keep up with the needs of the today’s IT pros.

The result is that ADCs now operate in a much less narrow function.

read more

Leveraging SDN and NFV for Comprehensive and Cost-effective Cyber Network Defense & Application Delivery

Last week I spent a few days in sunny (and crowded) San Jose, California at the NFV World Forum.  The theme this year was largely about open environments and interoperability, ushered on by the standardization efforts behind NFV, along with the related topics of carrier-grade service assurance and reliability.  I was fortunate to speak about how Radware is actively investing in open environments as the architecture becomes common platforms for commercial implementations.  Radware is implementing SDN and NFV in network security and application delivery domains to help service providers achieve radical cost reduction while benefitting from the advantages of cloud-based application services.  

read more

Protecting Your Applications Everywhere – Are You in Good Hands?

Cloud migration – one of the top trends this past year and predicted by many to be a top trend in 2015 – brings with it many benefits to the organization.  You can enjoy cost savings, scalability, flexibility, and productivity benefits for your organization, your customers and your partners.  Regardless of the industry they belong to, today’s enterprises are finding that the cost and speed advantages of cloud cannot be ignored. 

read more

The Road to Cyber-Safety is Shifting to Hybrid Cloud WAF Protection

Hybrid Cloud WAF is the answer.  Now what was the question?

Let’s back up a minute.  There is an ancient riddle which goes something like this:

You are walking down a path and come upon a fork in the road. One side is the good path and the other side is the bad path. However, you don’t know which one is which and both paths are guarded by identical twins. One guard tells the truth and the other, always tells lies. If you want to take the good path, what should you ask the guards? You would ask "which path would your brother go?" Then, take the path opposite from where they are pointing.

read more

Cyber-Security Concerns to Know Before You Sign On

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

Any of us who use the Internet with regularity enjoy the benefits of Federated Identity Management (FIM) and Single Sign-On (SSO) without much thought. Because of these technologies, we are able to move between our favorite blog site, news center, or social media site (Twitter, Facebook, LinkedIn, etc.) without having to struggle for log in information.

read more

What’s the Relationship Between Security and SDN Deployment?

A couple of years ago the discussion of SDN focused primarily on the fact that SDN separated the network control function from the network forwarding function and that separation of functions might require the introduction of new protocols such as OpenFlow. More recently there has been a lot of discussion about the value of an overlay SDN model vs. an underlay SDN model and the role of specialized hardware in either model. All of these discussions are important and they all are focused on key architectural characteristics of SDN.

read more