The Haystack Problem
  • Published in

Organizations lack sufficient collect and compute resources to arrive at accurate conclusions about whether or not events observed are good or bad. That is to say, simply passing metadata to a SIEM will not, by itself, identify a breach. To make it worse, things one organization or business unit deems “bad”, may not be “bad” […] The post The Haystack Problem appeared first on Gigamon Blog.

Read More
Run DeMC: Dell & EMC merge to thrive in the cloud era
  • Published in

Dell recently announced its intent to acquire EMC at approximately $33.15 a share, for a total transaction price of $67 billion. Upon first hearing of this deal, the ancient proverb, “fortune favors the bold,” immediately came to mind. This is a massive deal, and while some will say it is too risky, I would argue that the industry conditions have shifted to where it might be more risky for Dell and EMC not to make this move. The IT industry is in the midst of a massive upheaval. The merger makes both companies stronger than how they might have been apart.

Read More
Automated Traffic Visibility for Software Defined Data Centers using VMware NSX Dynamic Service Insertion
  • Published in

Another week, another advancement in GigaSECURE Security Delivery Platform from Gigamon, the leader in the Traffic Visibility space! Previously, my colleague Johnnie discussed GigaSECURE solutions to ‘Secure the promise of SDDC Micro-Segmentation’. Now, we are excited to announce at VMworld Barcelona, new extensions to GigaSECURE, specifically GigaVUE-VM that will automate traffic visibility for securing the […] The post Automated Traffic Visibility for Software Defined Data Centers using VMware NSX Dynamic Service Insertion appeared first on Gigamon Blog.

Read More
A Dell & EMC Merger = A Big Data & Analytics Powerhouse
  • Published in

So by now you have probably heard that Dell is planning on acquiring EMC, while leaving VMware as a publicly traded entity. Hot stuff indeed. This has big implications for the IT market as a whole, but Im most interested in how it sets up change for the big data, database, and analytics space. A few immediate opportunities and a risk are in store:

Read More
A Call for Open Cybersecurity Middleware

While attending Splunk.conf 15, I sat in on an interesting presentation given by Christof Jungo, head of security architecture and engineering at Swisscom.

Read More
Mobile is Here....Are you Ready?

Mobile is Here....Are you Ready? Mobile data traffic is expected to grow at a CAGR of around 45 percent between 2013 and 2019, resulting in a 10-fold increase over that time span...learn more about how mobile traffic will impact your network in this new infographic. Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More
Media Advisory: Juniper Networks Demonstrates Latest VMware Integrations for Simplified Network Security and Automation at VMworld 2015 Europe

Dateline City: SUNNYVALE, Calif. SUNNYVALE, Calif.--(BUSINESS WIRE)--Juniper Networks (NYSE:JNPR), the industry leader in network innovation, today announced details regarding its upcoming participation at VMworld 2015 Europe, VMware’s annual regional user conference and exhibition, October 12-15 at the Fira Gran Via, Barcelona. Juniper Networks is a Gold Sponsor and will be located at exhibition booth G318. Language: English Contact: Juniper NetworksPenny Still, +44 1372 385 692pstill@juniper.net Ticker Slug: Ticker: JNPR Exchange: NYSE read more                    

Read More
Can A Pure Storage Company Make It Big?

There has been a lot of time and [electronic] ink expended of late in the build-up to, and eventual launch of, the Pure IPO yesterday. Most of the commentary has concentrated on the valuation and stock trading zone. As I write this, the stock price has floated down softly to around $15.50, off from the offering starting point of $17 per share. The financial press headlines contain plenty of words like disappointing and failed to impress. Moreover, they talk of the impact of this unicorn IPO on the appetite and enthusiasm for tech IPOs. In other words, its a very parochial Wall Street view. And frankly, thats where the focus is misplaced, at least from the storage and IT market perspective. Now, I am not here to suggest that the share price is irrelevant or that many people wouldnt have been happier to see a more robust start for PSTG shares. But theres a more significant set of considerations from a technology, industry and end-user perspective.

Read More
Service Provider Problems with Analytics Tools

Gigamon Director of Service Provider Solutions Andy Huckridge recently spoke at the Telecom Council Innovation Meeting in Mountain View, CA. See how Gigamon solves the problem of the combination of decreasing ARPU/bit, exponentially increasing big data, and the limited ability of analytics tools to scale. For more information, read about the Triple Challenge of Network […] The post Service Provider Problems with Analytics Tools appeared first on Gigamon Blog.

Read More
Signature Update #2543

Signature Update #2543 247 new signatures:HIGHHTTP: Typo3 CMS SanitizeLocalUrl Cross-Site ScriptingMEDIUMHTTP: Static HTTP Server ini File Parsing Buffer Overflow1HIGHHTTP: Novell ZENworks Mobile Management Cross-Site ScriptingMEDIUMHTTP: Integard Home and Pro Password Remote Version Check1MEDIUMHTTP: VLC HTTPD Connection Header Format String1HIGHHTTP: Ignite Realtime Openfire group-summary.jsp Cross-Site ScriptingMEDIUMHTTP: ntop Basic Authorization Denial of Service1MEDIUMHTTP: PHPWiki CVE-2014-5519 Ploticus Arbitratu Code Execution1MEDIUMHTTP: Sun Java System Web Server JSP Source Code Disclosure1MEDIUMHTTP: ESTsoft ALZip MIM File Processing Buffer Overflow1MEDIUMHTTP: Maxthon History Cross Site Scripting1MEDIUMHTTP: Digium Asterisk Management Interface HTTP Digest Authentication Stack Buffer Overflow1MEDIUMHTTP: Adobe Flash Player Privilege Escalation1MEDIUMHTTP:Multiple Product XML External Entity Injection1MEDIUMHTTP: Wordpress W3 Total Cache Plugin Remote Code Execution1MEDIUMHTTP: Microsoft ASP.NET Post Request Parameters Handling Denial of Service1MEDIUMHTTP: Suspicious WIPER/SHAMOON Infected File Download1MEDIUMHTTP: XnView mbm File Parsing Buffer Overflow1MEDIUMHTTP: Microsoft Telnet Protocol Handler Insecure Loading1MEDIUMHTTP: Inout Article Base Ultimate Cross Site Request Forgery1MEDIUMHTTP: Sysax Multi Server Function Buffer Overflow1MEDIUMHTTP: Alt-N WebAdmin USER Buffer Overflow1MEDIUMHTTP: Ruby Gem Multiple Wrappers Command Injection1MEDIUMHTTP: Adobe RoboHelp Server SQL Injection Vulnerability1MEDIUMHTTP: Multiple Web Browsers Window Injection1MEDIUMHTTP: Microsoft .NET Framework Heap Corruption1MEDIUMHTTP: Localhost Host Header in Trans-Internet Request1MEDIUMHTTP: Microsoft Windows Folder GUID Code Execution1MEDIUMHTTP: Apple CUPS SGI Image Format Decoding imagetops Filter Buffer Overflow1MEDIUMHTTP: Ruby on Rails XML Parameter Parsing Remote Code Execution1MEDIUMHTTP: Easy LAN Folder Share .reg FIle Parsing Buffer Overflow1MEDIUMHTTP: Ruby on Rails JSON YAML Parsing Remote Code Execution1MEDIUMHTTP: Oracle Exploit Kit Angler Java1MEDIUMHTTP: Microsoft .NET Framework XAML Browser Applications Stack Corruption1MEDIUMHTTP: XAMPP Request Forgery Attempt1MEDIUMHTTP: HP LaserJet Pro Printers Remote Information Disclosure1MEDIUMHTTP: GD Graphics Library PNG Buffer Overflow1MEDIUMHTTP: Wordpress FGallery Plugin Malicious File Hosting1MEDIUMHTTP: UltraVNC VNCLog Buffer Overflow1MEDIUMHTTP: WireLurker Serial Number Upload Detected1MEDIUMHTTP: ManageEngine Multiple Products FailOverHelperServlet copyfile Information Disclosure1MEDIUMHTTP: Attachmate Reflection FTP Client ActiveX CE1MEDIUMHTTP: ContentKeeper Web Appliance benetool Remote Command Execution1HIGHDNS: ISC BIND openpgpkey Denial of ServiceMEDIUMHTTP: Apple QuickTime JPEG Atom Buffer Overflow 2MEDIUMHTTP: Apple QuickTime JPEG Atom Buffer Overflow 3HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 1HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 2HIGHHTTP: Microsoft Publisher PLC Objects Remote Code Execution 3MEDIUMHTTP: Invalid ANI Block Size Parameter in Stream (2)2MEDIUMHTTP: Invalid ANI Block Size Parameter in Stream (2)3HIGHHTTP: Adobe Flash Player null Reference Memory Corruption1HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow1HIGHHTTP: Adobe Flash Player null Reference Memory Corruption2HIGHHTTP: Adobe Flash Player null Reference Memory Corruption3HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow2HIGHHTTP: Microsoft PowerPoint 0xFB1 Parsing Buffer Overflow3MEDIUMHTTP: Google Chrome HTTP Response Handling Memory Corruption 2MEDIUMHTTP: Google Chrome HTTP Response Handling Memory Corruption 3HIGHHTTP: Microsoft Office OneNote 2010 Buffer Size Validation2HIGHHTTP: Avira Management Console Server HTTP Header Processing Heap Buffer OverflowHIGHDNS: ISC BIND DNSSEC Key Parsing Buffer Denial of ServiceHIGHHTTP: DHTML Object Handling Race Condition1HIGHHTTP: KingView KChartXY.ocx Unsafe ActiveX Control1MEDIUMHTTP: Microsoft IE MHTMLFile NULL De

Read More
Networking: Intelligence Augmentation vs. Artificial Intelligence

I recently read the book Machines of Loving Grace: The Quest for Common Ground Between Humans and Robots by John Markoff, a technology and science reporter at the New York Times. This is a good book that goes over the history of the development of automation in the 1950s and 1960s, and takes you to the current day where new robotic developments from Apple (Siri) and Google (driverless cars) put us in the another age of rapid change.

Read More
It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace

It’s a Team Effort: Developing a Culture of Cybersecurity in the Workplace Cyber threats today are evolving, becoming more sophisticated and making it critical for organizations to educate, implement and encourage employees to follow cyber best practices. In a recent RAND Corporation report, sponsored by Juniper Networks, it was projected that the cost to businesses in managing cybersecurity risk is set to increase 38 percent over the next 10 years. Copyright © 1996-2013 Juniper Networks, Inc.     All rights reserved                                                                                      Update preferences                    

Read More

Videos

Eric Herzog, Chief Marketing Officer at Infinidat, discusses the Brittle, Anxious, Non-linear, Incomprehensible (BANI) challenges facing businesses at the present time, explaining how the company’s innovative storage solutions help to address many of these current cost, staffing and wider cybersecurity, data resilience and sustainability pain points.
Women working in the IT industry share their experiences – covering the opportunities they have had, the challenges they have had to overcome during their careers to date, and offering plenty of constructive thoughts and observations as to what improvements still need to be made when it comes to improving diversity within the workplace. Episode 28 Marion Stewart, Chief Operating Officer at Red Helix
Mark Onisk shares the findings of the company’s recent Lean into Learning report, explaining how upskilling can play a major role in helping companies who are working towards digital transformation but find themselves short of the necessary technology experts.
Pure Storage’s Wes Van Den Berg, Vice President and General Manager, UK & Ireland, discusses the findings of the company’s recent IT Sustainability Impact Survey. IT departments have a major role to play in helping organisations achieve their sustainability goals; and IT vendors have a similar responsibility to supply energy-efficient, sustainable solutions – Evergreen storage in Pure Storage’s case.

News

ENGIE, the multinational utility company, was one of the first companies to deploy Axway's Amplify Enterprise Marketplace solution in 2022. Its objective is simple: to disseminate ENGIE’s APIs more widely within the large organisation.
The European Space Agency (ESA), an intergovernmental organisation shaping Europe’s space capability, is working with data management experts NetApp to help store the vast amount of data collected today and over the past 30 years of space exploration. The data stored comes from the ESA’s solar system missions and from the ESA’s fleet of cosmic observers.
Partnership enables PacketFabric’s TruNaaS™ Converge Platform to be used by Europe’s leading Edge data centre provider.
Programme offers channel partners strong revenue potential, significant growth opportunities, and industry-leading resources and tools.