network visibility - News, Features, and Slideshows
Ever since VMware bought Nicira last July the term software-defined networking (SDN) has taken off, with players like Cisco, Juniper, VMware and even HP and IBM jumping on the bandwagon.
By Hansang Bae, director, Cascade Product Architecture, Riverbed Technology | 04 January, 2013 22:03
Network downtime is an inescapable fact for networks of all sizes, and all the prevention and detection tools in the world won't allow analysts to quickly solve the problem. What's needed are tools that will pinpoint the root cause of the problem and determine the appropriate steps to solve it. This isn't to say that protection and detection tools aren't necessary. Obviously they are an important part of overall network health, but they should be a part of the solution, not THE solution.
By Tim Nichols, VP, global marketing, Endace | 16 November, 2012 21:42
Despite a substantial decline in Riverbed's stock price after the news of its $1 billion acquisition of Opnet this week, industry experts say that the buyout leaves Riverbed in a uniquely strong position in the network management arena.
By Jon Gold | 01 November, 2012 21:44
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
The Critical Security Controls for Effective Cyber Defense (CSCs) represent an established and solid set of guidelines for the government, financial, education, manufacturing and health care sectors, according to a 2013 SANS survey on the CSCs. SANS had the opportunity to review numerous features of LogRhythm's security information and event management (SIEM) platform with new security intelligence features built in for compliance. In our review, we focused on LogRhythm's ability to ease some of these pain points while meeting 10 of the most valuable CSCs.
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy