P.O. Box 82545 Lincoln, NE 68501-2545 ELECTRONIC SERVICE REQUESTED May 20, 2011 Volume 33 Number 10 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 In This Issue... FEATURE PACKAGE How Does Your Security: Is Your Enterprise Protected? Is your enterprise as secure as it should be Data Center’s Location against today’s biggest threats? We offer tips for making sure you’re ready. Inside Today’s Biggest Security Threats....................24 Impact Performance? Essential Elements To Keep Your Enterprise Secure........25 Protect Your Enterprise From Workers Gone Bad............26 Building Information Security Policies & Training.......27 PHYSICAL INFRASTRUCTURE Enterprises Look For Sites That Can Help Reduce Costs & Maximize Uptime ■ Enterprises pay a lot of attention to the location of their data centers. That’s because a facility’s location can have a huge impact on operating by Cynthia Harvey (cid:68)(cid:77)(cid:74)(cid:78)(cid:66)(cid:85)(cid:70)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:66)(cid:87)(cid:66)(cid:74)(cid:77)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:80)(cid:71)(cid:1)(cid:79)(cid:70)(cid:85)(cid:14) costs, uptime, and the overall performance of (cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114) (cid:88)(cid:80)(cid:83)(cid:76)(cid:1)(cid:68)(cid:80)(cid:79)(cid:79)(cid:70)(cid:68)(cid:85)(cid:74)(cid:80)(cid:79)(cid:84)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:74)(cid:79)(cid:73)(cid:70)(cid:83)(cid:70)(cid:79)(cid:85)(cid:1) the business...............................................page 1 Whether they’re building(cid:1) (cid:83)(cid:74)(cid:84)(cid:76)(cid:1)(cid:80)(cid:71)(cid:1)(cid:66)(cid:1)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:84)(cid:74)(cid:85)(cid:70)(cid:8)(cid:84)(cid:1) (cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1)(cid:80)(cid:88)(cid:79)(cid:1)(cid:71)(cid:66)(cid:68)(cid:74)(cid:77)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:1)(cid:80)(cid:83)(cid:1)(cid:77)(cid:80)(cid:80)(cid:76)(cid:74)(cid:79)(cid:72)(cid:1)(cid:1) (cid:81)(cid:83)(cid:80)(cid:89)(cid:74)(cid:78)(cid:74)(cid:85)(cid:90)(cid:1)(cid:85)(cid:80)(cid:1)(cid:78)(cid:70)(cid:85)(cid:83)(cid:80)(cid:81)(cid:80)(cid:77)(cid:74)(cid:85)(cid:66)(cid:79)(cid:1)(cid:66)(cid:83)(cid:70)(cid:66)(cid:84)(cid:1) ■ Servers and other components in a data center (cid:71)(cid:80)(cid:83)(cid:1)(cid:88)(cid:73)(cid:80)(cid:77)(cid:70)(cid:84)(cid:66)(cid:77)(cid:70)(cid:1)(cid:80)(cid:83)(cid:1)(cid:68)(cid:80)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:71)(cid:66)(cid:68)(cid:74)(cid:77)(cid:14)(cid:1) (cid:66)(cid:79)(cid:69)(cid:1)(cid:80)(cid:85)(cid:73)(cid:70)(cid:83)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:84)(cid:15) require a steady stream of power, and UPSes help (cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:13)(cid:1)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:81)(cid:83)(cid:74)(cid:84)(cid:70)(cid:84)(cid:1)(cid:81)(cid:66)(cid:90)(cid:1)(cid:66)(cid:1)(cid:77)(cid:80)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1) guard against the damage that can be caused by power Cheap Power (cid:66)(cid:85)(cid:85)(cid:70)(cid:79)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:85)(cid:80)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:80)(cid:71)(cid:1)(cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1) outages, surges, and sags. Maximizing UPS avail- (cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:84)(cid:15)(cid:1)(cid:53)(cid:73)(cid:66)(cid:85)(cid:8)(cid:84)(cid:1)(cid:67)(cid:70)(cid:68)(cid:66)(cid:86)(cid:84)(cid:70)(cid:1)(cid:66)(cid:1)(cid:1) (cid:34)(cid:68)(cid:68)(cid:80)(cid:83)(cid:69)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:49)(cid:70)(cid:85)(cid:70)(cid:1)(cid:46)(cid:66)(cid:83)(cid:74)(cid:79)(cid:13)(cid:1) ability is an important part of any IT strategy to protect (cid:71)(cid:66)(cid:68)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:8)(cid:84)(cid:1)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:66)(cid:1) (cid:81)(cid:83)(cid:70)(cid:84)(cid:74)(cid:69)(cid:70)(cid:79)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:1)(cid:69)(cid:70)(cid:87)(cid:70)(cid:77)(cid:14) critical systems................................................page 12 (cid:73)(cid:86)(cid:72)(cid:70)(cid:1)(cid:74)(cid:78)(cid:81)(cid:66)(cid:68)(cid:85)(cid:1)(cid:80)(cid:79)(cid:1)(cid:80)(cid:81)(cid:70)(cid:83)(cid:66)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:84)(cid:13)(cid:1) (cid:80)(cid:81)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:71)(cid:74)(cid:83)(cid:78)(cid:1)(cid:53)(cid:22)(cid:1)(cid:49)(cid:66)(cid:83)(cid:85)(cid:79)(cid:70)(cid:83)(cid:84)(cid:1)(cid:45)(cid:45)(cid:36)(cid:1) ■ Viridity, a data center management software com- (cid:86)(cid:81)(cid:85)(cid:74)(cid:78)(cid:70)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:80)(cid:87)(cid:70)(cid:83)(cid:66)(cid:77)(cid:77)(cid:1)(cid:81)(cid:70)(cid:83)(cid:71)(cid:80)(cid:83)(cid:14) (cid:9)(cid:88)(cid:88)(cid:88)(cid:15)(cid:85)(cid:22)(cid:14)(cid:78)(cid:68)(cid:71)(cid:15)(cid:68)(cid:80)(cid:78)(cid:10)(cid:13)(cid:1)(cid:105)(cid:49)(cid:80)(cid:88)(cid:70)(cid:83)(cid:1) pany located in Burlington, Mass., is a new arrival on (cid:78)(cid:66)(cid:79)(cid:68)(cid:70)(cid:1)(cid:80)(cid:71)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:67)(cid:86)(cid:84)(cid:74)(cid:79)(cid:70)(cid:84)(cid:84)(cid:15) (cid:68)(cid:80)(cid:84)(cid:85)(cid:1)(cid:74)(cid:84)(cid:1)(cid:66)(cid:1)(cid:76)(cid:70)(cid:90)(cid:1)(cid:69)(cid:83)(cid:74)(cid:87)(cid:70)(cid:83)(cid:1)(cid:74)(cid:79)(cid:1)(cid:66)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1) thedata management software scene..........page 14 (cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:15)(cid:1)(cid:53)(cid:73)(cid:66)(cid:85)(cid:8)(cid:84)(cid:1)(cid:80)(cid:79)(cid:70)(cid:1)(cid:80)(cid:71)(cid:1)(cid:90)(cid:80)(cid:86)(cid:83)(cid:1)(cid:77)(cid:66)(cid:83)(cid:72)(cid:14) Key Points (cid:70)(cid:84)(cid:85)(cid:1)(cid:80)(cid:81)(cid:70)(cid:83)(cid:66)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:79)(cid:84)(cid:70)(cid:84)(cid:13)(cid:117)(cid:1)(cid:73)(cid:70)(cid:1) ■Product Spotlight: (cid:70)(cid:89)(cid:81)(cid:77)(cid:66)(cid:74)(cid:79)(cid:84)(cid:13)(cid:1)(cid:105)(cid:84)(cid:80)(cid:1)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:67)(cid:86)(cid:79)(cid:69)(cid:66)(cid:79)(cid:85)(cid:13)(cid:1) Data Center Flooring & Accessories.................page 16 (cid:68)(cid:80)(cid:84)(cid:85)(cid:14)(cid:70)(cid:71)(cid:71)(cid:70)(cid:68)(cid:85)(cid:74)(cid:87)(cid:70)(cid:1)(cid:81)(cid:80)(cid:88)(cid:70)(cid:83)(cid:1)(cid:74)(cid:84)(cid:1)(cid:76)(cid:70)(cid:90)(cid:15)(cid:117) (cid:114)(cid:1) (cid:34)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:8)(cid:84)(cid:1)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:66)(cid:1)(cid:67)(cid:74)(cid:72)(cid:1) ■Product Spotlight: (cid:43)(cid:80)(cid:73)(cid:79)(cid:1)(cid:35)(cid:80)(cid:90)(cid:69)(cid:13)(cid:1)(cid:43)(cid:83)(cid:15)(cid:13)(cid:1)(cid:81)(cid:83)(cid:74)(cid:79)(cid:68)(cid:74)(cid:81)(cid:66)(cid:77)(cid:1) impact on its operational costs, uptime, Specialty Racks & Cabinets..............................page 18 (cid:66)(cid:85)(cid:1)(cid:77)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:68)(cid:80)(cid:79)(cid:84)(cid:86)(cid:77)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:71)(cid:74)(cid:83)(cid:78)(cid:1) and the business’ overall performance. (cid:53)(cid:73)(cid:70)(cid:1)(cid:35)(cid:80)(cid:90)(cid:69)(cid:1)(cid:36)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:13)(cid:1)(cid:66)(cid:72)(cid:83)(cid:70)(cid:70)(cid:84)(cid:15)(cid:1) ■ When done effectively, controlling airflow in (cid:105)(cid:48)(cid:81)(cid:70)(cid:83)(cid:66)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:78)(cid:80)(cid:84)(cid:85)(cid:1) the data center results in less downtime and longer (cid:114)(cid:1) (cid:53)(cid:73)(cid:70)(cid:1)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:84)(cid:74)(cid:85)(cid:70)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:69)(cid:83)(cid:66)(cid:78)(cid:66)(cid:85)(cid:74)(cid:68)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:77)(cid:80)(cid:88)(cid:70)(cid:83)(cid:1)(cid:70)(cid:77)(cid:70)(cid:68)- (cid:74)(cid:78)(cid:81)(cid:80)(cid:83)(cid:85)(cid:66)(cid:79)(cid:85)(cid:13)(cid:117)(cid:1)(cid:73)(cid:70)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:15)(cid:1)(cid:105)(cid:37)(cid:66)(cid:85)(cid:66)(cid:1) equipment lifespans, conditions that every data center tricity costs—one of a data center’s big- (cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:84)(cid:1)(cid:86)(cid:84)(cid:70)(cid:1)(cid:66)(cid:1)(cid:77)(cid:80)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:70)(cid:77)(cid:70)(cid:68)(cid:85)(cid:83)(cid:74)(cid:68)(cid:74)(cid:85)(cid:90)(cid:13)(cid:1) administrator wants to achieve........................page 20 gest operating expenses. (cid:34)(cid:77)(cid:85)(cid:73)(cid:80)(cid:86)(cid:72)(cid:73)(cid:1)(cid:70)(cid:87)(cid:70)(cid:83)(cid:90)(cid:1)(cid:68)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:1)(cid:73)(cid:66)(cid:84)(cid:1)(cid:84)(cid:77)(cid:74)(cid:72)(cid:73)(cid:85)(cid:77)(cid:90)(cid:1)(cid:69)(cid:74)(cid:71)(cid:14) (cid:84)(cid:80)(cid:1)(cid:78)(cid:66)(cid:83)(cid:76)(cid:70)(cid:85)(cid:84)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:66)(cid:68)(cid:68)(cid:70)(cid:84)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:68)(cid:73)(cid:70)(cid:66)(cid:81)(cid:13)(cid:1)(cid:83)(cid:70)(cid:77)(cid:74)(cid:14) NETWORKING & VPN (cid:114)(cid:1) (cid:45)(cid:80)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:84)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:70)(cid:66)(cid:84)(cid:90)(cid:1)(cid:66)(cid:68)(cid:68)(cid:70)(cid:84)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:71)(cid:74)(cid:67)(cid:70)(cid:83)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1) (cid:71)(cid:70)(cid:83)(cid:70)(cid:79)(cid:85)(cid:1)(cid:68)(cid:83)(cid:74)(cid:85)(cid:70)(cid:83)(cid:74)(cid:66)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:1)(cid:84)(cid:74)(cid:85)(cid:70)(cid:1)(cid:84)(cid:70)(cid:77)(cid:70)(cid:68)(cid:14) (cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:70)(cid:79)(cid:70)(cid:83)(cid:72)(cid:90)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:77)(cid:80)(cid:80)(cid:76)(cid:70)(cid:69)(cid:1)(cid:86)(cid:81)(cid:80)(cid:79)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:71)(cid:66)(cid:87)(cid:80)(cid:83)(cid:15)(cid:117) multiple network providers, as well as low (cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:13)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:83)(cid:85)(cid:84)(cid:1)(cid:66)(cid:72)(cid:83)(cid:70)(cid:70)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:66)(cid:1)(cid:71)(cid:70)(cid:88)(cid:1)(cid:71)(cid:66)(cid:68)(cid:85)(cid:80)(cid:83)(cid:84)(cid:1) (cid:46)(cid:80)(cid:84)(cid:85)(cid:1)(cid:34)(cid:78)(cid:70)(cid:83)(cid:74)(cid:68)(cid:66)(cid:79)(cid:1)(cid:68)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:1)(cid:72)(cid:70)(cid:85)(cid:1)(cid:85)(cid:73)(cid:70)(cid:74)(cid:83)(cid:1)(cid:70)(cid:79)(cid:70)(cid:83)(cid:72)(cid:90)(cid:1) ■ Making necessary changes to the security perimeter, disaster risk, can maximize uptime. (cid:66)(cid:83)(cid:70)(cid:1)(cid:72)(cid:70)(cid:79)(cid:70)(cid:83)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:74)(cid:78)(cid:81)(cid:80)(cid:83)(cid:85)(cid:66)(cid:79)(cid:85)(cid:1)(cid:85)(cid:80)(cid:1)(cid:70)(cid:87)(cid:70)(cid:83)(cid:90)(cid:80)(cid:79)(cid:70)(cid:15)(cid:1)(cid:53)(cid:73)(cid:70)(cid:90)(cid:1) (cid:71)(cid:83)(cid:80)(cid:78)(cid:1)(cid:68)(cid:80)(cid:66)(cid:77)(cid:14)(cid:224)(cid:83)(cid:70)(cid:69)(cid:1)(cid:70)(cid:77)(cid:70)(cid:68)(cid:85)(cid:83)(cid:74)(cid:68)(cid:1)(cid:86)(cid:85)(cid:74)(cid:77)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:13)(cid:1)(cid:67)(cid:86)(cid:85)(cid:1)(cid:68)(cid:80)(cid:66)(cid:77)(cid:1)(cid:1) including applying patches, changing software settings, (cid:74)(cid:79)(cid:68)(cid:77)(cid:86)(cid:69)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:66)(cid:87)(cid:66)(cid:74)(cid:77)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:68)(cid:80)(cid:84)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:81)(cid:80)(cid:88)(cid:70)(cid:83)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) Go to Page 10 or adding a new device, can be a nail-biting time for any organization. It’s best to have good change control procedures in place..........................................page 1 (cid:51)(cid:70)(cid:68)(cid:73)(cid:66)(cid:83)(cid:72)(cid:70)(cid:1)(cid:58)(cid:80)(cid:86)(cid:83)(cid:1)(cid:36)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:1) ■ The ability to monitor application performance is paramount, and improving this ability has saved many a bewildered network manager from the perils of heated end users.............................................page 21 (cid:36)(cid:80)(cid:79)(cid:85)(cid:83)(cid:80)(cid:77)(cid:1)(cid:49)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84) ■ Many organizations are beginning to focus on the commonalities of their voice, video, and data networks rather than their differences. The result is a holistic architecture that shares resources to Key Points more efficiently support users’ growing technol- Solid Procedures Ensure Evaluation, Risk Assessment ogy needs.................................................page 22 (cid:114)(cid:1) (cid:36)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:1)(cid:68)(cid:80)(cid:79)(cid:85)(cid:83)(cid:80)(cid:77)(cid:1)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:69)(cid:86)(cid:83)(cid:70)(cid:84)(cid:13)(cid:1)(cid:70)(cid:84)(cid:81)(cid:70)(cid:68)(cid:74)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1) the security perimeter, are not optional. ■ Are your enterprise’s IT services Mac-friendly? Here are some tips to help...............................page 23 by Bill Hayes (cid:68)(cid:80)(cid:79)(cid:85)(cid:83)(cid:80)(cid:77)(cid:84)(cid:1)(cid:66)(cid:85)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:81)(cid:70)(cid:83)(cid:74)(cid:78)(cid:70)(cid:85)(cid:70)(cid:83)(cid:1)(cid:74)(cid:84)(cid:1)(cid:70)(cid:84)(cid:84)(cid:70)(cid:79)(cid:85)(cid:74)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:14) (cid:114)(cid:1) (cid:34)(cid:1)(cid:72)(cid:80)(cid:80)(cid:69)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:1)(cid:81)(cid:77)(cid:66)(cid:79)(cid:1)(cid:73)(cid:66)(cid:84)(cid:1)(cid:66)(cid:1)(cid:85)(cid:70)(cid:84)(cid:85)(cid:70)(cid:69)(cid:1)(cid:67)(cid:66)(cid:68)(cid:76)(cid:14)(cid:80)(cid:86)(cid:85)(cid:1) (cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114) (cid:74)(cid:79)(cid:72)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)(cid:83)(cid:74)(cid:85)(cid:90)(cid:1)(cid:81)(cid:80)(cid:77)(cid:74)(cid:68)(cid:90)(cid:15)(cid:1)(cid:105)(cid:53)(cid:73)(cid:70)(cid:1)(cid:83)(cid:74)(cid:84)(cid:76)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:87)(cid:86)(cid:77)(cid:14) STORAGE plan in case things go awry. Don’t let crisis Making necessary changes(cid:1)(cid:85)(cid:80)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)(cid:14)(cid:1) (cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:79)(cid:66)(cid:77)(cid:1)(cid:83)(cid:70)(cid:84)(cid:80)(cid:86)(cid:83)(cid:68)(cid:70)(cid:84)(cid:1)(cid:78)(cid:66)(cid:90)(cid:1)(cid:67)(cid:70)(cid:1)(cid:70)(cid:89)(cid:81)(cid:80)(cid:84)(cid:70)(cid:69)(cid:1) management undo change control. Hurried, (cid:83)(cid:74)(cid:85)(cid:90)(cid:1)(cid:81)(cid:70)(cid:83)(cid:74)(cid:78)(cid:70)(cid:85)(cid:70)(cid:83)(cid:13)(cid:1)(cid:74)(cid:79)(cid:68)(cid:77)(cid:86)(cid:69)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:81)(cid:81)(cid:77)(cid:90)(cid:74)(cid:79)(cid:72)(cid:1)(cid:81)(cid:66)(cid:85)(cid:68)(cid:73)(cid:70)(cid:84)(cid:13)(cid:1) (cid:85)(cid:80)(cid:1)(cid:70)(cid:89)(cid:85)(cid:70)(cid:83)(cid:79)(cid:66)(cid:77)(cid:1)(cid:66)(cid:85)(cid:85)(cid:66)(cid:68)(cid:76)(cid:70)(cid:83)(cid:84)(cid:13)(cid:1)(cid:67)(cid:86)(cid:85)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:83)(cid:74)(cid:84)(cid:76)(cid:1)(cid:80)(cid:71)(cid:1)(cid:66)(cid:68)(cid:68)(cid:74)(cid:69)(cid:70)(cid:79)(cid:14) ■Electronically stored information, or ESI, undocumented fixes will come back and (cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:74)(cid:79)(cid:72)(cid:1)(cid:84)(cid:80)(cid:71)(cid:85)(cid:88)(cid:66)(cid:83)(cid:70)(cid:1)(cid:84)(cid:70)(cid:85)(cid:85)(cid:74)(cid:79)(cid:72)(cid:84)(cid:13)(cid:1)(cid:80)(cid:83)(cid:1)(cid:66)(cid:69)(cid:69)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1) (cid:85)(cid:66)(cid:77)(cid:1)(cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:79)(cid:66)(cid:77)(cid:1)(cid:70)(cid:89)(cid:81)(cid:80)(cid:84)(cid:86)(cid:83)(cid:70)(cid:84)(cid:1)(cid:9)(cid:84)(cid:86)(cid:68)(cid:73)(cid:1)(cid:66)(cid:84)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:77)(cid:70)(cid:66)(cid:76)(cid:66)(cid:72)(cid:70)(cid:10)(cid:1) seems pretty self-explanatory, but a definition for it haunt you sooner rather than later. (cid:69)(cid:70)(cid:87)(cid:74)(cid:68)(cid:70)(cid:13)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:67)(cid:70)(cid:1)(cid:66)(cid:1)(cid:79)(cid:66)(cid:74)(cid:77)(cid:14)(cid:67)(cid:74)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:74)(cid:78)(cid:70)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:66)(cid:79)(cid:90)(cid:1) (cid:74)(cid:79)(cid:68)(cid:83)(cid:70)(cid:66)(cid:84)(cid:70)(cid:84)(cid:13)(cid:1)(cid:66)(cid:84)(cid:1)(cid:88)(cid:70)(cid:77)(cid:77)(cid:13)(cid:117)(cid:1)(cid:49)(cid:70)(cid:84)(cid:68)(cid:66)(cid:85)(cid:80)(cid:83)(cid:70)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:15) does exist.................................................page 30 (cid:80)(cid:83)(cid:72)(cid:66)(cid:79)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:15)(cid:1)(cid:42)(cid:85)(cid:8)(cid:84)(cid:1)(cid:67)(cid:70)(cid:84)(cid:85)(cid:1)(cid:85)(cid:80)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:72)(cid:80)(cid:80)(cid:69)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:1) (cid:42)(cid:53)(cid:1)(cid:80)(cid:81)(cid:70)(cid:83)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:84)(cid:1)(cid:85)(cid:70)(cid:66)(cid:78)(cid:84)(cid:1)(cid:85)(cid:90)(cid:81)(cid:74)(cid:68)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:87)(cid:74)(cid:70)(cid:88)(cid:1)(cid:83)(cid:74)(cid:84)(cid:76)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1) (cid:114)(cid:1) (cid:35)(cid:70)(cid:1)(cid:84)(cid:86)(cid:83)(cid:70)(cid:1)(cid:85)(cid:80)(cid:1)(cid:69)(cid:80)(cid:68)(cid:86)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:83)(cid:70)(cid:72)(cid:86)- (cid:68)(cid:80)(cid:79)(cid:85)(cid:83)(cid:80)(cid:77)(cid:1)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:69)(cid:86)(cid:83)(cid:70)(cid:84)(cid:1)(cid:74)(cid:79)(cid:1)(cid:81)(cid:77)(cid:66)(cid:68)(cid:70)(cid:15)(cid:1) (cid:70)(cid:79)(cid:69)(cid:1)(cid:81)(cid:80)(cid:74)(cid:79)(cid:85)(cid:84)(cid:1)(cid:74)(cid:79)(cid:1)(cid:85)(cid:70)(cid:83)(cid:78)(cid:84)(cid:1)(cid:80)(cid:71)(cid:1)(cid:86)(cid:79)(cid:74)(cid:79)(cid:85)(cid:70)(cid:79)(cid:69)(cid:70)(cid:69)(cid:1)(cid:68)(cid:80)(cid:79)(cid:84)(cid:70)(cid:82)(cid:86)(cid:70)(cid:79)(cid:68)(cid:70)(cid:84)(cid:1) larly review those changes with your staff. The Processor.com home page is frequently updated with (cid:34)(cid:68)(cid:68)(cid:80)(cid:83)(cid:69)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:40)(cid:66)(cid:83)(cid:85)(cid:79)(cid:70)(cid:83)(cid:1)(cid:87)(cid:74)(cid:68)(cid:70)(cid:1)(cid:81)(cid:83)(cid:70)(cid:84)(cid:74)(cid:69)(cid:70)(cid:79)(cid:85)(cid:1)(cid:43)(cid:80)(cid:73)(cid:79)(cid:1) (cid:71)(cid:83)(cid:80)(cid:78)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:13)(cid:1)(cid:84)(cid:86)(cid:68)(cid:73)(cid:1)(cid:66)(cid:84)(cid:1)(cid:66)(cid:1)(cid:81)(cid:66)(cid:85)(cid:68)(cid:73)(cid:1)(cid:81)(cid:66)(cid:68)(cid:76)(cid:66)(cid:72)(cid:70)(cid:1)(cid:83)(cid:70)(cid:79)(cid:69)(cid:70)(cid:83)(cid:74)(cid:79)(cid:72)(cid:1) Make someone responsible for reviewing new articles and hardware news to help you keep current. (cid:49)(cid:70)(cid:84)(cid:68)(cid:66)(cid:85)(cid:80)(cid:83)(cid:70)(cid:13)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)(cid:83)(cid:74)(cid:85)(cid:90)(cid:1)(cid:68)(cid:80)(cid:79)(cid:85)(cid:83)(cid:80)(cid:77)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)(cid:83)(cid:74)(cid:85)(cid:90)(cid:1) (cid:66)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:1)(cid:74)(cid:79)(cid:80)(cid:81)(cid:70)(cid:83)(cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:80)(cid:83)(cid:1)(cid:83)(cid:70)(cid:84)(cid:86)(cid:77)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:74)(cid:79)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:84)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:1) and approving changes. Visit www.processor.com today. (cid:81)(cid:80)(cid:77)(cid:74)(cid:68)(cid:90)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:83)(cid:70)(cid:77)(cid:66)(cid:85)(cid:70)(cid:69)(cid:13)(cid:1)(cid:84)(cid:80)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:74)(cid:79)(cid:72)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)(cid:83)(cid:74)(cid:85)(cid:90)(cid:1) Go to Page 10 Page 2 Processor.com May 20, 2011 Subscribe Today/Address Change Form (cid:39)(cid:80)(cid:83)(cid:1)(cid:66)(cid:69)(cid:69)(cid:83)(cid:70)(cid:84)(cid:84)(cid:1)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:13)(cid:1)(cid:71)(cid:74)(cid:77)(cid:77)(cid:1)(cid:80)(cid:86)(cid:85)(cid:1)(cid:71)(cid:80)(cid:83)(cid:78)(cid:1)(cid:67)(cid:70)(cid:77)(cid:80)(cid:88)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1) information and mail or fax. PLEASE PRINT What type of subscription request is this? ❑ New ❑ Renewal ❑ Cancel (cid:165)(cid:1)(cid:36)(cid:80)(cid:81)(cid:90)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:19)(cid:17)(cid:18)(cid:18)(cid:1)(cid:52)(cid:66)(cid:79)(cid:69)(cid:73)(cid:74)(cid:77)(cid:77)(cid:84)(cid:1)(cid:49)(cid:86)(cid:67)(cid:77)(cid:74)(cid:84)(cid:73)(cid:74)(cid:79)(cid:72)(cid:1)(cid:36)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:15)(cid:1)(cid:34)(cid:77)(cid:77)(cid:1)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:84)(cid:1)(cid:83)(cid:70)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:69)(cid:15)(cid:1) Phone: ( ______ )________________________________ Fax: ( ______ ) __________________________________________ Contact Name:__________________________________________________________________________________________ Company Name:________________________________________________________________________________________ Subscriptions Address: ______________________________________________________________________________________________ (cid:46)(cid:66)(cid:74)(cid:77)(cid:1)(cid:39)(cid:80)(cid:83)(cid:78)(cid:1)(cid:53)(cid:80)(cid:27)(cid:1)(cid:49)(cid:15)(cid:48)(cid:15)(cid:1)(cid:35)(cid:80)(cid:89)(cid:1)(cid:25)(cid:19)(cid:22)(cid:21)(cid:22)(cid:1)(cid:114)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:17)(cid:18)(cid:14)(cid:19)(cid:22)(cid:21)(cid:22) (cid:48)(cid:87)(cid:70)(cid:83)(cid:79)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:37)(cid:70)(cid:77)(cid:74)(cid:87)(cid:70)(cid:83)(cid:90)(cid:27)(cid:1)(cid:18)(cid:19)(cid:17)(cid:1)(cid:56)(cid:70)(cid:84)(cid:85)(cid:1)(cid:41)(cid:66)(cid:83)(cid:87)(cid:70)(cid:84)(cid:85)(cid:1)(cid:37)(cid:83)(cid:74)(cid:87)(cid:70)(cid:1)(cid:114)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:19)(cid:18) City: ___________________________________________ State: ________ Postal Code: _____________________________ (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:20)(cid:20)(cid:21)(cid:14)(cid:24)(cid:21)(cid:22)(cid:25)(cid:1)(cid:93)(cid:1)(cid:45)(cid:48)(cid:36)(cid:34)(cid:45)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:20)(cid:19)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:26)(cid:20) Country:_______________________________________________________________________________________________ Advertising & Reprints Email: ________________________________________ Web Address: ___________________________________________ (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:19)(cid:21)(cid:24)(cid:14)(cid:21)(cid:25)(cid:25)(cid:17)(cid:1)(cid:93)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:21)(cid:18)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:17)(cid:21) 1. What is the size of your company 3. What is your annual computer hardware/ Editorial Staff (how many employees)? software purchasing budget? [email protected] ❑ Less than 10 ❑ 200 to 499 ❑ $0 to $9,999 ❑ $100,000 to $249,999 (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) ❑ 10 to 99 ❑500 to 999 ❑ $10,000 to $24,999 ❑ $250,000 to $499,999 ❑ 100 to 199 ❑ 1,000+ ❑ $25,000 to $49,999 ❑ $500,000 to $999,000 ❑ $50,000 to $99,999 ❑ $1,000,000+ Do you have a new product that data center/IT managers (cid:88)(cid:80)(cid:86)(cid:77)(cid:69)(cid:1)(cid:67)(cid:70)(cid:1)(cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:70)(cid:84)(cid:85)(cid:70)(cid:69)(cid:1)(cid:74)(cid:79)(cid:1)(cid:77)(cid:70)(cid:66)(cid:83)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:32)(cid:1)(cid:36)(cid:66)(cid:77)(cid:77)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21)(cid:1) 2. How often do you purchase computer or email [email protected]. hardware/software? ❑ Weekly ❑ Quarterly ❑ Bi-weekly ❑ Annually ❑ Monthly ❑ No Involvement www.Processor.com News Also In This Issue... SECURITY the existing solar markets. In 2010, Germany and ■Cisco To Cut Its Workforce . . . ■Symantec’s Fourth-Quarter Profits Italy accounted for about two-thirds of purchases ■ Cloud computing has been touted as the future of Decline, Revenues Increase Following the release of lackluster Q3 2011 in the solar market, but government subsidies are data storage, but like any heavily hyped technology, financial results, Cisco announced plans to Security software vendor Symantec ended the expected to be scaled back, so Lux Research it comes with some red flags. The No. 1 caveat with cut jobs in an effort to recharge profit. The job fourth quarter of its fiscal year 2011 earning a net believes that solar growth will level off in those cloud computing is security......................... page 28 cuts—the number of which has not yet been income of $168 million, or 22 cents per share, countries. Japan, China, and the United States ■ Recently, some high-profile cyberattacks have determined—are part of CEO John Chambers’ down from $184 million in Q4 2010. The com- are other markets where large capacities of solar brought the phrase “advanced persistent threat,” or plans to slash $1 billion in expenses. The com- pany’s full-year profit was $597 million, down from panels were installed, but the question of subsidies APT, into more common use. Organizations of all types puter networking company’s revenue stalled 2010’s $714 million. Although the company’s and solar penetration leaves the future of those and sizes find these incidents troubling.......... page 29 after initially recovering from the recession, overall profit declined, its revenues increased 9% markets unsure. In India, Lux says solar technol- growing just 4.8% to $10.9 billion from $10.4 year over year, climbing from $1.53 billion in Q4 ogy will likely need to be integrated with storage in STORAGE billion in Q3 2010; the company’s net income, 2010 to $1.67 billion this year. Symantec credits order for off-grid applications to gain ground. however, fell 11% year over year to $1.8 bil- improved backup, SaaS, and data loss prevention ■Buying Guide: Data Backup........................page 31 lion, or 33 cents per share. Chambers also said sales for the increase in revenue. Looking ahead, ■Nvidia Buys Into Baseband, RF ■Product Spotlight: Data Backup.................page 32 that the company was abandoning its long-held Symantec anticipates Q1 2012 earnings of 19 to With Icera Acquisition ■Dealing with disaster is never easy, but there are goal of achieving 12 to 17% in year-over-year 20 cents per share and revenues between $1.57 Chip maker Nvidia is delving deeper into the revenue growth each quarter because the goal billion and $1.59 billion. mobile market with a new acquisition. The com- methods organizations can use to better prepare them- is “not reflective of the environment.” pany has agreed to buy Bristol, England,-based selves for when an emergency does occur........ page 34 ■India To Lead New Charge Icera, which makes low-power 2G to 4G wire- ■In part because of HIPAA and the HITECH Act, archiving ■. . . & Streamline Sales, Service For Solar Power less baseband processors with RF components & Engineering Divisions and retaining electronic medical records is a critical Lux Research predicts that India, South for mobile phones. Because issue for healthcare-related businesses................ page 35 Cisco plans to undergo significant organizational Africa, Russia, Brazil, Mexico, and the Icera’s Livanto and other changes to simplify the way it executes strategy, UK will become the leading consum- chips are programmable, MESSAGING & says Chairman and CEO John Chambers. In ers of solar technology in the next they can easily support TELEPHONY making the announcement, Cisco says it will five years because there will no multiple protocols for ■ The features and capabilities of unified commu- focus on five key areas: core (routing, switching, longer be as much demand in use on a variety of car- and services), collaboration, data center virtual- riers’ networks. Nvidia nicationshave a lot to offer small businesses, but ization and the cloud, video, and architectures expects Icera’s products it costs money to bring the different communication for business transformation. The company’s to complement Nvidia’s options into one integrated package............... page 36 Worldwide Field Operations will be organized Tegra mobile application into three geographic regions: the Americas; processor in a smartphone and SERVERS Europe, Middle East, and Africa; and Asia Pacific/ tablet platform going forward. The ■ Chenbro 6G Expanders are a reliable, flexible line of Japan/Greater China. Cisco Services will align companies should finalize the $367 with Field Operations and organize around key million cash deal in early to mid-June. products designed to ensure compatibility. A number of customer segments. Cisco Engineering will focus features, including LSI controllers and SCSI Enclosure its efforts on the five company priority areas, and ■Sophos To Purchase Astaro Services, offer enhanced capabilities.............. page 37 the company’s Council structure will Antivirus firm Sophos announced ■Buying Guide: Rackmount Servers.............page 37 be refined to cover three an agreement to acquire network ■Product Spotlight: Rackmount Servers......page 38 areas: Enterprise, Service security appliance and unified Provider, and Emerging threat management vendor CLIENTS Countries. Most changes Astaro. Through the acquisition, will take effect within the Sophos, which specializes in ■ The landscape for software management is chang- next 120 days. endpoint, mobile, Web, and email ing. A growing number of companies are choosing to security, says it will broaden the move from traditional, on-premises software manage- WATCH THE coverage of its product portfolio, addressing This information provides a quick glimpse of current and historical stock ment solutions to SaaS................................... page 40 STOCKS security in a more holistic, comprehensive fash- prices and trends for 13 major companies in the technology market. ion. Astaro, considered the fourth largest entity DATA CENTER in the UTM market, has a significant presence MANAGEMENT % change from in the region encompassing Europe, the Middle Company Symbol Year Ago April 28 $ May 12 $ previous issue East, and Africa. Neither company released ■ Experts offer some pointers on how to recruit a new AMD AMD $9.42 $9.03 $8.93 ▼ 1.11% details regarding the financial aspects or time- IT department or group................................ page 41 Apple AAPL $258.36 $346.80 $346.57 ▼ 0.07% line of the deal. CA Technologies CA $21.88 $24.80 $25.06 ▲ 1.05% ■Corporate sustainability is an extension of today’s Cisco Systems CSCO $25.53 $17.35 $16.93 ▼ 2.42% ■Valuable Brands: eco-driven wave, and as long as IT leaders don’t feel Apple Takes Top Spot From Google Dell DELL $15.44 $15.84 $16.66 ▲ 5.18% like they’re being dragged into it, tech shops are opti- Google GOOG $510.88 $537 $535.05 ▼ 0.36% For the first time ever, Apple ranked No. 1 on the mally positioned to drive sustainability............ page 42 HP HPQ $48.72 $40.57 $40.88 ▲ 0.76% BrandZ Top 100 Most Valuable Global Brands, ■ The common definition of gray market is “the sale IBM IBM $131.48 $170.83 $172.24 ▲ 0.83% compiled by Millward Brown Optimor. Apple post- of equipment through channels that aren’t licensed or Intel INTC $22.50 $22.85 $23.71 ▲ 3.76% ed a brand value of $153 billion to oust Google, authorized by the original manufacturer,” and it’s both Microsoft MSFT $29.24 $26.20 $25.32 ▼ 3.36% which had been ranked No. 1 for four years legal and legitimate........................................ page 43 Oracle ORCL $24.24 $35.29 $35.73 ▲ 1.25% straight. Google came in at No. 2. Other notable Red Hat Software RHT $30.76 $46.77 $47.44 ▲ 1.43% tech entrants on the top 10 include IBM at No. 3, The Processor.com home page is frequently updated with Symantec SYMC $16.37 $19.70 $20.42 ▲ 3.65% Microsoft at No. 5, AT&T at No. 7, China Mobile new articles and hardware news to help you keep current. at No. 9, and GE at No. 10. NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. Visit www.processor.com today. May 20, 2011 Processor.com Page 3 Page 4 Processor.com May 20, 2011 News S T A T S & F A C T S ■New Privacy Rules by Apple’s iPad, with several other products Providing The Latest Insight & Information Adopted In India elbowing for room in a small segment. The From Leading Research Firms India has issued new rules that restrict how iPad occupies 82% of the market, with 43% businesses handle personal information. going to Wi-Fi-only models and 39% to 3G With the spread of cloud computing adop- + Wi-Fi models. The second largest share Plan For tion, IT organizations worldwide are seeking of the market goes to the catch-all “Other” standardization of data protection laws to category, which makes up 9% of the market. THE FUTURE promote privacy so that cloud computing Samsung’s Galaxy Tab came in third with firms can move data internationally without 4%, and the Dell Streak (3%) and Motorola fear of legal consequences. India’s new Xoom (2%) rounded out the top five. The Privacy Rules will require organizations great disparity can be attributed at least in Could it be possible for data center space requirements to notify individuals by letter, fax, or email part to the fact that the iPad hit the market to decrease? Gartner thinks so, saying four forces could when their personal information is collected. before the others. dramatically shrink data center space requirements Additional stipulations require organiza- within the next decade: tions to make a privacy policy available, ■Android Overtakes Smartphone OS Market Share implement measures to secure personal Smarter designs. Traditional methods of designing information, and set up a process to resolve Recent statistics from ComScore show that data centers were created during the mainframe disputes relating to the collection and use Google’s Android operating system has era, Gartner says, which had minimal variation in of personal information. surpassed BlackBerry in the United States operating temperature or power consumption dur- as the dominant smartphone platform. Be- ing long periods of time. Today’s data centers have ■Survey Details Consumers’ tween December 2010 and March 2011, different mechanical/electrical demands, which new Wish Lists For Health Apps Google’s share increased to 34.7% of the designs need to take into account. In a survey conducted in March by the CHIC market, up from 28.7%, while BlackBerry’s (Consumer Health Information Corp.), 91.1% share dropped from 31.6% to 27.1%. Apple Green pressures. As awareness of green IT has increased, of nearly 400 respondents indicated they’re saw modest improvement, increasing its new data center managers are taking a hard look at energy effi- most interested in share from 25% ciency in both data center design and execution, Gartner says. using health-related to 25.5% over the PUE, in particular, is gaining ground, with new data centers apps to gain medi- same time period, being built to meet specific PUE targets. cal information. while Microsoft Specifically, 48.5% (7.5%) and Palm Conquering density. Although data center physical floor space would like to use (2.8%) each saw may be nearing capacity, Gartner says, the actual compute health apps to keep a drop of 0.9%. space within racks and servers is poorly used. Average rack track of health informa- Another finding of densities are about 60% worldwide; new designs could push that tion, while 58.4% want note is that smart- to between 85% and 90% density. the app to help man- phone ownership age a disease or drug. increased 15% Cloud computing. Data center managers are increasingly shift- Nearly 80% said they’d from December ing nonessential workloads to cloud providers, freeing up floor be more likely to use a 2010 to March space, power, and cooling. Gartner says this means the “new” health app that could 2011, with 72.5 corporate data center will focus on core business functions that analyze data the user million people differentiate the business from its competition. was logging and pro- now owning one vide feedback concern- of the devices. ing how the user was doing. Another 39.8% ■FTC A Mixed Outlook For Settles With indicated they’re will- Companies ing to use a health JOBS, CERTIFICATIONS app several times In what might daily, and respon- be construed as dents were most likely a stern warn- to use health apps ing to Web site Companies have changed the way they think about IT and how it’s managed and deliv- to locate data about developers and ered, driving growth in pay and demand for specialized IT and business skills, says David drugs (42.2%) or dis- providers who Foote, co-founder, CEO, and chief research officer at Foote Partners. That shift in mental- ease states (26.5%). collect sensitive ity has led to a slight increase in pay for select noncertified skills and a decline in pay for Ultimately, CHIC said user information, those with certain individual IT certifications. “patients will not use a the Federal Trade smartphone app simply Commission (cid:114)(cid:1) “At this point, I don’t think anyone should be surprised that skills acquisition, not because it is innova- says that payroll recruiting full-time people, has been the bigger focus in the past few years,” Foote says. tive or handy.” Instead, provider Ceridian Companies are increasingly hiring contractors, consultants, part-time employees, offshore they seek convenience and a way to simpli- and immigration services software provider vendors, and managed services/cloud computing providers. fy their health-related tasks. Patients also Lookout Services have settled charges that want feedback from apps that are accurate they failed to enact security measures suf- and that follow clinical and behavior modifi- ficient to protect sensitive data. The two com- cation guidelines. panies failed to secure consumer information, the FTC says, exposing some 65,000 users’ ■Broadcom To Acquire SC Square personal information during recent security Semiconductor maker Broadcom announced breaches. As part of the settlement, the early this month that it has entered a definitive companies have agreed to implement com- agreement to acquire Israeli security software prehensive security programs and to obtain developer SC Square. In a release, Broadcom independent security audits every other year said that in addition to acquiring SC Square’s for the next 20 years. team of security-focused engineers, the acqui- sition continues the company’s strategy to ■Google Facing DoJ Probe acquire “innovative technology and high-quality After taking a hit on mobile privacy issues (cid:114)(cid:1) “There’s a brand new defini- teams with a solid track record of execution.” related to the collection of users’ location tion of ‘IT professional,’” Foote The deal is expected to cost Broadcom $41.9 data by the company’s Android devices, says. The new IT professional million and complete sometime prior to June 30 Google is now being investigated by the combines knowledge, experi- subject to the satisfaction of closing conditions. Department of Justice in connection with ence, and skill sets not associat- SC Square is a leading provider of security practices related to its advertising program. ed with traditional IT departments chip and communication solutions, offering In connection with that probe, the company and workers. smart card technology that’s used in e-health, has earmarked some $500 million toward a passports, ID cards, and credit and debit cards. possible settlement, the terms—and even (cid:114)(cid:1) “Technology and business skills have The company boasts a team of engineers and the potential recipient—of which remain in effect collapsed into each other, creating specialists with extensive real-world experience undisclosed. Google has therefore revised legions of what our firm refers to generically as in implementing smart card solutions. its first-quarter profit figures, dropping its hybrid IT/business professionals,” Foote says. New expected profit from $2.3 billion to $1.8 bil- hybrid jobs and job titles are being created, and tradi- ■Apple Still Tops In Tablet Market Share lion for the quarter, which ended March 31. tional IT jobs have been changed and redefined. According to the latest research from Niel- The company has declined to comment on sen, the tablet market is still being dominated the issue. May 20, 2011 Processor.com Page 5 News piled high enough to reach Neptune. By 2024, the ■ Microsoft Acquires Skype ■BI Study Points To Dissatisfaction world’s business servers will annually process data For $8.5 Billion that equates to a stack of books 4.37 light-years When it comes to BI (business intelligence), about Microsoft announced that high that stretches to Alpha Centauri. To calculate half of non-technical users of the systems report it will buy video voice the data, researchers pegged the worldwide work dissatisfaction, according to a survey conducted by and communications force at 3.18 billion, with each worker responsible LogiXML. When you include technical workers, the company Skype for $8.5 for an average of 3TB of information each year. overall satisfaction improves, with 38% reporting billion. The acquisition, some level of dissatisfaction. About 20% of enter- ■ Intel Creates New Microsoft’s largest ever, prises aren’t using any type of BI technology, and “Ivy Bridge” Chips will give Microsoft access the most common reasons for the lack of BI tech- to Skype’s customer base of Intel announced a breakthrough in transistor and nology are cost (27%) and lack of IT staff (26%). more than 660 million users, about 107 computer chip technology with its creation of a Ease of use was the key concern for those who million of whom use Skype at least once 22nm microprocessor codenamed “Ivy Bridge” that did use the systems. One common concern the a month. Analysts say that the acquisition uses 3D Tri-Gate transistors. These small chips survey identified is that organizations are buying or gives Microsoft an advantage over Google are designed to take up less space, help products using BI tools without involving the IT department. in the Internet communications market. be more energy efficient, and not take away any ■ EHRs Leave Positive Microsoft CEO Steve Ballmer says the speed or processing power from larger chips. Environmental Footprint company will integrate Skype technology Although no partner companies or future products with many of its products, including Xbox, have been officially announced, Intel is working According to a recent Outlook, and Windows Phone. Ballmer also on a few prototype devices and foresees study released by said that Skype will still be available on compet- releasing the new chips sometime Kaiser Permanente ■ SSDs Going Mainstream ing mobile OS platforms from Google and Apple. by the end of this year regarding the envi- Other potential buyers for Skype included Google Gartner reports that solid-state drives will be get- or early next ronmental footprint of and Facebook. ting significantly cheaper throughout 2012, mak- year. its KP Health-Connect ing them a top storage option for consumers. EHR (electronic health ■ Federal Government SSDs will achieve the magic $1-per-gigabyte record) system, growing To Close Data Centers price by the second half of 2012. SSDs have EHR use in the medical field By the end of 2011, the U.S. government been popular among enterprise customers since will likely produce environmental will close 137 data centers, 39 of which have 2010, but consumers are only now beginning benefits. According to the firm, already been closed, according to a recent to purchase SSDs in thin and light notebooks. KP HealthConnect enables a more White House blog post by U.S. CIO Vivek Gartner claims that the average selling price of efficient way for patients to commu- Kundra. The government wants to close at NAND flash memory, the kind used in SSDs, will nicate with clinicians and new ways least 400 data centers by the end of 2015. The drop by 30% over the course of the rest of this to share information in both inpatient Department of Defense will close 52 data cen- year and another 36% from 2011 to 2012. and outpatient situations. The report ters before the end of the year, which was the revealed a substantial decline in gas- ■ Mind Boggling Server Data highest number of any government department. oline consumption—about 3 million The Department of Interior operates 18 of the Two teams of researchers from UC San Diego gallons per year—for patients using closures, while NASA runs 14. Other agencies claim that as of 2008, the world’s 27 million busi- the KP HealthConnect service (due to that will lose data centers this year include the ness servers processed 9.57 zettabytes of data. the lack of need to visit the health clinic), a Departments of Agriculture, Homeland Security, The researchers claim that this is equal to 20 1,000-ton reduction in paper use, and reduc- Justice, and Energy. separate 5.6-billion-mile-high stacks of books tion in X-ray film use by about 68 tons. Page 6 Processor.com May 20, 2011 P R O D U C T R E L E A S E S The Processor Product Releases section Manufacturers: includes brief overviews of data center products. Do you have a new product that data center/IT managers would be interested in learning about? All products listed have been released recently, so use this section to get Send your press release or product information up-to-date with what’s new on the market and to find products you need. to [email protected]. PHYSICALINFRASTRUCTURE previous versions. A flexible duct vents and tablets. The platform allows users to heated air out a window. The PC7 doesn’t ■Force10 Networks access high-definition video, wireless VoIP, ■ATEN KVMP Switches require a condensate tank or drain line to Open Cloud Networking and other multimedia applications. CS1782A, CS1784A get rid of condensation. The OCN (Open Cloud Networking) ■NetScout Systems ATEN says that its two new two- and framework from Force10 Networks is ■Tate DirectAire X2, nGenius Enterprise Intelligence four-port USB DVI Dual Link KVMP designed for cloud and conventional data switches are the first in the industry to SmartAire, PowerAire centers and is built on open architectures, NetScout Systems announced nGenius support 3D video. The P in the products’ The new DirectAire X2 airflow panel open automation, and open ecosystems. Enterprise Intelligence, an integrated mod- KVMP designation stands for peripherals, from Tate divides 2,600cfm of airflow in The OCN framework is powered by a new ule for the company’s nGenius Service as the units support USB 2.0 devices. two directions to cool up to 25kW per rack family of centralized and distributed core Assurance solution. Designed to close in a raised floor setting. Also available are switches, a ToR (top of rack) open cloud the gap between network and application ■Belkin Advanced Secure KVM new control options for the company’s switch, and automation software. performance analysis, nGenius Enterprise Six new KVM switches are on the way SmartAire variable-air-volume dampers Intelligence uses network traffic informa- from Belkin, bringing security innovations and PowerAire fan-assist modules. ■Force10 Networks tion and hop-by-hop views to determine to government agencies in the defense S-Series S7000 Open Cloud Switch performance and latency of application and intelligence communities. The two- ■Thomas & Betts Joslyn Products Data center operators will get new lev- traffic across data centers and cloud envi- and four-port units come with optical data Thomas & Betts released a new line of els of integration with the improvements ronments and provide a unified view of diodes that guarantee single-direction data Joslyn surge protection devices designed Force10 Networks has made to its ToR user experience. paths in ways that traditional electronic to protect sensitive equipment from dam- (top of rack) networking equipment. The circuits can’t, Belkin says. In addition, age caused by electrical power surges, S-Series S7000 Open Cloud Switch is a ■NextComputing the new KVMs feature dedicated resourc- transients, and noise. The new devices can new type of ToR node that combines stor- Continuum Traffic Generator es for each port to eliminate data leak- handle single, split, and three-phase appli- age and application processing capabilities NextComputing has released the Con- age among ports. Should a breach occur, cations between 120V and 600V Delta and in a single 2U space. tinuum, a traffic generator capable of Belkin says, the intruders won’t be able to high-surge energy to 400kA per phase. transmitting packet streams at line rates log keystrokes or capture upstream data. ■Force10 Networks Z-Series ZettaScale reaching up to 25Gbps. The generator is Currently undergoing EAL2 and other NETWORKING & VPN Force10 Networks has announced the aimed at IT administrators, network engi- security standard validation, the Advanced Z-Series ZettaScale core switches, which neers, and field technicians who trouble- Secure KVMs will ship in June in tamper- ■BMC Software Cloud Management make a generational leap in density and shoot or stress-test high-speed enterprise evident packaging. Portfolio Enhancements performance. The new Z9000 distributed networks. The release combines off-the- BMC Software announced enhance- core switch delivers scalability and perfor- shelf hardware with intelligent network ■Cisco Containerized Data Center ments to its cloud management portfo- mance in an ultra-small form factor. For adapters and preconfigured, open-source Cisco announced the Containerized lio. With its second-generation Cloud conventional data centers, the new Z9512 software. The Continuum ships in an all- Data Center, a modular data center built Lifecycle Management solution, the com- chassis-based switch delivers high density in-one chassis with an integrated monitor. in a weatherized ISO container that is pany offers enterprises, public agencies, and 9.6 terabits of switching capacity in a designed to address the ever-changing and service providers the ability to build half-rack unit. ■Quest Software PacketTrap MSP networking needs of organizations. The and manage highly flexible cloud ser- Quest Software has released the latest Containerized Data Center features an vices across public and private hybrid ■Infoblox DDI Solution version of PacketTrap MSP, an SME- open architecture and a transportable cloud environments. The cloud manage- Infoblox announced a DDI (DNS, DHCP, oriented platform for remote monitor- platform, efficient continuity of oper- ment portfolio is part of BMC’s Dynamic and IPAM) solution designed to automate ing, management, and service delivery. ations in case of a disaster, increased Business Service Management platform, and manage the IPv4-to-IPv6 transition PacketTrap MSP now includes VIPRE energy efficiency and power density, and which offers organizations unified man- life cycle. Expanding on the company’s Antivirus software, a Global Policy Man- reduced risk. agement abilities across physical, virtual, existing IPv6 support in its previous DDI agement interface, custom dashboard and hybrid environments to help reduce solutions, the new solution is designed gadgets, and support for out-of-the-box ■Cyber Switching costs and build an evolutionary path to to make the IPv4-to-IPv6 transition easier monitoring of Cisco Nexus switches and Single-Phase ePower iPDUs cloud adoption. Among the enhance- for service providers, educational institu- VMware ESX and ESXi. Cyber Switching announced new single- ments is a newly introduced policy-based tions, e-commerce retailers, and the like. ■Radware ADC-VX OS 28 phase versions of its ePower iPDUs (intel- Service Governor. Features include IP address management ligent power distribution units). In addition functionality from a single GUI, AAAA Radware announced the ADC-VX OS to meeting or exceeding environmental ■Dell Boomi AtomSphere Spring 11 records for DNS resolution, task delega- 28, the latest addition to its VADI (Virtual requirements, features of the iPDUs include Dell announced enhancements to Dell tion, automation for complex tasks, and Application Delivery Structure) portfo- remote management options, an interactive Boomi, the company’s cloud integra- automated IPv6 network change and config- lio. ADC-VX OS 28 is designed to provide color LCD touchscreen, power metering tion technology, with the release of Dell uration management. Additionally, the solu- unique services that ease the transition to vir- and control on each outlet, IPv4 and IPv6 Boomi AtomSphere Spring 11. Boomi tion includes DNS64 support and dynamic tual data centers and cloud computing envi- dual-stack support, and support for Cisco AtomSphere Spring 11 is designed to help assignment and delivery of an IPv6 address ronments. Features include physical-to-virtual EnergyWise v2.5. users both start using new cloud and SaaS to all IPv6 devices. migration, virtual-to-virtual migration, vADC applications and connect to existing appli- (virtual application delivery controller) tem- ■ITWatchDogs Web-Based cations. New features include enhanced ■Juniper Networks Universal WAN plates, and vADC service redundancy. Climate & Power Monitoring Systems middleware connectivity, large-scale data Juniper Networks unveiled the Uni- ITWatchDogs announces its partnership management and migration options, and versal WAN solution, which consists of ■Red Hat CloudForms with HM Cragg as an authorized distribu- anywhere integration monitoring. new and enhanced Edge and Branch rout- Red Hat has announced CloudForms, tor for its Web-based climate and power ers that enable users to support mobile, a solution the company says helps create monitoring systems. Using the systems, ■Fluke TL175 TwistGuard Test Leads video, and cloud computing applica- and manage IaaS (infrastructure-as-a-ser- data center administrators can track tem- Fluke released the TL175 TwistGuard tions. Juniper’s Universal WAN offer- vice) private and hybrid clouds. The release perature, humidity, airflow, light, sound, Test Leads, which let users manual- ing features QFabric architecture, which includes comprehensive application life- power, water leaks, live video feed, and ly adjust the length of the probe end to streamlines data center-to-data center con- cycle management and the ability to create more on the Web. If sensor values fall safely measure CAT III 1000 V, CAT nectivity for distributed enterprises. integrated clouds from various computing outside user-adjustable thresholds, users IV 600 V, and CAT II 1000 V. Fluke’s resources with portability across physical, can receive alerts via email, SMS, SNMP TL175 TwistGuard Test Leads feature ■Meru Networks AP400 Mobile Edge virtual, and cloud computing resources. traps, or voice call. The ITWatchDogs WearGuard insulation and are currently Meru Networks released its AP400 CloudForms can create hybrid clouds from units are small, compact, and fully cus- available starting at $23.65. Mobile Edge access point platform, existing computing resources such as vir- tomizable and enable surveillance of user- aimed at helping IT organizations man- tual servers, public clouds, and traditional defined criteria for IT and data center ■Force10 Networks Open Automation 2.0 age a smooth and accelerated transfor- in-house or hosted physical servers. equipment. Admins can set multiple levels Force10 Networks announced Open mation of their enterprise edge networks of access, ensuring employees or clients Automation 2.0, an expansion of its Open from wired Ethernet switches to the Mobile ■Red Hat JBoss Enterprise Data Grid see only the information they need. Automation Framework. The standards- Edge wireless architecture. Featuring a Red Hat has launched JBoss Enterprise based approach to network automation maximum total data rate of 1.8Gbps, the Data Grid 6, a cloud-ready, scalable dis- ■MovinCool PC7 optimizes data center network perfor- AP400 Mobile Edge platform delivers a tributed data cache that eases the load on The MovinCool PC7 personal space/ mance and efficiency and lays the foun- flexible, software-configurable mobile edge database servers, reduces response times spot cooler is now more powerful. The dation for cloud-based services. Open architecture that’s purpose-built for high- in applications, and provides additional $595 portable air conditioner runs on stan- Automation 2.0 extends these capabili- performance enterprise mobility; supports failure response. The release is based on dard 110V power and “green” R-410A ties with the new DevExchange develop- indoor and outdoor use; and is compat- the JBoss Community project Infinispan refrigerant. It supplies 9,000 BTUs of ment community and ScriptStore, an open ible with mobile devices such as iPads, and will be accessible initially via an Early cooling per hour—a 30% boost from exchange for SmartScripts. iPhones, and Android-based smartphones Access Program. May 20, 2011 Processor.com Page 7 P R O D U C T R E L E A S E S functions in a single product, with data environments, improves tape system ■Riverbed Technology recovery and data backup included in one efficiency in virtual environments. ■Nexsan E-Series Steelhead Appliances system. Acronis Backup & Recovery 11 Nexsan has a new line of E-Series stor- Riverbed Technology announced that its can help simplify disaster recovery and ■EMC Integrated Tools With Microsoft age systems with 3TB SATA drives. Steelhead appliances have been optimized data protection needs across physical, vir- Applications & Technology These systems use the Nexsan Flexible for Microsoft RemoteFX. Features include tual, and cloud environments, the com- EMC announced new products designed Storage Platform and are high-capacity but an enhanced VDI (virtual desktop infrastruc- pany says. to integrate with Microsoft applica- also low on power consumption. Specific ture) user experience over a WAN, opti- tions and technologies to provide sim- examples of these systems include the ■Arkeia Progressive mized RDP traffic, and advanced codecs. plified storage provisioning and elimina- E60, E18, and E60X. Some systems can Deduplication Upgrade tion of manual scripting for protection hold up to 45TB of storage per U. ■SuperLumin Networks Arkeia has announced an upgrade that and discovery. New tools and features Nemesis Version 2.2 will provide source-side progressive dedu- include the EMC Performance and ■Sans Digital EliteSTOR SuperLumin Networks announced plication for all of the company’s back- Resource Optimization pack, EMC VNX, Rackmount Storage Systems Nemesis version 2.2, which offers updated up appliances shipped since July 2007. EMC Replication Manager, EMC Total Sans Digital launched a line of rack- features available in media proxy appli- The firmware upgrade will deliver all the Protection, EMC Efficiency Software, mount storage systems, based on the cations. Nemesis 2.2 addresses today’s new features in Arkeia Network Backup EMC VMAX, and EMC VPLEX. EliteSTOR 6G SAS expander JBOD. increasing demand for streaming video and Version 9.0, including two-phase backups The EliteSTOR ES208X6+BHA (2U rich media on the Web, while focusing on for shorter backup windows, AES-256 ■Iomega StorCenter PX Series eight-bay), ES316X6+BHA (3U 16- safeguarding Web accessibility for varying encryption, and enhancements to the Web Three new Iomega NAS systems are bay), and ES424X6+BHA (4U 24-bay) user authentication. Other features include user interface. designed and tested by EMC for SMBs provide RAID 60 capability and up to a Web-based management console, sup- and distributed enterprises. The new 24Gbps bandwidth via a Mini-SAS cable, port for SNMP version 2c, and a custom or ■Ciphertex CX-RANGER-EX StorCenter PX line features the desktop plus 6Gbps SAS and SATA HDD support. localized error page specification. The Ciphertex CX-RANGER-EX is models px4-300d ($799.99 bare) and px6- a portable RAID unit with 256-bit AES 300d ($1,199.99 bare), plus the rackmount ■Seagate Barracuda XT 3TB Hard Drive ■TE Connectivity QUAREO hardware encryption. The five-bay, 3.5- px4-300r ($2,299.99 bare). All feature Seagate announced new technology that TE Connectivity unveiled QUAREO, a inch drive RAID array has a 15TB capac- Intel dual-core processors and Iomega allows the company to fit 1TB of storage patented connection point technology that ity with current drives, expandable to Personal Cloud Technology. onto one disk platter. The Barracuda XT makes it possible to electronically trace, 60GB when four units are combined 3TB hard drive will be one of the first monitor, and authenticate every connec- with a RAID card. Supported interfaces ■Maxava HA Enterprise+ drives from Seagate to feature the technol- tion from the data center to the desktop. include eSATA, FireWire 800Mbps, Dual Maxava has announced the release of ogy, and there will be 1TB, 1.5TB, and QUAREO connectors have an advanced FireWire, and USB 3.0. Maxava HA Enterprise+, which integrates 2TB drives available, as well. chip technology that provides a unique the company’s CSF (Command Scripting connection point identification that records ■Crossroads Systems Functionality) with its new maxView ■Symantec Backup Exec the real-time status of each fiber and cop- ReadVerify Appliance 4.0 Manager interface to provide enterprises Symantec announced cloud support for per connection point. Crossroads Systems has released ver- with high availability and disaster recov- three of its products: Backup Exec 2010, sion 4.0 of RVA (ReadVerify Appli- ery capabilities. Enhancements include Backup Exec Cloud, and Backup Exec STORAGE ance), aimed at helping organizations capabilities for building fully scripted Appliance. All three have been designed save time and money by validating the routines, accessibility via Web-enabled to now work with virtualized environ- ■Acronis Backup & Recovery 11 integrity of tape library systems. The devices, and IBM i functionality. Maxava ments to provide better backup options The latest version of Acronis Backup & company says that the new release, com- is offering customers of its HA Enterprise and improved security tools. Recovery combines two often-separated patible with VMware ESXi 4.1 virtual solution a free upgrade to HA Enterprise+. Go to Page 8 Oncore’s Colored Power Cords Help You Differentiate Your A & B Power Feeds! C13/C14 C19/C20 5-15P/C13 And More Sold through distribution Four vibrant colors. Get rid of the confusing “black power cord mess” inside your server cabinet. Now you can use specific colors to identify critical devices with and without redundant power. Cords are available in green, yellow, red, and blue, with custom colors also available. Eliminate the slack. We offer our power cords in exact lengths—even in inches. In addition to providing an organized and maintained work environment, having the exact length of power cords will greatly improve your server room’s performance by minimizing the amount of clutter in an enclosure, which increases airflow and the life of the equipment. Jacket flexibility. Oncore’s power cords have a soft, flexible jacket for easy maneuvering inside the cabinet. The cord’s flexibility is extremely important, especially when the cables have to make tight turns. In addition, our cables aren’t shipped as a coiled cable with a tie wrap, which can cause kinking. They are shipped in bundles of 10, loose in the bag, which keeps the power cables in their natural state and free of kinks. Data center- and lab-rated.Our power cords have been designed specifically for data center and lab environments. All of our cables carry a UL certification and are RoHS-compliant. In addition, they are rated to 250V, which can be used in either the United States or Europe. Oncore Cables LLC (cid:21)(cid:22)(cid:1)(cid:49)(cid:80)(cid:84)(cid:85)(cid:1)(cid:116)(cid:1)(cid:42)(cid:83)(cid:87)(cid:74)(cid:79)(cid:70)(cid:13)(cid:1)(cid:36)(cid:34)(cid:1)(cid:26)(cid:19)(cid:23)(cid:18)(cid:25)(cid:1)(cid:1)(cid:1)(cid:93)(cid:1)(cid:1)(cid:1)(cid:9)(cid:26)(cid:21)(cid:26)(cid:10)(cid:1)(cid:24)(cid:24)(cid:24)(cid:14)(cid:19)(cid:19)(cid:22)(cid:22)(cid:1)(cid:116)(cid:1)(cid:88)(cid:88)(cid:88)(cid:15)(cid:80)(cid:79)(cid:68)(cid:80)(cid:83)(cid:70)(cid:68)(cid:66)(cid:67)(cid:77)(cid:70)(cid:84)(cid:15)(cid:68)(cid:80)(cid:78) Page 8 Processor.com May 20, 2011 P R O D U C T R E L E A S E S Continued from Page 7 Patrol Signatures is certified for use with security and component protection, and ■M86 Security Windows Server 2008 R2. the HP Self-Service Kiosks with Virtual ■Symantec Enterprise Vault 10 Web Filtering & Reporting Suite 4.1 Sales Assistant software. & Enterprise Vault.cloud M86 Security released version 4.1 of SERVERS ■OKI Data Americas Symantec announced Symantec Enter- its WFR (Web Filtering and Reporting) ■Fujitsu PRIMEQUEST 1800E2 pro920WHT prise Vault 10 and Enterprise Vault.cloud. Suite. This version includes VuSafe for Symantec Enterprise Vault 10 software K-12 schools, which lets educators find, Fujitsu launched the PRIMEQUEST OKI Data Americas announced the can integrate with Symantec’s data loss tag, and manage a secure media library 1800E2, which is the latest model in addition of the pro920WHT to its pro- prevention and encryption technologies to to prevent students from viewing inap- its PRIMEQUEST 1000 series of high- Color Series of digital laser printers aimed archive and discover organizations’ infor- propriate videos, comments, and ads. The performance servers aimed at enterprise at color-critical applications in graphic arts mation without compromising confiden- solution combines VuSafe’s video library applications and cloud and virtualization and production environments. Available in tial information. Symantec’s SaaS-based management capabilities with WRF’s environments. The new model, available July, the pro920WHT utilizes white toner, Enterprise Vault.cloud will offer unlimited ability to block and filter Web sites and worldwide, features Intel Xeon E7 proces- allowing direct, low-cost imaging to dark cloud storage for email for a flat fee per applications for more thorough control sors, and the company says the server is or colored media, signage, and films. The mailbox per month. over Web access. 1.2 times as fast as previous models. The pro920WHT will be available for $7,495 server is compliant with Red Hat Enterprise and offers up to 31ppm color and 36ppm ■Symantec Veritas ■nCircle Benchmark Metrics Pack Linux, Microsoft Windows Server, and mono speeds and high-definition color Operations Manager 4.0 For Identity & Access Management VMware vSphere operating systems. printing at up to 1,200 x 600 dpi. Symantec released the newest ver- nCircle announced its nCircle Bench- ■SGI Rackable & CloudRack C2 ■Oracle Business Intelligence sion of its Veritas Operations Manager. mark Metrics Pack for Identity and Access Version 4.0 of the management platform Management, a tool designed to allow SGI announced a variety of enhance- Software Suite is designed for Veritas Cluster Server and users to compare the performance of their ments available in its Rackable and Oracle announced version 11.1.1.5 of Storage Foundation. It improves monitor- entire IT security systems with their inter- CloudRack C2 server lines. First up are its business intelligence products, includ- ing and analyzing capabilities for physical nal goals as well as against those of others new preconfigured solutions with the ing Oracle Business Intelligence, Oracle or virtual storage. in the same industry. The product is avail- open-source programming framework Business Intelligence Applications, and able in a free Basic edition. Hadoop as the overlying application layer. Oracle Real-Time Decisions. New capa- SECURITY The solutions span data-intensive applica- bilities include iPad and iPhone support, ■Symantec Endpoint Protection 12 tions, cloud storage, social networking, extended OLAP and in-memory platform ■CREDANT Technologies & Protection Center 2.0 and other areas. Also new is the D-Rack support, enhanced real-time decision man- Enterprise Server 7.1.1 Symantec announced its new Endpoint (destination rack) cabinet with a highly agement features, and new certifications. CREDANT Technologies announced Protection 12 and Protection Center 2.0 flexible configuration, including back-to- The latest version lets users initiate actions the newest version of its Enterprise Server, security solutions. Endpoint Protection back and water-cooled. and workflows from their mobile devices. version 7.1.1. Enterprise Server 7.1.1 fea- 12 provides enhanced security measures ■Supermicro X9 Embedded Server ■Pervasive Software Pervasive Move, tures support for Microsoft BitLocker, to detect and block new threats earlier. which can be used in the same console Protection Center 2.0 is a management Supermicro added an ultra-compact Connect & Protect as existing encryption solutions. It also console for monitoring multiple security X9 solution to its Embedded Server Pervasive Software announced Per- has more advanced reporting that pro- solutions at the same time. Building Block Solution line that’s opti- vasive Move, Pervasive Connect, and vides support for state data breach laws, mized with Intel’s second-generation Pervasive Protect, packaged subscrip- HIPAA, and PCI compliance. CREDANT ■Symplified Mobile Edition Core processor family and Intel QM67 tion-based offerings that touch on all has added support for Mac OS X and Symplified has announced Symplified Express chipsets. Supermicro says the phases of the cloud application lifecy- removable media so companies can Mobile Edition, which secures cloud and X9 embedded solution provides 25% cle. The programs also allow partners protect data stored on removable stor- Web apps on any mobile device so enter- better performance while cutting power to address data quality issues during age devices. Enterprise Server 7.1.1 is prises can safely make corporate data consumption vs. the previous genera- early stages of cloud integration proj- designed to improve security with public accessible on tablets and smartphones. tion. PCI-E 2.0 x16 and remote manage- ects. Pervasive Move addresses the first and private cloud-based environments. Symplified Mobile Edition lets businesses ment support is also included. phase of the cloud application data ser- provide employees with single sign-on vices life cycle, which often involves ■EdgeWave Email Data Compliance and enforce access policies on cloud and CLIENTS migrating data from the existing system. EdgeWave released its Email Data on-premises apps regardless of the user’s Pervasive Connect consists of Pervasive Compliance solution, which helps orga- access device. ■Dell Precision M4600, M6600 & R5500 Data Integrator, which provides con- nizations prevent outbound email data Dell announced its new Precision M4600 nectivity to virtually every application leaks. Available as an appliance or a ■Voltage Security Page-Integrated and M6600 mobile workstations as well in the cloud and on-premises ecosystem, hosted service, Email Data Compliance Encryption & SecureData Web as the Precision R5500 rack workstation. with no per-connector fees. Pervasive leverages EdgeWave’s exclusive analy- Voltage Security released PIE (Page- The M4600 is 15.6 inches, and the M6600 Protect allows for data validation of sis technology that scans for and blocks Integrated Encryption), a new encryp- is 17.3 inches, and both are designed to be cloud application data and provides private data from leaving the network, tion product aimed at protecting personal mobile, high-performance computers. The tools to enhance and protect data from including personally identifiable infor- data entered by consumers on Web pages. R5500 is a rack workstation with a dual- future duplicates or incomplete entries. mation, Social Security numbers, credit The company also announced the Voltage socket rack form factor. ■Port80 httpZip 4.0 card numbers, and patient health informa- SecureData Web data protection solu- tion. The offering helps users comply with tion, which Voltage says also uses the PIE ■FieldView Solutions FieldView 4.0 Port80 introduced the latest version of PCI DSS, Gramm-Leach-Bliley, HIPAA, encryption protocol to help e-commerce FieldView Solutions announced the its HTTP compression tool for IIS, httpZip and HITECH. Email Data Compliance’s merchants protect account number data release of its data center efficiency solu- 4.0. The offering now supports all versions lexicons and logic engine allow precise exchanged in Web transactions. The com- tion, FieldView 4.0, a scalable data col- of Server 2008 and Server 2008 R2 (IIS 7.0 deterministic analysis, and its proprietary pany says PIE helps merchants retain con- lection engine that manages resources as and IIS 7.5) as well as 64-bit editions of all technology keeps latency low. trol during payment capture without having a Web-based reporting tool. FieldView Windows Server platforms, while continu- cardholder data present in their systems. 4.0 includes support for Modbus/SNMP/ ing to provide advanced control of IIS com- ■Entrust PIV-I BACnet/XML/OPC, accommodates mil- pression. Port80’s httpZip 4.0 is currently Entrust announced the extension of MESSAGING & TELEPHONY lions of end points, and is accessible to available for $349.95 per server. its Non-Federal Identity SSP service unlimited users. to encompass PIV-I (Personal Identity ■Polycom Telepresence Products ■Supermicro PWS-406P-1R Verification-Interoperable) in multiple Polycom launched three new products ■HP LaserJet Enterprise Supermicro’s SuperServers have a new sectors. PIV-I is based on the same in its telepresence portfolio: the EagleEye M4555 & Pro M1217nfw 1U, 400W power supply option in the standards used by the federal govern- Director room camera tracking system, the HP introduced two new networked PWS-406P-1R. Billed as a short-depth, ment but is designed for state, local, HDX 4500 executive desktop telepresence MFPs, the HP LaserJet Enterprise M4555 redundant power module, the PWS-406P- and enterprise vendor use. Supported system, and the mobile telepresence m100 MFP and the HP LaserJet Pro M1217nfw 1R meets Energy Star Server 2.0 specifi- by Entrust’s PKI platform and creden- solution. The three products power tele- MFP. The enterprise-centric M4555 fea- cations for efficiency superior to 80 Plus tialing services, PIV-I credentials com- presence applications for conference tures HP Web Jetadmin for monitoring Gold. It’s intended for embedded applica- ply with Homeland Security Presidential rooms, desktops, and SMBs. and management. The SMB-focused tions and industrial PCs. Directive 12 and are for agencies using M1217nfw is an inexpensive wireless the USAccess program or other large ■Red Earth Software LaserJet MFP that features HP Smart ■Webalo BlackBerry Client government agencies. Entrust’s PIV-I Policy Patrol Signatures Install, which enables rapid CD-free driv- Webalo announced that it has made solution features smartcard components The new Policy Patrol Signatures corpo- er installations. its BlackBerry client available in the from XTec’s AuthentX identity manage- rate email signature uniformity tool from BlackBerry App World as a free download ment solution products. Other platform Red Earth Software works with Microsoft ■HP rp5800 Retail System that enhances the abilities of BlackBerry features and capabilities include logical Outlook and Outlook Web Access. With HP released its rp5800 Retail System smartphones as enterprise computing credentialing; security layering across Policy Patrol Signatures, companies high-performance solution for point-of- devices. The app is designed to provide numerous users; and authentication of can ensure uniform corporate email sig- sale retail environments. New optional an enterprise-to-mobile connection that passwords, IP geolocation, devices, natures and disclaimers. It uses Active accessories include the HP L1506x allows for access to various enterprise out-of-band one-time passcodes, eGrid Directory merge fields to allow for per- 15-inch LED Monitor for point-of-sale, resources via a subscription to the com- cards, and digital certificates. sonalized signatures for senders. Policy the HP Integration Assembly for added pany’s cloud-based service. May 20, 2011 Processor.com Page 9 Program Details (cid:114)(cid:1) Trade in one old PDU regardless of brand for one new Cyber Switching PDU at a discounted price (cid:114)(cid:1) $100 discount on ePower, $75 on Dualcom S, $50 on Dualcom Plus, and $25 on E Series PDU models (cid:114)(cid:1) All Cyber Switching units are brand new, 100% factory-tested and calibrated with full manufacturer standard warranty (cid:114)(cid:1) One discount per trade-in for each new Cyber Switching PDU purchased with no trade-in limit (cid:114)(cid:1) FREE return shipping of old PDU(s) - certain limitations may apply (cid:114)(cid:1) FREE environmentally-friendly disposal of your old PDU(s) once returned to Cyber Switching To get started, please contact: [email protected], (888) 311-6277, or visit www.cyberswitching.com/cashforclunkers. Page 10 Processor.com May 20, 2011 How Does Your Data Center’s Location Impact Performance? Continued from Page 1 network infrastructure. “Obviously, you different electric grid than the primary site. company headquarters in major metro- can be very expensive and polluting. As need to be in a market with fiber-optics That reduces the chance that both sites will politan areas. Marin calls this the “serv- a result, areas that offer cheaper, greener infrastructure,” Boyd says. suffer a power outage at the same time. er hugger” mentality. “The folks at the hydropower and nuclear power are very According to Marin, different compa- corporation have their data center out- What’s Nearby? attractive to data centers. nies have different requirements for their sourced, but they still want to be able to network infrastructure. “Some data centers For a few types of companies and appli- drive over and see it,” he explains. Cool Climate want to be right on that long haul,” he cations, latency concerns mean that they Other companies don’t care about A data center’s location not only affects says, while others are willing to build to need their data centers to be physically being close to major cities but do want to electricity costs, it also impacts the amount the network. “As a developer, we want to located in a certain area. “The guys that be close to other data centers. “Data cen- of electricity needed to run the data center. have as many fiber providers to our loca- focus the most on latency are the traders ters have typically clustered together on One of the biggest energy drains in a data tion as possible,” he adds. “We also want on the exchanges, the financial institu- happenstance,” Marin explains. “The first center is the cooling system. If a data center to have dark fiber to our location.” tions,” Marin says. “That’s why you still guy drove a certain amount of infrastruc- is located in a more temperate climate, it Because this network infrastructure pro- see significant growth in data centers in ture, and the second guy brought even may be able to use less expensive methods vides a data center’s link to customers, northern New Jersey or in Chicago next to more. By the third or fourth data center of cooling the facility. suppliers, and the rest of the company, fast the Mercantile Exchange.” coming to that market, the infrastructure Douglas Alger, IT architect at Cisco and redundant connections are important. In addition, some companies want is very robust and those last-in players Systems and author of “Grow a Greener Data their data centers to be located near their really benefit from that.” P Maximum Uptime Center,” explains that air economizers “allow you to draw in some of your outside air and Companies also want to place their data Data Center Hot Spots use that to cool your data center rather than centers in areas with minimal disaster risk. running your condensers from your own cool- “You want to be in areas that allow you to You can find data centers spread all across the country, but experts point to some areas that are ing infrastructure.” He adds, “The condensers have continuity of operation,” Boyd says. particularly popular: are what consume the greatest amount of “So you want to avoid places that are very energy in the cooling system, so if there are vulnerable to hurricanes [or] earthquakes.” Central and Eastern Washington: Grant County, Wash., has the lowest-cost power in the country. certain hours per day or days per year that you Marin adds, “You’re looking to mitigate North Carolina: Nuclear power, a temperate climate, and accessibility from major cities on the don’t have to do that, you can kind of lever- all types of risk, both man-made and non- East Coast make this state popular. age Mother Nature.” man-made risk. So it could be weather Northern New Jersey: Proximity to New York City makes this area a favorite with financial According to Alger, some companies risk, or it could be risk relative to inter- services firms. have even considered placing data centers state highways, rail lines, [or] the flight Chicago:Cool weather, network connections, and nearby industry have attracted some big names. in areas such as Greenland specifically to path of a major airport.” Texas:Texas boasts low-cost power, a favorable business climate, and a lot of data centers. take advantage of the natural cooling. Many enterprises have more than one data Western New York: Financial firms like this area because it’s on a separate grid from New York center—they need a secondary data center City, but not too far away. Fiber Infrastructure and possibly also a disaster recovery site. The Midwest: The center of the country generally offers lower operational costs than either Another location factor that has a huge Another way to minimize disruption is to of the coasts. impact on data center performance is the locate these secondary and backup sites on a Recharge Your Change Control Process Continued from Page 1 but recognize the need to implement a more generally given the opportunity to provide Then look at the numbers after implementing a are incompatible with an existing application, formal and structured approach. “Technology feedback regarding such changes before change control process to see if they improved. says Bryan Rhodes, director of product man- aside, one of the first steps in accomplishing they are implemented. In some situations, “There is nothing more powerful than demon- agement at Symantec (www.symantec.com). this is to designate a change manager who is the nature of the change could be cause for strating how a formal change process has con- “Security teams may be interested in responsible for reviewing, coordinating, and concern, such as a proposed change that is tributed positively to this,” he says. changes that may enable a particular secu- documenting changes,” Rhodes says. incompatible with an existing application. In addition, it is important to communicate rity vulnerability to be exploited, such as the As the process evolves, Rhodes says, “In other cases, the timing of the proposed regulatory requirements that formal change deployment of software with known vulner- the change manager can leverage technol- change could be cause for concern due to sys- control processes help facilitate, Rhodes says. abilities or operating system configuration ogy such as a CMDB (configuration manage- tem availability requirements,” Rhodes says. Change control procedures should be con- changes making the operating environment ment database) to have visibility into resource If the timing of the change is a cause for con- tinually adapted to meet new technological more susceptible,” Rhodes says. associations of equipment scheduled for cern, it may be possible to address such con- challenges. According to Pescatore, new tech- change. “This provides a better understanding cern by adjusting the schedule of the change. nology and external services can challenge old Good Change Control of upstream and downstream impact and over- Stephen Northcutt, president of the change control procedures. “Virtualization is Pescatore says a good security change all risk related to the change,” Rhodes says. SANS Technology Institute, says one of the breaking many old change control processes control process starts with a baseline of Organizations should also formalize docu- real keys to good change control is using that relied on physical controls of computers security policy and a gap assessment of the mentation around implementation, planning, technological controls that detect and report and servers and security controls,” he says. security controls’ current state to determine and testing and include a change advisory change. “This gives management a tool to “Similarly, outsourcing and use of cloud breaks where security controls need to be changed. board, Rhodes says. Such a board can be help- hold everyone involved accountable to the the old ways of change control, as well.” P Ultimately, your goal is to reach the level ful in reviewing and approving changes prior policy and process,” he says. necessary to both protect the business and to implementation and could be used based on meet compliance requirements. the service, size, and complexity of the change. Gain Staff Buy-In Six Configuration “A change control process is required At minimum, Rhodes says, most nonstan- Although many in IT management want to Management Tenets to evaluate every requested change, assess dard change requests should have an imple- emphasize awareness and education in order the risk, obtain approval to accept residual mentation plan, a test plan, and a back-out to ensure that IT staff supports good change According to Stephen Northcutt, president of risks, and document approved changes,” plan. “The change should also include infor- control procedures, Pescatore says there’s SANS Technology Institute, there are six con- Pescatore says. mation about the service being impacted by another approach—providing an incentive to figuration management tenets used by effective An organization that is currently relying the change and any dependencies that this support change control procedures. IT organizations. upon an informal, seat-of-the-pants change service has,” Rhodes says. “Make sure change control process compli- control method can move to a more formal “Many organizations use workflows that ance is a measurable part of system administra- 1. Focus on hardening systems. method that reduces the risk of accidental send automated email messages to affected tors’ evaluation criteria. Show metrics of which 2. Develop repeatable builds. exposure or data leakage. parties (asset owners, IT security team, etc.) groups or people are doing well or poorly, and 3. Implement change control. “First, it should determine if the infor- at various points throughout the change man- that will drive awareness,” he says. 4. Audit change control with tools that mea- mal process is actually working well,” agement process,” Rhodes says. Such mes- Rhodes suggests that one way to demon- sure security. Discipline people if you have Pescatore says. If not, it’s time to establish sages can be purely informational in nature or strate the value of a good change control pro- to, but make change control stick. a baseline and perform a gap analysis. “If may require action/input from the recipient. cess is to take a historical view of incidents 5. Don’t waste time troubleshooting; burn bad the process is working well, document it When changes are scheduled, Rhodes related to change requests. “For example, prior boxes to the ground and reload them. and, wherever possible, automate it.” says, it’s ideal to inform asset owners of the to implementing a change control process, 6. Re-engineer the frailest boxes first. Rhodes says most enterprises have some changes that could affect the assets for which was their help desk flooded with incidents sort of informal change control process in place they are responsible. Those owners then are that resulted from the change?,” Rhodes says.