Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in this case, they determine how a cloud environment can be used to enhance and scale authentication for a service that can be cloud-based or private data center-based. Just last week, CSA announced the results of a worldwide Hackathon against an implementation of their Software Defined Perimeter ...

Read More

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, to persistently defend the endpoint as a beachhead against undesired, malicious processes trying to execute. Each has its use cases and strong points, but together they provide a significantly broader perspective and richer context for driving response. While sitting on the network and inspecting packets allows for ...

Read More

Thoughts on Splunk .conf 2014

Thoughts on Splunk .conf 2014

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have ...

Read More

Hacker-Security_300x190

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in...

Read More »



Damballa-Bit9_300x190

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint,...

Read More »



posted by David Monahan   | October 24, 2014 | 0 Comments

SecurityImageEye_300x190

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave...

Read More »



posted by Jim Frey   | October 7, 2014 | 0 Comments

NetworkManagementEntIT_300x190

It’s sometimes difficult to differentiate between hype and reality when it comes to topics such as cloud, ITaaS, SDN, DevOps, hybrid this and hybrid that. But there are a few certainties in the IT universe and one of them is that IT doesn’t function if all of the pieces can’t talk to one another, and...

Read More »



NetworkManagementWorldView_300x190

Last week, I attended a Citrix analyst relations summit program to learn about the company’s direction and strategy.  While the main-tent program was longer on vision than it was on execution details, there were some aspects of the proceedings that I found compelling. First off, there weren’t a lot of net new things being introduced,...

Read More »



posted by Jim Miller   | August 28, 2014 | 0 Comments

RemoteControls300x190

There was a time at the height of my home video and audio craze that the number of devices I needed to watch a movie could no longer be counted on one hand. Amplifier, preamplifier, tuner, CD player, DVD player, TV, cable box . . .you get the idea. As I organized my vast array...

Read More »



posted by John Myers   | August 18, 2014 | 0 Comments

AnalyticsText300x190

In skiing, the “black diamond” run or ski slope is often referred to as “high risk/high reward.” You receive lots of “reward” skiing the black diamond slopes, but you have a significant amount of “risk” associated with variable terrain, such as the presence of trees and the possibility of injury. However, the black diamond slopes...

Read More »



posted by Tracy Corbo   | August 18, 2014 | 0 Comments

NetworkPerformance300x190

Jim Frey contributed to this blog post. On Wednesday, August 6, 2014, F5 Networks held an analyst summit at the company’s tech center in NYC. It was a great opportunity to catch up and see what was new and where the company is headed. The company appears to be enjoying a bit of a renaissance,...

Read More »



posted by Jim Miller   | August 14, 2014 | 0 Comments

Storage_300x190

Welcome to “The StorHouse”! This house will accommodate all areas of storage, and there is plenty to cover. As a product manager in storage for 20 years, I had the opportunity to see some pretty interesting changes in the market. Events such as the move to distributed computing, the advent of technologies like virtual disk and snapshot copies and moving from large single...

Read More »



Posted in Jim Miller

posted by Dennis Drogseth   | July 31, 2014 | 0 Comments

IT Value_300x190

A little over a year ago, I got into a rather animated argument about whether IT could measure its performance by the “value” it delivered rather than by purely measuring “costs.” My dinner companion insisted that IT could now, always, and forever only be measured on costs. I disagreed. In fact I had just planned...

Read More »



Page 1 of 3512345»102030...Last »