The size, frequency and complexity of DDoS attacks are increasing, says Rakesh Shah of Arbor Networks. And to make matters worse, traditional security products are inadequate in protecting against them. A multi-layer...
As enterprises use cloud technologies and services, what are some of key components to watch for? Michael Jackson, of Adaptive Computing, examines the issues.
Bob Deutsche of Intel explains the fourth fundamental truth of corporate cloud strategy: services-oriented taxonomy is not optional. Along the way he compares it to the method of manufacture of Henry Ford’s Model T.
As users demand more and more, CIOs are looking to a next generation WAN optimization, which includes visibility, control and optimization of networks. Kevin Suitor of Exinda discusses these features of WAN optimization.
Thanks to cloud, the role of an “outsourced CIO” for small and mid-size companies has a different meaning than even just a few years back. Billy Cox, of Intel, explains how this position is evolving.
Data centers that host systems relevant to their customers’ financial reporting are responsible for certain controls over those systems, such as physical and environmental security. Thus, says Chris Shellman of...
Owen DeLong of Hurricane Electric writes about IPv6 adoption, while sometimes a struggle to get accomplished, can bring immediate benefits in the form of improved network topologies and security. Data center managers...
For most organizations, a cloud service providers’ foundational security will not suffice. Tenant-based cloud security is critical to solving the issue of protecting your individual cloud infrastructure. Three...