Two Web application acceleration vendors at Interop will announce new products and capabilities that provide more throughput for customers with higher and higher demand on their data centers.
Stories by Tim Greene
Palo Alto Networks is announcing at Interop Las Vegas a new version of its next-generation firewall that makes it possible to create tighter security policies based on information about specific applications.
An elite social-networking site for network engineers is expanding into consulting on IT projects for businesses and service providers.
Cisco is looking to aggressively incorporate its reputation and monitoring gear into security gear, all under the direction the former CEO of Ironport, the company Cisco bought for its reputation technology.
Two luxury cruise lines faced the same satellite-delay challenges for shipboard Internet access and came up with different ways to address the unavoidable latency on those ship-to-shore connections and keep passengers happy.
Array Networks will announce at Interop Las Vegas next week that it has expanded its SSL protection from remote-access users to include those coming in over Wi-Fi connections, and basing authentication in users' identities.
HP ProCurve Monday announced that its gear supports Microsoft Network Access Protection and also makes NAP simpler to configure.
Citrix is announcing software at Interop Las Vegas this week designed to speed up traffic between individual computers and corporate sites using its WAN acceleration appliances on only one end of the connection.
WAN optimization technology is a way to save money -- take that to the bank. For instance, U.S.-based custom machinery manufacturer Curt G. Joa, avoided the cost of adding a server to its German office by installing WAN-acceleration gear from Silver Peak.
Cisco is opening up two pieces of its branch office gear to application developers in an effort to reduce the amount of equipment businesses have to place and manage in small business locations.
Check Point Software is introducing a set of security appliances for midsize businesses and branch offices of larger businesses bent on reducing the clutter of devices and the cost and hassle of dealing with multiple vendors.
There are lots of ways business networks can be compromised, and more are developing all the time.
They range from technology exploits to social engineering attacks, and all can compromise corporate data, reputation and the ability to conduct business effectively.
At this year's RSA Conference, there were fewer sessions and displays devoted to NAC than at previous conferences, but interest in the technology still seemed to run high among 2008 attendees.
Threats against browsers are getting more sophisticated and branching out into such exotic areas as gaming, experts told attendees at RSA Conference 2008.
Juniper is upgrading its J-Series routers to support a firewall and IPSec VPN, putting it in closer competition with Cisco's ISR branch office routers.