The Business Defined Hybrid Cloud – Or Why the Software Defined Data Center Needs a Brain

Let us look at a hypothetical example to better understand the difference between the traditional bottom-up approach to hybrid cloud management and the new business-driven paradigm. In Q4 of 2016, a bank wants to gain a 3% market share in North America with its trading tools directed toward savvy end customers that are between 30 and 40 years old, have an average household income of over $100k, and live in California. After reaching the Q4 goal, this same bank sets itself the new objective of defending its IRA market share against aggressive competition in California. Of course, our example bank does ...

Read More

Cisco Is Turning Enterprise Pets into Scale Out Cattle

When we think back to why everyone’s favorite child named OpenStack failed so miserably to catch on in all but the largest enterprises, the conversation comes back to one central topic: OPEX. This topic consists of multiple dimensions: Initial deployment and configuration: Integrating OpenStack within a traditional data center setting has shown very costly, as much custom integration work has to be done. Separate set of management tools: New tools are needed to manage and monitor OpenStack environments. Especially performance and user experience management have proven to be difficult and costly. Lack of hardware supporting scale out: Turn-key scale out of OpenStack environments has remained a ...

Read More

EMA Innovators of Cisco Live 2017 in Berlin

Jens Soeldner writing for iX Magazin, the largest German IT publication, and Torsten Volk of Enterprise Management Associations (EMA) have selected the two most outstanding and innovative vendors (out of 150 exhibitors) at last week’s Cisco Live event in Berlin. This EMA Innovators award crowns vendors that dare stepping outside the box to help their customers solve hard IT problems in a simpler, faster and often more cost effective manner. And the winners are: StratoScale and Zerto StratoScale – Private Scale Out Cloud 2.0 Website: http://www.stratoscale.com Founded in 2013 in Israel, Stratoscale attracted $70 million in venture cap ital (partially from big names such as Cisco Systems and Intel Capital, ...

Read More


Breach Detection, Sony Entertainment and Vectra Networks…


Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year. Recent articles revealed that some employees [...]



By | December 19th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Allgress Insight Risk Management Suite Brings Flexibility and Functionality to IT-GRC


When I started out in security, only very large organizations with a mature set of business processes dared to talk about implementing some form of governance, risk, and compliance (GRC) or enterprise program (e-GRC). They generally did it in an attempt to get ISO or similar certification, or to “move their programs to the next [...]



By | December 19th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Service Automation: Key for Maximizing IT and Business Efficiency


The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at [...]



By | December 10th, 2014|IT Management, Jim Frey, Network Management|0 Comments

Is EMV an Expensive Security Misstep for the Payments Industry?


There is no disagreement that the current mag-stripe technology used in the USA and other countries outside of the EU is antiquated and lends itself to fraud. The data is easily copied using various methods from manual card data copying and shoulder surfing, to database compromise and POS terminal malware.  Cards can be reproduced with [...]



By | December 8th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Innovation Explosion Sets the Stage for New Wave of “Hybrid” Applications


In the past, technology evolution was quantified as generational. So the first generation of computing was based on the vacuum tube, followed by the transistor, integrated circuits, and microprocessors. Even today, multi-generational software and hardware systems are very much alive in many modern data centers. The interesting thing about the generational approach is that it [...]



By | December 8th, 2014|IT Management, Julie Craig|0 Comments

Riverbed Tees Up for Hybrid Computing at 2014 FORCE User Conference


During the first week of November, Riverbed held its first combined OPNET and Riverbed user conference at the San Jose Convention Center. Held in tandem with the Riverbed industry analyst event, this conference was an opportunity for Riverbed to share with both customers and industry analysts the company’s vision for becoming the go-to vendor for [...]



By | December 2nd, 2014|IT Management, Network Management, Tracy Corbo|0 Comments

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter


The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in [...]



By | November 7th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context


  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, [...]



By | October 28th, 2014|David Monahan, IT Management, Scott Crawford, Security|0 Comments
Load More Posts