main

Security

Data Center Application Layer Attacks

October 31, 2017 — by Christina Hausman1

data-center-security-960x640.jpg

This post originally appeared on the Cisco blog: Data Center Application Layer Attacks 

There have been a number of articles written on data center outages and their business costs of lost productivity, infrastructure damage, loss of brand reputation and goodwill in the marketplace, and litigation costs.  Data center outages can occur from a number of factors such as such as component quality issues, power supply disturbances, or human error. Even turning systems off for routine maintenance could lead to a potentially costly incident to the business.  However a multiyear Ponemon study, “Cost of Data Center Outages” found that the fastest growing cause of data center outages was cybercrime.

Application DeliveryWAF

How Integrating Application Delivery and a Firewall is like Auto Repair

January 12, 2016 — by Frank Yue2

application-delivery-and-firewall-960x516.jpg

I took my car in for some work a while back. They had to replace a gasket on the engine because it was leaking a bit of oil. When they looked at the problem, they told me that I should replace a few other parts.

This was interesting because the parts were working and not causing any issues. The parts they wanted to replace were reasonably inexpensive, but in order to get to the failing gasket they had to spend a lot of time taking apart the engine. The time and labor to dismantle my engine outweighed the cost of the parts that they recommended replacing. It made sense to do this other work at the same time while they were easy to access. In the long run, this would save me money by not having to take apart the engine later when these components would eventually go bad.

SDN

Transformation of the Data Center & Building the Private Cloud, Part 2

December 16, 2014 — by Jim Frey0

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

In Part 1 of this blog, we looked at the growing adoption of cloud and Software-Defined Datacenter (SDDC), but also the fact that network virtualization choices are many and varied, creating some uncertainty regarding how to proceed.  In part 2, we will look at network virtualization options and how to align for best success.

SDN

Transformation of the Data Center & Building the Private Cloud (Part 1)

December 1, 2014 — by Jim Frey3

Jim Frey is Vice President of Research, Network Management for Enterprise Management Associates (EMA) and is a featured guest blogger.

In order to remain engaged and relevant in the long run, a growing percentage of enterprise IT organizations are seriously considering transforming themselves into internal private cloud service providers. The requisite enabling technology is virtualization across all three primary technology domains – compute, storage, and network – combined with a healthy dose of automation and orchestration. Server virtualization is the most mature, and has taught us much with regard to automation and improving IT agility, fueling a desire to extend the model and achieve fluid architectures such as the Software Defined Data Center (SDDC).

SDN

IMO: Selection Criteria for SDN Controllers

October 8, 2013 — by Lior Cohen0

As the Software Defined Networking (SDN) hype dust settles, more vendors are offering SDN products that represent their take on the “how the world will be a better place with SDN” strategy. I figured that we should really get a better sense of what matters and what doesn’t when it comes to SDN controllers, as well as recognize the best ways to determine which controllers are a good choice.

Application DeliveryData CenterServer Virtualization

Greening the Data Center: How Server Virtualization Makes Next Generation Data Centers More Energy Efficient

August 5, 2013 — by Lior Cohen2

Let’s recall exactly how server virtualization started and what it’s all about:

In the late 90’s, a company named VMware developed hypervisor technology, and as much as it had immediate appeal, not too many people really understood it and only a select few believed there was a business value associated with the technology.

Application DeliveryData CenterWeb Application Firewall

How Application Delivery and Security Work Hand-in-Hand

March 29, 2013 — by Nir Ilani1

At first glance, application delivery and security might seem unrelated because they appear to solve and address different challenges from different domains. But a closer look actually reveals that they are entwined. In this post I’ll break down the ways in which application delivery and security work hand-in-hand.

Mobile DataService Provider

The Mobile Momentum: How Can Carriers Manage Increasing Traffic in the Mobile Space?

February 25, 2013 — by Nir Ilani1

As their revenues decline and mobile carriers continue to struggle with the increasing traffic demand from their customers, Long Term Evolution (LTE) looks like a good candidate to reduce the cost per bit. I recently read a nice analysis from Deloitte that claims that 2013 will be a strong year for LTE adoption, predicting that more than 200 operators in 75 countries will launch LTE networks alongside their existing HSxPA networks. With a diverse range of LTE handsets and tablets available in the consumer market, overall LTE subscription is expected to exceed 200 million clients.