Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

Cloud Security Alliance Hack-A-Thon and the Software Defined Perimeter

The Cloud Security Alliance (CSA) is a not-for-profit think tank of volunteers that spend their time trying to better the internet. These people are the antithesis of cybercriminals; they spend their energy trying to figure out ways to make our data safer. They create best practices for providing security assurance within cloud computing, or in this case, they determine how a cloud environment can be used to enhance and scale authentication for a service that can be cloud-based or private data center-based. Just last week, CSA announced the results of a worldwide Hackathon against an implementation of their Software Defined Perimeter ...

Read More

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

Damballa and Bit9 + Carbon Black Collaborate to Deliver Better Security with More Context

  In looking at the solutions available for threat protection (and detection), there are quite a few options out there. Some, like Damballa Failsafe, are network-based, vigilantly watching packets across the network and looking for indications of undesirable activities/behaviors and content.  Others are host-based, like Bit9 + Carbon Black, using an agent on the endpoint, to persistently defend the endpoint as a beachhead against undesired, malicious processes trying to execute. Each has its use cases and strong points, but together they provide a significantly broader perspective and richer context for driving response. While sitting on the network and inspecting packets allows for ...

Read More

Thoughts on Splunk .conf 2014

Thoughts on Splunk .conf 2014

This week, Las Vegas hosted some 3500 people at the MGM Grand to mark Splunk .conf14, the annual user gathering for Splunk customers, referred to as “Splunkers”. For those of you not in the tech industry, spelunking, or the act of exploring caves, may come to mind. The theme of the conference was not cave exploration, but data exploration; however, the analogy of cave exploration actually aligns very well. “Splunkers” are diving into their data, delving deep into places that many have never explored before. Each of them finding new and cool ways to use the data that they have ...

Read More

posted by Torsten Volk   | January 23, 2012 | 0 Comments

puzzle

IT as a Service is one of the hottest topics these days. In a nutshell, it entails the radical alignment of all IT disciplines around strategic business requirements. Instead of having to beg IT for resources and services, as many of us are accustomed to, we can now pick all the resources and services from...

Read More »



Radar-Sample-Logo-300x292

For the past few months, I have been “heads down” completing my latest EMA Radar Report—which is why I have been notably absent from the Blog- and Twitter- spheres. Entitled “Application Performance Management (APM) for Cloud”, it discusses the challenges of managing Cloud-based applications, and eighteen APM solutions which can help solve them. So what...

Read More »



posted by Tracy Corbo   | January 18, 2012 | 0 Comments

Digital_Abstract

SOPA highlights the frustration and tension between technology and content providers. Messages flash across television screens as channels are removed due to disputes between service providers and the content providers. Book and magazine publishers offer a mixed bag of digital content. Some opt for PDF version of printed materials while others embrace a full interactive...

Read More »



posted by    | January 16, 2012 | 0 Comments

SkeletonHandMouse-300x225

This parrot is no more. It has ceased to be. It’s expired and gone to meet its maker. This is a late parrot. It’s a stiff. Bereft of life, it rests in peace. If you hadn’t nailed it to the perch, it would be pushing up the daisies. It’s rung down the curtain and joined...

Read More »



posted by John Myers   | January 13, 2012 | 0 Comments
In-Memory and Mobile Drive SAP Today, SAP announced their revenues for 2011.  It was a record year in many respects.  In particular, SAP touted growth for their in-memory database HANA and their Mobile Solutions growth – two components I consider important for the development of an organizations Mobile BI capabilities.  Both exceeded expectations. Speed of Analytics From...

Read More »



World_network_300x190px

The game is afoot. Riverbed announced that they had “purchased certain assets of Expand Networks, including its intellectual property, out of liquidation in Israel. Riverbed did not purchase the corporate entity of Expand Networks and has not assumed any of Expand’s liabilities, obligations or contracts.” Last October Expand Networks had gone into liquidation under the supervision...

Read More »



posted by Jim Frey   | January 9, 2012 | 0 Comments

resolutions

In keeping with my nascent tradition of not predicting trends, I’ll instead propose a number of focal points that network engineering and operations professionals should keep in mind in the coming New Year of 2012.  2011 resolutions were around application-awareness, connecting with the network security team, assessing the impact of videoconferencing, embracing automation, and improving service...

Read More »



posted by Steve Brasen   | January 9, 2012 | 0 Comments

Rainbow-300x199

For the past two decades or so, several leading IT management vendors have tried to convince us that organizations should invest in a single unified management platform for supporting all of IT management needs.  Setting aside for the moment the fact that such an animal does not and cannot possibly exist (no vendor has the...

Read More »



posted by Steve Brasen   | January 9, 2012 | 0 Comments

Radar-Sample-Logo-300x292

Desktop PCs and laptops are the backbone of business profitability.  Yes, yes … I know … last week I raved about the rising mobile device revolution – but that transition is still a few years off.  Today the PC desktop remains king in enabling enterprise workforce productivity, and, in fact, organizational success and ongoing profitability...

Read More »



posted by    | January 6, 2012 | 0 Comments

New2dDemand3-300x277

Welcome to 2012. Like my friend Troy DuMoulin, I want to start the year with a post on IT demand management, which I think will continue to be a hot topic this year. Troy covers the intake functions often associated with different levels of demand, which he sees as business relationship management, service catalog, and...

Read More »



Page 19 of 35« First...10«1718192021»30...Last »