From Point Solutions to Application Centric Services: Cisco ACI and Radware

For decades IT managers have been deploying application delivery (Layers 4 – 7) and security services as point solutions.  The network provided the basic connectivity and each L4-7 had to be configured manually per each application.  Virtualizing the compute fabric enabled automation at the configuration stage; however, L4-7 and security were still deployed as point solutions.  Each application infrastructure change still required intervention in rewiring the physical network, reconfiguring network nodes and, of course, with testing application integrity end-to-end and performance.

read more

Results Rely on Security Confidence

Too often we hear about the success of attackers in today’s cyber threat landscape, those who claim leadership in the ongoing information security war.  But history proves that the successes of those standing guard are rarely publicized.  And in this continuous battle of data protection, we are certain; more attacks are blocked by intelligent solutions than ever before. 

read more

Obama’s Cyber-Security Proposals: Does this Safe Platform Translate to a Safer Network?

President Obama’s mention of cyber-security in last night’s State of the Union Address came as no surprise.  The Obama camp implemented a novel approach this year of “previewing” the President’s main agenda items through a series of speeches in the week preceding the SOTU. But even without the preview, the comments on cyber-security were rather predictable (and brief).

read more

The Right Way to Secure Your Applications Against DDoS Using Signaling

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

Let’s face it. DDoS are the big, fat, scary bully of the Internet. When organizations have sufficiently tight security or a would-be attacker doesn’t have the skills to overcome a target’s security, he or she can buy capacity on a bot-net or other delivery vehicle and slam packets from all over the world at the target’s site and application(s).

read more

Attackers are winning the Race to Find the Weakest Link — An Update on the JP Morgan Data Breach

With the information security industry suitably distracted by the attacks against Sony, there was a notable story that slipped quietly under the radar last week. On December 22, the New York Times reported that this summer’s breach at JP Morgan Chase was the result of a single server that got overlooked in a system-wide upgrade of security. Such an oversight is not entirely uncommon for vast enterprises managing tens-of-thousands of assets as part of their corporate network.

read more

Your Six Favorite Posts of 2014

During the past 12 months, we’ve worked to provide more than application delivery and security solutions.  Our goal was (and is) to share knowledge with the IT community so you can assess upcoming trends, implement best practices, and gain insights through our research. Thanks to our readers, partners, customers, and team members for another great year of sharing our thought leadership. 

Here’s a look at what resonated the most with our readers this past year.  Happy Holidays and we wish you a smart, successful, and secure 2015.  Cheers!

read more