P.O. Box 85518 Lincoln, NE 68501-5518 CHANGE SERVICE REQUESTED May 23, 2008 Volume 30 Number 21 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 Choosing A In This ISSUE evaluate what type of wireless solution that they are looking for and what types of fea- COVER FOCUS tures their users require,” says Andy Ballema, a mobile wireless specialist for Buying Guides CDW (www.cdw.com). What are the most important elements to consid- Smartphone The obvious starting point is to learn er before purchasing data center products? What everything there is to know about the vari- new technologies and standards do you need to ous smartphone candidates. How easy is it know? Get answers to these questions and more. to use? Does it have enough horsepower, bandwidth, and memory? Does it have the Choosing A Smartphone................................................1 applications you need, or can it integrate PC Buying In The SME..................................................9 with third-party applications? Data Center Power & Cooling......................................11 Tips To Help You Avoid Dumb Choices “SMEs should ask themselves if they VoIP Phones & Systems For The SME........................12 require basic features like phone and email, When Selecting Smartphones TECH & TRENDS or have to have calendar applications, the ability to synchronize data between de- Enabling Use Of New Technologies| 1 by Drew Robb services, applications, and features that vices, etc.” says Ballema. “You should also Palo Alto Networks recently released a report • (cid:127) (cid:127) determine which device would best serve check if end users are going to need to edit that shows some enterprise end users are inten- JUST ABOUT EVERYONE has a cell phone the needs of the business. attachments or access to external applica- tionally evading IT security controls and ignoring these days. But that may not be enough “When SMEs begin selecting smart- tions such as Salesforce.com.” acceptable use policies to use new technologies. anymore. If all business traffic goes on the phones for business use, it is essential to Go to Page 10 phone lines, you may end up with huge SCAP Method Update| 25 cellular bills. And if the only way employ- Any federal agency that falls under the Office of ees can access email is at the office, they Management and Budget will now have to meet either spend too long at the office early in the FDCC policy for all WinXP and Vista systems the day or come in early to handle their through the use of the SCAP, a method for using messages. Either way, they spend less time specific standards to enable automated vulnera- with customers. bility management, measurement, and policy The answer is the smartphone. Such compliance evaluation. devices combine phone, email, and other tools on one easy-to-use device. They are Email: Hosted Or Internal?| 26 typically defined as devices harnessing Besides the DIY route, small to midsized enter- operating systems that can run applications prises have several options on how to manage for mobile users. their growing requirement for email. “It has become increasingly important for smaller companies to be able to easily and Boosting Confidence In VoIP | 27 cost-effectively deploy and manage mobile There is trouble in VoIP paradise: According to a technology solutions in order to remain study by Network Instruments, only 25% of the competitive and responsive to customers,” respondents said they are confident in their VoIP says Carrie MacGillivray, an analyst for systems. mobility at IT consultancy IDC. There are lots of smartphones out there Product Releases| 17 with various pros and cons. It is the mix of ■ AdRem Software unveiled a new version of its NetCrunch 5 comprehensive network monitor- ing solution. ■ Alloy Softwareannounced Enabling Use Of video, and streaming audio. (See the “Risk Alloy Discovery, a network inventory application Report” sidebar for more information.) that’s designed for small and medium-sized Opening up these network channels can enterprises. ■ Ciscoannounced two virtual create security havoc within a system but can communications environments: TelePresence also slow a network down because of signifi- New Technologies System 500, for use in individual offices, and the cant spikes in bandwidth. One approach is to TelePresence System 3200 room, ideal for shut down all unauthorized use, but for com- group training and cross-functional team meet- panies that have hundreds of employees, ings. ■ Cloudworksannounced its Webtops babysitting every machine can be time-con- product, which allows customers to work from suming and counterproductive. any computer. ■ WhatsUp Gold Version 12 Users Want The Freshest Applications, Experts have noted that there are better Standard, Premium, Distributed, and MSP edi- But They May Conflict With Security Controls strategies, such as enabling use of new tech- tions are now available from Ipswitch.■ nologies so that users feel comfortable com- StorageCraft released StorageCraft Shadow- ing to IT for support and following rules. Protect 3.2, a disk-based backup and disaster by Elizabeth Millard attackers trying to get in, but rather, the recovery package. ■ Vinpowerplans to create Security Issues (cid:127) (cid:127) (cid:127) employees just down the hall. a line of standalone DVD/CD and BD duplicators IT DEPARTMENTSSPENDALARGECHUNKof Palo Alto Networks (www.paloaltonet Some users may be looking to outwit the branded with the Xerox name. their time figuring out better security con- works.com) recently released a report that IT department and deliberately break the trols that will keep corporate information shows some enterprise end users are inten- rules of the security policy that they should EACH WEEK safe, creating a digital barrier between the tionally evading IT security controls and have signed during new employee orienta- Upcoming IT Events......4 Opinions......................24 network and the outside world that can only ignoring acceptable use policies, in many tion. But the majority of users tend to be MarketPlace News........4 Six Quick Tips..............28 be lifted by permission. But for many com- cases to enable the use of new technologies those who have an idea that watching a Products At Work..........5 What’s Happening........29 panies, the largest threat may not be the such as peer-to-peer applications, Web YouTube video at work isn’t the best use of Product Of The Week..16 Three Questions..........29 time but do it anyway. Those who are more Product Releases........17 technologically savvy might be able to fig- Some end users are intentionally evading IT ure out a few ways around any security The Processor.com home page is updated each week with controls in place to prevent content down- security controls and ignoring policies. new articles and hardware news to help you keep current. loading of video, games, or audio. Visit www.processor.com today. Go to Page 10 Page 2 Processor.com May 23, 2008 Subscribe Today/Address Change Form For address change, fill out form below with new information and mail or fax. PLEASE PRINT Phone:( ______ )________________________________ Fax:( ______ )________________________________ © Copyright 2008 Sandhills Publishing Company. Contact Name: ______________________________________________________________________________ All rights reserved. Company Name: ____________________________________________________________________________ Address: __________________________________________________________________________________ City:___________________________________________ State:________ Postal Code: __________________ Subscriptions:(800) 819-9014 Subscriptions Local:(402) 479-2132 Country:____________________________________________________________________________________ Subscriptions Fax:(402) 479-2193 Email: ________________________________________ Web Address: ________________________________ Mail Form To: P.O.Box 85518, Lincoln,NE 68501-5518 1. What is the size of your company 3. What is your annual computer hardware/ (how many employees)? software purchasing budget? Overnight Delivery: ■■ Less than 10 ■■ 200 to 499 ■■ $0 to $9,999 ■■ $100,000 to $249,999 120 West Harvest Drive, Lincoln, NE 68521 ■■ 10 to 99 ■■ 500 to 999 ■■ $10,000 to $24,999 ■■ $250,000 to $499,999 ■■ 100 to 199 ■■ 1,000+ ■■ $25,000 to $49,999 ■■ $500,000 to $999,000 ■■ $50,000 to $99,999 ■■ $1,000,000+ 2. How often do you purchase computer hardware/software? ■■ Weekly ■■ Quarterly ■■ Bi-weekly ■■ Annually ■■ Monthly ■■ No Involvement www.Processor.com PHYSICAL INFRASTRUCTURE MAY23, 2008 Remotely Manage Any remotely connect to the unit, and it’s upgrades possible from remote loca- ready to use. Instead of going to a tions. remote site to perform an (cid:127) Front panel indicators show Link, Local Type Of Application upgrade or patch, let the or Remote connection, VNC, Network remote site come to you. Speed, and Power. The Virtual Media (cid:127) Password security prevents unautho- feature allows the IT rized configuration and access. Rose Electronics UltraLink 2 Offers Remote KVM Access Over IP professional to remotely (cid:127) Resolution up to 1,280 x 1,024. access USB-equipped systems and perform patches and upgrades ROSE ELECTRONICS UltraLink 2 sets a network, or over IP using a Web browser. without the expense of a trip to the remote Rose Electronics UltraLink 2 new standard for an easy and secure way Connect the unit to a Rose Electronics site. On the dual access model, a local Starts at $695 to remotely manage server room envi- KVM switch, and you now have access to KVM station can be connected for direct ronments, remote standalone applica- as many as 1,000 computers or servers access to the connected computer. Connect to computers or servers locally, across a net- tions such as digital signage, and other from anywhere in the world. Other key features include: work, or over IP remote applications. The UltraLink 2 is easy to install and (cid:127) Virtual Media feature allows authorized (800) 333-9343 Use the UltraLink2 to access your configure. Connect the unit, assign an IP remote users to transfer files and folders computers and servers locally, across your address and network information, and to a computer. This feature makes www.rose.com STORAGE MAY23, 2008 NETWORKING & VPN MAY23, 2008 Managing Storage Fixed RFID Reader Storage Horizon 3.7 Provides Analysis For Better Management Motorola XR450 Reduces Costs & Increases Inventory Visibility assets can be grouped with a vari- prevent the placement of inventory in ety of different parameters and the wrong location. automatically analyzed to show The standards-based SOA enables storage usage. seamless integration and interoperability Advanced analytical capabilities with existing IT infrastructure—and max- provide reports to help eliminate imum application flexibility. Robust wasted or unused storage assets. RFID functionality includes support for Reports analyze storage consump- THEXR450fixedRFID reader is designed standard back-end platforms, direct appli- tion by volume group, free pool to help enterprises achieve a competitive cation hosting, and the ability to interact report, LUN-to-disk analysis, and advantage by increasing inventory visibili- with additional asset automation equip- dark storage breakdown. Other ty and process efficiency, resulting in re- ment such as forklifts and conveyor belts. new analytical functions include MonoSphere Storage Horizon 3.7 offers detailed views duced costs and improved profitability. Support for leading business sys- automated scheduling and distribu- for more efficient storage management. The reader enables customers to select tems includes IBM’s Data Capture and tion of analytical reports. between using four mono-static ports that Delivery Solution certified to work with Enhanced database storage con- WITH THE VARIETY of different storage each utilize a single antenna to transmit IBM Premises Server 6.1 and 6.0, Micro- sumption analysis provides feedback that environments used by SMEs, it can be dif- and receive or four bi-static ports that uti- soft RFID Biz Talk Server 2006 R2 and enables database users to drill down to see ficult and time-consuming to manage all lize dual antennas. In this way, the SAP, as well as leading development details concerning table spaces and data of a company’s data storage. MonoSphere XR450 RFID reader provides greater tools, including .NET 2.0 and off-the- files, as well as view log applications, data has upgraded its storage management soft- flexibility to adapt the reader to the shelf applications. vs. log information, and public folder and ware to meet this need. intended application and perform deploy- The ability to control and maintain all mailbox rollups. Storage Horizon 3.7 sup- One of the newest upgrades to Storage ments at the highest possible performance XR Series Readers from a single central ports Oracle, MS SQL, and Sybase data- Horizon 3.7 is increased support for in the most challenging RF environments. location dramatically simplifies and bases and MS Exchange. VMware server virtualization with visual- Superior read rates and enhanced read reduces the costs associated with day-to- ization of storage abstraction. The soft- MonoSphere Storage Horizon 3.7 ranges easily accommodate multiple day management. ware analyzes and displays results for RFID applications—from the manufac- Starts at $50,000 storage usage details and relationships be- turing floor to warehouse loading docks Motorola XR450 tween servers, file systems, virtual disks, Provides detailed analysis for simplifying and opti- to the retail store front. Advanced data Starts at $2,195 guest OSes, and guest OS file systems/ mizing enterprise storage capacity management collection features enable the rapid deliv- raw devices, so managers can determine ery of refined real-time information. RFID Reader is easy to use and can serve as a (800) 925-3040 when additional storage needs arise. The ability to incorporate alarms, light control center for all XRSeries Readers Other enhancements include automated www.monosphere.com sensors, and more from other automated (800) 722-6234 chargeback analysis, advanced analytical asset equipment enables a wide range of www.motorola.com capabilities, and analysis of database stor- business processes—from dynamic age consumption. With automated charge- reconfiguration of build-to-order assem- back analysis, logical and physical IT bly lines to real-time alerts that can May 23, 2008 Processor.com Page 3 SECURITY MAY23, 2008 PHYSICAL INFASTRUCTURE MAY2, 2008 Helping Organizations Reduce Operating Costs Meet Compliance GDCM nlyte Optimizes Personnel, Processes & Physical Resources Global DataGuard Offers Security Suite & Services redundancy, power, cooling, space, net- work, and cable capacity. GLOBAL DATAGUARD is offering a full included), with pricing starting at $7,500 nlyte solves complex problems related suite of enterprise-class products and for an ASM core module. Custom con- to managing physical capacity, allowing services to assist organizations in pro- figurations for the Enterprise UTM++ the delay of capital expenses, and reduc- tecting confidential healthcare data and solution are designed and priced based ing operational costs related to power, electronic healthcare transactions. on an organization’s unique network space, and human capital. Companies Within its Enterprise UTM portfolio, the requirements. Pricing for turnkey man- using nlyte today are gaining the ability to Enterprise UTM++ solution and ASM aged services starts as low as $1,000 per model the data center, establish unified (All-n-One Security Module) for En- month. procedures and processes, integrate multi- terprise UTM integrate a range of enter- Global DataGuard’s approach to sup- nlyte lets you manage changes affecting power, cool- ple systems, understand IT changes prior prise-class security applications, includ- porting organizations in improving their ing, space, and network physical infrastructure. to implementation, and predict how power ing firewall, antivirus, and antispam; a compliance posture includes aspects such and cooling supply and demand will effect VPN and Web content filter; IP reputa- as behavioral analysis and correlation, IT PERSONNEL are facing enormous their entire global data center fabric. tion; IDS and IPS; network behavioral security monitoring, vulnerability man- problems managing a dynamic data cen- Global DataCenter Management pro- analysis and correlation; vulnerability agement, network access management/ ter environment. Impacts of implementa- vides enterprise software products to sup- scanning; a security event manager for monitoring, assessment, training, project tions, consolidations, virtualization, the port strategic planning and operation of global, network, and vendor threats and management, policies and procedures, and retirement of IT assets, and even basic some of the largest data centers in the detected vulnerabilities; and network regulatory compliance audits. It provides a IT changes lead to the risk of overheat- world. The company, founded in 2003 access control and monitoring. risk-based methodology, regular reviews ing, increased power costs, new capital and headquartered in California and Because all of the Enterprise UTM of security controls, full life cycle device equipment expense, cable infrastructure London, England, is uniquely positioned security applications are integrated at the management, and audits and assessments road blocks, system downtime, and secu- to provide automation and analytic architectural level, organizations realize for workforce and training policies. rity risks that result in increased opera- expertise, focusing on the physical infra- better performance and service at a tional cost. structure needs of medium to extremely lower cost of ownership—up to 60% Global DataGuard Enterprise The nlyte software suite from GDCM large data center environments. over standalone products. Application Unified Threat Management Suite (Global DataCenter Management) opti- modules can be deployed as part of a Helps organizations protect healthcare information mizes critical data center physical assets Global DataCenter Management nlyte complete security infrastructure or can by visualizing, modeling, and enabling Lets you visualize, model, and manage your complex Starts at $7,500 for an ASM core module be added incrementally, as business and immediate feedback on planned and data center environment compliance requirements evolve. (972) 980-1444 implemented changes to facilities, The All-n-One Security module for equipment assets, racks, devices, cables, (866) 929-4326 www.globaldataguard.com Enterprise UTM comes in four options connections, and power resources. The www.gdcm.com (with firewall, VPN, antivirus, antispam, software lets users trend and analyze content filter, IP reputation, and IPS how current and planned changes impact NETWORKING & VPN APRIL4, 2008 NETWORKING & VPN MAY23, 2008 A Comprehensive View Mobile Management dcTrack 2.0 From Nassoura Technology Associates Control Wireless Networks Offers Automated, Visual Management Of Data Center Assets With AirWave Wireless Management Suite 6 Access points, routers, switches, to determine the cause of a authentication servers, and manage- failure and the departments ment servers are visible across wired and applications affected. and wireless infrastructures. This pro- dcTrack integrates with gram provides comprehensive reports AutoCAD, providing color- and centralized control of tens of coded views of floor plans thousands of wireless devices. and objects; the program The AirWave Management plat- automatically identifies man- form provides real-time monitoring aged objects when they’re of wireless users and devices, as well added to a CAD floor plan. as multivendor support. VisualRF Data center managers can View and control all aspects of your wireless network software features direct CAD and get a clear view of a cabinet’s with the AirWave Wireless Management Suite 6. bulk floor plan import to make con- dcTrack 2.0 provides a comprehensive view of the front and rear views elevation, devices within a sole views more user-friendly, along of servers as well as floor maps, rack elevations, and power paths. cabinet, and the front and THE MOBILE workforce is growing as with visual display of alerts and error con- rear ports of those devices. wireless technologies emerge and evolve. ditions. For enhanced security, the plat- MANAGING THE infrastructure of a data Data center personnel can label device While this is great for the success of orga- form includes RAPIDS rogue AP detec- center can be a costly venture, but it does ports and add their own views of devices nizations, it can be a burden to IT support tion software. The AirWave Master Con- not have to be. dcTrack 2.0 from Nas- to dcTrack’s library. teams. But with a program that gives you sole offers scalable centralized configura- soura Technology Associates simplifies Version 2.0 adds data center visualiza- visibility and transparency from a single tion and detailed reports of the network’s managing a data center’s infrastructure by tion tools; SNMP data discovery of console, such as the AirWave Wireless performance, groups, locations, and indi- offering a centralized, automated manage- power, temperature, and humidity; and Management Suite 6, organizations can vidual devices. ment system. It offers tools for tracking support for one-to-many and many-to- configure and manage an entire wireless assets, cabling, IP subnets, VLANs, VMs, one IP address assignments. network without additional costs. AirWave Management Suite 6 smart power strips, cooling devices, and AirWave Wireless Management Suite 6 Starts at $5,000 many other components. The latest ver- dcTrack 2.0 from AirWave, a division of Aruba sion can also manage virtual servers Networks, can help organizations migrate Helps organizations configure and control an entire A complete automated system for central based on clusters, data store locations, to 802.11n technology without discarding wireless network from a single console management of a data center’s infrastructure virtual switches, and virtual ports. legacy infrastructure. The application also (866) 802-1121 One of the key benefits of dcTrack is (908) 604-6700 features a new Help Desk module that that it reduces the costs incurred through integrates with existing service desk solu- airwave.com www.nta.com/dctrack.htm manual asset tracking. It simplifies man- tions to provide ITwith automated diag- aging changes and the documentation nostics and real-time monitoring for more required for audits, and it provides tools efficient resolution of end-user issues. Page 4 Processor.com May 23, 2008 MarketPlace ▲▲ NEWS UpcomingIITT Events ▼ - MAY - ITEC St. Louis Act, introduced by Reps. John Conyers of and Chekib Akrout, the former vice presi- May 27-28 St. Louis, Mo. Michigan and Zoe Lofgren of California, dent of design technology at Freescale www.goitec.com would require Internet service providers to Semiconductor, will lead the group. treat all content passing through their net- ❙❙ - JUNE - Corporate Software Spending works in a “reasonable and non-discrimina- Gartner IT Security Summit tory” manner. Some service providers have Sees A Slowdown June 2-4 Washington, D.C. allegedly slowed access to certain sites dur- ACCORDING TO A RECENT SURVEY on U.S. www.gartner.com/it ❙❙ ing peak times of network congestion. corporate IT spending conducted by /page.jsp?id=594029 Microsoft Appeals EU Fine Conyers says the bill was introduced to pre- ChangeWave Research, 25% of respon- (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) MICROSOFT HAS ISSUED a formal vent companies with monopoly or duopoly dents said they plan to spend less on soft- ITEC Dallas appeal of the nearly $1.4 billion fine power from controlling how the Internet ware in the upcoming months. When com- June 4-5 Dallas, Texas imposed on the company earlier this year operates and essentially choosing what con- pared to earlier figures, the results show a www.goitec.com by the European Union. Microsoft filed the tent is available. continuing trend. The figure has increased (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) appeal at the European Court of First ❙❙ by three points compared to a similar sur- ITEC Seattle Executive Changes At IBM Instance in Luxembourg. The European vey conducted in January and is 11 points June 10-11 Commission filed its latest fine against IBM IS RESHUFFLING ITS RANKS to replace higher than one conducted in October. In Seattle, Wash. www.goitec.com Microsoft on Feb. 27 for its failure to com- retiring executives and make other restruc- the most recent survey, 55% of those ques- (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) ply with a 2004 antitrust agreement. turing changes. The company’s senior vice tioned responded that their spending on Microsoft TechEd 2008 Among other items, the 2004 agreement president of IBM’s Systems and Tech- software will remain the same during the June 10-13 between the EU and Microsoft required nology Group, William Zeitler, is retiring next 90 days, and 12% predicted an in- Orlando, Fla. Microsoft to allow third-party developers in the beginning of August, and Robert crease in spending. www.microsoft.com/events/teched2008 easier, more affordable access to Windows Moffat will fill his position. Likewise, ❙❙ (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) State Dept. Finds Missing Laptops HP Technology Forum & Expo and Office interoperability information. IBM’s executive vice president of innova- June 16-19 Microsoft officially came into compliance tion and technology, Nicolas Donofrio, will AFTER REPORTS SURFACED IN MARCH that Las Vegas, Nev. with the agreement on Oct. 22; the $1.4 bil- retire in the beginning of October, but no $30 million worth of equipment, consisting www.hptechnologyforum.com lion fine is for the original judgment and one will fill the vacant position. The week mostly of laptops, had gone missing from (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) NXTcomm noncompliance up to the October date. before these announcements, Ravindra the U.S. Department of State, Congres- June 16-19 ❙❙ Marwaha, the general manager of global sional Quarterly is reporting that hundreds Las Vegas, Nev. HP Buys EDS business partners, announced at the IBM of the laptops have been located. According www.telecom-next.com ACCORDING TO A RECENT announcement Business Partner Leadership Conference to the original report, auditors discovered (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) by HP, the company will acquire IT out- that he will retire and be replaced by the missing equipment. The missing State ITEC Indianapolis June 18-19 sourcer EDS in a deal worth $13.9 billion, Richard Hume. Department equipment followed several Indianapolis, Ind. or $25 per share. The acquisition is sched- ❙❙ other high-profile cases of missing govern- www.goitec.com Sprint Nextel Posts Lower Revenue uled to be completed by the second quarter. ment laptops. In 1999, a State Department (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) According to HP, EDS will help the com- IN ITS FIRST QUARTER THAT ENDED on laptop storing information on foreign ITEC Charlotte pany more than double its services revenue. March 31, wireless carrier Sprint Nextel’s agents was stolen; in 2001, laptops used by June 25-26 Charlotte, N.C. After the deal is complete, HP will fold its revenue dropped 7.5% year over year, from the IRS went missing; and in 2006, an offi- www.goitec.com outsourcing business into a new unit, which $10.1 billion last year to $9.3 billion this cer from the Veterans Administration had a will be called EDS—an HP company. The year. The company’s quarterly loss was laptop stolen. All of those cases led to con- - JULY - new unit will be based in Plano, Texas, higher this year than last year, with a loss gressional hearings. SANSFIRE 2008 which is where EDS is headquartered, and of $505 million, or 18 cents a share, up ❙❙ July 22-31 New CEO For Gates Foundation Washington, D.C. will be run by Ronald Rittenmeyer, EDS’ from last year’s loss of $211 million, or 7 www.sans.org current chairman, president, and CEO. cents a share. The company also noted that JEFFRAIKES, ALONGTIMESENIORexecutive (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) ❙❙ its total subscriber base decreased 1.09 mil- at Microsoft who announced his retirement National Institute SAP Posts Drop In Q1 Profit lion subscribers this quarter to settle at 52.8 in January, will become the new CEO of the of Governmental Purchasing FIRST-QUARTER PROFITS AT BUSINESS soft- million subscribers. That figure includes Bill & Melinda Gates Foundation. Raikes is July 26-30 Charlotte, N.C. ware maker SAP dropped more than expect- the loss of 1.07 million post-paid customers taking the place of Patty Stonesifer, who has www.nigp.org/Events/Forum.htm ed, according to recent reports. Reasons for who normally pay a monthly bill. been the foundation’s CEO for 10 years and the decline include costs associated with ❙❙ will move to a new role within the founda- - AUGUST - AMD Makes Internal acquisitions and the falling dollar. Net tion. Prior to this position, Raikes worked at LinuxWorld Conference & Expo income during Q1 dropped 22% to $376.7 Management Changes Microsoft for 26 years and had been presi- August 4-7 San Francisco, Calif. million, compared to $478.9 million during CHIPMAKER ADVANCED MICRO Devices is dent of the business division, where he was www.linuxworldexpo.com the same quarter a year ago. Despite the rearranging some executive positions, with in charge of Office, Windows Server, SQL (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) drop in income, SAP reported a growth of Randy Allen replacing Mario Rivas as the Server, and other products. The foundation CompTIA Breakaway Conference 11% in software-license fees, which were senior vice president of the computing sol- has more than 500 employees and an August 5-7 $960.8 million for the quarter, and a growth utions group. AMD said Rivas is leaving endowment of $37.3 billion. Orlando, Fla. breakaway.comptia.org of 15% in software and related service rev- AMD “to pursue new opportunities.” Allen, ❙❙ Social Networking Apps Take Off (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) enues, which were $2.69 billion. who had previously headed up the server Next Generation Data Center ❙❙ and workstation business at AMD, will THE MARKET FOR ENTERPRISE social net- August 4-7 New ’Net Neutrality Bill Introduced report to President and COO Dirk Meyer. working applications grew more than 190% San Francisco, Calif. AFTER A SIMILAR BILL FACED significant AMD also announced plans to create a new during 2007, much faster than expected, www.ngdcexpo.com opposition in 2006, two members of the U.S. central engineering organization to oversee according to figures from research firm (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) SHARE House of Representatives have introduced a the development and direction of its prod- IDC. And the market is expected to grow to August 10-15 revised bill aimed at Internet neutrality. The uct road map. Jeff VerHeul, AMD’s corpo- $1.3 billion by 2012. IDC cited several rea- San Jose, Calif. Internet Freedom and Nondiscrimination rate vice president of design engineering, sons for the growth, including a larger num- www.share.org ber of manufacturers that are starting to (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) Intel Developer Forum WATCH THE build social features into their products and August 19-21 This information provides a quick glimpse of current and historical stock an increase in enterprises adopting social STOCKS San Francisco, Calif. prices and trends for 14 major companies in the technology market. networking products for use in a variety of www.intel.com/idf areas, such as human resources and sales. - SEPTEMBER - ❙❙ % change from Indian High-Tech Workers Enterprise Architecture 2008 Company Symbol Year Ago May 7 $ May 14 $ previous week Prefer To Stay In Country September 9-10 Computer Associates CA $27.70 $23.03 $23.89 ▲▲3.73% Washington, D.C. Cisco Systems CSCO $26.48 $25.78 $25.75 ▼▼0.12% AMONGGRADUATESOFINDIANInstitutes of events.fcw.com Technology during 2002 and 2007, 84% Dell DELL $25.92 $18.90 $20.06 ▲▲6.14% chose to remain in India for higher educa- Electronic Data Systems EDS $28.26 $18.95 $24.34 ▲▲28.44% tion or work opportunities. That compares Google GOOG $472.61 $579 $576.30 ▼▼0.47% to 65% of those who graduated between HP HPQ $45.21 $48.65 $45.64 ▼▼6.19% Do you have a new product that data center/IT IBM IBM $105.87 $124.14 $127.52 ▲▲2.72% 1964 and 2001. Those figures are among managers would be interested in learning about? those reported by research and analytics Call (800) 544-1264 or email [email protected]. Intel INTC $22.18 $23.17 $23.84 ▲▲2.89% firm Evalueserve. The latest figures corre- McAfee MFE $33.24 $33.95 $35.72 ▲▲5.21% Subscriptions Advertising & Reprints spond to a drop in the number of people Microsoft MSFT $31.07 $29.21 $29.93 ▲▲2.46% (800) 819-9014 (800) 247-4880 who view the United States and other coun- (402) 479-2170 (402) 479-2141 Oracle ORCL $18.99 $20.99 $21.78 ▲▲3.76% tries as having more opportunities than FAX: (402) 479-2193 Red Hat Software RHT $22.17 $21.84 $22.42 ▲▲2.66% India: 60% of those who graduated be- Sun Microsystems JAVA $5.12 $12.83 $13.17 ▲▲2.65% tween 1964 and 2001 thought countries Editorial Staff 131 W. Grand Drive (cid:127) Lincoln, NE 68521 Symantec SYMC $19.88 $19.71 $20.59 ▲▲4.46% other than India provided better opportuni- [email protected] ties compared to 51% of recent graduates FAX: (402) 479-2104 NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. who said the same thing. May 23, 2008 Processor.com Page 5 P A W RODUCTS T ORK Firewall Implements just external threats to his network infra- structure. “By utilizing the PA-4020’s built- in reporting features, we were able to identi- fy internal application traffic that could also be detrimental to network performance,” Application Usage Policies says Bailey. Some of the issues Catholic Charities was able to take corrective mea- sures against included streaming media and peer-to-peer applications. The outright blocking of malware and spyware previous- Device Plays Central Role Application decoding. A continuous ly noted was also an added bonus. application decoding engine identifies the All in all, Bailey was pleased with the In Charity’s Infrastructure Upgrade more evasive applications and creates the results of the rollout: “Our implementation foundation for accurate threat prevention went smoothly as the PA-4020’s graphic by Joseph Pasquini Protocol Label Switching (MPLS) data net- and application function control. user interface (GUI) was easy to use. The (cid:127) (cid:127) (cid:127) work,” says Bailey. “Our previous firewall SSL decryption. Decrypts outbound SSL firewall has worked flawlessly.” THE BENEFITS OF CONNECTING an organi- also lacked built-in reporting, and we didn’t traffic using a forward proxy to identify and Bailey also has praise for the responsive zation to the Internet are unquestionable. In have adequate visibility into Internet traffic control the traffic inside before re-encrypt- level of support offered by Palo Alto today’s business arena, high-speed access as a result. We really needed the ability to ing it to its destination. SSL decryption can Networks. “They were very helpful when to the vast resources of the Web is often mitigate internal and external threats to our be enabled or disabled per policy based on we had some advanced configuration ques- considered just as crucial to employee pro- network, get reports on network activity, and source/destination, user, and URL category. tions.” According to Bailey, Catholic ductivity as access to a telephone or photo- then fine-tune our firewall policies Charities has not experienced any per- copier. However, the conspicuous benefits based on report findings.” formance or operational problems with of such online access are not devoid of According to Bailey, it was clearly the PA-4020 unit. their hidden costs. Without the proper con- evident that a new firewall would be an Room For Growth trols in place, the unforgiving reality is that integral part of the network infrastruc- a compromised corporate network will ture upgrade process. With that, the Bailey notes that there are a couple of inflict havoc upon an organization’s ability search was on for the right solution. Protocol/port. Enables policy control minor areas in which the PA-4020’s func- to serve its customers and retain their trust. During the research phase, though, Bailey over which port(s) may be used by a tionality could be somewhat strengthened. Catholic Charities of Santa Clara County learned that Palo Alto Networks (www given application. “I can only see Palo Alto Networks making thoroughly recognizes the tenets of service .paloaltonetworks.com) had implemented a Other features of the PA-4000 Series some minor GUI changes to the Web admin and commitment. Offering a helping hand to new firewall technology that could identify include integration with Microsoft Active interface and perhaps provide some updated its community for more than 50 years, the applications over any network port. “I Directory, Web usage policies using URL reporting capabilities to improve upon what California-based Catholic Charities annually found this capability to be quite intrigu- filtering categories, and robust traffic logs. is already an excellent product,” observes serves a wide array of individuals—approxi- ing,” says Bailey. “The fact that no other Sporting a 2U form factor, the rack- Bailey. However, he views the situation in a mately 27,000 in total—through a wide array firewall vendor provided technology simi- mountable PA-4000 Series is available in positive light. “My personal experience has of programs, including housing services, job lar to Palo Alto Networks’ App-ID signa- two models: the PA-4020 and the PA-4050. been that Palo Alto Networks welcomes skills training and placement, mental health ture technology really piqued my interest.” The PA-4020 delivers 2Gbps firewall customer opinion and makes improvement and substance abuse counseling, older adult As a result, the firewall that Bailey selected throughput and 2Gbps of threat prevention based directly on customer needs.” services, financial education, immigration, and deployed at the end of the day was the throughput; the PA-4050 is capable of Overall, Bailey asserts that the PA-4020 refugee resettlement, and youth services edu- Palo Alto Networks PA-4020. 10Gbps firewall throughput and 5Gbps full met his project’s objectives: “The PA-400 cation. Catholic Charities is also designated threat prevention. Both models are equipped firewall did ultimately solve our agency’s The Proposed Solution & Specifications as an early responder and is empowered to with 24 interfaces (16 10/100/1000 and problems. We feel much more protected and assist its community following a natural dis- The Palo Alto Networks PA-4000 Series eight SFP optical gigabit) and feature in control of our network as a result.” P aster or other similar crisis. is a next-generation firewall targeted at redundant 400W power supplies. high-speed Internet gateway deployments. Firewall Needed For Upgrade Testing & Implementation Palo Alto Based on a new traffic classification tech- In order to better serve its clients and busi- nology referred to as App-ID, the highlight The initial implementation of the Palo Networks PA-4000 ness partners, in addition to the organiza- of the series is its ability to classify traffic Alto Networks PA-4020 was conducted tion’s 400 employees, Catholic Charities of based on an application-centric viewpoint. at the headquarter offices of Catholic Series Firewall Santa Clara County recently set out to More than 600 applications can be uniquely Charities. Within hours of placing the PA- upgrade its network infrastructure. Will identified by application content irrespec- 4020, Bailey noticed an excessive level of Bailey, the organization’s information tech- tive of port, protocol, SSL encryption, or traffic being generated from a workstation High-performance, next-generation firewall nology manager, was tasked with leading the evasive characteristic. The device also on his network. After some investigation, offers policy-based application security project. Bailey has extensive knowledge in combines policy-based application visibili- he discovered that the node in question was together with real-time threat prevention networking technologies, including WAN, ty and control with real-time threat preven- badly infected with a wide assortment of VPN, and DSL. Prior to his current position, tion designed to protect traffic flowing in malware. Thanks to the PA-4020, the spy- “The Palo Alto Networks PA-4000 firewall ulti- Bailey served as the network administrator and out of the network. ware-laden system was quickly found and mately resolved our agency’s problems. We for a financial institution, as well as a com- Palo Alto Networks’ App-ID technology immediately removed from the network. feel much more protected and in control of puter lab instructor for grades K-6. uses four collaborative traffic identification After putting the unit through a series of our network as a result,” says Will Bailey, Based upon his varied experience, Bailey mechanisms to determine which applica- tests, Bailey next moved the firewall to his information technology manager at Catholic instinctively knew he needed to address sev- tions are traversing the network: colocation site where his service provider Charities of Santa Clara County. eral concerns. “Our previous firewall was Application signatures. Context-aware links his agency’s Internet connection to his not powerful enough to handle increased pattern matching designed to look for and MPLS network. During this phase of the (866) 207-0077 Internet traffic that would pass through our correctly identify the unique properties and evaluation process, Bailey observed that the www.paloaltonetworks.com new, centralized Internet gateway and Multi information exchanges of applications. firewall was capable of blocking more than MESSAGING & TELEPHONY MAY23, 2008 Regulating Electronic be sorted by employee name, group, or available for enterprise and public IM, online other directory attribute. L7 Enterprise can conferencing, server-based fax, and VoIP. It also offer security, policy management, will be available as an add-on module for Communications and content filtering in addition to the Akonix’s A1000 and A6000 appliances or as archiving, with support for Microsoft a Windows Server software module. Office Communicator Mobile, IBM Lotus Sametime Mobile, and MindAlign Mobile. Akonix L7 Enterprise for the Archive Messages With Akonix’s L7 Enterprise The L7 Enterprise provides thorough BlackBerry Enterprise Solution electronic message storage by integrating For The BlackBerry Enterprise Solution Starts around $10 per BlackBerry with LDAP directories, such as BlackBerry AS PROFESSIONALS USE ELECTRONIC com- L7 Enterprise for the BlackBerry Enter- Enterprise Server, Microsoft Active Direc- Helps organizations archive and regulate electronic munications more and more, organizations prise Solution. tory, and email archive platforms, such as communications must look for ways to supervise and As a new addition to the Akonix UPM EMC EmailXtender, HP Integrated Archive (619) 615-9415 archive this type of communication to pre- (Unified Policy Management) platform, L7 Platform, and Symantec Enterprise Vault. vent fines and legal sanctions. Enterprise for BlackBerry archives SMS, L7 Enterprise provides multiple real-time www.akonix.com For organizations looking to archive and PIN-to-PIN text messaging, instant mes- communications from a single console and monitor all forms of electronic commu- saging, and email, making them search- the ability to apply and enforce policy nications, Akonix has introduced the able, retrievable, and auditable. They can through other L7 Enterprise modules Page 6 Processor.com May 23, 2008 NETWORKING & VPN MAY9, 2008 NETWORKING & VPN APRIL11, 2008 Quickly, Efficiently Software With Skills Test Ethernet Connections Marathon’s everRun VM Adds Reliability To Virtual Servers When The Ethernet Connection Goes Down, IN MOST VIRTUAL ENVIRONMENTS, servers that run business-critical Smartronix’s LinkUp? Can Help applications are not consolidated with the virtual Web, file, and print servers because the business-criti- WHEN PROBLEMS arise a data packet loopback cal servers require more than fail- with your network con- test, which sends real over protection. Marathon’s ever- nection, your organiza- data through the cables. Run VM software prevents outages tion can pay the price in The LinkUp? Ethernet and data loss in Citrix XenServer both time and money. Tester can identify 10/ virtual infrastructures, so high- Getting the Ethernet con- 100/1000Mbps capabili- value production applications can nection up and running ties and test 802.3af reliably run on virtual machines. again can be difficult, PoE voltages, while also Therefore, you can use everRun especially when there are verifying port, NIC, or VM to ex pand virtualization bene- several potential causes. AUTO-MDIX wiring. fits to a much broader range of Troubleshooting needs to be quick, effi- The impact-resistant ABS case is dust- applications than you could before, With Marathon’s everRun VM, you can automate cient, and simple in order to contain the and splash-proof, and the keypad is virtual machine availability. which can also help enable faster effects of a break in the Ethernet connec- sealed in a membrane for protection. The adoption of server virtualization. tion. Smartronix’s LinkUp? Ethernet LinkUp? Ethernet Tester can operate at everRun VM creates redundant midsized enterprises and helps remove Tester can help IT managers quickly temperatures ranging from 0 to 50 virtual machines and offers synchronized burdens from IT professionals. The dial-in diagnose problems with Ethernet connec- degrees Celsius. The LinkUp? Ethernet mirroring of your whole system to main- availability feature also eases the burden tivity. Tester package includes a 4-foot CAT 5 tain high availability and server perfor- on IT administrators because they can The LinkUp? Ethernet Tester is a Test cable and a SuperLooper Gigabit mance on virtual machines. The everRun match the right availability level for each heavy-duty battery-powered (two AA Loopback Adapter. VM software can also monitor and control application running in a virtual machine to batteries are included) device that can troubleshoot connectivity problems Smartronix LinkUp? all the interactions between the hypervisor create optimal accessibility. and the virtual machine. In particular, quickly through its LED lights or thor- $349 everRun VM features tight integration Marathon Technologies everRun VM oughly through its LCD. This display A quick and easy Ethernet link tester that can help IT with Citrix XenServer to automate virtual provides a detailed link analysis via the Starts at $2,000 per server managers diagnose Ethernet connection problems machine availability, let administrators LinkUp?’s menu system, while the basic select different availability protections for Fault-tolerant, high-availability software connection status is supplied through the (301) 737-2800 each virtual machine, and support for server virtualization device’s LEDs. The LinkUp? Ethernet www.smartronixstore.com Windows applications without need for Tester has a LinkBlink test that can (800) 884-6425 modifications. establish wired port numbers by the link everRun VM’s automated fault and www.marathontechnologies.com lights on hubs and switches. Prerun policy management makes high avail- cabling malfunctions can be found with ability and data redundancy practical for NETWORKING & VPN APRIL18, 2008 SECURITY APRIL18, 2008 Wi-Point 3G: Cellular & Active Directory, Wi-Fi Connectivity Meet Unix & Linux Digi International’s Router Helps Businesses Connect Symark PowerADvantage Offers Integrated Authentication & Configuration easy integration between the Internet and any corporate network. Digi has also addressed the concerns MANY ORGANIZATIONS PowerADvantage is min- of updates and has made it even easier to rely on Microsoft’s Ac- imally disruptive, so us- keep up with the constantly changing tive Directory to handle ers can make changes business world. It uses updates that authentication requests. without having to reboot improve remote Wi-Fi hotspots, disaster But because it can’t man- systems or restart the recovery, backup, security, and mobile age Unix and Linux, or- agent. Admins can make issues. No software is needed to run or ganizations have had to configuration changes update the Wi-Point 3G. rely on alternate methods through Group Policy to BUSINESSES ARE in a constant state of Wi-Point’s supported interfaces in- of authentication. avoid having to apply connectivity. The employees are con- clude 10/100Base-T for Ethernet, 3G for PowerADvantage is an changes to each host. nected to and through numerous net- cellular, 802.11b/g for Wi-Fi, and DIN integrated authentication All identity data is works using laptops with Wi-Fi, mobile connector for serial. It supports multiple and configuration utility The PowerADvantage admin console stored within Active phones, and laptops with cellular PC network options, including DHCP server, from Symark that brings lets users remotely alter contexts, Directory, eliminating data cards. And many IT and data center a LAN and WLAN bridge, DMZ sup- Unix and Linux systems account names, UIDs, and more. the need to save redun- managers are recognizing the need for an port, GPS, DDNS, and NTP. all the benefits of Active dant identity data else- access point within business. The Wi-Point includes an internal fire- Directory, including centralized authenti- where. PowerADvantage also produces Digi International’s Wi-Point 3G router wall to help protect passing traffic. cation, account access, policy enforce- detailed compliance reports to help orga- helps ease the use of multiple wireless There are firmware upgrades, traffic and ment, and infrastructure management. nizations adhere to regulations. devices. The Wi-Point 3G is a cellular-to- event logs, and a setup wizard. A list of PowerADvantage joins the Unix/Linux Wi-Fi hotspot with VPN. It supports most supported wireless PC cards can be host to the domain and configures it to Symark PowerADvantage cellular PC data cards, and it is easy to set found on the company Web site. route authentication requests through the Pricing starts at $290 per server, $45 per workstation up for instant wireless connectivity. PowerADvantage agent, which communi- Digi designed the Wi-Point to be Digi Wi-Point 3G cates with the Active Directory domain A centralized authentication, account access, policy small and convenient. It is about 6 x 6 controllers to process requests. enforcement, and infrastructure management platform Starts at $485 inches and can be easily integrated with PowerADvantage lets administrators (800) 234-9072 existing wireless equipment. Router for ease of cellular maintain a unified login and password for The Wi-Point 3G excels in device and Wi-Fi connectivity all machines. For each host, the offering www.symark.com connectivity. Cell phones are able to uti- also lets users adjust the Group Policy (952) 912-3444 lize Internet equal to and above DSL Objects and change the PowerADvantage speeds. The Wi-Point also allows for www.digi.com Context to reset the login for any host. May 23, 2008 Processor.com Page 7 SECURITY APRIL18, 2008 NETWORKING & VPN APRIL18, 2008 Take Your Security Testing Clientless Security To A New Level Promisec Spectator Professional 3.3 Reports On Threats Codenomicon DEFENSICS 3.0 Finds Security Flaws be reported on and managed by preset policies. Removable stor- Other Fuzzers Have Missed age devices would be reported on in the same fashion. With the the testing capabilities from aforementioned remote remedia- what is offered by default and tion, the need to physically ad- also enjoy an improved out-of- dress problems is eliminated. the-box experience. Enhancements in Promisec The Test Case Editing feature Spectator have improved end- provides a targeted approach for point visibility, reporting, con- testing highly specific protocol trol, and utilization. Com-pati- areas, whereas the Instrumen- bility and ease of use have also tation Script Library feature been increased. Unix/Linux and enables additional means for Mac OS X and newer are sup- monitoring and controlling the ported with reports made using system under test and test exe- Spec Pro 3.3 uses graphs to create a more well-rounded view the SSH protocol. A hotfix cution itself. A complete rewrite of issues in the system. patch monitor has been added to DEFENSICS 3.0 quickly detects software vulnerabilities. of the GUI provides a dash- point out missing patches in the board view with full control ISSUES WITH PRODUCTIVITY can make or system. Reports and audit data can now INTHEWORLDOFFUZZING,even the best over multiple test runs with break a company. Employees are often not be saved in XML format along with can do better. Codenomicon’s DEFEN- multiple protocols and file formats. the culprit when office efficiency is ques- other standard formats. Promisec’s soft- SICS 3.0 bundles accumulated experi- Advances in reporting, as well as the tioned. System downtime can be just as ware also helps with audit tracking and ence from the past decade and upgrades adoption of industry standard scoring much a factor as too many coffee breaks. automatically records all audit activity security testing. Improving test coverage mechanisms such as CVSS and CWE, Promisec has created the Spectator Pro- and presents tracking data. and efficiency even further than before aid in assessing the severity and root fessional 3.3 to help report on problems has been a key goal in the development cause of any found problems. and ensure compliance. To help prevent Promisec Spectator Professional 3.3 of DEFENSICS 3.0. downtime, remediation capabilities have Codenomicon DEFENSICS 3.0 In addition to improved efficiency, been added to the software. Starts at $43 per seat DEFENSICS 3.0 introduces several Finds critical quality issues fast and tests The Promisec Spectator software is Keep productivity high and compliance issues low enhancements in the areas of productiv- wireless and networked products and services clientless. Operating from a central point, ity, usability, and root cause analysis. an entire company can receive reports and (212) 743-9916 (408) 392-9000 It’s also easier to integrate with cus- risk information without performance www.promisec.com tomer testing frameworks and test con- www.codenomicon.com loss. Promisec’s software can also protect trol systems. With the new DEFEN- against human and cyber threats. Un- SICS 3.0 tests, users can both extend authorized peer-to-peer networks would MESSAGING & TELEPHONY APRIL25, 2008 SECURITY APRIL25, 2008 Protect Telepresence IT & Security Metrics Investments ClearPoint Security Performance Manager 2.0 Communicates Results Upgrade Your Monitoring Capabilities With Tandberg Management Suite HIGH-PROFILEorganizationalfailures coupled with threats of information system disruptions have elevated IT TMS can allocate and connect man- and information security performance agement resources. Users can easily plan control reviews and transparency to a video, audio, and Web conferences; the board-level issue. The current busi- Conference Control Center allows for ness climate mandates that organiza- real-time schedule management. tions adopt IT and information securi- TMS sustains multiple vendors to ty governance programs. ClearPoint manage video networks and deployment. Metrics has created the Sec-urity The new version features automatic Performance Manager 2.0 to deal upgrades for videoconferencing end- with these challenges. points and infrastructure software and The Security Performance Man- Scorecards include hard facts and data from metric results, Track conference bookings and perform network now supports Polycom HDX endpoints ager 2.0 automates the entire improving decision-making and evidencing controls. administration tasks through the Web-based interface. and Tandberg Codian Multipoint Control process of designing, calculating, Units. It continues to support Sony, and communicating key IT and infor- unit executives to understand their role in IT ADMINSneed to maintain a reliable net- Radvision, Cisco, Aethra, VTel, and mation security performance metrics to safeguarding information assets. work environment. To help them do that, Polycom product lines. TMS also inte- all levels. Best practice content pack- Features include customizable presenta- Tandberg has upgraded its TMS (Tand- grates with collaboration tools. ages deliver the data to support risk tion “views” for scorecards, new data berg Management Suite) for telepresence evaluation and mitigation efforts, sav- adapters for security element managers, and high-definition videoconferencing ing time and cost in compliance assess- and improved processing scale with the with enhanced diagnostics, monitoring, Tandberg Management Suite ment, reporting, and audits. ClearPoint ability to run multiple production servers. and scheduling options. The TMS Server appliance starts at $13,900, with Metrics offers four packages: Identity With total network visibility and cen- preinstalled Tandberg Management Suite and and Access Management; Vulnerability ClearPointMetrics tralized control, TMS offers end-to-end Scheduler; a free 30-day trial version is also available and Patch Management; Threat and Security Performance Manager 2.0 management for onsite and remote video Virus Management; and Compliance Video management platform that provides central- Starts at $50,000 per package per year systems. It uses a Web-based interface for Management. ized management, diagnostics, monitoring, and scheduling, call launching, and accessing The solution is designed to deliver reli- Uses metrics and scorecards to measure, monitor, scheduling options for videoconferencing networks phone directories. Through this user- able, trusted, and auditable metric results and communicate IT andsecurity initiatives friendly navigation tool, admins can also (888) 263-2374 presented in the business context and (617) 456-1904 monitor network statistics, organize book- aligned with operational goals. As a www.tandberg.com ing, and perform software updates. Event result, IT and security teams can regularly www.clearpointmetrics.com notification alerts warn users of negative assess and communicate IT and informa- service levels before a problem occurs. tion security posture and enable business Page 8 Processor.com May 23, 2008 May 23, 2008 Processor.com Page 9 PC Buying In The SME greenhouse gas emissions by the equivalent of removing 4,000 cars from our roads.” Single Or Multiple Manufacturers? Biglin says that buying all your PCs from a single manufacturer Notebook & Desktop Purchases offers potential hardware and service-level agree- Take Thought & Planning ment price breaks, along with additional free ser- by Robyn Weisman has the kinks worked out of it,” vices, such as disk image (cid:127) (cid:127) (cid:127) says Kay. management and asset BUYINGPCSISACENTRALTASKfor IT man- Given that the situation is tagging. “Also, when agers, but it’s hardly an easy one. For one more complicated than ever going with a Tier 1 manu- (obvious) thing, you cannot just buy new before, here are some tips to facturer, you generally computers the way people order lattes. It not help you in your quest to can get parts and service only takes a lot of thought and planning, but upgrade your PC fleet. along with combined it rarely gets accomplished overnight. driver patching, which Maximize Your PC Life Cycle “Even if you’re upgrading your whole would otherwise be more fleet of PCs, you take everybody out a little Blane Warrene, director of laborious,” says Biglin. at a time, and so you have two operating investment technologies at Endpoint’s Kay concurs environments going at once—your old one ValMark Securities (www.val that you can get a better and new one,” says Roger Kay, founder marksecurities.com), says that deal if you can aggregate and president of Endpoint Technologies you want to make sure you all your volume with a Associates (www.ndpta.com), a technology maximize your PC life cycle so single supplier. However, market analysis firm. In addition to manag- that you are replacing your PCs you may find yourself ing the two environments, you have to about every three years. To vulnerable to this suppli- upgrade your applications, perhaps rewrite achieve this, think about buying er’s whims. “If they don’t your primary business applications, and scalable machines that come perform for you, you’re upgrade your client-side operating system. with dual monitor cards and stuck. You can’t shift their Except it isn’t even that simple anymore. expandable RAM slots. And volume to somebody Microsoft Windows Vista (www.microsoft keep a close eye toward every else,” he says. Therefore, .com) has been problematic for many users, progressive OS migration, you need to feel very and it can be so slow that The Wall Street whether you’re going to stay with WinXP for comfortable with your supplier if it is the Additional Considerations For Notebooks Journalcolumnist Walter Mossberg recently the near term or make the jump to Vista. only one you plan to use. joked in a column that you can take your dog John Biglin, CEO of Interphase Systems Given that your company’s data is at risk Meanwhile, using multiple sources on a walk during the amount of time Vista (www.intph.com), a management and tech- more than it has ever been, you can no allows you to play vendors off of each takes to boot up. Meanwhile, Microsoft has nology consultancy, says that along with longer assign a laptop to a user before mak- other. “You can always say, ‘Look, we announced that it plans to stop retail sales various security, hardware, and graphics ing sure the laptop has email and disk took your notebooks last time, and we took and general licensing of WinXP to OEMs improvements, more online management encryption tools integrated into it that do these other guys’ desktops, but we could beginning June 20, as well as quit primary capabilities are being built into new busi- not require user intervention, says Warrene. give them your notebooks because you’re support of the OS as of April 14, 2009. “And ness-class systems, all of which you want Also, look for laptops that offer system not behaving very well, so we need more XP is a good OS. It’s stable, runs pretty fast, to consider when choosing your new fleet. protection capabilities such as “drop protec- cooperation from you,’” says Kay. tion,” which pauses hard drives if it senses a Vista Or WinXP? certain level of g-force; built-in backup parti- Questions For Potential Vendors tions; and Bluetooth connectivity, says Given that so many people are dissatisfied Biglin. For example, many new notebooks with Vista, Kay thinks that Microsoft will use wireless cards that provide 802.11n probably not end primary support for WinXP When talking to vendors, make sure you put (cid:127) How old is the proposed product in terms of specs, as well as the older 802.11a/b/g ones. by its intended date. Moreover, it isn’t clear together a list of questions for them to answer. the product life cycle? Is a replacement how long OEMs will continue to ship PCs In addition to those that will be specific to your model due to be released soon? Look For EPEAT Certification with dual-boot WinXP and Vista, downgrade business, consider adding basic ones to your Melissa Quinn, sustainability programs rights, or simply with only WinXP loaded. list also. (cid:127) What is the process for providing updates manager at IT resources management firm The question becomes, should you go and patches to firmware, drivers, and so Softchoice (www.softchoice.com), recom- ahead and upgrade to Vista? With the For example, Blane Warrene, director of invest- forth? mends choosing PCs that pass EPEAT upgrade, you face significant investments in ment technologies at ValMark Securities (www (Electronic Product Environmental Assess- applications and other peripherals that will .valmarksecurities.com), suggests asking: How (cid:127) What common accessories or components ment Tool) system testing. According to work with the newer OS, and the benefits at standardized are the parts for this batch of sys- exist between the proposed replacement Quinn, EPEAT evaluates computers, laptops, this time are questionable, says Kay. tems in your supply chain, and what will the hardware and your company’s current hard- and monitors against two dozen mandatory At the same time, don’t assume you can inventory of these parts look like in 12 months? ware? Can certain power supplies, media environmental performance criteria. Bench- hold out until Windows 7 is launched in drives, and hard drives (as examples) be marks include the elimination of environ- 2010 and avoid Vista-related headaches. “Don’t get caught with an inability to rapidly reused? mentally sensitive materials in the manufac- Win7 is built on Vista’s code base, so you replace or upgrade based on a supply chain at turing process and energy conservation. may face more hurdles. Also, WinXP will the manufacturer that changes too rapidly,” he (cid:127) Does your hardware comply with systems “Over the coming year, [Softchoice] eventually be obsolete and unavailable as an notes. management standards for remote manage- expects to sell in excess of 140,000 desktops, option in new hardware. “Where that puts ment? laptops, and computer monitors,” Quinn you is, can you get XP and should you? Or In addition, John Biglin, CEO of Interphase says. “If each of these items were to meet should you make the leap to Vista, deal with Systems (www.intph.com), suggests these (cid:127) What wireless data networks do your laptops [EPEAT’s] Gold environmental standard, installation and integration headaches, and at questions: support? our customers would help save enough least be done with it? It’s a choice users have energy to power 6,000 homes and reduce to make on their own,” Kay says. P STORAGE APRIL4, 2008 Data Optimization recovery, and data replication applications. HyperIP works with applications includ- HyperIP is simplified for speed and reliabil- ing EMC’s SRDF, Centera Replicator, and ity to reduce cost and can help enterprises Celerra Replicator; Hitachi Data Systems’ Appliance meet compliance standards, TrueCopy; IBM’s Tivoli Storage Manager which protects them from and Global Mirror; NetApp’s SnapVault regulatory sanctions or and SnapMirror; Oracle’s DataGuard and lawsuits. The device is DB Rsync; and Symantec’s NetBackup, NetEx Optimizes also scalable and possess- Replication Exec, and Volume Replicator. es Recovery On Demand features. Connections Between Data Centers With HyperIP HyperIP is designed to accelerate data NetEx HyperIP replication and file transfers by aggregating DATA RELIABILITY, integrity, and per- necks and unreliable data problems that multiple data replication applications over Starts at $6,000 formance are paramount to the success, can plague low-end data optimization long-distance remote TCP/IP data trans- Facilitates reliable, low-cost data optimization between security, and compliance of every organi- appliances make managing and migrating missions. The appliances support up to data centers and helps enterprises meet compliance zation. Transferring data between data cen- data challenging and expensive. 800Mbps transfers over long-distance con- standards ters is crucial, especially for disaster recov- NetEx addresses this problem with nections for data management applications, (763) 694-4300 ery, but the process can be hamstrung by HyperIP, a business continuity and disaster including backup and remote replication low-end office WANs. Performance bottle- recovery optimization appliance for backup, and business continuance/disaster recovery. www.netex.com Page 10 Processor.com May 23, 2008 Choosing A Smartphone “goods delivered,” 2 means “en route,” etc. Keeping Costs Down And then there are models with touch- screens. These are great for certain uses, but It’s all very well to find the perfect Continued from Page 1 The basic functions you are looking for are, may be impractical in more rugged environ- smartphone. But if it ends up costing an of course, Internet, email, contacts, and ments. If your field reps have hands full of arm and a leg, it may not be quite so ideal Smartphone Options access to your own business systems. grease or acidic elements, some touch- after all. One way to keep costs down is to There are plenty of good smartphones More recently, phones have become avail- screens may not fare well. sign a two-year contract with the carrier— out there. And they are now selling at a able that have support for Microsoft Ex- but only do it if you are sure the service is Internet Connectivity much higher rate than regular cell phones, change. Others include more advanced secu- what you desire. With such a contract, you according to Mark Donovan, an analyst for rity features—remotely wiping the phone in There is a big difference in Internet con- can also obtain a nice discount based on the mobile technology consultancy M:Metrics. case it is lost or stolen, for example. This pre- nectivity between the various smartphones. number of phones purchased. “The smartphone market will nearly dou- vents the company database and key sales Some provide only a very basic connec- Another consideration for cost is the ble this year to 14.6 million devices from 7.4 contacts from ending up in the wrong hands. tion—fine for email and viewing a few Web hardware that is part of the deal. Some- million units sold in 2007,” says Donovan. Whatever model you choose, make sure the sites but hopeless if you have to view Web times carriers throw in older devices to That means the manufacturers are rolling basics work well in your environment. sites with a lot of graphics or surf through sweeten the deal. But a year or two down out a never-ending parade of newer, faster, multiple Web sites rapidly. Fortunately, a the line, you might be forced to go through All Thumbs and sleeker models. But SMEs shouldn’t be few devices have now come on the market an expensive upgrade in order to keep your tempted so much by fad as by workability. A major consideration on smartphone that provide a richer Web experience. applications current. Therefore, always choice is data entry. Some have tiny keys The choice comes down to need. If your seek out the most up-to-date hardware so Most Important that may not be usable in the field. If you sales reps require top-notch Internet capabil- you don’t get stranded one day with obso- are supplying phones to a bunch of burly ities, avoid smartphones that take forever to lete gear. Considerations plumbers with fingers like tree trunks, there load pictures. But if you hardly need Internet “Implementing a standard wireless solu- is no point buying a dainty model. at all, don’t pay more for a fancier design tion companywide, as well as consolidating “My fingers were just way too big to be with super Web features you’ll never use. onto one email solution and one device (cid:127) Learn all about the device—what it can and able to type messages on my new phone,” Ballema makes the point, though, that the type, is a good way to keep costs down,” can’t do. says Albie Berk, president of Ultimate Site phone itself might have all the features you says Ballema. “Standardization allows (cid:127) Marry that up with the needs of your busi- Promotion, a search engine marketing firm. need, but in some cases a particular smart- the company to control hardware and rate ness. “I really needed a bigger keyboard.” phone might limit your carrier options. plan costs.” (cid:127) Prioritize features so you differentiate Some manufacturers make larger hand- Depending on the carrier and organization- This necessitates, of course, a company between the essential and the “nice to sets, and a few provide a great deal of typ- al needs, one network may be more suitable policy against employees using their own haves.” ing space. In these cases, they provide a than another. devices. Some companies prefer letting (cid:127) Find out if the device itself integrates with reasonably sized QWERTY keyboard, “Select a carrier based upon the best cov- employees choose their own. That’s fine as the applications you require. which makes it easier to type long mes- erage area of where end users may be work- long as it is on the employee’s dime. But if (cid:127) Obtain a version for a trial to see how prac- sages and faster to compose short ones. ing,” says Ballema “If organizations have you are paying, it can end up very expen- tical it is to use in your primary users envi- Other phones use a number system for international users, they should seek out one sive—and a nightmare for IT trying to get ronment. automated data entry. For example, 1 means that can accommodate global coverage.” apps to work on so many devices. P Enabling Use Of New Technologies Risk Report Continued from Page 1 threat research project manager at Trend that they can only access authorized sites or Palo Alto Networks (www.paloaltonetworks “In 80% of the sample we looked at, Micro (www.trendmicro.com). “Users may applications could backfire, King believes. .com) summarized application traffic for 20 users were using proxies to circumvent not see something like a PDA as a risk,” he “A company that expects an employee to large organizations across a number of controls,” says Chris King, director of mar- says. “But they open windows of vulnera- answer email on a weekend is already com- industries, examining the behavior of more keting at Palo Alto Networks. “They use bility, and by the time they realize what’s municating that there’s a blend of work and than 350,000 users. Here are some of the anonymizer tools that have been perfected happening, it might be too late.” life,” he says. “If you give someone a findings: by those in oppressive regimes; they down- BlackBerry, do you expect them to only load tools to get around limits on the size of Bandwidth Concerns use it at their desk? Of course not.” (cid:127) External proxies, the kind IT does not sup- email attachments; they use Web-based Along with security, another major issue A first step in enabling new technology is port, such as CGIProxy and KProxy, were applications for downloading. All of it is bandwidth because many of the new to look at the culture and expectations of present in 80% of the customer networks. could represent substantial data leakage.” applications that users like can be band- the company, King adds. Also important is (cid:127) Encrypted tunneling applications, such as In other words, whatever IT is afraid width hogs. to understand how employees might be TOR (The Onion Router), were found 15% users are doing is probably exactly what As the Palo Alto report found, video in using the applications. For example, King of the time. they’re doing. Devices, too, can add an particular has become a significant con- points to a pharmaceutical company that’s (cid:127) Web-based file transfer and storage applica- extra layer of concern, notes Jamz Yaneza, sumer of bandwidth. using social-networking apps to market its tions such as Megaupload, YouSendIt, and The fact that some users will download drugs to physicians. Doctors go to the Web, MediaMax were detected in 30% of the sites. an application from a site that doesn’t have research the drug, and can then ask ques- (cid:127) Video over HTTP is consuming significant Understand Port 80 information they can even read will likely tions in a chat room. bandwidth in 100% of the sites. not surprise many IT managers, King notes. More companies are using instant messag- (cid:127) Streaming audio was present in 95% of Many IT managers might assume that port 80 “Users are a lot smarter than they used to ing for company representatives to keep in cases. is just related to Web browsing, but Chris be,” he says. “They can figure out security touch with customers. Understanding the (cid:127) Peer-to-peer file sharing applications were King, director of marketing at Palo Alto Net- controls, and they care less about down- role of the applications is crucial in dealing found in 90% of the sites assessed. works (www.paloaltonetworks.com), notes loading risky applications.” with new technologies, King notes. “It that in the recent report, more than 90% of requires a bit of a mind shift,” he says. Tools that monitor traffic, and particular- Balancing Act the applications using the port weren’t related “There are places where the security policy ly look at spikes in bandwidth usage, can to browsing. More than half the applications Being able to provide security and still basically says ‘no’ to everything, yet the pol- be ideal for tracking down the location of using the port weren’t business-related, and allow users to download the newest appli- icy isn’t enforced, so it creates contempt. particular users, but it’s equally important Web-based mail was found in 95% of cases. cation may be the trick that many IT But if you give IT the tools, you can safely to start conversations about why and how departments have to perfect. Telling users enable some applications and block others.” employees are using the applications. P SECURITY APRIL11, 2008 All-In-One Internet Security and installed onto systems with a VMware player, VMware workstation, VMware server, or VMware ESX server. The Web Gateway lets you control The Astaro Web Gateway Controls, Protects Web-Transferred Data employee Web access for specific content categories to enforce compliance and reduce legal risks. The malware detection tool fil- MANAGING SEVERAL APPLIANCES for URL that are based on Intel-compatible server ters both Web and FTP traffic to prevent Astaro Web Gateway filtering, malware detection, application systems and have integrated hard drives to viruses, spyware, and other active malware Pricing starts at $995 controls, and bandwidth optimization needs locally cache scanned Web pages and store from entering your network. It can block is a hassle. The Astaro Web Gateway is log data. The hardware appliances are capa- “phone home” communication and Skype All-in-one security appliance that lets you control and available as a set of hardware appliances or ble of effectively protecting networks with sessions from spyware-infected PCs. The protect data transferred over the Web a virtualized appliance to provide all those up to 2,000 users. As a virtualized appli- appliance can control access and use of IM (877) 427-8276 protections from one device. You can han- ance, the Gateway can run on multiple com- and P2P apps. You can also allow or block dle all the security controls through a single, puters running the software in parallel using specific IP addresses. The bandwidth man- www.astaro.com Web-based user interface. VMware virtualization infrastructure—ideal agement utility lets you prioritize business As a group of hardware appliances, the for managed security services. The software applications and define granular bandwidth Web Gateway consists of four appliances can be downloaded from the Astaro server limitations on specific applications.