P.O. Box 85518 Lincoln, NE 68501-5518 CHANGE SERVICE REQUESTED January 15, 2010 Volume 32 Number 02 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 In This Issue... COVER FOCUS Harness Heat & Big Projects For 2010 What big projects or upgrades does your data center have planned for the coming year? We talked with some industry insiders to identify the Power Consumption most common projects and offer some tips on how to succeed. Harness Heat & Power Consumption............................1 Better Mobile Storage....................................................8 Your 2010 Security Project..........................................10 Get Your Data Center Out Of The Hot Seat In 2010 Migrate Smoothly To Windows 7..................................11 Tighten Your Security Defenses Staying one step ahead by Christian Perry of cybercriminals can (cid:127) (cid:127) (cid:127) be overwhelming. DATA CENTERS aren’t the only things chugging along into the new year, as We offer tips and heat is anticipated to have yet another successful year of delivering strategies to help. headaches to infrastructure managers around the globe. However, by under- See page 30. taking a project in 2010 that can help to keep temperatures and power con- sumption under control, data centers can force heat to look elsewhere to continue its productive run. PHYSICAL An easy approach to controlling rising temperatures is simply to throw more cooling INFRASTRUCTURE at the heat, but then the data center faces increased power consumption costs. The chal- ■It may be more important to ensure good cooling in lenge, then, is to achieve acceptable temperature levels while keeping an active eye on small data centers than in big ones. Start 2010 with a green IT measures. This process is by no means simple, but it’s also not necessarily program to reduce energy consumption in all your small, expensive nor out of the expertise realm of even small data centers. remote data centers ........................................page 12 Hit The Heat ■Product Spotlight:Cable Suppliers ............page 14 Analysis is key to understanding the temperature range that ■Product Spotlight:Three-Phase Power Distribution.. your data center should achieve both now and for the ............................................................................page 16 next several years, says Rudy Rangel, sales manager Go to Page 6 NETWORKING & VPN ■Product Spotlight:VPN & Remote Access..page 18 Key Points ■Third-generation connectivityis coming to the (cid:127) Targeting temperature-related problems enterprise. What could it mean for your SME? ..page 20 requires close analysis of not only your ■For IT departments in the middle of merging net- current environment but also your existing works, it’s not always easy to bring everything systems and their dependencies on other together........................................................page 21 parts of the data center. ■Few SMEs give much thought to the possible pres- (cid:127) By working to cut power consumption, you ence of unlicensed softwarein their midst. Yet organi- can help to control temperatures while zations such as the Business Software Alliance carry saving on perpetually rising energy costs. out regular policing actions to detect illegal applications (cid:127) Depending on the scope of the project, and OSes........................................................page 22 costs can range from a few hundred dollars to tens of thousands, but keeping an eye ■To help IT professionals gauge Web site uptime and toward reducing energy consumption can performancefrom the customer’s perspective, Florida- help to offset initial investments. based AlertSite has introduced its DéjàClick transaction monitor utility......................................................page 23 ■Neverfail’s Continuous Availability Suiteis designed to protect what the company calls “application ecosystems” Data Classification by using continuous replication, application monitoring, self-configuration, and automated failover ..........page 24 ■With a wireless infrastructure, there is a lot to learn about Wi-Fi radio technology, networking backhauls, and security protocols. But a thorough knowledge of Make Sure Your SME Is Employing The Right Strategy the building layout, nontechnical needs of employees, and business objectives also comes into play during deployment........................................................page 25 by Elizabeth Millard properly? Here are some insights on get- Systems (www.varonis.com), a firm spe- ■DataVelocity’s managed service plansinclude contin- (cid:127) (cid:127) (cid:127) ting started and implementing a solid cializing in unstructured data governance. uous monitoring, asset management, capacity planning, INCREASINGLY, backup and security plans classification strategy. Common examples might include file security assurance, and other similar services ....page 26 focus on different tiers of data because sizes, types, and locations. Also helpful is Use Metadata not all information within a corporate access permissions data, which helps deter- system is mission-critical. But how can Data about data—called metadata—can mine what data a specific user or group can The Processor.com home page is frequently updated with an IT manager classify data assets to be used to focus and accelerate the data or cannot access. A benefit to gathering new articles and hardware news to help you keep current. make sure they’re being shuttled to classification process, notes Raphael Reich, that info might be a glimpse into what data Visit www.processor.com today. the right storage areas and are secured senior director of marketing at Varonis Go to Page 6 Page 2 Processor.com January 15, 2010 Subscribe Today/Address Change Form For address change, fill out form below with new information and mail or fax. PLEASE PRINT What type of subscription request is this? ■■ New ■■ Renewal ■■ Cancel © Copyright 2010 Sandhills Publishing Company. Phone: ( ______ )________________________________ Fax: ( ______ ) __________________________________________ All rights reserved. Contact Name:__________________________________________________________________________________________ Company Name: ________________________________________________________________________________________ Subscriptions Address: ______________________________________________________________________________________________ Mail Form To: P.O. Box 85518 (cid:127) Lincoln, NE 68501-5518 Overnight Delivery: 120 West Harvest Drive (cid:127) Lincoln, NE 68521 City: ___________________________________________ State: ________ Postal Code:______________________________ (800) 819-9014 | LOCAL: (402) 479-2132 | FAX: (402) 479-2193 Country: ______________________________________________________________________________________________ Advertising & Reprints Email: ________________________________________ Web Address:____________________________________________ (800) 247-4880 | (402) 479-2141 | FAX: (402) 479-2193 1. What is the size of your company 3. What is your annual computer hardware/ Editorial Staff (how many employees)? software purchasing budget? [email protected] ■■ Less than 10 ■■ 200 to 499 ■■ $0 to $9,999 ■■ $100,000 to $249,999 (800) 544-1264 ■■ 10 to 99 ■■ 500 to 999 ■■ $10,000 to $24,999 ■■ $250,000 to $499,999 ■■ 100 to 199 ■■ 1,000+ ■■ $25,000 to $49,999 ■■ $500,000 to $999,000 ■■ $50,000 to $99,999 ■■ $1,000,000+ Do you have a new product that data center/IT managers would be interested in learning about? Call (800) 544-1264 2. How often do you purchase computer or email [email protected]. hardware/software? ■■ Weekly ■■ Quarterly ■■ Bi-weekly ■■ Annually ■■ Monthly ■■ No Involvement www.Processor.com News Also In This Issue... STORAGE ❙ per share. The American speech domain name was rejected late last month by ■Not all information within a corporate system is mis- Online Holiday recognition platform provider the three-person NAF (National Arbitration Shopping Rebounds . . . sion-critical. How can an IT manager classify data expects that the addition of Forum) panel. In its November-filed complaint, assets to make sure they’re being shuttled to the right It’s good news for the UK-based SpinVox will beef Google argued that Groovle.com was “nearly storage areas and are secured properly?............page 1 economy as a whole as up its international presence identical or confusingly similar” to the Google well as for a host of IT and technology portfolio. The trademark, but the NAF panel ruled that the SECURITY vendors: Shopping on the deal will also improve the quali- name was sufficiently different. Google also ■Backbone Security provides steganalysis services Web made a year-over- ty of service the company pro- argued that Groovle.com’s layout of the search year comeback during the vides to telecom carriers in the box and other items are highly similar to the lay- that can help SMEs find confidential information hidden 2009 holiday season. area of voicemail-to-messaging out of Google’s search home page. Jacob Fuller in larger sets of data..........................................page 27 Research firm comScore automation and management, and Ryan Fitzgibbon created the Google-pow- ■Best-in-class companies are moving forward with reports that consumer e- Nuance says. ered Groovle.com in 2007. The site provides encryption, but most small and midsized enterprise aren’t commerce climbed 5% over ❙ users starting pages they can customize with “Soupnazi” Hacker using encryption as effectively as they could........page 28 2008 to about $27.1 billion personal photos and then conduct Web search- Makes Plea Agreement ■ETSec is an information security and managed for the Nov. 1 to Dec. 24 es from. In its ruling, the NAF stated that the dis- timeframe. Growth was about Accused hacker Albert Gonzalez pled guilty similar letters in Groovle.com’s domain name services companythat protects the network, data cen- 3.5% year-over-year for the Black late last month to two counts of conspiring to are sufficiently different to make it distinguish- ter, and informational assets..............................page 29 Friday-to-Christmas Eve period. Con- gain unauthorized access to the payment card able from Google’s mark “because the domain sumer electronics shone as a category with networks of several U.S. retailers and financial name creates an entirely new word and conveys MESSAGING more than 20% growth. However, the amount institutions to steal information on tens of mil- an entirely singular meaning from the mark.” & TELEPHONY spent per shopper declined a little as compared lions of credit card and debit card accounts. ❙ ■Telecommunications networks may be the lifeblood of to the 2008 holiday shopping season. Under the plea agreement, Gonzalez, a Miami Study Outlines Dangers Of Texting While Driving the modern enterprise, but they’re clogged with choles- ❙ resident who went by the names “soupnazi” and . . . & Online Shoppers Are Becoming terol in the form of byzantine, complex, and often “segvec,” faces a 17- to 25-year prison sen- Another study has been released that shows More Satisfied inscrutable bills.TEM software can help ........page 34 tence. In a statement, the U.S. Department of texting while driving isn’t safe. In fact, accord- ■Cloud-based email offers enterprises a number of Satisfaction with e-commerce sites was up 7% Justice said, “The case is one of the largest data ing to the study, which was conducted by re- during the 2009 holiday season, with a total breaches ever investigated and prosecuted in searchers at the University of Utah, a texter is advantages, but because email is a mission-critical score of 79 out of 100, according to the latest the United States.” Gonzalez also faces sen- six times more likely to be involved in an acci- application, you should carefully consider the business data from ForeSee Results’ E-Retail Satisfac- tencing related to charges filed in Massachu- dent than someone who is undistracted. The requirements, advantages, and challenges related to the tion Index. Amazon took the top ranking in setts and New York, although the sentencing will study involved 20 men and 20 women, ages cloud..................................................................page 35 terms of customer satisfaction, scoring 87 out of run concurrently per his plea agreement. Among 19 to 23, texting while operating a driving simu- ■Axway’s MailGate 3650 Appliance has helped Hay 100. Apple led in terms of computer and elec- Gonzalez’s targets were payment card networks lator. Each participant had texting experience House Publishers limit its problems with spam..page 36 tronics companies with a score of 82, up four operated by 7-Eleven, Hannaford Brothers, and and had been driving for less than five years. points from 2008. Dell scored 79 (up five points Heartland Payment Systems. He also tested Participants suffered delayed reaction times, CLIENTS from 2008), while HP scored 78 (up two points). and stored malware aimed at attacking networks followed other drivers too closely, and were ■Product Spotlight:Business-Class Notebooks.......... ❙ Nuance Acquires SpinVox and stealing data involving 250 financial organi- slower to apply their brakes. Overall, their reac- zations on several networks. tion time was diminished by 30% compared to ............................................................................page 38 Nuance Communications announced that it has ❙ 9% for someone talking on a cell phone. Google Loses Claim To Groovle.com acquired international voice-to-text provider ❙ DATA CENTER Domain Name Apple Acquires Mobile Ad Company SpinVox. The $102.5 million deal consisted of MANAGEMENT Quattro Wireless a cash payout of $66 million along with a $36.5 Google’s attempt to block Canadian Web site ■In today’s economy, IT can’t merely be an efficient, million stock purchase at a little less than $16 operator 207 Media from using the Groovle.com Apple has acquired mobile advertising compa- cost-effective, and reliable operator of technology ny Quattro Wireless for a reported $275 mil- infrastructure and information systems. Now, business WATCH THE lion. Waltham, Mass.,-based Quattro Wireless executives expect IT managers to operate further up This information provides a quick glimpse of current and historical stock offers Q Elevation, its mobile-specific targeting STOCKS on the value chain as strategic partners in new busi- prices and trends for 14 major companies in the technology market. platform for delivering audience-appropriate ness initiatives..............................................page 40 mobile ads, and its customers include compa- ■Mobile devices have invaded just about everywhere % change from nies such as Microsoft, Procter & Gamble, and people work. Yet, most organizations haven’t developed Company Symbol Year Ago Dec. 22 $ Jan. 7 $ previous issue Visa. The acquisition brings Apple into increas- strategies for deploying and managingthem..page 41 AMD AMD $2.69 $9.43 $9.47 ▲0.42% ing competition with Google, which acquired CA CA $18.42 $22.60 $22.87 ▲1.19% AdMob, another mobile advertising firm and ■EHR (electronic health records)have to be imple- Cisco Systems CSCO $16.70 $23.75 $24.53 ▲3.28% Quattro competitor, in November at a price mented thoughtfully, with time planned into the schedule Dell DELL $11.12 $14.11 $14.72 ▲4.32% tag of $750 million, although U.S. antitrust for user education, testing, and customization..page 42 regulators are currently reviewing Google GOOG $315.07 $601.12 $594.10 ▼1.17% ■Before virtualization, software licensingwas fairly HP HPQ $37.49 $52.46 $52.20 ▼0.5% the deal. Also heightening the competition straightforward. But with virtualized servers, software IBM IBM $84.70 $129.93 $129.55 ▼0.29% between Google licensing has become much more complex........page 43 Intel INTC $14.15 $20.04 $20.60 ▲2.79% and Apple is McAfee MFE $31.38 $39.77 $40.42 ▲1.63% ■There are several steps IT staff can take to cut the Google’s an- Microsoft MSFT $19.52 $30.82 $30.45 ▼1.2% number of help desk callswhile offering better all- nouncement Oracle ORCL $17.36 $24.46 $24.38 ▼0.33% around service....................................................page 44 of the Nexus Red Hat Software RHT $15.46 $29.87 $30.39 ▲1.74% One mobile Sun Microsystems JAVA $4.66 $9.33 $9.40 ▲0.75% phone, which The Processor.com home page is frequently updated with Symantec SYMC $13.60 $17.71 $18.32 ▲3.44% could rival new articles and hardware news to help you keep current. NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. Apple’s iPhone. Visit www.processor.com today. January 15, 2010 Processor.com Page 3 News UpcomingITEvents Are you looking to learn more about data center ❙ stock increased 32 cents per share (1.3%) the ❙ or IT topics? Network with some of your peers? Advertising Coalition Finds Broadcom Settles Consider joining a group of data center day of the purchase. Ad Networks Mostly In Compliance Shareholder Lawsuit professionals. If you have an event you’d like ❙ Office 2010 Pricing listed, please send an email to The Network Advertising Initiative, a group Broadcom will divvy out $160.5 million in a set- [email protected]. of more than 35 online marketing companies, Microsoft has released pricing details for tlement regarding the company’s backdating created a code of conduct in December 2008 Office 2010. The four versions include Office practices. As per the settlement, any claims - JANUARY - related to the transparency, notice, choice, col- 2010 Home And Student, Home And Busi- against Broadcom officers and directors are to ISSA Upstate South Carolina lection, and use of personally identifiable infor- ness, Professional, and an academic version be dismissed, and the company will take a Jan. 15 mation in online advertising. The code has of Office Professional, which are expected to fourth-quarter charge. The final deal will be the NuVox been in effect for about a year, and the NAI be available later this year for $149, $279, second largest up-front cash settlement in a 301 N. Main St., Suite 5000 says that the companies it monitors “met their $499, and $99, respectively. Office 2010 suit against a company accused of stock option Greensville, S.C. www.upstate-issa.org compliance obligations with respect to the Home And Student includes the most popular backdating. The lawsuit was filed by sharehold- (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) great majority of the requirements of the NAI applications: Word, Excel, PowerPoint, and ers who purchased or obtained Broadcom Exchange Server 2010 First Look & Hands on Lab Code.” Charles Curran, the NAI’s executive OneNote. Office Home And Business includes stock between July 21, 2005, and July 13, Jan. 18, 8 a.m. to 4 p.m. director, says the review shows that NAI mem- the same applications with the addition of Out- 2006. Broadcom had to ultimately restate $2.2 Max Technical Training bers “take consumer transparency and choice look. Both the academic and nonacademic billion in earnings for a four-year period due to 4900 Parkway Drive, Suite 160 Mason, Ohio for online behavioral advertising very serious- versions of Office Professional feature Pub- the backdating; however, the com- www.maxtrain.com ly.” Although the NAI says member companies lisher and Access. Microsoft is also releas- pany denies any wrongdoing in (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) showed “no compliance deficiencies” when it ing Office 2010 Product Key Cards for each the case. AITP Southwest Missouri came to the new code, several member com- version save Office Professional Academic Jan. 19 panies are working to improve in certain areas, that forego the boxed software in favor of a Springfield, Mo. aitpspringfield.org including the ways in which they disclose data product key, which the customer can use (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) retention periods. to download and activate the software on ISSA St. Louis Chapter ❙ one PC. Users can install all three non- Jan. 19 Windows 7 Influencing IT Spending academic versions on up to two PCs, but St. Louis, Mo. A report from ChangeWave found Office Professional Academic, available stl.issa.org that nearly one in five corpo- through authorized academic resellers only, (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) Oklahoma City AITP Chapter rate IT buyers say that in-cludes a license that lets users install Jan. 19 Windows 7 is bumping up the software on up to three PCs. Oklahoma City, Okla. the pace of their com- Product Key Card pricing for Office www.aitp.org/organization/chapters puter upgrade cycles. Home And Student, Home And /chapterhome.jsp?chapter=40 Of the 1,700 IT profes- Business, and Office Professional (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) AITP Northeastern Wisconsin Chapter sionals surveyed, 93% will be $119, $199, and $349, Jan. 20, 4:15 p.m. said that their compa- respectively. Holiday Inn Select nies are satisfied with ❙ 150 S. Nicolet Road Forrester Studies Win7. Additionally, 10% said Appleton, Wis. The State Of Smartphones new.aitp.org that their enterprises have (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) already purchased PCs with Win7 installed. Forrester Research recently released its U.S. AITP Atlanta When asked if their companies plan on spend- Omnibus Survey, which shows that about ❙ Jan. 21, 5:30 p.m. Ethernet ing more on Microsoft products, 26% said they 17% of mobile subscribers now own smart- Crowne Plaza Atlanta Perimeter NW Services See will in the next quarter, which is up from 16% in phones based on the iPhone OS, the 6345 Powers Ferry Road NW Boom In North America Atlanta, Ga. August and 10% last February. BlackBerry OS, Windows Mobile, PalmOS, www.aitpatlanta.org ❙ WebOS, Sym-bian, or Linux (Android). That’s In contrast to the economic downturn, carrier Smart Grid Spending On The Rise (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) compared to just 11% toward the end of 2008 Ethernet services are seeing double-digit rate San Diego SQL Server User Group In a recent report, Pike Research says it and 7% at the end of 2007. In 2009, RIM’s increases. According to a recent report from Jan. 21 expects government and utility companies to BlackBerry maintained the highest market Heavy Reading, a market research organiza- San Diego, Calif. www.sdsqlug.org spend about $200 billion worldwide from share of all smartphones, largely due to, tion, Ethernet connectivity services are increas- (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) 2008 to 2015 on smart grid technology, which according to Forrester, its price, availability, ingly being incorporated into vertical industries. ISSA Des Moines is the digitized management of electrical and full QWERTY keyboard. Forrester distin- Based on input by 20 carriers, the report also Jan. 25 power in order to help both consumers and guishes quick messaging devices from smart- indicated that retail and wholesale Ethernet 3920 SW Camden Circle companies use energy more efficiently. Pike phones, due to their lack of a standard smart- services have survived the poor economy, Ankeny, Iowa www.issa-desmoines.org expects that 84% of the spending will be on phone OS. Forrester reports that 15% of adult even as traditional frame relay, ATM, and (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) the technologies that automate the grid and subscribers owned one of these phones in TDM private line services continue to decline. AITP Akron balance power generation supply and 2009, compared to 9% in 2008. Forrester Other key results reveal that the Ethernet ser- Jan. 26 demand. Another 14% of the funds will go believes that 2010 will be an even bigger year vice market is now a mainstream revenue Akron, Ohio into smart metering technologies that monitor for smartphones than 2009 was. source, companies are embracing Ethernet www.akron-aitp.org and analyze the use of electricity, gas, and ❙ beyond adoption and performance reasons, (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) EMC To Acquire Archer Technologies ISSA Inland Empire water. Pike predicts the remaining 2% will be and service providers are penetrating the mar- Jan. 26 invested in technology that provides energy Storage and security manufacturer EMC ket at both the connectivity level and the appli- ie.issa.org to electric cars. recently announced that it plans to buy Archer cation level. (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) Technologies, a supplier of enterprise gover- ❙ ISSA Baltimore HP Exec Heads To Intermec Jan. 27, 4:30 p.m. nance, risk, and compliance solutions that has Sparta Inc. more than 6 million licensed users. Although Jim McDonnell is leaving his executive position 7110 Samuel Morse Drive, Suite 200 the financial details were not disclosed, EMC at HP for Intermec, which produces machines Columbia, Md. says Archer will operate as part of EMC’s RSA for automated identification and data capture. www.issa-balt.org Security Division and remain in its original loca- McDonnell has been named a senior vice presi- (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) AITP California Southland tion of Overland Park, Kan. EMC expects the dent of global sales at Intermec and has vacat- Jan. 27 acquisition of Archer will benefit EMC’s recently ed his post as the vice president of global sales www.aitpcalsouthland.org acquired Ionix unit. in HP’s Enterprise Storage, Servers, and Net- ❙ working Group after working at HP for 26 years. - FEBRUARY - Chrome Passes Safari Intermec earned $35.7 million in 2008, as com- Windows Server 2008-What’s New Hands on Lab In Browser Usage Feb. 1-2, 8 a.m. to 4 p.m. pared to the $10.5 billion HP profited, but Max Technical Training ❙ Oracle Buys Silver Creek Systems Statistics published Intermec has recently snagged other exec- 4900 Parkway Drive, Suite 160 by analytics firm Net utives from large companies. Mason, Ohio California-based software maker Oracle has Applications show ❙ www.maxtrain.com IDC Survey Finds Concerns acquired Silver Creek Systems in an attempt that Google’s Chrome (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) Among IT Green Data Center Conference to improve its information management sys- browser has surpassed Feb. 2 tems with the addition of data quality manage- Apple’s Safari in number A recent survey conducted by IDC shows University Of California San Diego ment capabilities. Silver Creek Systems’ of users. The number of that security was the biggest concern in 2009 San Diego Super Computer Center DataLens software will help Oracle simplify users browsing with Chrome went for IT cloud services; availability and perfor- 10100 Hopkins Drive and standardize product descriptions. The from 3.9% to 4.6% in December, while Safari mance were listed as the second and third con- San Diego, Calif. greendatacenterconference.com purchase will ensure improved management ranked at only 4.5%. The statistics are based cerns. The survey, which questioned 263 IT (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) of various Oracle software programs, includ- on 160 million monthly visitors that browse to personnel, also found that there was trepida- AFCOM St. Louis “Gateway” Chapter ing supply chain management, customer rela- a network of sites that use Net Applications’ tion over whether a cloud model would be more Feb. 9 tionship management, and product lifecycle services. Coming in ahead of both and all expensive than a noncloud model. Although IT Schneider Electric Technology Center management. The company says future other included browsers was Microsoft’s Inter- personnel have been slightly uneasy about the 807 Corporate Centre Drive O’Fallon, Mo. spending on the research and development of net Explorer, with 62.69% of users. Coming switch because of these challenges, the IDC www.afcom.com/afcomnew/stlouis.html this software will increase. Financial details of in second was Mozilla’s Firefox, with 24.61% survey found that many adopters of cloud mod- the deal were not disclosed; however, Oracle of users. els have made the leap for economic gain. For more Upcoming IT Events, see page 8. Page 4 Processor.com January 15, 2010 P R O D U C T R E L E A S E S The ProcessorProduct Releases section Manufacturers: includes brief overviews of data center products. Do you have a new product that data center/IT managers would be interested in learning about? All products listed have been released recently, so use this section to get Send your press release or product information up-to-date with what’s new on the market and to find products you need. to [email protected]. can scale servers programmatically via an well as support for the CSA’s (Cloud high-capacity system configurations built CLIENTS API over a Web management portal. Security Alliance) “Guidance for Critical around two and four engines and software Pricing starts at five cents per server hour. Areas of Focus in Cloud Computing – compression for EMC SRDF (Symmetrix ■ Oracle SQL Developer 2.1 Version 2.1” document. Designed to deliver Remote Data Facility) traffic over both Fibre Oracle announced version 2.1 of its SQL PHYSICALINFRASTRUCTURE secure and easily manageable enterprise- Channel and Gigabit Ethernet connections. Developer. The free tool offers PL/SQL grade cloud services, Sun’s Cloud Security unit testing; data modeling viewer; and ■ Emerson Network Power Liebert Data architecture uses the built-in security features ■ iStoragePro 8-Bay Safari 2.5-inch JBODs expanded database migration support, Center Audit in the Solaris OS. The new Cloud Security iStoragePro introduced two 8-bay Safari including Teradata and IBM DB2 UDB for Emerson Network Power released the tools include OpenSolaris VPC Gateway, 2.5-inch JBOD storage units. The Liebert Data Center Audit, which is designed ISCs (Immutable Service Containers), iT8PESA and iT8PMIS, which are de- to identify, evaluate, and resolve cooling and Security Enhanced VMIs (Virtual Machine signed specifically for the audio/video power issues. The Liebert Data Center Audit Images), and Cloud Safety Box. industry, are enclosed in aluminum and covers data center virtualization, consolida- have quiet cooling fans. The two devices tion, and blade implantations and provides SERVERS have 4TB of storage; offer miniSAS and Linux, Unix, and Windows. In addition, custom reports for data centers that are less eSATA interfaces; and support 2K, 4K, version 2.1 includes a background task than 2,500 square feet. The reports compare ■ HP NonStop BladeCluster Express 1.2, full resolution 1080i HD, 720p, HDV, SD, capability that enables users to run time- customer data with more than 50 industry NonStop SOAP 4.0 & NonStop SQL 2.3 and VFX. Additionally, with a MiniSAS consuming tasks using SQL in the back- benchmarks, including power, cooling, racks Database and SATA II port multiplier chipset, the ground while completing other tasks with and cabling, and monitoring. HP announced several updates to its two devices easily handle uncompressed the tool. Version 2.1 also uses enhanced NonStop server platform. The NonStop HD video. Finally, each device includes a data grids that offer dynamic searching, fil- SECURITY BladeCluster Express 1.2 is designed to high-speed PCI Express RAID Card for tering, and highlighting. assist customers with widely distributed tough RAID protection, including RAID ■ Black Box Network Services Intelli-Pass enterprise data center systems that consist Level 0, 1, 5, 6, or 10 (depending on the NETWORKING& VPN Black Box Network Services unveiled its of thousands of processors. Another updat- RAID Card). two-factor Intelli-Pass biometric fingerprint ed offering, NonStop SOAP 4.0, helps users ■ Advanced Systems Concepts ActiveBatch ■ LaCie & Symwave 2Big USB 3.0 ID system designed to secure rooms, gather Business Intelligence by gathering V7 Service Pack 2 offices, and areas within a building against LaCie, along with Symwave, announced Advanced Systems Concepts released unauthorized entry. The two Intelli-Pass what the companies call the industry’s first ActiveBatch V7 Service Pack 2, which models, SAC510NA and SAC510SA, fea- dual hard disk RAID storage solution based incorporates a series of new extensions and ture an antitamper design, separate reader on the new SuperSpeed USB 3.0 standard. add-ins supporting Oracle jobs, SAP, and The companies say the LaCie 2Big USB VMware platforms. Additionally, V7 Service 3.0 has reached the highest throughput ever Pack 2 expands ActiveBatch’s capabilities achieved in a USB 3.0 external storage for the Microsoft System Center Operations product. It comes with up to 4TB of storage Manager Management Pack. ActiveBatch with a potential burst read transfer rate of can automate and centrally manage jobs data from across the enterprise. NonStop 275MBps. The LaCie 2Big USB 3.0 is and workflows across multiple and disparate SQL 2.3 database provides users with better powered by Symwave’s USB 3.0 standard- operating systems, applications, and environ- overall performance and increased service compliant dual SATA and RAID bridge ments. It offers an event-based architecture levels through simplified software program- controller, supports RAID types 0 and 1, and a jobs library containing a list of “pro- ming and improved application capacity. and comes with backup software for PC duction-ready” job steps. ActiveBatch V7’s and controller units, and a protected door HP also offers its Integrity NonStop cus- and Mac users. Service Pack 2 further extends the sched- opening mechanism to foil would-be intrud- tomers access to its business technology uler’s interaction with leading enterprise ers. The Intelli-Pass system protects reader user community, Connect, which lets them ■ MicroNet MaxNAS 4R & 8R applications and network elements. For and controller communication via Black interact, share knowledge, and exchange MicroNet announced rackmount addi- example, it features an expansion in the num- Box’s proprietary encryption scheme. In best practices with one another. tions to its MaxNAS line of storage units ber and type of Oracle job steps, such as Get order to gain entry to an Intelli-Pass-secured for SMEs. The MaxNAS 4R is a 1U model Job Status, Start Job, and Synchronize Job. location, users must type a PIN and submit STORAGE that supports up to four 3.5-inch SATA to a fingerprint scan. Other features include drives, while the 2U MaxNAS 8R supports ■ Quest Software vWorkSpace 7.0 ■ DataCore Software Virtual Disk Expansion the ability to network the system, remote Quest Software released the latest version access, logs of everyone entering and leav- DataCore Software expanded the size of its vWorkspace desktop virtualization ing, and the ability to grant access to certain of its virtual disks from 2TB to 1PB software, which now not only supports the users at certain times of the day. (petabyte) in response to market demands. VMware platform but also VMware Linked The company says that performance-wise, Clones, which reduces shared storage disk ■ Fortinet FortiGate-5140 the larger virtual disks benefit from space requirements. The update also in- Fortinet announced an achievement in DataCore Software’s 1TB per node, 64-bit cludes enhancements that improve the end- IPv6 performance. Based on the company’s mega-caches, allowing for large storage up to eight. The MaxNAS 4R and 8R appli- user experience and expanded desktop plat- FortiASIC technologies, which accelerate and quickness. DataCore says the expan- ances can be configured with 1TB or 2TB form choices, including new support for security processing through its FortiGate- sion meets two industry trends, including drives to deliver up to 16TB of storage. Windows 7, Windows 2008 and 2008 R2, 5000 series blades and other ADM modules, clients who want to group numerous disk Stackable to up to 96TB, the units feature Windows Vista, System Center Virtual the FortiGate-5140 multithreat chassis-based drives that each top 1TB into RAID sets iSCSI targets; dual 1Gbps Ethernet ports Machine Manager 2008 R2, and Parallels system delivered 56Gbps of IPv6 through- and applications that must update and ana- with link aggregation; and redundant and Virtuozzo Containers. The company says put. The achievement was validated using lyze large datasets that will exceed 2TB hot-swappable drive bays, power supplies, the latest version also drives down costs and IPv6 testing performed by BreakingPoint caps in the foreseeable future. Concerning and cooling fans. The appliances offer sup- reduces the impact on backend resources. Elite. Fortinet supports IPv6 with its FortiOS RAID sets, DataCore says its storage vir- port for RAID 0/1/5/6/10/JBOD and IP- Additionally, it provides increased speed for 4.0 firmware, which has been certified by tualization nodes can control pools con- based video surveillance applications. flash media embedded in Internet Explorer. the IPv6 Ready Logo Program. taining numerous RAID sets with each Pricing starts at $1,679. exceeding the previous 2TB maximum. ■ VISI ReliaCloud ■ Solutionary & e-Cop New Security Services DataCore customers with current mainte- VISI launched a public beta of its Relia- Solutionary and e-Cop announced an nance contracts can receive the 1PB en- Cloud service, which the company says is alliance that will combine security monitor- hancement free. Do you have a designed so that customers don’t need to ing, management, and compliance services to rearchitect their solutions to work reliably provide a new platform for enterprises, the ■ EMC Symmetrix V-Max NEW PRODUCT in the cloud. The service is ideally suited public sector, and government organizations. EMC enhanced its Symmetrix V-Max that data center/IT managers for IT managers in established, small to The suite will include log monitoring, device storage array to include 8Gbps connectivity midsized organizations as well as startup management, and full BOT (Build, Operate, for both mainframe and open systems envi- would be interested in organizations that want to take advantage and Transfer) SOC services. It will feature ronments. EMC has also enhanced Virtual of the cloud’s economic benefits. Relia- full, global cross-correlation views of log Provisioning for Symmetrix V-Max sys- learning about? Cloud is a set of secure cloud computing data, threat intelligence monitoring, and mul- tems, which now includes zero space recla- services—the first two are Cloud Servers tiple device monitoring. mation, thick-to-thin and thin-to-thick sup- Send your press release or and, coming soon, Cloud Storage. Relia- port for EMC TimeFinder/Clone software, Cloud Servers offer computing environ- ■ Sun Microsystems Cloud Security and automated rebalancing of Virtual related product information to [email protected]. ments that you can provision 24 hours a Sun Microsystems announced additional Provisioning storage pools as additional day, with full administrator access. You open-source cloud security capabilities as capacity is added. Other features include January 15, 2010 Processor.com Page 5 Page 6 Processor.com January 15, 2010 Harness Heat & Kolbe recommends taking inventory of dedicated AC server cabinets or a new systems presently in place and reducing AC unit. However, if you currently have in-production systems where possible. For no raised flooring but determine that you Power Consumption example, you can virtualize servers and need it, you could be facing costs of up to identify systems that can be eliminated or $100,000 for architectural fees, builder’s transitioned into a powered-off, or cold fees, and the product itself. But solutions Continued from Page 1 only a few degrees, or if it experiences backup, state. Not only will these steps geared toward reducing energy consump- for Rackmount Solutions (www.rack constantly fluctuating temperatures, a help to keep energy consumption under tion offer a more cost-neutral proposition, mountsolutions.net). He recommends series of small fixes could satisfy the pro- control, but they’ll also contribute to the because the savings on power costs can using temperature monitors to visualize ject. For example, control in/out access to overall effort of keeping temperatures in eclipse the one-time cost of systems current temperatures and see how they the room to harness unnecessary tempera- check. Kolbe also suggests identifying themselves. fluctuate during the day and various sea- ture fluctuations, and implement spot systems that can be targeted for scheduled In terms of personnel, this project relies sons. From there, ask questions: Are there coolers directed at hot spots or to boost or scripted sleep mode or power-off status. on several parties to help reach a success- hot spots? Are the temperatures on nights the current air-conditioning system. He ful conclusion. Rangel notes that IT staff Required Resources and weekends set higher than during also recommends installing one or two members are required to reroute cables weekdays? Are you determining your dedicated AC cabinets for the hottest Attacking rising temperatures while and rerack equipment as needed, and facil- ideal range based on typical server-room configurations, as well as adding ducts keeping power consumption in check can ities management and staff are needed to wisdom of 68 to 72 degrees Fahrenheit? and vents to the server room’s existing easily empty a yearlong budget, but that’s move equipment, add AC ducts, and place Also, determine whether you are having AC system. not a given. In fact, some measures can tighter seals and/or controlled access locks equipment failure now or if you can safely help to save tremendous amounts of on entry and exit doors. If new equipment Power Down boost temperatures. For example, Rangel money over time, thanks to a better-run- is required for the project, vendors will notes that some manufacturers now rec- Keeping temperatures under control is ning data center infrastructure that isn’t also be in the mix. Finally, Kolbe recom- ommend operating temperatures of up to critical for the efficient operation of your handcuffed by pricey energy costs. mends involving an outside electrician for 82 F, but it remains a good idea to check data center, but undertaking this project Rangel says that simple cooling fixes low- and high-voltage wiring as well as a with your own equipment manufacturers without regard to power consumption can can range from several hundred dollars to consultant qualified in green or sustainable before assuming that your data center is lead to escalating costs. So, while working about $20,000 if you purchase several technology initiatives. P overheated. It’s also wise to understand toward temperature management, be sure how that equipment interacts with the rest to watch for opportunities to control costs Where To Start of the data center. through green infrastructure and power “The first step is to discover the IT infra- management systems. structure and facilities,” says Dr. Mickey S. “Not only does a sustainability, or green Big infrastructure projects should never be taken lightly, particularly because you’re dealing with Zandi, managing principal at SunGard IT initiative, present a substantial potential the backbone of your data center. Steve Kolbe, CEO and founder of Analysys (www.analysys Availability Services (www.availability for cost savings in the face of escalating .net), says that it’s a good idea to take a slow, deliberate approach to the project. .sungard.com). “You must understand the power costs, it offers the data center to current state of the infrastructure—how is it present its ‘green’ credentials to cus- “Data centers are expected to function seamlessly 24/7, without outage or incident,” he says. interconnected and independent? By under- tomers, co-workers, and affiliates,” says “Therefore, a proof-of-concept step is appropriate on nonproduction systems. This allows the standing the interdependencies, an organi- Steve Kolbe, CEO and founder of implementer to demonstrate functionality, and it also gives insight into the reality of any anticipat- zation is then able to right-size the infra- AnalySys (www.analysys.net). “It also is a ed cost savings that may have been calculated, or proposed if an outside consultant is involved.” structure. Next, validate your design layout proactive approach to a likely eventuality and modify it to meet current trends. that the U.S. data center may become reg- Before jumping into the proof of concept, Kolbe says it’s necessary to conduct comprehensive Carefully plan the change to the topology ulated as cap-and-trade or other similar analysis, which can take at least two months to establish an appropriate average. This analysis and the interconnectivity.” legislation such as the U.K.’s Climate should depend on a strategy that looks at current inventory and determines where changes can According to Rangel, if your data cen- Change Levy [a carbon tax] is enacted to and should be made. ter’s temperature needs to be adjusted stem the further growth in consumption.” Data Classification type of content an organization needs to Key Points manage and protect. Industry best prac- tices show that a good rule of thumb is to (cid:127) Determine what types of metadata need constrain hierarchy to four levels, Reich Continued from Page 1 data, he or she can first identify those files to be collected for the data classification notes, because more than that becomes is overly accessible. Other metadata for that are poorly protected and then look process; these might include ownership, difficult and impractical to manage. classification might be access activity and inside them for credit card data. That’s a usage, and access permissions. An example of four levels might be: faster way to identify data that’s at risk ownership information. (cid:127) Bring together the company’s business Secret data: information critical to an than to first look for credit card data in all “What is most important about using leaders to get their thoughts on what organization’s core value, including data files and then determine which of those is metadata is that it can be used to separate types of data are most important and that would be significantly damaging if not well-protected. the data that is most interesting from the what’s driving data search needs. competitors were to obtain it. data that is not and thereby accelerate the Gather The Leaders (cid:127) Establish different levels of sensitivity Confidential data: also called regulated data classification process,” says Reich. based on content type. data, this information is required for stor- Although some automation can be used “In this way, the metadata becomes anoth- age due to regulations or to protect cus- once metadata is employed, an IT manager er element of the search. Specifically, it tomer and employee privacy. will still have to bring together leaders provides a short-list of where to look and words, phrases, and patterns that will help Private data: information an organiza- from different departments to get a sense what to expect.” with deeper classification work, Reich says. tion prefers to keep out of the public of what type of data they find important. For example, he notes, if someone “You’ll need to understand what’s dri- domain but that is considered noncritical. Coming into these types of meetings, an wants to find poorly protected credit card ving the need to find data,” he notes. “For An example might be the names of prod- IT manager should have metadata infor- example, in many organizations, regulato- uct vendors used by the company. mation to give insight on what type of data ry compliance is a driver. Other common Public data: information intended for Most Common is in use and how often data is accessed, types of information requiring special public consumption and acceptable to notes Bob Fine, director of product mar- attention are intellectual property, cus- share inside and outside the company— Misstep: Not keting at storage provider Compellent tomer data, and employee information. As for instance, marketing materials or prod- Technologies (www.compellent.com). Establishing you work with [department leaders] as uct specs. He states that many department heads Ownership may not know what type of data is being “What is most important about using metadata stored and why it’s important to prioritize Raphael Reich, senior director of marketing the data. These conversations can also get is that it can be used to separate the data that at Varonis Systems (www.varonis.com), tricky, he adds: “One of the biggest chal- notes that classifying data without knowing lenges is how to have intelligent and who owns it is a stumbling block that can meaningful discussions among business is most interesting from the data that is not.” lead to the problem of finding data that’s of leaders, so they can determine whose data interest but not knowing the significance of is more important, relatively speaking, -Varonis Systems’ Raphael Reich the finding. He says, “Yes, it’s sensitive compared to others. Of course, most busi- data, but is it fine where it’s stored, or does ness leaders will claim their data is more it need to be moved? Are the people who important than the person across the table, access it the right ones, and is this actively so IT needs to be prepared for that.” well as security and risk managers, be as Many parts of the process can be auto- used data or should it be archived?” Finding Having solid information about access specific as possible about what needs to be mated by extracting key information a data owner can help answer these ques- and frequency of use creates more intelli- identified and protected.” from data owners, but personal value tions, and although it sometimes takes a bit gence around usage, Fine notes, and tends judgments play a vital role. “It’s data of investigation to track down data owner- to curb debate. At that point, the discussion Create A Hierarchy owners who are equipped to make those ship, it can prevent improper classification can turn to the advantages of tiered storage. In terms of setting criteria used for clas- judgment calls more so than IT, which is and storage. Another benefit to bringing leaders sification, experts recommend establishing why finding them early on is important,” together is that they can identify the key different levels of sensitivity based on the says Reich. P January 15, 2010 Processor.com Page 7 Page 8 Processor.com January 15, 2010 UpcomingIT Events C O V E R F O C U S For more Upcoming IT Events, see page 3. Cincinnati .NET Better Users Group Feb. 9, 6 p.m. to 8:30 p.m. Max Technical Training 4900 Parkway Drive, Suite 160 Mason, Ohio www.maxtrain.com (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) PASS Wisconsin SQL Server Mobile User’s Group Feb. 9, 4:30 Microsoft Office 2176 Woodcrest Drive Green Bay, Wis. wisconsin.sqlpass.org (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) AITP San Diego Storage Feb. 10, 5:30 p.m. National University-Kearny Mesa Campus 3678 Aero Court San Diego, Calif. sandiego.aitp.org (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) Greater Wheeling AITP Feb. 10 Wheeling, W.Va. Make 2010 The Year Your www.aitp-wheeling.org Mobile Storage Gets Bulletproof (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) ISSA San Diego Feb. 10 www.sdissa.org (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) by Elizabeth Millard management for SonicWALL (www available from vendors. Most im- AITP Washington D.C. Feb. 11, 6:30 p.m. (cid:127) (cid:127) (cid:127) .sonicwall.com), developer of backup portant, though, is simply to have Alfio’s Restaurant AS THE NEW DECADE dawns, employees and security products. data recovery as a robust part of a 4515 Willard Ave. are more mobile than ever, and the type of “Backed-up data must somehow be storage strategy. Chevy Chase, Md. cobbled-together storage systems that replicated to a second, and geographi- aitpwashdc.ning.com User Education might have sufficed just a few years ago cally separate, location,” he says. (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) are no longer sufficient for the years “Replacing a failed disk drive and Although every aspect of storage AITP Southwest Missouri Feb. 16 recovering all of the operating sys- will rely heavily on IT, and auto- Springfield, Mo. tem, applications, configurations, and mation should take users out of the Key Points aitpspringfield.org preferences takes the same time on a equation to some degree, employ- (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) desktop as on a mobile device, usual- ees will have a certain level of ISSA St. Louis Chapter (cid:127) Create as much standardization as possi- ly two to three days. A good mobile involvement when it comes to mo- Feb. 16 St. Louis, Mo. ble when approaching mobile storage, backup solution will recover a failed bile backup. stl.issa.org because using multiple device brands can disk drive in less than four hours for Letting users know what to expect (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) create troubleshooting headaches. both desktop and mobile devices.” can go a long way toward creating Oklahoma City AITP Chapter (cid:127) Tap into automation as a way to bring all The best mobile backup solutions user comfort with storage proce- Feb. 16 aspects of a storage strategy together. will allow the backup to be stored or dures, notes Streuter. Also, using Oklahoma City, Okla. www.aitp.org/organization/chapters (cid:127) Develop a data recovery strategy that is restored to a physically or virtually analogies from the nontechnical /chapterhome.jsp?chapter=40 specific to mobile computing. different device in case of loss or world can be useful. For example, (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) technology changes, he notes. Auto- he suggests that users be told they AITP Northeastern Wisconsin mation allows for better sync between can run off an external unit but shouldn’t Chapter ahead. Instead, make a resolution for 2010 a data center and mobile devices, creat- work on it for long, “much like the drive is Feb. 17, 4:15 p.m. Holiday Inn Select to develop a multilayered, secure, and for- ing a single data warehouse rather than the spare tire for a car, but when you’re 150 S. Nicolet Road ward-looking mobile storage strategy. data silos. running on a spare, you better not have Appleton, Wis. Here are some key elements. another flat,” he says. new.aitp.org Data Recovery Developing user-friendly training (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) Standardization The ability to bounce back from a disas- materials is one option, but you should AITP Atlanta Feb. 18, 5:30 p.m. Mobility experts have often touted the ter, such as an unexpected outage, is cru- Crowne Plaza Atlanta Perimeter NW benefits of having a company on a single cial for any storage strategy. When it 6345 Powers Ferry Road NW mobile platform and standardizing de- comes to mobility, IT managers have to Where To Start: Atlanta, Ga. vices. If an SME hasn’t taken that route in consider lost and stolen devices, system www.aitpatlanta.org Get An Overview the past couple years, this could be the file corruption, inadvertent file deletions, (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) ISSA Upstate South Carolina year to get started. and other common data loss events. Like any major technology implementation, Feb. 19 With such an increase in mobility, an “What we’ve found is that about NuVox array of device types and brands can cre- 85% of data loss issues aren’t mechani- the first step is to organize data in order to 301 N. Main St., Suite 5000 see where standardization makes sense. ate troubleshooting issues, not to mention cal,” says Gary Streuter, vice president Greensville, S.C. With mobility, that means creating a spread- compatibility concerns. One type of smart- of marketing at CMS Products (www www.upstate-issa.org sheet that tracks what types of devices— phone might sync well with a storage .cmsproducts.com). “Maybe someone’s (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) such as laptops and smartphones—are ISSA Des Moines application, while another requires several kid went on their work laptop and erased Feb. 22 extra steps to get to the same point. More something, for example, or an employee being used, how data is being accessed, 3920 SW Camden Circle and what type of storage is needed. importantly, standardization helps with downloaded a program that caused prob- Ankeny, Iowa security because storage and security are lems. That’s when you need a solid res- www.issa-desmoines.org Before putting pieces in place, talk to ven- so closely linked. cue strategy.” (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) dors and other data center managers to get AITP Akron He notes that the traditional approach at Feb. 23 Automation many companies has been to have far- an idea of the different types of storage Akron, Ohio implementations that have been done and Utilizing change and configuration flung employees box up a machine and www.akron-aitp.org garner details on any challenges or mis- management tools can boost the ability to send it in, but the lost productivity can be (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) steps. Then, run a test or pilot program to First Look Visual Studio 2008 back up data automatically, notes Grant detrimental. If an employee can come into find any initial stumbling blocks before Feb. 24, 8 a.m. to 4 p.m. Ho, senior solutions marketing manager the office, it’s less of a hit, but in many Max Technical Training for endpoint management at Novell cases, there’s at least some downtime. rolling the program out company-wide. 4900 Parkway Drive, Suite 160 (www.novell.com). At some backup providers, recovery Mason, Ohio He notes that when combining standard takes the form of portable data backup www.maxtrain.com (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) backups with mobile storage, automation products with disaster recovery software also draw on vendors for information; ISSA Baltimore is necessary so that users don’t have to be built-in. The unified products allow for often, product developers have well- Feb. 24, 4:30 p.m. relied upon to do nightly backups them- both documents-only backups and full- written FAQ sheets that can be used Sparta Inc. selves. Instead, a data center manager can system storage. for implementations. 7110 Samuel Morse Drive, Suite 200 set a policy that the devices or laptops are Other appliance and software develop- With major steps such as user educa- Columbia, Md. www.issa-balt.org backed up whenever they’re connected to ers also have options that combine data tion, standardization, and automation in (cid:127) (cid:127) (cid:127) (cid:127) (cid:127) the local network. recovery with backup features. When place, SMEs can be more confident in AITP California Southland Automation can be used, as well, for evaluating different products, it’s vital to creating a storage strategy that includes Feb. 24 replicating data to a second or third loca- ask vendors how well they might match mobile devices, and as the decade rolls www.aitpcalsouthland.org tion beyond the corporate data center, adds with existing corporate mobile devices and on, scalability and growth won’t be Chris Winter, director for CDP product evaluate user education training materials sources of anxiety. P January 15, 2010 Processor.com Page 9 E SERIES PART NUMBER:1010105 - E2130 VLiCB 59” PRICE:$289.00 (cid:127) TRUE RMS Current and Voltage Measurement (cid:127) 3-digit display (cid:127) Display flashes when current exceeds 80% of rating and/or high or low voltage condition exists (cid:127) Available in 20A and 30A models (cid:127) Available in Zero RU vertical and 1RU horizontal models While supplies last, some restrictions apply CONTACT: [email protected] or (408) 436-9830 to place your order or for more information “Our expectations for quality, service, lead times and innovation have been exceeded without blowing our budget.” -Product Manager Some Of Our Valued Customers Include: Adobe Systems (cid:127) ANL (cid:127) Blue Cross Blue Shield Brocade Communications (cid:127) Cisco Systems ConSentry Networks Department of Defense Extreme Networks (cid:127) Hewlett-Packard (cid:127) Intel Jabil (cid:127) NEC (cid:127) Telenav (cid:127) WebEx www.cyberswitching.com (cid:127) (408) 436-9830 (408) 436-9828 Fax (cid:127) (888) 311-6277 Toll Free Page 10 Processor.com January 15, 2010 News C O V E R F O C U S ❙ Former Seagate Employee Blows Whistle Your 2010 Former Seagate employee Paul Galloway has alleged in legal documents that Seagate is guilty of using intel- lectual property owned by Con- volve in its hard Security drives. The legal docu- ments are part of a 9-year-old patent infringe- Project ment lawsuit brought against Seagate by Convolve. Galloway from says that he embarrass- saw developers at Seagate using Convolve’s Make End-User Responsibility ing and expen- Quick and Quiet technology, which pertains sive breaches. A Priority In The New Year to drive-silencing techniques that stifle noise “It’s a growing vec- and vibration within hard drives, and that the tor for leakage of cor- evidence had been destroyed by Seagate. porate information, these The Massachusetts Institute of Technology is various social media also a plaintiff in the suit, which asks for $800 by Carmi Levy security around machines used for finan- channels,” says Schacter. million from both Seagate and Compaq. (cid:127) (cid:127) (cid:127) cial transactions such as banking, payroll, “That can be very problem- ❙ AS IT SHOPS REFINE their priority lists for and retail or point-of-sale activities. atic, especially if you’re a McAfee Outlines Biggest Threats security-related investments in the coming “This is an ongoing problem that up until public company. The last In 2010 year, reducing client-side risk is emerging now has been under-reported,” says thing you want is to deal with Security experts at McAfee believe that hack- as a leading—and cost-effective—option. Naraine. “It’s a big problem because IT employees sharing insider infor- ers and malware makers have shifted their As appealing as big-bang investments in departments are under-resourced and under- mation on Facebook.” focus from primarily Microsoft products to other high-profile security hardware such as funded, especially because of the recession, Updating the organization’s software platforms, such as Adobe’s Flash and firewalls and dedicated appliances might so they’re less likely to be doing the kinds acceptable use policies and inte- Acrobat Reader programs. McAfee’s 2010 seem, the smarter option for resource- of things they need to do to identify the grating them into the HR-led per- Threat Predictions report points to improved constrained organizations typically involves problem and obtain funding to solve it.” formance management framework process-focused projects that reinforce Naraine says this class of malware will reduce these gaps. end-user responsibility for data. specifically targets these dedicated, trans- Small Cost, Big Impact action-focused machines, so hardening these systems is an effective first step. The good news for budget-weary IT Key Points Beyond the obvious best practices applied departments is these types of projects to any client PC—fully patched and updat- rarely break the bank. (cid:127) Resist the urge to buy new security hard- ed operating systems and applications, “In many cases, it’s leveraging the exist- ware or software; instead, focus on human fully updated antivirus and anti-malware ing investments you’ve already made,” factors to improve data management prac- packages, and monitoring systems tuned says Schacter. “The information that tices and reduce risk of exposure. to detect anomalous behavior—he recom- you’re looking for to reduce your expo- (cid:127) Segregate sensitive client machines and mends strictly controlling the build. This sure may not require you to purchase new lock down PCs used for especially sensitive includes removing the email client, software or a new appliance. You may functions such as banking and payroll to removing the browser (or at least running already be recording it [with] a product limit exposure to targeted malware attacks. it without add-ons or extensions), limiting you’re using for network management.” security in Microsoft’s software and the rising (cid:127) If your shop lacks in-house security exper- everyday Web activities, and outright for- The low cost comes with its own risk, popularity of Adobe’s offerings as reasons for tise, look to third-party security consul- bidding social media activities. however, in that senior leadership may not the criminals seeking out new avenues of tants to help assess current state and “These machines should support only buy into the projects’ importance. Just attack. Other targets feeling the brunt of the longer-term needs. the activities required to handle the trans- because security projects such as this shifted focus include Mozilla’s Firefox browser mission and storage of confidential finan- don’t require major investments doesn’t and Apple’s QuickTime software. The report cial, personnel, or similarly sensitive data,” mean they’re not significant to the organi- also warns of increased attacks on social net- “Most security-related risks within com- says Naraine. “This limits their exposure to zation’s bottom line. Shorter timelines for working sites such as Facebook and Twitter as panies are caused by user error,” says Jack these kinds of focused attacks.” human- and process-oriented security pro- well as HTML 5-based and Google Chrome Gold, president and principal analyst of jects also drive earlier reduction of risk Beware Of Social Media’s Pitfalls OS-based attacks throughout 2010. McAfee J.Gold Associates. “Companies lose data and ultimately greater ROI. also acknowledges that improved international because they don’t do a very good job of If social media and other broader-focused Once approved, IT should resist the urge and domestic law enforcement collaboration telling their users what they should be pro- Web activities are integral to a particular to handle them as ad-hoc initiatives. They and tactics will lead to more cyber criminals tecting, how they should be protecting it, employee’s role, they can be delivered via should instead be managed as de facto behind bars in the coming year. and how they’ll get them onside to accom- separate client machines. Phil Schacter, vice projects, with the same degree of project ❙ plish that.” president and service director for security management rigor also used for big-ticket Court Bans Current Versions and risk management strategies at Burton technology projects. Of Microsoft Word People Matter Most Group, says reinforcing smart social media Know What You Have Microsoft lost another round in its fight to Gold says companies in the process of data usage policies can save organizations keep selling Microsoft Word in its original narrowing down their security project lists Closing the gaps in end-user security form. In 2007, Canada-based i4i filed a law- for 2010 may want to stress human factors involves understanding your current Where To Start: suit against Microsoft for including some of instead of technology acquisitions. state—something that’s easier said than its technology, designed to enable users to “From a cost perspective, especially for done given the general state of security Assess Your Risks easily edit XML documents, in Microsoft SMBs, a lot of what they need to do is not so awareness in the average SME. Word. Microsoft lost that round and was much around upgrading software or hard- “Very few companies actually do true You can’t improve what you don’t know. ordered to stop selling Word and pay fines ware,” says Gold. “In most cases, it’s more security assessments,” says Gold. “You need Assess your existing end-user security totaling $290 million. The software giant important for them to assess what their risks to look at the assets you’re trying to protect, maturity to establish a baseline. Quantify appealed the decision, and a federal appeals are and what their end users can do to help do a real assessment of what your security risk factors associated with identified gaps— court has just found that, indeed, Microsoft them mitigate some of those risks.” risks are, and then put a strategy around that for example, the potential for social media- did violate i4i’s software patent. As a result, On a day-to-day level, these risks may to protect yourself. It’s relatively inexpen- aware employees to breach privacy or for Microsoft will be forced to cease selling Word involve vulnerable client-side machines. sive, but companies often ignore it.” road warriors to misplace USB drives. as of Jan. 11 and pay the damages. Ver- These vulnerabilities, often in the form of Although vendors are often only too sions of the offending software sold prior to malware, can silently compromise corporate happy to help with assessments, Gold rec- Finally, match solutions to each risk—for that date will not be subject to any specific desktops and result in the exposure of sensi- ommends companies with limited in- example, limits on social media activities not action, but versions of Word 2007 and Office tive financial data. house security expertise consider working directly related to a given role or mandated 2007 sold after Jan. 11 will not include i4i’s Kaspersky Lab security evangelist Ryan with third-party experts. use of encrypted removable media and lim- software. Future versions of Word and Office Naraine says the Clampi Trojan, which “It’s worth paying a bit of money up its on database mobility off of the protected expected in 2010 also do not include the specifically targets banking information, is front to bring in someone to do this for corporate network. Once cost/benefit is cal- software. Microsoft has yet to state publicly already responsible for more than $40 mil- you,” says Gold, who adds that an indepen- culated for each, prioritize and proceed. whether it plans to seek further appeal. lion in losses over the past two years. He dent consultant is more likely to provide says it reinforces IT’s need to tighten independent, vendor-neutral advice. P