Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application discovery and availability monitoring Service dependency mapping Change design and workflow automation Network topology and policy analysis Policy optimization and violation guidance Policy violation notification Take a look at it.  

Read More

Flash or HDD for the Best Price/Performance?

Flash or HDD for the Best Price/Performance?

Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server virtualization has further contributed to this situation. Server virtualization has been deployed in most enterprises and has delivered great benefits, including environmental and footprint savings, more efficient server utilization, and longer life for legacy applications. When the overall workload density increases on a single physical ...

Read More

The Changing Game of IT Service Management

The Changing Game of IT Service Management

If you think that ITSM is static and old hat, think twice. A huge number of innovations are just emerging—some have been a long time in coming; while others are unexpected surprises—as analytics and automation are changing the ITSM game dramatically. Here are some trends that I’ve seen in 2014 that I expect will grow [...]

Read More

LAN Network Diagram_300x190

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application...

Read More »



posted by Jim Miller   | January 9, 2015 | 0 Comments

flash and HDD_300x190

Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server...

Read More »



posted by Dennis Drogseth   | January 5, 2015 | 0 Comments

IT-management-diagram-person_300x190

If you think that ITSM is static and old hat, think twice. A huge number of innovations are just emerging—some have been a long time in coming; while others are unexpected surprises—as analytics and automation are changing the ITSM game dramatically. Here are some trends that I’ve seen in 2014 that I expect will grow...

Read More »



posted by Steve Brasen   | December 30, 2014 | 0 Comments

Keyboard_300x190

Reflecting on my earlier career in IT management, I have to confess to a level of astonishment at how naïve IT administrative practices were just a decade or two ago. Failure events were common, and most organizations just accepted as immutable fact the reality of systemic firefighting. IT services critical to business operations were all...

Read More »



posted by David Monahan   | December 19, 2014 | 0 Comments

Vectra_Threat_Certainty_Index_300x190

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year. Recent articles revealed that some employees...

Read More »



Security and assessment module_300x190

When I started out in security, only very large organizations with a mature set of business processes dared to talk about implementing some form of governance, risk, and compliance (GRC) or enterprise program (e-GRC). They generally did it in an attempt to get ISO or similar certification, or to “move their programs to the next...

Read More »



posted by Jim Frey   | December 10, 2014 | 0 Comments

NetMan Image_300x190

The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at...

Read More »



Credit Card_300x190

There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with...

Read More »



Lightbulb Explosion_300x190

In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it...

Read More »



Hacker-Security_300x190

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in...

Read More »



Page 1 of 3612345»102030...Last »