Tumblelog by Soup.io
Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

March 16 2014

tannerigor

The Cisco Nexus Or The Juniper Ex Series?

Image Caption The Nexus 7000 uses Cisco's NX-OS operating system, increasing the product's complexity and raising operating costs. Conclusion: New operating systems aside, we took a hard look at the performance specs and, in the end, it was no contest. We chose Juniper. The bottom line was better performance with lower overall operating costs. "There has been a lot of hype around the Cisco Nexus. What's driving this is the unprecedented demand for bandwidth and network managers on a quest to find a solution. Since Nexus runs NX-OS, IT will be introducing a new operating system into their environment.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/-cisco-nexus-the-juniper-ex-series-/2010/09/27/5030198.htm

Cisco Systems Cisco Catalyst 2960G-48TC Switch

More Cisco Systems Cisco Catalyst 2960G-48TC SwitchCompare Prices Tax & shipping for ZIP code: Condition: See more sellers See less sellers Description Cisco Systems is introducing the intelligent Ethernet Cisco Catalyst 2960G-48TC Switch, a new member of the Cisco Catalyst 2960 Series of fixed-configuration standalone devices that provide desktop Fast Ethernet and Gigabit Ethernet connectivity for entry-level enterprise, mid market, and branch office networks, helping enable enhanced LAN services. The Cisco Catalyst 2960G-48TC Switch accelerates the deployment of Gigabit to the Desktop (GTTD) by providing 48 ports of Gigabit Ethernet in one rack unit (RU) along with integrated security, including Network Admission Control (NAC), as well as advanced quality of service (QoS) and resiliency, delivering intelligent services for the network edge. Specifications
For the original version including any supplementary images or video, visit http://shopping.yahoo.com/19570706-cisco-systems-cisco-catalyst-2960g-48tc-switch/

John Paul II Hospital in Krakow: 21st-Century Medical Care

Due to the critical role of the campus data network, which is the 'blood circulation system' of our IT, we were looking for solutions and technologies that would be open to new multimedia communications (text, voice, high-definition video), and Cisco has provided us with such a solution. In the coming year we plan to further develop the network and migrate to a unified communications system. We also plan the expansion of telemedicine services and cooperation with experts from outside the hospital using video conferencing technology." Jerzy Wysocki, healthcare expert, Cisco Poland "Providing modern and effective health care requires the use of the latest information and communication solutions. Thanks to these solutions, doctors can have full access to medical records, medical Meru Networks data and patient diagnostic information at any time and anywhere and, if necessary, can quickly consult with other specialists. Information about Cisco can be found at http://www.cisco.com .
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/John-Paul-II-Hospital-in-iw-1395131156.html

March 06 2014

tannerigor

Converting Fron A Cisco 1841 Router To A Cisco 2900 Router

Cisco takes aim at fakers with anti-piracy tool

The IOS (Firmware) of the 1841 is not compatible with Cisco 2900. So i think you want the configuration of the Cisco 1841. You can copy the running-config to a TFTP server (copy running-config tftp), or copy the running-config to usb stick (copy running-config usbflash0). To put the config on the Cisco 2900.
For the original version including any supplementary images or video, visit http://itknowledgeexchange.techtarget.com/itanswers/converting-fron-a-cisco-1841-router-to-a-cisco-2900-router/

The firms senior vice president for public sector, Patrick Finn, told Nextgov that increasing numbers of rogue partners pretend to posses Cisco accreditation but are in fact selling bogus software and hardware. Undercover investigators from the US Government Accountability Office are said to have uncovered 40 quotes for counterfeit parts from online retailers based in China after placing orders for electronics between August 2011 and February 2012. Cisco has a whole section of its partner site devoted to such matters, including a case study example of a reseller who purchased 40 Cisco 1841 Integrated Services Routers from a broker and sold them on to a government department using the official channels. However, the department was not satisfied with the provenance of the kit, as Cisco explains : Cisco traced the serial numbers to the original routers, two of which were installed in a clients network in Asia Pacific. Cisco Brand Protection team members photographed the serial numbers of the original routers and provided this evidence to the government department. After further investigation, it was found that the 40 Cisco 1841 Integrated Services Routers had been illegally modified to a Security (K9) bundle, which costs twice the price of a standard version. Market watcher IHS iSuppli reported last month that the number of high risk suppliers selling counterfeit tech products to US government and other customers has grown by two thirds since 2002. Although the analyst admitted it is difficult to pinpoint the origin of parts, given that key markings are often falsified, China and the US were fingered as the top two locations for suppliers engaged in dodgy dealings. Last year was a record one for fake parts, with 1363 counterfeit incidents reported by iSuppli.
For the original version including any supplementary images or video, visit http://www.theregister.co.uk/2012/11/29/cisco_counterfeit_items_china/

Coming soon: Wireless Cisco multi-function router

Theres no reason to not do it, Kerravala said during an interview, adding he predicts Cisco may also add Wide Area File Services (WAFS) technology http://www.prodec.co.uk/products/hp-proliant-bl490c-g7-603599r-b21-blade-server-refurbished-1-x-intel-xeon-x5670-293ghz which is designed to reduce the amount of time it takes to access and save files over wide-area networks - to the ISR routers. The ISR series is aimed at small to mid-sized firms, and at large enterprises operating branch offices. Cisco officials would not say when the company plans to launch a wireless version of ISR or what the product will be named, nor would they release other details. The ISR family includes: the 1841 Router, aimed at small to mid-sized organizations, which has intrusion prevention, firewall and virtual private networking capability; the 2800 series, which supports both security functions and voice over Internet Protocol (VoIP), and targets mid-sized businesses and large organizations operating branch offices; and the 3800 series, which supports security, VoIP and power over Ethernet. Since it was launched last fall, the ISR series has accounted for about 60 per cent of Ciscos edge router sales, Cisco Canadas vice-president for channel operations, Steve Simmons, said during a media briefing Monday. With ISR, its the fastest ramp-up of any product weve ever had, said John Chambers, Ciscos president and chief executive officer, who made his remarks during Tuesdays general session. Chambers said a big question for Cisco and its partners is how to design voice, video and data networking products tailored to the small and medium-sized business (SMB) market, which for Cisco is growing more quickly than the enterprise and service provider markets. He added vendors need to sell products designed to solve business problems for specific industries such as retail and health care rather than products designed only with a function in mind, such as storage, security or wireless.
For the original version including any supplementary images or video, visit http://www.itbusiness.ca/news/coming-soon-wireless-cisco-multi-function-router/5553

February 24 2014

tannerigor

Coming Soon: Wireless Cisco Multi-function Router

Cisco officials would not say when the company plans to launch a wireless version of ISR or what the product will be named, nor would they release other details. The ISR family includes: the 1841 Router, aimed at small to mid-sized organizations, which has intrusion prevention, firewall and virtual private networking capability; the 2800 series, which supports both security functions and voice over Internet Protocol (VoIP), and targets mid-sized businesses and large organizations operating branch offices; and the 3800 series, which supports security, VoIP and power over Ethernet. Since it was launched last fall, the ISR series has accounted for about 60 per cent of Ciscos edge router sales, Cisco Canadas vice-president for channel operations, Steve Simmons, said during a media briefing Monday. With ISR, its the fastest ramp-up of any product weve ever had, said John Chambers, Ciscos president and chief executive officer, who made his remarks during Tuesdays general session. Chambers said a big question for Cisco and its partners is how to design voice, video and data networking products tailored to the small and medium-sized business (SMB) market, which for Cisco is growing more quickly than the enterprise and service provider markets.
For the original version including any supplementary images or video, visit http://www.itbusiness.ca/news/coming-soon-wireless-cisco-multi-function-router/5553

Cisco brings multifunction router to the masses

The networking giant's ISR router series is designed to run simultaneous services such as data, security and quality of service (QoS) at wire speed in one integrated routing platform. The 800 and 1800 lines are intended to extend those capabilities to smaller organizations. The new 1800 managed eight-port switch, intended for enterprise branch offices, offers http://www.prodec.co.uk/products/hp-bluetooth-adapter virtual LAN (vLAN) capabilities and power over Ethernet (PoE). It has onboard security features such as a firewall, intrusion protection, VPN and Network Access Control (NAC).
For the original version including any supplementary images or video, visit http://searchnetworking.techtarget.com/news/1084441/Cisco-brings-multifunction-router-to-the-masses

Cisco 1841 and 2610XM ADSL help

I have installed a 64k diginet line at my site and at the other site. I have purchased 2 x 1841 Ciso routers one for me one for the other site. I now need to setup and connect the two together and thats where it becomes grey and blurry. The 1841 has a serial port connected to the NTU. The other company has given me their ip address that my router on their side will connect to and told me to setup the router first and then ship it down to them. So I need to know what needs to be done this side from IP addressing and Ethernet and serial setup.
For the original version including any supplementary images or video, visit http://mybroadband.co.za/vb/showthread.php/181242-Cisco-1841-amp-Diginet-Setup

Cisco 1841 & Diginet Setup

I cannot seem to get either of them connecting. I have tried everything and just end up landing right where I began. I have looked at previous posts put up and non of them help. The 2610XM has ios: c2600-adventerprisek9-mz.124-7 The 1841 has: c1841-advipservicesk9-mz.124-12 I know my line is fine since I can browse the net via my standard Telkom router. My config looks like this: interface FastEthernet0/0
For the original version including any supplementary images or video, visit http://mybroadband.co.za/vb/showthread.php/76739-Cisco-1841-and-2610XM-ADSL-help

February 14 2014

tannerigor

Cisco Reseller Lists Top Five Lead Time Replacements

Cisco Systems Cisco Catalyst 2960G-48TC Switch

It can be purchased on the secondary market for up to 90% off the price of the newer 2960G. Also, used 2960G models are readily available on the secondary market, the reseller reports; Cisco's 7204VXR router for the 3845 Integrated Services Router + NM-1T3/E3: The 7204VXR is ancient yet delivers comparable performance to the 3845, NHR says. It, too, can be had for up to 90% less than the cost of a new 3845. Plus, the 7204VXR has "greater modularity and configuration flexibility" than the 3845, the reseller states; A previous generation 3745 ISR for the 3825 ISR: Again, it performs "similarly" to the 3825 for "most applications," NHR says. The 3745 accepts cards from the 3825 and can be purchased for more than half the cost of "the latest generation gear," the reseller says. Does that mean greater than 50% of the price, or less than 50% of the price? One caveat: the 3745 has reached end-of-sale status, but NHR says Cisco should still support it for another five years.
For the original version including any supplementary images or video, visit http://www.networkworld.com/community/blog/cisco-reseller-lists-top-five-lead-time-repla

Juniper EX4200 or Cisco Catalyst 3750 Series Switch? ? Results from Great Lakes Computer?s Juniper University Series

googlecse Juniper EX4200 or Cisco Catalyst 3750 Series Switch? Results from Great Lakes Computers Juniper University Series Great Lakes Computer, a 24-year-old billion dollar Elite Juniper Networks reseller, published its results from a side by side comparison between Junipers EX4200 switch and Ciscos 3750 series Catalyst switches. Grand Rapids, MI (PRWEB) July 26, 2010 Great Lakes Computer, a 24-year-old billion dollar Elite Juniper Networks reseller, published its results from a side by side comparison between Junipers EX4200 switch and Ciscos 3750 series Catalyst switches. Juniper University is a monthly series of side by side comparisons of Juniper products to their Cisco counterparts. This is Great Lakes Computers third installment of their Juniper University series. 2010 Juniper University Course Schedule: May 19th - Juniper SRX vs Cisco ASA June 15th - Juniper EX2200 vs Cisco Catalyst 2960G July 20th - Juniper EX4200 vs Cisco Catalyst 3750G August 17th - Juniper EX3200 vs Cisco Catalyst 3560G September 21st - Juniper EX8200 vs Cisco Catalyst 6500 October 19th - Juniper SRX for the branch vs Legacy Cisco 3 box architecture November 16th - Juniper JUNOS vs Cisco IOS December 14th - Juniper J-Care vs Cisco Unified Communications SmartNET GRAND FINALE - A case study of a 100% Juniper network Juniper University: EX4200 vs. Catalyst 3750 The results Layer 3 stackable switch comparison The findings are nothing less than remarkable. With prices starting at under $4,000, Junipers EX4200 line is available in 24 and 48 port 10/100/1000 densities, both PoE and non-PoE.
For the original version including any supplementary images or video, visit http://www.benzinga.com/press-releases/10/07/p393479/juniper-ex4200-or-cisco-catalyst-3750-series-switch-%E2%80%93-results-from-grea

Description Cisco Systems is introducing the intelligent Ethernet Cisco Catalyst 2960G-48TC Switch, a new member of the Cisco Catalyst 2960 Series of fixed-configuration standalone devices that provide desktop... More Cisco Systems Cisco Catalyst 2960G-48TC SwitchCompare Prices Tax & shipping for ZIP code: Condition: See more sellers See less sellers Description Cisco Systems is introducing the intelligent Ethernet Cisco Catalyst 2960G-48TC Switch, a new member of the Cisco Catalyst 2960 Series of fixed-configuration standalone devices that provide desktop Fast Ethernet and Gigabit Ethernet connectivity for entry-level enterprise, mid market, and branch office networks, helping enable enhanced LAN services. The Cisco Catalyst 2960G-48TC Switch accelerates the deployment of Gigabit to the Desktop (GTTD) by providing 48 ports of Gigabit Ethernet in one rack unit (RU) along with integrated security, including Network Admission Control (NAC), as well as advanced quality of service (QoS) and resiliency, delivering intelligent services for the network edge. Specifications
For the original version including any supplementary images or video, visit http://shopping.yahoo.com/19570706-cisco-systems-cisco-catalyst-2960g-48tc-switch/

Cisco Cisco Catalyst 2960g 24tc Switch, Wholesale Cisco Cisco Catalyst 2960g 24tc Switch

You've come to the right place.This page is your Cisco Cisco Catalyst 2960g 24tc Switch one-stop source for the competitive price and quality.If you have a difficulty finding a right supplier. post your Buying Leads for FREE now! Get Listed TooToo is the largest global B2B marketplace. Global Cisco Cisco Catalyst 2960g 24tc Switch buyers find suppliers here ever day.
For the original version including any supplementary images or video, visit http://www.tootoo.com/product/cisco-cisco-catalyst-2960g-24tc-switch.html

February 03 2014

tannerigor

Watchguard Technologies Extends Real-time Network Security Visibility Tool To Microsoft?s Hyper-v Platform

Fortinet Network Security Initiative to Benefit Managed Service Providers

cyberoam-922x201 Veterans through the G.I. Bill. The new educational Green IT framework is expected to help provide employment placement opportunities to Veterans within Managed Security Service Providers (MSSPs) and managed service providers. Trained Network Security Personnel are in High Demand Burning Glass, a company that develops technologies that are used for matching people with jobs, issued a report that found in the past five years, demand for cyber security jobs has grown 3.5x faster than computer jobs and 12x faster than the overall labor market. Furthermore, the report noted that cyber security jobs now make up approximately three percent of all information technology positions and continues to grow READ MORE:
For the original version including any supplementary images or video, visit http://www.mspnews.com/2014/01/31/fortinet-network-security-initiative-to-benefit-managed-service-providers/

The latest update includes faster access and increased scalability with external and shared database support. It also improves visibility with dynamic hostname resolution, and native language support for key countries will be available toward the end of Q1. For complete information on the latest upgrades to Dimension or to test-drive the tool, click here - http://watchguard.com/products/dimension/?vprdim1 About WatchGuard Technologies, Inc. WatchGuard Technologies, Inc. is a global leader of integrated, multi-function business security solutions that intelligently combine industry standard hardware, Best-of-Breed security features, and policy-based management tools. WatchGuard provides easy-to-use, but enterprise-powerful protection to hundreds of thousands of businesses worldwide. WatchGuard products are backed by WatchGuard LiveSecurity Service, an innovative support program. WatchGuard is headquartered in Seattle, Wash.
For the original version including any supplementary images or video, visit http://www.sys-con.com/node/2951522

The top 10 cloud-based security tools to protect your network in a hurry

Not only does it make sure none of the bad stuff gets in, but it also protects any outgoing data. Proofpoint further promises that while it stores that data to prevent data loss, it does not have the keys to decrypt any of the information. Zscaler Zscaler calls its product the Direct to Cloud Network, and like many of these products, boasts that its much easier to deploy and can be much more cost efficient than traditional appliance security. The companys products protect you from advanced persistent threats by monitoring all the traffic that comes in and out of your network as a kind of checkpost in the cloud. But you dont have to filter all that traffic in from one central point.
For the original version including any supplementary images or video, visit http://venturebeat.com/2014/01/30/top-ten-saas-security-tools/

January 23 2014

tannerigor

Palo Alto Update Extends File Visibility, Wildfire Detection

Palo Alto Networks acquires stealthy start-up with NSA roots

"We're segmenting our partner data so we know who is selling Wildfire and we have this long-tail opportunity that when we get the messaging correct, we believe the in-line message will kick off," Myers said. "You can deploy Wildfire behind an existing firewall, whether it is us, Cisco or Fortinet." In a January presentation to investors, Palo Alto said its revenue increased 49 percent year over year, and partners have told CRN that they are replacing some of their customers' legacy firewalls with Palo Alto appliances. The company's competitors are taking notice. In August, Check Point unveiled its ThreatCloud Emulation Service that inspects suspicious files in a sandbox. Fortinet, for its part, is testing its FortiSandbox appliance for file behavioral analysis. FireEye, meanwhile, sells an advanced threat detection platform that uses a virtual sandbox to inspect files. Palo Alto is working on incident response capabilities, and engineers are developing other advanced detection features, according to Myers, who pointed to the company's recent acquisition of Morta Security as key. Partners can put Palo Alto appliances in transparent mode, placing them in tandem with existing firewalls to help highlight differences, said Daniel Payne, CTO of Evansville, Ind.-based Pinnacle Computer Services, a Palo Alto partner.
For the original version including any supplementary images or video, visit http://www.crn.com/news/security/240165468/palo-alto-update-extends-file-visibility-wildfire-detection.htm

Palo Altos http://www.prodec.co.uk/products/hp-xw4600-fl826ut-convertible-mini-tower-workstation-1-x-intel-core-2-duo-e8300-283ghz firewalls support sandboxing technologies to detect zero-day malware. Already an Insider? Sign in Network World - Next-generation firewall maker Palo Alto Networks today announced its first acquisition, an intriguing buyout of a stealthy Mountain View start-up called Morta Security whose founders hail from the NSA. The price of the purchase was not disclosed. Morta that has been in stealth mode since 2012 and describes its founders as executives and engineers from the National Security Agency. CEO Raj Shahsays he worked in the Air Force Reserve supporting the NSA. We have deep experience in protecting our national infrastructure, he says. Rene Bonvanie, chief marketing officer at Palo Alto Networks, says Morta has developed techniques for detecting and remediating malware, and Palo Alto intends to integrate the technology into its next-generation firewall platform either as a cloud service or directly on the Palo Alto firewall platform. Palo Altos firewalls support sandboxing technologies to detect zero-day malware. + Also on NetworkWorld: Juniper vs. Palo Alto Networks -- Firewall court battle set to begin + Palo Alto declined to say much more about Morta, which hasnt yet introduced products publicly. Morta technologies will show up in our product soon, according to Bonvanie.
For the original version including any supplementary images or video, visit http://www.networkworld.com/news/2014/010614-palo-alto-networks-acquires-stealthy-277402.html

January 18 2014

tannerigor

Juniper Networks Vs. Palo Alto Networks

U.S. Patent No. 7,107,612 - Describes approaches for dynamically generating rules based on data received by a network instead of using a fixed set of rules. The key term at issue in this patent is "rule." While Juniper offers no construction, Palo Alto proposes to construe the term as "a policy for filtering packets across multiple sessions, as distinct from a lookup table." This is not surprising since such a definition would narrow the claim and specifically exclude a lookup table from the claim's scope. Juniper counters with Palo Alto's own expert's admission that rules are just another general data structure and can be stored in a hash table. U.S. Patent No. 6,772,347 - Describes efficient packet filtering in a firewall by initially denying or allowing packets using access control list engine and sorting them accordingly by either allowing to pass or finally denying . The key term in dispute in the '347 patent is "sorting packets into initially denied packets." Juniper believes no construction is necessary, while Palo Alto proposes the term to mean: "applying rules to make a first determination that identifies packets to be dropped." Palo Alto bases its argument on the patent specification which discloses the initial denial by the ACL engine as the identification of packets to be initially denied. However, no packets are dropped during that phase, but in fact proceed to a dynamic filter which allows some of the initially denied packets to pass through the firewall. Packets are "dropped" only after they've been sorted during the second phase.
For the original version including any supplementary images or video, visit http://seekingalpha.com/article/1819652-juniper-networks-vs-palo-alto-networks

Juniper vs. Palo Alto Networks: Firewall court battle set to begin

Juniper is seeking an injunction to bar firewall sales by Palo Alto and possibly reap monetary damages as well. Palo Alto declined to talk about the lawsuit, and sources at Juniper spoke only on background. But the Juniper lawsuit, which commenced as legal filings two years ago and is now expected to go to a jury trial in Wilmington, Del., speaks for itself. Already an Insider? Sign in Network World - Call it the fist fight over firewalls for 2014. Juniper Networks is going for a knock-out against rival Palo Alto Networks in a patent-dispute lawsuit related to next-generation firewalls that's set to go to trial in Delaware in February. And Palo Alto wants to Unified Communications take out Juniper in its own separate patent lawsuit. Juniper alleges that Palo Altos firewalls are based on intellectual property that Juniper gained in its $4 billion acquisition of NetScreen in 2004, and that this technology was developed by Nir Zuk, the former CTO at NetScreen, and Yuming Mao, a former engineering architect there. Later, Zuk and Mao went off to found Palo Alto, a maker of application-aware, or next-generation, firewalls.
For the original version including any supplementary images or video, visit http://www.networkworld.com/news/2013/121913-juniper-palo-alto-277090.html

Network Innovation Award: Palo Alto Networks next-generation firewalls

On the networking side you expect firewalls to take modern networking protocols; for example, dynamic routing protocols. When you are part of the network you have to speak the language of the network and communicate with routers and switches. This is unique for a firewall from all of the other security devices. Palo Alto recently expanded its virtualization firewall offering. How do virtual and physical firewalls differ -- and where must they be the same? Zuk:The main reason you need a virtualization firewall is that you can't see inside [a virtual environment] with a physical device. So if you have a SaaS provider that doesn't allow you to deploy physical devices on the network, you would deploy a virtual firewall there. The way virtualized data centers are built, traffic only goes from one rack to another. The [virtualization] firewall monitors traffic running between virtual machines.
For the original version including any supplementary images or video, visit http://searchnetworking.techtarget.com/news/2240179694/Network-Innovation-Award-Palo-Alto-next-generation-firewalls

January 14 2014

tannerigor

Palo Alto Networks (nyse: Panw) Stock Latest To Jump After Major Cyber Deal

VMware adds NSX firewall integration with Palo Alto Networks

Santa Clara, Calif.-headquartered Palo Alto Networks Inc. (NYSE: PANW ) acquired Silicon Valley startup Morta Security, described as "operating in stealth mode since 2012." Financial terms of the transaction were not disclosed. PANW stock rose 3.7% Tuesday on the news. The post Palo Alto Networks (NYSE: PANW) Stock Latest to Jump After Major Cyber Deal appeared first on Money Morning - Only the News You Can Profit From .
For the original version including any supplementary images or video, visit http://markets.financialcontent.com/stocks/news/read/26079053/Palo_Alto_Networks_

So when you browse the Internet, [the firewall] is making sure you don't go to sites you're not supposed to go and that the content that comes in is not going to harm you. The second option is to allow the application to go through without checking the traffic. The third option is to use a next-generation firewall. With that option, you are safely enabling the use of applications. So you set policy based upon application type? Zuk:What you do for each application is to mirror your email policy. You decide what applications users can access, what they can do with the application and what kind of content can they send.
For the original version including any supplementary images or video, visit http://searchnetworking.techtarget.com/news/2240179694/Network-Innovation-Award-Palo-Alto-next-generation-firewalls

Network Innovation Award: Palo Alto Networks next-generation firewalls

The combined technologies bring automated, advanced security features and visibility to virtual network overlays. The NSX firewall integration includes Palo Alto's Panorama firewall management software and its VM Series of virtual firewalls . "We're going down the road of network virtualization and software-defined networks -- and integrating them now with security is important ," said John Kindervag, principal analyst for Cambridge, Legacy Systems Mass.-based Forrester Research Inc. "Too many people are thinking about the networking part of [SDN] and not the security part." VMware NSX firewall integration: Automated virtual network security When VMware NSX connects with Panorama, it can automatically insert Palo Alto's virtual firewalls on all the server hosts connected to the virtual network. "Panorama will register itself and show up as a service on NSX," said Danelle Au, director of solutions marketing at Santa Clara, Calif.-based Palo Alto . "NSX will then take a copy of [Palo Alto's] VM Series and deploy it on every ESXi server. The VM Series will boot up and go to Panorama to retrieve all its licensing, configuration and policy." The NSX firewall integration assures the automatic application of security policies to virtual machines and the sharing of contextual information about those virtual machines with Panorama so that the proper security policies are applied to each application running on a physical host. Context is essential to securing virtual networks, which have been opaque to firewalls and other network security appliances in the past. "If you don't have context, you can't make good policy decisions," Kindervag said. "You need a multiplicity of data points to understand what's happening on the network, and whether you should allow that traffic or not." The integration also streamlines operations through automation.
For the original version including any supplementary images or video, visit http://searchsdn.techtarget.com/news/2240210076/VMware-adds-NSX-firewall-integration-with-Palo-Alto-Networks

January 07 2014

tannerigor

Hp?s Low-cost, No-fuss Starter Server: Proliant Microserver Gen8

HP ProLiant MicroServer Gen8 in pictures

The switch has enough smarts to detect and list all MicroServers on its network, so administrators dont have to hop from iLO to iLO to manage them; they just click the name of the server they want to work on from within the switchs browser-based management interface. For larger offices, you can connect several switches, but theres also a $429 24 port model (it doesnt fit on top of the MicroServer, though). Both switches are covered by HPs enhanced lifetime warranty, which includes three years of 24/7 phone support. You get a year of warranty coverage on the server, and can purchase more if you like. Hardware maintenance is mainly tool-free; HP includes the one tool you need to help you extract the motherboard if need be. A couple of thumbscrews secure the case, and most components are easily accessible and pop in and out easily but are not hot swappable. If a disk fails, you turn the server off before changing it. Theres also only one power supply; this is not a server for high availability applications which need redundant components! Server setup is simple and quick plug in network cables and power, and turn it on. HPs Intelligent Provisioning tools make initial configuration easy, and integrated management tools let the admin, whether onsite or remote, keep the MicroServer humming.
For the original version including any supplementary images or video, visit http://www.theglobeandmail.com/technology/gadgets-and-gear/gadgets/hps-low-cost-no-fuss-starter-server-proliant-microserver-gen8/article14000586/

HP previews ProLiant Gen8 servers

HP Figure 2 This includes a step where all appropriate drivers for HP hardware will be downloaded and installed with full support for the selected OS. This completely eliminates the frustration of not having the proper driver loaded or available when performing a new installation. Other boot-time configuration options include iLO 4 by pressing F8 and a wizard-based tool to configure local storage. Figure 3 iLO 4 keeps a wide range of information about your server in persistent logs available for your perusal (see Figure 3). You'll need the Advanced license to view some of the information such as a power meter graph like the one in Figure 4. HP sells the advanced licenses in single, multiple or enterprise versions.
For the original version including any supplementary images or video, visit http://www.serverwatch.com/server-reviews/server-review-hp-proliant-bl460c-gen8-blade-server.html

Server Review: HP ProLiant BL460c Gen8 Blade Server

HP ProLiant BL460c Gen8 Blade Server - Figure 1 Because it could not talk much about server feeds and speeds, HP's top brass talked about an array of management technologies that have been developed for the past two years under a $300m series of engineering efforts to revamp its server lines. The ProLiant Gen8 machines were "Project Voyager", and the main goal was to make servers a lot easier to manage and to give them substantially more I/O and storage bandwidth. The Gen8 machines will support PCI-Express 3.0 peripheral slots as everyone expects the Xeon E5 machines to but they will also sport new HP SmartArray disk controllers that are tuned for solid state disks and to offer more secure three-disk mirroring as well as tweaks in the memory modules that will let them run 25 per cent faster than other platforms while at the same time correcting for common memory errors. The Project Voyager effort sits alongside Project Moonshot, the low-energy server effort that HP announced back in early November, and Project Odyssey, revealed later that month, that will bring the Xeon processors from Intel to the Integrity and Superdome 2 classes of Itanium-based machines, while at the same time goosing Linux and Windows to be more HP-UX-like. HP is not, however, abandoning its Itanium-based Integrity and Superdome machines, nor is it abandoning HP-UX. So don't get the wrong idea. But it is conceding that some customers want the attributes of an HP-UX system but with commodity hardware and software. http://www.prodec.co.uk/products/hp-storageworks-lto-ultrium-960-tape-drive Add these three projects up, and HP is shelling out $300m over two years of development. The ProLiant Gen8 machines, HP says, incorporate over 150 new features that were driven by customer requirements. Mark Potter, general manager of the Industry Standard Servers and Software division at HP, said during a webcast previewing the Gen8 boxes that the company has applied for over 900 patents relating to the new technology it has developed.
For the original version including any supplementary images or video, visit http://www.theregister.co.uk/2012/02/14/hp_proliant_gen8_preview/

The breadth of responses shows how versatile HP's line of ProLiant MicroServers are, and the latest version, the Gen8, just ups the game once again. We received our HP ProLiant Microserver Gen8 today and while we haven't had time to test it out yet, we did manage to snap a lot of photos of this beauty. The first thing you'll notice is the size: This small cube can fit practically anywhere in your home or office and never be observed. Indeed, we did power the box up and couldn't even hear the fans over our main watercooled workstation.
For the original version including any supplementary images or video, visit http://www.neowin.net/news/hp-proliant-microserver-gen8-in-pictures

January 01 2014

tannerigor

The Future Of Network Security

2014: The year network security operations become orchestrated

Sign in Network World - Enterprise connectivity is exploding, driven by globalization, convergence , virtualization and social computing. As corporate perimeters dissolve, the security focus switches towards application and data-level security solutions. The question to ask is what are the longer-term implications for network security? Will it become redundant or could it grow more powerful?
For the original version including any supplementary images or video, visit http://www.networkworld.com/columnists/2008/013008-jericho-network-security.html

BeyondTrust Releases Network Security Scanner With Unlimited Vulnerability Assessment And Compliance Reporting

IT Pros Guide to Data Protection: Top 5 Tips to Securing Data in the Modern Organization As such, firewalls have become the natural focal point for network layer orchestration. Orchestration significantly automates painful manual security policy change processes while preserving governance and control over the process, which is absolutely crucial for security-related changes. In addition, orchestration provides the capacity to automatically provision changes to relevant devices and systems such as applications and servers that require current and accurate security policies. Additionally, if you look at the broad orchestration-related announcements made in 2013, it's safe to assume that my prediction will play out, as these platforms become embraced and validated in production environments in 2014. This will create a healthy balance between business units, some of which may have already been automated. So when I predict that orchestration will drive the business forward, that is not lip service. In fact, the benefits have already been identified and are clearly quantifiable . This segues into my second prediction: that in 2014, security ops will converge with IT ops to the point where they no longer exist as separate entities. This convergence is already underway. A recent survey of 502 IT executives revealed that 71 percent had to adopt new processes, learn new technologies and interact with new people because of trends like Cloud, IPv6, DevOps and virtualization. Fifty-five percent reported that new business initiatives now require security's input, and almost one third reported that they require data from new stakeholders in order to design proper security policies. As a result, security teams are engaging IT Ops teams earlier and much more often. As organizations continue to virtualize their infrastructure, these groups do more then engage they will merge. I expect to see that happen en masse in 2014. As this occurs, my third prediction will then come into play the rise of application infrastructure managers.
For the original version including any supplementary images or video, visit http://www.scmagazine.com/2014-the-year-network-security-operations-become-orchestrated/article/326683/

Now, IT professionals responsible for such critical areas as servers, desktops, virtualization and databases can quickly and easily assess their focus area for vulnerabilities. Learn more about the entire family of Retina vulnerability management solutions during this two-minute video: https://vimeo.com/76358645 About BeyondTrust BeyondTrust is the leading security solution vendor providing Context-Aware Security Intelligence, giving customers the visibility and controls necessary to reduce their IT security risks, while at the same time simplifying their compliance reporting. BeyondTrust offers consistent policy-driven vulnerability and privilege management, role-based access control, monitoring, logging, auditing and reporting to protect internal assets from the inside out. The company's products empower IT governance to strengthen security, improve productivity, drive compliance, and reduce expense across physical, virtual, mobile and cloud environments.
For the original version including any supplementary images or video, visit http://www.darkreading.com/intrusion-prevention/beyondtrust-releases-network-security-sc/240162384

The Practice of Network Security Monitoring, review: A hands-on guidebook

nsm-book-left This book is most useful if you plan to use the recommended tools to monitor your network, but the approach applies to other tools as well. And the principles Bejtlich outlines for running your security monitoring are the kind of best practice you should apply to any important server. Since security is more about process than technology and every network is different, Bejtlich shows you how to analyse your network to find out where to do your monitoring, either with port analysis and mirroring or a hardware network tap, and how to specify the server that will do the monitoring. His suggestion for monitoring tools starts with Security Onion , a network security monitoring suite built on Ubuntu, but he covers a range of tools that work with it for analysing information further. For Windows admins, he suggests getting used to Linux. Fully covering tools like Microsoft's Network Monitor would be outside the scope of the book, but it would have been useful to include a discussion of what comparable tools are available on other platforms (Wireshark is just as useful if you're running network monitoring from Windows, for example). The conclusion does mention two cloud network security monitoring options, ThreatStack and PacketLoop , although only briefly. Plenty of books explain how to set up your network (the advice here concentrates on designing your security process), but few concentrate on what to do when the intruders arrive. Here the author walks you through what your monitoring tools will show you when you're attacked over the network, or through applications like email and web browsers. In one example, a tweet is sent with a web link that installs Java and exploits a Java vulnerability to install a keylogger, capture passwords and infect Green IT a second system.
For the original version including any supplementary images or video, visit http://www.zdnet.com/the-practice-of-network-security-monitoring-review-a-hands-on-guidebook-7000020593/

December 28 2013

tannerigor

Palo Alto Networks Extends Next-generation Firewall Visibility And Control To Enterprise Branch Offices And Apple Devices

Top 3 Myths about Big Data Security: Debunking common misconceptions about big data security ebook "We're looking to Palo Alto Networks to possibly help us with this challenge as they can seamlessly extend our existing user-specific policies to the recent influx of Apple products on our networks." WildFire- Controlling Modern Malware With the introduction of WildFire, customers can extend the capabilities of all of their Palo Alto Networks next-generation firewalls to addresses the challenge of modern malware, which is often targeted, unknown, highly evasive and network enabled. This latest innovation to Palo Alto Networks' industry-acclaimed next-generation firewalls identifies unknown malicious files by directly and automatically executing them in a virtual cloud-based environment to expose malicious behavior even if the malware has never been seen in the wild before. For malicious files, Palo Alto Networks automatically generates new signatures that are distributed with regular signature updates, and provides the user with actionable analysis of exactly how the malware behaves, who was targeted and the application that delivered the threat. By tightly integrating the firewall with the cloud-based analysis engine, WildFire significantly reduces the time-to-protection for all customers, and makes this critical new protection accessible to any enterprise. "Our approach to modern malware is the latest example of how we question conventional network security approaches until we've developed a better way of addressing the problem," said Nir Zuk, founder and CTO of Palo Alto Networks. "Combining prior technical contributions such as sandboxing technology and cloud-based malware analysis with the unprecedented capabilities of a next-generation firewall has resulted in innovation that enterprises can feasibly deploy throughout their networks." Availability Palo Alto Networks PA-200, GlobalProtect, and WildFire are all available immediately. PAN-OS 4.1 is a free upgrade for customers on maintenance. For more information on pricing for Palo Alto Networks PA-200, WildFire, and GlobalProtect, contact your local reseller or visit http://www.paloaltonetworks.com. About Palo Alto Networks Palo Alto Networks(TM) is the network security company. Its next-generation firewalls enable unprecedented visibility and granular policy control of applications and content - by user, not just IP address - at up to 20Gbps with no performance degradation.
For the original version including any supplementary images or video, visit http://www.darkreading.com/perimeter/palo-alto-networks-extends-next-generati/231902494

Palo Alto Networks Introduces SafeSwitch for Sourcefire

Additionally, the WildFire capability adds malware-fighting capabilities to the firewall. As a general rule, enterprises deploy best-practices network security at the company headquarters, but compensate by reducing costs when it comes to securing the branch office and remote users, according to Chris King, director of product marketing at Palo Alto Networks. The branch office often deploys security products designed for small and midsized businesses in order to get "the best security available for a certain price," King told eWEEK. Remote users most often have limited security protection, often limited to just endpoint security products such as an antivirus tool, he said. For most organizations, the only ways to secure the network is to either divert all traffic back to headquarters for proper scanning first or "go cheap" on security, King said. Considering very few organizations have a large swathe of employees and other types of enterprise users working within headquarters, the goal was to extend the "exact same security experience" to the branch office, King said. The PA-200 allows the IT team to have the same firewall protection across all branch offices without breaking the bank, according to King. The company also announced a new version of its GlobalProtect remote access technology to protect remote users running Mac OS X and iOS devices. GlobalProtect, which already supported Microsoft Windows devices, protects remote users with the same policies and controls that are being applied back at the corporate office, according to King. The auto-firewall is "just on," so users don't have to think about turning it on or checking to see what it's doing, King said. The iOS version of GlobalProtect is not a new application, so Palo Alto Networks doesn't have to wait on Apple to approve it, according to King.
For the original version including any supplementary images or video, visit http://www.channelinsider.com/c/a/Security/Palo-Alto-Networks-Extends-Network-Security-to-Branch-Office-352723/

Palo Alto Networks Launches Branch-Office Security Solution

The core of the Palo Alto Networks platform is its Next-Generation Firewall, which delivers application, user, and content visibility and control integrated within the firewall through its proprietary hardware and software architecture. Palo Alto Networks products and services can address a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and a growing number of mobile devices. Palo Alto Networks products http://www.prodec.co.uk/products/hp-storageworks-286810-b21-232-edge-fibre-channel-switch are used by more than 12,500 customers in over 100 countries. For more information, visit www.paloaltonetworks.com . * For details, contact your reseller.
For the original version including any supplementary images or video, visit http://finance.yahoo.com/news/palo-alto-networks-introduces-safeswitch-120000892.html

December 24 2013

tannerigor

Reliance 3g Bond Risk Tumbling As Loans Fund License Binge: India Credit

need to persuade lenders they can repay almost 1 trillion rupees ($22 billion) of debt after bidding twice as much as the government projected for third-generation mobile phone licenses. Reliance Communications bond risk reached 766 basis points on June 8, a level comparable with that of European phone companies when they loaded up on debt to pay $100 billion for permits to offer faster services. The company is witnessing a revival in its mobile services business, said Piyush Choudhary , an analyst at Indiabulls Securities Ltd. in Mumbai. Reliance Communications cash-flow ability is expected to improve since the peak capital expenditure cycle is behind it. Credit-default swaps insuring Reliance Communications debt dropped three basis points to 411 basis points as of Oct. 12, CMA prices show. Default Swaps A decade ago, France Telecom SA and Deutsche Telekom AG bid so aggressively for European 3G licenses that they reported record losses.
For the original version including any supplementary images or video, visit http://www.bloomberg.com/news/2010-10-12/reliance-3g-bond-risk-tumbling-as-loans-fund-license-binge-india-credit.html

Philippines opens up to 3G networks

This year, we extensively worked on our 3G offering. Globe has successfully completed its first 3G video calls in July and has complied with all the NTC's 3G requirements by October," said Globe Telecom's senior vice president for corporate and regulatory affairs Rodolfo Salalima. Not to be beaten on optimism, SMART Chief Executive Napoleon Nazareno said, "We have been testing a number of 3G cell sites and can now service customers on a trial basis in Metro Manila and Metro Cebu. What's more, we have already ordered the network facilities needed to establish nationwide 3G coverage at the shortest possible time. "We will repeat the rapid roll-out that we accomplished in deploying first our analog and then our GSM network infrastructures.
For the original version including any supplementary images or video, visit http://phys.org/news9436.html

Mushroom Networks' Innovative Streamer? Offers Live, High-Quality Webcasting Over Bonded Internet Connections

Using bonding technology that is optimized to stream video to web via aggregated 3G/4G wireless data cards, Streamer allows webcasters to simply plug in the encoded video and audio feed from their encoder or video switcher (such as Flash Media Live Encoder on a laptop, Wirecast, Tricaster and TouchStream), add the USB modem cellular air cards to the Streamer and start streaming video to web. The wireless data cards provide support for higher quality video settings, such as higher resolution and higher frame rate, as well as unmatched, professional grade reliability. "Streamer is designed for video professionals who already have a streaming system that uses wired Internet and related processes in place," Akin said. "Streamer simply replaces the wired Internet connectivity in their existing streaming setup. In other words, they keep their encoder and video server/CDN setup and configuration exactly as it is and simply slide in the Streamer solution as the Internet connection which is optimized for live video streaming." With Streamer, webcasters have the option to mix and match wireless services from any provider creating built-in redundancy to assure near 100 percent reliability, even if some of the broadband links fail during the live stream.And when not in use for streaming live content, Streamer serves as a traditional Broadband Bonding device, delivering extremely fast broadband service to access the Internet from the office, home or while traveling. Starting at just 1.3 pounds, Streamer is extremely portable, delivering a flexible option to anyone in need of creating and distributing live content while on the road, such as broadcasters and bloggers covering special events, non-profit organizations reaching across the globe, or even media firms covering tradeshows from the floor. Streamer comes standard with up to eight USB ports, one RJ-45 Ethernet connector, a built-in http://www.prodec.co.uk/products/avaya-4624-ip-telephone WiFi, built-in rechargeable battery option, support for most common video streaming protocols and video servers. For more information, call 858-452-1032 or visit http://www.mushroomnetworks.com . About Mushroom Networks Mushroom Networks, Inc., is a privately held company based in San Diego, CA, providing patent pending Broadband Bonding solutions to a range of Internet connection applications.
For the original version including any supplementary images or video, visit http://www.reuters.com/article/2013/10/09/ca-mushroomnetworks-idUSnPNCG94697+1e0+PRN20131009

Hands on ... Prodec Bonded 3G

Prodec Bonded 3G Friday 4 May 2012 It is surprising, at least to a wired-up suburbanite like me, that broadband still reaches only 61% of Scottish homes. It is surprising, at least to a wired-up suburbanite like me, that broadband still reaches only 61% of Scottish homes. Custom byline text: It's not just a rural problem. A straw poll of my colleagues revealed poor souls within the Glasgow postcode area who can't get broadband because they're too far from the telephone exchange. Poor internet infrastructure can be a real problem for businesses too, especially as more and more essential services and government forms go online. Loading article content Prodec Networks offers a solution that could bring high-speed broadband to even the most remote locations. Their system, known as Bonded 3G, combines signals from several mobile phone networks to provide a single, high-speed connection to the web. By bonding up to six mobile channels, the system promises maximum speeds of 42Mbps that's five times faster than most home broadband connections. I tested their smaller, three-network system which has a top speed of 21Mbps. Set-up of the unit is straightforward. There are just two connections: power, which can come from a mains outlet or 12V battery, and LAN, which can plug into an office network or directly into a single computer.
For the original version including any supplementary images or video, visit http://www.heraldscotland.com/life-style/technology/hands-on-prodec-bonded-3g.1336183504

tannerigor

Cisco's Sliding But Still Dominates Routers

Cisco takes aim at fakers with anti-piracy tool

ENP takes a look. By Paul Rubens | Feb 28, 2005 If you play word association with a network administrator and say "router," the chances are pretty high that the response you get back will be "Cisco." This doesn't reflect a lack of imagination on the part of NAs, it's just that Cisco Systems has a vast share of the router market about 58 per cent according to San Jose, CA-based research house Infonetics. Cisco, also based in San Jose, addresses the SOHO market with its Linksys division, and the SMB, enterprise and service provider markets with its bewildering range of Cisco products. Although Cisco's share of the overall router market has been falling sharply over the last 12 months no doubt to the delight of rival Juniper Networks Cisco still the lion's share of the enterprise router market, which Juniper has as yet failed to penetrate significantly. Also on Cisco at ENP RSA: Cisco Revs Its Security Offerings In the enterprise space the models that matter cater for branch and head offices which effectively means the new 1800, 2800, and 3800 series Integrated Services Routers (ISRs) in branches and the 7200 series routers at head office. The new branch office routers build on the older and perhaps more familiar 1700, 2600, and 3700 series multiservice access routers, but have been redesigned from the ground up, with the result that they are both cheaper and offer higher performance than their predecessors. As the name suggests, the integrated services routers offer a range of services built in to the router, including telephony and call processing (except in the 1800) and security management including hardware encryption acceleration, IPSec VPN, and URL filtering. Most importantly, all these extra services can be switched on without having a negative impact on the underlying performance of the router itself all services can operate while the router is forwarding packets at line speed, Cisco claims. "In the past, services have been rolled out at head offices, but many companies now want to push out these services Shortel to branches," says Neil Walker, a Cisco Systems router product manager.
For the original version including any supplementary images or video, visit http://www.enterprisenetworkingplanet.com/netsysm/article.php/3486211/Ciscos-Sliding-But-Still-Dominates-Routers.htm

The firms senior vice president for public sector, Patrick Finn, told Nextgov that increasing numbers of rogue partners pretend to posses Cisco accreditation but are in fact selling bogus software and hardware. Undercover investigators from the US Government Accountability Office are said to have uncovered 40 quotes for counterfeit parts from online retailers based in China after placing orders for electronics between August 2011 and February 2012. Cisco has a whole section of its partner site devoted to such matters, including a case study example of a reseller who purchased 40 Cisco 1841 Integrated Services Routers from a broker and sold them on to a government department using the official channels. However, the department was not satisfied with the provenance of the kit, as Cisco explains : Cisco traced the serial numbers to the original routers, two of which were installed in a clients network in Asia Pacific. Cisco Brand Protection team members photographed the serial numbers of the original routers and provided this evidence to the government department.
For the original version including any supplementary images or video, visit http://www.theregister.co.uk/2012/11/29/cisco_counterfeit_items_china/

Brand New CISCO1841 CISCO 1841 Router

Brand New CISCO1841 CISCO 1841 Router It has onboard security features such as a firewall, intrusion protection, VPN and Network Access Control (NAC). Plus with embedded hardware acceleration, it's between three and four times faster than the original 1841 modular ISR. Integrated DSL modems are standard on the 1801, 1802 and 1803 models, while the 1811 and 1812 devices offer dual Ethernet with analog modem or ISDN backup for DSL, cable and metro Ethernet uplinks. It retails starting at $1,295. Paulette Altmaier, vice president and general manager of Cisco's premises communications Requires Free Membership to View TechTarget and its partners. Privacy Policy Terms of Use .
For the original version including any supplementary images or video, visit http://searchnetworking.techtarget.com/news/1084441/Cisco-brings-multifunction-router-to-the-masses

Cisco brings multifunction router to the masses

Name Please click the button below to pay for buyers info! Tel(work) Please click the button below to pay for buyers info! IP Address China Content Is it true that cisco is offering free g-bics to china? I\'m interested in purchasing from you but want to make sure they are not fake. If cisco gives them away, then i figure they are all real. Please let me know if china now gets free cisco g-bics. thanks
For the original version including any supplementary images or video, visit http://www.tootoo.com/idetail/brand-new-cisco1841-cisco-1841-router_1495388_427368_5915344_1/

December 20 2013

tannerigor

Mushroom Networks Unveils Streamer 3g/4g Bonding Device

The service allows users to seamlessly stream live, high-quality video to the Web from practically anywhere. Webcasters get the option to mix and match wireless service from any provider creating built-in redundancy that delivers 100 percent reliability, even if some of the broadband links fail during the live stream. When not in use for streaming live content, Streamer serves as a traditional Broadband Bonding device, which can deliver fast broadband service to access Internet from the office, home or while traveling. Weighing only 1.3 pounds, the 3G/4G bonding device is highly portable and can be used in all challenging scenarios that require creating and distributing live content while on the road, such as broadcasters and bloggers covering special events, non-profit organizations reaching across the globe, or even media firms covering tradeshows from the floor. Streamer comes standard with up to eight USB ports, one RJ-45 Ethernet connector, a built-in WiFi( News - Alert ), built-in rechargeable battery option, support for most common video streaming protocols and video servers. Webcasters can simply plug in the encoded video and audio feed from their encoder or video switcher such as Flash Media Live Encoder on a laptop, Wirecast, Tricaster and TouchStream and then add the USB modem cellular air cards to the Streamer and start streaming video to Web. The wireless data cards support higher quality video settings such as higher resolution and higher frame rate, as well as unmatched, professional grade reliability. Streamer simply replaces the wired Internet connectivity in users existing streaming setup.
For the original version including any supplementary images or video, visit http://unified-communications.tmcnet.com/topics/unified-communications/articles/356451-mushroom-networks-unveils-streamer-3g4g-bonding-device.htm

Stream Communications supports outside broadcast feeds over bonded 3G connections

Stream Communications SIM cards -Borderlands 2 fiend Originally Posted by Peon Well, you will need 2x3G routers and a DUAL-wan load balancer to bond both of them That's called load-balancing, and can be used in failover mode as well. But it is not bonding. True bonding requires hardware on both the client side, and the network operators side. The hardware on either end merges the 2+ connections into a single fat pipe whose capacity/speed is the sum of the capacity/speed of all pipes, less negligible bonding overhead.
For the original version including any supplementary images or video, visit http://mybroadband.co.za/vb/showthread.php/364748-bonded-3G-mobile-broadband

bonded 3G mobile broadband

With a quick, simple set up and monthly service charge, Stream Communications provides broadcasters with a flexible and resilient alternative to satellite backhaul, with a tariff that is significantly lower when compared to capital expenditure and data transmission HP Servers costs from hiring or owning a satellite vehicle. As the 3G data connection does not require tethering to a vehicle, with all the additional demands of cabling these bring, it immediately delivers additional advantages in terms of mobility which roving reporters will in particular demand as they are spread across the many and often remote Olympic venues in 2012. Bonded 3G offers low capital expenditure to set up and relatively small operational costs. The broadcaster only ever pays for the data it sends, so it becomes easy to manage and budget for future reporting activity, said Chadwick. This is why we are already witnessing high demand for our resilient and secure end to end high capacity 3G services from a range of equipment manufacturers as well as broadcasting companies. Ends About Stream Stream is the UKs most innovative M2M network service provider. The company has provided enhanced mobile network resilience, connectivity and SIM/network management to the M2M sector since 2000. Stream has consistently innovated services specific to the M2M sector for the past decade.
For the original version including any supplementary images or video, visit http://www.sourcewire.com/news/68668/stream-communications-supports-outside-broadcast-feeds-over-bonded-3g-connections

December 16 2013

tannerigor

Mushroom Networks Unveils Streamer 3g/4g Bonding Device

The service allows users to seamlessly stream live, high-quality video to the Web from practically anywhere. Webcasters get the option to mix and match wireless service from any provider creating built-in redundancy that delivers 100 percent reliability, even if some of the broadband links fail during the live stream. When not in use for streaming live content, Streamer serves as a traditional Broadband Bonding device, which can deliver fast broadband service to access Internet from the office, home or while traveling. Weighing only 1.3 pounds, the 3G/4G bonding device is highly portable and can be used in all challenging scenarios that require creating and distributing live content while on the road, such as broadcasters and bloggers covering special events, non-profit organizations reaching across the globe, or even media firms covering tradeshows from the floor. Streamer comes standard with up to eight USB ports, one RJ-45 Ethernet connector, a built-in WiFi( News - Alert ), built-in rechargeable battery option, support for most common video streaming protocols and video servers. Webcasters can simply plug in the encoded video and audio feed from their encoder or video switcher such as Flash Media Live Encoder on a laptop, Wirecast, Tricaster and TouchStream and then add the USB modem cellular air cards to the Streamer and start streaming video to Web. The wireless data cards support higher quality video settings such as higher resolution and higher frame rate, as well as unmatched, professional grade reliability.
For the original version including any supplementary images or video, visit http://unified-communications.tmcnet.com/topics/unified-communications/articles/356451-mushroom-networks-unveils-streamer-3g4g-bonding-device.htm

Hands on ... Prodec Bonded 3G

By bonding up to six mobile channels, the system promises maximum speeds of 42Mbps that's five times faster than most home broadband connections. I tested their smaller, three-network system which has a top speed of 21Mbps. Set-up of the unit is straightforward. There are just two connections: power, which can come from a mains outlet or 12V battery, and LAN, which can plug into an office network or directly into a single computer. I tested the system in a few locations, both urban and in the countryside, and was impressed with the reliability of the connection.
For the original version including any supplementary images or video, visit http://www.heraldscotland.com/life-style/technology/hands-on-prodec-bonded-3g.1336183504

bonded 3G mobile broadband

Dual WAN routers are very common, and can be purchased. So for VOIP load-balancing multiple 3G connections, yes it is possible. For true bonding, it is not possible, at least not in RSA. I've never heard of it being done anywhere else in the world either. But Google is your friend if you'd like to check to be sure.
For the original version including any supplementary images or video, visit http://mybroadband.co.za/vb/showthread.php/364748-bonded-3G-mobile-broadband

December 02 2013

tannerigor

Hp Mediasmart Server (ex470)

Quick Look: HP's MediaSmart EX495 Home Server

It's a blue-black case with glowing blue LEDs that indicate occupied drive bays, power, and server health. A front-mount case door keeps the drive bays hidden from view. Like all WHS boxes, this one runs headlesswithout a display, keyboard, or mouse. You manage the NAS via a console app on any networked Windows machine or through a browser using the Remote Access feature. The idea is to power the box on, connect it to your home network, and then place it on a shelf. You shouldn't ever have to touch it again, unless you're upgrading drives. The server's four bays accept drives of any capacity (the EX470 I tested comes with one 500GB unit), but the capacities must match. External drives, which connect via USB ports (three on the front and one in back) as well as an eSATA port in the back, can vary in storage size and provide easy expandability. A caveat here: First, the MediaSmart connects to your network only via a wired Ethernet portat least for now. The box runs a stripped-down version of Windows Server 2003, so you can theoretically attach a USB wireless dongle. But because Windows Home Server can't install software in the same way as a regular Windows operating system, the dongle will have to have a driver and an install program specific to WHS.
For the original version including any supplementary images or video, visit http://www.pcmag.com/article2/0,2817,2247237,00.asp

HP Mini 1000 Netbook ? Running Linux

Ubuntu Appearance Preferences In this story, we fill you in on both of the newest server familiesnamely HPs Celeron-based EX485/487 models and its Core 2 Duo-based EX490/95 models. We also examine some options for building your own small form factor server, thanks to an equipment loan from mini-ITX system builder Logic Supply, to compare what Wireless Networking you can build these days versus what you can buy from HP. As it hears from its users and understands that they want more power and capability to play back and transcode videos, as well as provide network backups, share photos and home videos, and establish a low-maintenance Web site for outside access, HP has steadily bolstered the specs of each new generation of its MediaSmart Servers. The following provides additional detail on the various HP MSS models. Model XP/Vista/Win7: backup, media, itunes, NAS MacOS (v10.5+): iTunes, backup, media, NAS Three Generations of HP MediaSmart Servers Compared The differences between the 47* and 48* and 49* models are huge, starting with AMD-based processors in the 47* models versus Intel (Celeron 440 stock in 48* and Celeron 450 in EX490 and dual-core Pentium E5200 in EX495). Storage also increases from 500GB and 1TB in the 47* models to 750GB and 1.5TB for both 48* and 49* models, all using Seagate 7,200 RPM SATA 3 Gb/s drives. As you might expect from a piece of technology, prices have continued to fall on the older models as newer ones have emerged. Fortunately, prices on the newest models are surprisingly low for a pre-built appliance, especially compared to some of the NAS/SAN devices we've reviewed in the past.
For the original version including any supplementary images or video, visit http://www.tomshardware.com/reviews/hp-mediasmart-server,2496.html

HP Trickles Up Features from Home Server to SMB Storage Package

It has four internal SATA drive bays -- each of which supports a drive of up to 1.5TB capacity. It has four USB ports and an eSata port to enable a maximum of 13.5TB capacity, HP claimed. Designed for SMBs with up to 10 Windows PC or Mac OS X clients, the X510 includes such useful business capabilities as remote file access, fully-automated client backup and remote desktop control. The pricing of the network-attached storage device is also part of the news: $699 for the 1TB starter package. With this new product, Hewlett-Packard, well known for office peripherals that include printers and scanners, now wants to supply small and mid-range businesses with yet another IT machine: desktop data storage units. In the process, HP is heading into stiff new competition with companies such as Iomega, Seagate and Buffalo in an effort to offer inexpensive desktop storage to businesses with several servers to one- or two-person microbusinesses with one server or none at all. HP also announced upgrades to the StorageWorks X1000 and X3000 Network Storage Systems it introduced last May. The X1000 and X3000 combine file and application storage so that SMBs do not need to invest in siloed storage systems. "The X1000 and X3000 are self-contained systems; they have iSCSI and file serving with an automated storage manager, which makes it very easy for an SMB to configure," Johns said at the time. "A user can basically just request extra capacity.
For the original version including any supplementary images or video, visit http://www.eweek.com/c/a/Data-Storage/HP-Trickles-Features-from-Home-Server-to-SMB-Storage-Package-574068/

First is the Wubi installer, which makes installing Ubuntu on a PC that is already running Windows quite pain-free by putting the entire Linux installation in a Windows folder, without making any other changes to the system. If you decide not to keep it, you can just delete its folder and its gone. Wubi also does its work without requiring a CD, which is quite useful if you dont have an external CD drive to use with the Mini. Wubi The second reason I chose Ubuntu is the Ubuntu Netbook Remix , which is a set of customizations for Ubuntu to make it more netbook-ish. Although the netbook remix is available as an installation image, you can also add it to an existing Ubuntu installation, such as one created using Wubi. The technical details of how to do this are beyond the scope of this article, but you can find them here if youre interested in trying it yourself. So, heres what it takes to install Linux on the Mini: Run wubi.exe and wait for it to do its work. Reboot, and choose your new Linux installation from the menu.
For the original version including any supplementary images or video, visit http://the-gadgeteer.com/2009/03/17/hp-mini-1000-netbook-running-linux/

November 27 2013

tannerigor

Palo Alto Networks Next-generation Firewall Achieves Icsa Labs Certification For Network Firewalls

Top Global Advertising Agency Selects Palo Alto Networks to Safely Enable Application Access

As they evaluate their own network risk posture, we remain a constant in providing safe and secure enablement of network applications. The Palo Alto Networks Next-Generation Firewall (NGFW) delivers visibility and control over application, users, and content within the firewall using a proprietary hardware and software architecture. The Palo Alto Networks NGFW platform (paloaltonetworks.com) addresses a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and HP IMC webinar and trial scheme a growing number of mobile devices. The NGFW series tested and certified by ICSA Labs include: PA-4000 Series: Ideally suited for high speed Internet gateway deployments within enterprise environments. These high performance platforms are tailor made to provide enterprise firewall protection at throughput speeds of up to 10 Gbps using dedicated processing for networking, security, content inspection and management. The Palo Alto Networks PA-4000 Series uses a 10 Gbps backplane to smooth the pathway between processors, and the physical separation of data and control plane ensures that management access is always available, irrespective of the traffic load. PA-2000 Series: Designed for high speed Internet gateway deployments within large branch offices and medium sized enterprises to provide network security and threat prevention. Delivers next-generation firewall security using dedicated processing and memory for networking, security, threat prevention, URL filtering and management. Further, the PA-2000 series, uses a high speed backplane to smooth the pathway between processors and the separation of data and control plane helps maintain management access availability, irrespective of the traffic load. PA-500: delivers next-generation firewall security to Internet gateway deployments within medium to large branch offices and medium sized enterprises. The PA-500 protects enterprise networks using high performance processing and dedicated memory for networking, security, threat prevention, URL filtering and management.
For the original version including any supplementary images or video, visit http://www.newswiretoday.com/news/116505/Palo_Alto_Networks_NextGeneration_Firewall_Achieves_ICSA_Labs_Certification_for_Network_Firewalls/

DDB Amsterdam's incumbent firewalls from Juniper Networks, and web filtering software from Web Marshall, we're too inflexible and time-consuming. They also could not provide visibility into specific network activity. The agency selected Palo Alto Networks' PA-500 and PA-4000 Series firewalls for the granular visibility and flexibility it needs to squash threats while securely -- and transparently -- controlling application usage and Internet access. "Our goal is to let our staff to securely use any application they want to anytime," said Jeroen Buren, IT Manager for DDB Amsterdam. "Palo Alto Networks enables us to give users all the functionality they need without forcing us to compromise on security.
For the original version including any supplementary images or video, visit http://www.newswiretoday.com/news/87167/

tannerigor

Palo Alto Networks Next-generation Firewall Achieves Icsa Labs Certification For Network Firewalls

Top Global Advertising Agency Selects Palo Alto Networks to Safely Enable Application Access

As they evaluate their own network risk posture, we remain a constant in providing safe and secure enablement of network applications. The Palo Alto Networks Next-Generation Firewall (NGFW) delivers visibility and control over application, users, and content within the firewall using a proprietary hardware and software architecture. The Palo Alto Networks NGFW platform (paloaltonetworks.com) addresses a broad range of network security requirements, from the data center to the network perimeter, as well as the distributed enterprise, which includes branch offices and HP IMC webinar and trial scheme a growing number of mobile devices. The NGFW series tested and certified by ICSA Labs include: PA-4000 Series: Ideally suited for high speed Internet gateway deployments within enterprise environments. These high performance platforms are tailor made to provide enterprise firewall protection at throughput speeds of up to 10 Gbps using dedicated processing for networking, security, content inspection and management. The Palo Alto Networks PA-4000 Series uses a 10 Gbps backplane to smooth the pathway between processors, and the physical separation of data and control plane ensures that management access is always available, irrespective of the traffic load. PA-2000 Series: Designed for high speed Internet gateway deployments within large branch offices and medium sized enterprises to provide network security and threat prevention. Delivers next-generation firewall security using dedicated processing and memory for networking, security, threat prevention, URL filtering and management. Further, the PA-2000 series, uses a high speed backplane to smooth the pathway between processors and the separation of data and control plane helps maintain management access availability, irrespective of the traffic load. PA-500: delivers next-generation firewall security to Internet gateway deployments within medium to large branch offices and medium sized enterprises. The PA-500 protects enterprise networks using high performance processing and dedicated memory for networking, security, threat prevention, URL filtering and management.
For the original version including any supplementary images or video, visit http://www.newswiretoday.com/news/116505/Palo_Alto_Networks_NextGeneration_Firewall_Achieves_ICSA_Labs_Certification_for_Network_Firewalls/

DDB Amsterdam's incumbent firewalls from Juniper Networks, and web filtering software from Web Marshall, we're too inflexible and time-consuming. They also could not provide visibility into specific network activity. The agency selected Palo Alto Networks' PA-500 and PA-4000 Series firewalls for the granular visibility and flexibility it needs to squash threats while securely -- and transparently -- controlling application usage and Internet access. "Our goal is to let our staff to securely use any application they want to anytime," said Jeroen Buren, IT Manager for DDB Amsterdam. "Palo Alto Networks enables us to give users all the functionality they need without forcing us to compromise on security.
For the original version including any supplementary images or video, visit http://www.newswiretoday.com/news/87167/

November 21 2013

tannerigor

Italian Manufacturer Taps Palo Alto For Improved Security [global Data Point]

Palo Alto Networks Next-Generation Firewalls Added to the Department of Defense Unified Capabilities Approved Products List

Forgital's initial needs consisted in the distribution of a centralised service, providing software to manage all phases of production for the branch offices as well as uniformity of the systems of connectivity, the VPN and the dedicated lines. The Palo Alto Networks PA-2020, PA-500 and PA-200 firewall platforms were selected and were installed at Forgital's Italian headquarters, two French branch offices and the Italian hub office in RTM Breda. The new Palo Alto Networks platform has give Forgital an aggregated and standardised system within a single offering, while bringing the entire infrastructure under greater control, enabling the use of applications in the enterprise and in the cloud. (c) 2013 Global Data Point.
For the original version including any supplementary images or video, visit http://www.tmcnet.com/usubmit/2013/07/19/7287511.htm

Mill Hill School selects next-generation firewalls from Palo Alto Networks

The independent school said IT makes up a significant part of the curriculum and it feels a duty to encourage the use of a broad range of web applications, some of which have become an integral part of its students' lives. Adam Banks, network manager at Mill Hill School, said: With 1,000 users, including day-pupils and boarders, it became clear to us that we needed a way of gaining greater visibility of what was being accessed as well as greater control over the specific applications that our pupils were using. It was also important that we had a complete all-in-one solution that was easy to use and manage. We can now provide a highly accommodating service to our pupils, safe in the knowledge that we're not exposed to any security threats. Following advice from IT services and security integration firm Synetix Solutions, Mill Hill deployed Palo Alto Networks' PA-500 Series firewalls. These provide visibility and policy control of more than 1,300 applications running on enterprise networks. Palo Alto Networks' App-ID technology identifies applications regardless of port, protocol, evasive tactic or even SSL encryption, all at up to 20Gbps with no performance degradation. Rene Bonvanie, vice-president of worldwide marketing at Palo Alto Networks, said: We have had tremendous success in the education sector precisely because we enable organisations to effectively balance the need for both access and security. Unlike legacy security technologies, our next-generation firewalls are unique in their ability to see and control applications, users and content not just ports, IP addresses and packets. Related Articles
For the original version including any supplementary images or video, visit http://www.scmagazineuk.com/mill-hill-school-selects-next-generation-firewalls-from-palo-alto-networks/article/219492/

Image Caption The DoD Unified Capabilities APL is established in accordance with the UC Requirements (UCR 2008, Change 2) document. Its purpose is to maintain a single consolidated list of products that have completed Interoperability (IO) and Information Assurance (IA) certification. Use of the DoD UC APL allows DoD Components to purchase and operate UC systems over any and all DoD network infrastructure. "This is a huge milestone for Palo Alto Networks and our DoD customers. The product was submitted to several months of rigorous testing to ensure that it would meet or exceed the DoD's standards and requirements," said Lee Klarich, vice president of product management at Palo Alto Networks.
For the original version including any supplementary images or video, visit http://it.tmcnet.com/news/2011/07/14/5637250.htm

Italian manufacturer taps Palo Alto for improved security

Forgital's initial needs consisted in the distribution of a centralised service, providing software to manage all phases of production for the branch offices as well as uniformity of the systems of connectivity, the VPN and the dedicated lines. The Palo Alto Networks PA-2020, PA-500 and PA-200 firewall platforms were selected and were installed at Forgital's Italian headquarters, two French branch offices and the Italian hub office in RTM Breda. The new Palo Alto Networks platform has give Forgital an aggregated and standardised system within a single offering, while bringing the entire infrastructure under greater control, enabling the use of applications in the enterprise and in the cloud. Categories:
For the original version including any supplementary images or video, visit http://www.telecompaper.com/news/italian-manufacturer-taps-palo-alto-for-improved-security--956018

November 15 2013

tannerigor

Juniper Networks Vs. Palo Alto Networks

Markman Advisors picture Cir. 1988), that Palo Alto is estopped from attempting to invalidate the asserted patents, thus rendering its defense of invalidity insufficient as a matter of law. The Diamond case requires three dispositive findings, which according to Juniper are satisfied here: (1) the inventor assigned his patent rights for valuable consideration; (2) the inventor executed an inventor's oath averring that he was the first and true inventor; (3) the accused infringer was in privity with the inventor. If Juniper wins this argument, the down-side risk for Palo Alto cannot be overstated. A party accused of patent infringement typically has two fundamental defenses at its disposal: (1) it is not infringing the patents; and (2) even if it is infringing, the patents are invalid. Defendants typically pursue both of these defenses in parallel through the course of a litigation. The good news for defendants is that they only need to win one of these defenses-non-infringement or invalidity-to win the case. Here, however, Juniper is seeking to strip Palo Alto, right from the start, of one of its two principal defenses.
For the original version including any supplementary images or video, visit http://seekingalpha.com/article/1819652-juniper-networks-vs-palo-alto-networks

Palo Alto Networks Extends Network Security to Branch Office

"We're looking to Palo Alto Networks to possibly help us with this challenge as they can seamlessly extend our existing user-specific policies to the recent influx of Apple products on our networks." WildFire- Controlling Modern Malware With the introduction of WildFire, customers can extend the capabilities of all of their Palo Alto Networks next-generation firewalls to addresses the challenge of modern malware, which is often targeted, unknown, highly evasive and network enabled. This latest innovation to Palo Alto Networks' industry-acclaimed next-generation firewalls identifies unknown malicious files by directly and automatically executing them in a virtual cloud-based environment to expose malicious behavior even if the malware has never been seen in the wild before. For malicious files, Palo Alto Networks automatically generates new signatures that are distributed with regular signature updates, and provides the user with actionable analysis of exactly how the malware behaves, who was targeted and the application that delivered the threat. By tightly integrating the firewall with the cloud-based analysis engine, WildFire significantly reduces the time-to-protection for all customers, and makes this critical new protection accessible to any enterprise. "Our approach to modern malware is the latest example of how we question conventional network security approaches until we've developed a better way of addressing the problem," said Nir Zuk, founder and CTO of Palo Alto Networks. "Combining prior technical contributions such as sandboxing technology and cloud-based malware analysis with the unprecedented capabilities of a next-generation firewall has resulted in innovation that enterprises can feasibly deploy throughout their networks." Availability Palo Alto Networks PA-200, GlobalProtect, and WildFire are all available immediately. PAN-OS 4.1 is a free upgrade for customers on maintenance. For more information on pricing for Palo Alto Networks PA-200, WildFire, and GlobalProtect, contact your local reseller or visit http://www.paloaltonetworks.com . About Palo Alto Networks Palo Alto Networks is the network security company.
For the original version including any supplementary images or video, visit http://news.thomasnet.com/companystory/Palo-Alto-Networks-Extends-Next-Generation-Firewall-Visibility-and-Control-to-Enterprise-Branch-Offices-and-Apple-Devices-605273

Palo Alto Networks Extends Next-Generation Firewall Visibility and Control to Enterprise Branch Offices and Apple Devices

The PA-200 allows the IT team to have the same firewall protection across all branch offices without breaking the bank, according to King. The company also announced a new version of its GlobalProtect remote access technology to protect remote users running Mac OS X and iOS devices. GlobalProtect, which already supported Microsoft Windows devices, protects remote users with the same policies and controls that are being applied back at the corporate office, according to King. The auto-firewall is "just on," so users don't have to think about turning it on or checking to see what it's doing, King said. The iOS version of GlobalProtect is not a new application, so Palo Alto Networks doesn't have to wait on Apple to approve it, according to King. Instead, it uses the native VPN capability on iOS devices, and is configured using mobile-device management tools to provide the protection. The company's newly announced WildFire capability focuses on blocking malware specifically designed to bypass front-line defenses. With WildFire running, the firewall can identify outbound traffic generated by malware on an already-compromised system on the network and generate a signature to identify the traffic to stop future incidents. WildFire identifies malicious files by unpacking and executing them in a virtual cloud-based sandbox, King said.
For the original version including any supplementary images or video, visit http://www.eweek.com/c/a/Security/Palo-Alto-Networks-Extends-Network-Security-to-Branch-Office-352723/

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl