Monday, May 07, 2012

Next-gen firewalls: Off to a good start

Next-gen firewalls require external visibility tools | IT shops sifting RIM's bold promises and plans

Network World Network/Systems Management

Forward this to a Friend >>>


Next-gen firewalls: Off to a good start
When we tested four next-gen firewalls strictly on performance, we found that the products could forward packets at impressive rates, but throughput dropped when advanced security features were turned on. We now dive deep into application identification and control - the defining features of next-gen firewalls - to find out what works and what doesn't. Read More


WHITE PAPER: HP

Your Network is Heading for Traffic Chaos
The increased use of virtual machine (VM) mobility and new application deployments is significantly increasing traffic levels between servers in the data center. This Gartner report provides recommendations for overcoming these challenges prevalent in most traditional data center networks. Learn more.

WHITE PAPER: Limelight

Warp Speed: The Nuts and Bolts of Web Acceleration Solutions
Enterprises are quickly realizing that they can't achieve the web performance they need by simply deploying their web server on a high-speed network. Improving page rendering speeds incrementally through content caching is no longer enough. It's time to look for dramatic performance gains by applying optimization techniques right at the browser. Learn More!

Next-gen firewalls require external visibility tools
Knowing what's happening on your network is a prerequisite to controlling the traffic. We call that visibility because it combines all of the information the firewall knows, including session and application information, traffic volumes, and rate information, into a way to "see" into your network -- to give you visibility. Read More

IT shops sifting RIM's bold promises and plans
Research in Motion executives and managers practiced staying "on message" at BlackBerry World this week, repeating a series of mantras about the company's directions and product plans. Yet the simple message is running into the hard practicalities of enterprise IT customers, and they want details and nuance. Read More

Five Internet TV cable cutting considerations
I've been watching video over the Internet since its first days. And, I've been pushing that video from the net to televisions for almost as long. It wasn't until late year though that I finally cut my cable and went to just watching television over the Internet and with a little bit of over-the-air (OTA) for good measure. If you're considering cutting the cable or satellite cord too, here are some things you should know. Read More

What is WAN virtualization?
Not your father's link aggregation, it delivers reliability plus Internet economics for the enterprise WAN. Read More


WHITE PAPER: Silver Peak Systems, Inc.

Magic Quadrant Identifies Leaders in WAN Optimization
Gartner ranks the top eight vendors in the WAN optimization controller market. See how these products are innovating around cloud, video, multipoint quality of service and quality. Read now.

Juniper joins Cisco, Enterasys in BYOD management fray
Juniper this week unveiled new and enhanced products designed to secure mobile device access to enterprise networks. Read More

Alcatel-Lucent brings 40G to the core
Alcatel-Lucent this week at Interop will flesh out its data center fabric vision with 40G Ethernet and higher-density 10G Ethernet capabilities on its core switches, as well as enhanced software for its top-of-rack and core switches. Read More

Extreme Networks adds heavy dose of copper to 10G switches
Extreme Networks Monday unveiled 10G Ethernet copper modules for its BlackDiamond X8 core switch and new fixed copper versions of its Summit X670 top-of-rack switch. Read More

Hitachi starts all-in-one data center service, covers construction to IT support
Japanese conglomerate Hitachi on Monday launched a new data center business that includes everything from planning to construction to IT support. Read More


WHITE PAPER: Riverbed

Measuring Private Cloud Payback
With 2,000 employees spread across five continents, balancing the tradeoff between complexity and performance is no easy task. See how a natural resources firm leveraged WAN optimization to deploy their private cloud and achieve bandwidth utilization reductions of 70%-90% without having to make changes to routers or QoS configurations. Read now!

IBM: The rapidly changing role of top security executives
Security issues are exerting a ton of pressure and monetary concerns on the executives in charge of keeping corporate networks and assets safe. Read More

Open-source cloud frameworks: A work in progress
Here's a look at the growing list of open-source platform-as-a-service providers and how IT managers can decide where the technology fits best in their organizations. Read More

How to fight back against privacy pirates
Have you Googled yourself lately? Is the information about you accurate or full of inconsistencies, both of which can be devastating? Read More

Manage software deployments across complex environments
The larger and more complex an organization's processing environments are, including cloud instances, the more challenging the process of application deployment. Automation tools support the best practice of keeping these apps updated for peak performance, capability and security. Read More



SLIDESHOWS

7 reasons why Linux is a desktop flop
Writer Maria Korolov runs through all the reasons why Linux has not made any headway despite its many strengths.

JOIN THE NETWORK WORLD COMMUNITIES
As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity). Network World on Facebook Network World on LinkedIn

MOST-READ STORIES

  1. 10 ways to celebrate Star Wars Day
  2. Samsung's Galaxy S III: four things to know
  3. Microsoft Researchers say cybercrime loss estimates are a bunch of bunk
  4. How to land a cybersecurity job
  5. Hottest IT skill? Cybersecurity
  6. Watch Steve Jobs play FDR in Apple's long-lost takeoff on famous '1984' Macintosh TV commercial
  7. The 10 worst Web application-logic flaws that hackers love to abuse
  8. Why Linux is a desktop flop
  9. Tech's 10 most famous college dropouts
  10. Step aside Anonymous, here comes The Unknowns

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_systems_management_alert as security.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2011 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **


No comments:

Post a Comment