Our walls of security prevention are actually being surmounted every day - we
just don't always know it. Assaults from within the network, as well as
zero-day threats, are driving new types of solutions referred to as "advanced
threat detection" (ATD). ATD brings in real-time packet capture and analysis
in addition to monitoring of logs and NetFlow information, as well as
recording of packet capture data for near-real-time and post-analysis. By
analyzing data traffic, it is possible to build a profile of normal network
behavior that can then be compared against real-time data or recorded data to
detect anomalies. Alerts can be compared against security prevention solution
data to assess if an attack is underway. Conversely, it can be used to
determine "false positives."
The foundation for solutions like this is continuous monitoring and analysis,
not just of logs a... (more)
We live in a hyper-connected, mobility-enabled world, one in which carriers
must make drastic changes to how they do business if they are to survive and
thrive in the future. Accordingly, great strides have been made over the last
three years to prove the viability of Network Functions Virtualization (NFV).
Many Proof of Concept (PoC) trials have proven that workloads can be migrated
to virtual environments running on standard hardware, and there are even
examples of carrier deployments using NFV.
The next step is to determine how to make NFV work effectively so it will
deliver ... (more)
In 1956, Malcolm McLean invented a shipping system that revolutionized cargo
shipping forever, namely the container. The shipping container provides a
standard, universal packing solution that can be used for transporting
whatever you need to ship. Containers can be transported on trucks, trains or
on ships, because they are of standard size.
Containers are an example of a universal solution that revolutionized the
shipping industry. Can the emergence of the standard PC server platform as a
universal computing platform herald the proliferation of even more innovative
dedicated n... (more)
Cloud Computing on Ulitzer
We are standing on the threshold of a new transition in information
technology and communications; a radical departure from current practice that
promises to bring us new levels of efficiency at a vastly reduced cost. Cloud
computing is full of potential, bursting with opportunity and within our
But, remember, that clouds always appear to be within our grasp and bursting
clouds promise only one thing: rain!
As with all radical transitions, it takes time for the various pieces to fall
into place. Some of them are already in place; some of them hav... (more)
Cloud computing has now passed the stage of hype to reality. More and more
enterprises are realizing the benefits of remote hosting of IT services
rather than local IT management, especially as managing and operating IT
networks and services is not getting any easier.
Managing IT networks requires a broad set of competencies in a growing number
of technologies and products. It therefore makes sense that these
competencies are centralized in larger data centers providing cloud services
to a number of smaller enterprises for which IT is not a core competency.
Larger data centers al... (more)