ebook img

Processor Newspaper Volume 33 Number 13 PDF

2011·11.9 MB·English
Save to my drive
Quick download
Download
Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.

Preview Processor Newspaper Volume 33 Number 13

P.O. Box 82545 Lincoln, NE 68501-2545 ELECTRONIC SERVICE REQUESTED July 1, 2011 Volume 33 Number 13 www.processor.com Products, News & Information Data Centers Can Trust. Since 1979 In This Issue... FEATURE PACKAGE Detecting Data Center Building & Design What are your options when it comes to need- Vulnerabilities ing more data center space? And what are the most important issues to consider? We talked with some Tips & Strategies To Keep experts to answer those questions and more. Your Enterprise & Applications Secure Maxed Out: Your Options..........................................24 Your Next Data Center: New Construction Or Existing Facility?..................................................26 Know Your Building Needs........................................27 by Bill Hayes (cid:81)(cid:80)(cid:84)(cid:84)(cid:74)(cid:67)(cid:77)(cid:70)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:80)(cid:1)(cid:66)(cid:85)(cid:85)(cid:70)(cid:78)(cid:81)(cid:85)(cid:1)(cid:79)(cid:80)(cid:85)(cid:1)(cid:85)(cid:80)(cid:1)(cid:68)(cid:83)(cid:66)(cid:84)(cid:73)(cid:1)(cid:70)(cid:74)(cid:85)(cid:73)(cid:70)(cid:83)(cid:1) Overseeing A Data Center Move................................28 (cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114) (cid:85)(cid:73)(cid:70)(cid:1)(cid:66)(cid:81)(cid:81)(cid:77)(cid:74)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:80)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:85)(cid:66)(cid:83)(cid:72)(cid:70)(cid:85)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:1)(cid:74)(cid:85)(cid:84)(cid:70)(cid:77)(cid:71)(cid:13)(cid:117)(cid:1) A certain amount(cid:1)(cid:80)(cid:71)(cid:1)(cid:68)(cid:80)(cid:79)(cid:71)(cid:86)(cid:84)(cid:74)(cid:80)(cid:79)(cid:1)(cid:70)(cid:89)(cid:74)(cid:84)(cid:85)(cid:84)(cid:1) (cid:47)(cid:80)(cid:83)(cid:85)(cid:73)(cid:68)(cid:86)(cid:85)(cid:85)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:15)(cid:1) PHYSICAL (cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:1)(cid:87)(cid:86)(cid:77)(cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:84)(cid:84)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:79)(cid:70)(cid:83)(cid:84)(cid:13)(cid:1) INFRASTRUCTURE Vulnerability Assessment Systems (cid:81)(cid:70)(cid:79)(cid:70)(cid:85)(cid:83)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:85)(cid:70)(cid:84)(cid:85)(cid:74)(cid:79)(cid:72)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:56)(cid:70)(cid:67)(cid:1)(cid:66)(cid:81)(cid:81)(cid:77)(cid:74)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1) ■ When Chris Stilwell needed a company to research the (cid:87)(cid:86)(cid:77)(cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:84)(cid:84)(cid:78)(cid:70)(cid:79)(cid:85)(cid:15)(cid:1)(cid:42)(cid:79)(cid:1)(cid:71)(cid:66)(cid:68)(cid:85)(cid:13)(cid:1)(cid:90)(cid:80)(cid:86)(cid:1)(cid:78)(cid:66)(cid:90)(cid:1) (cid:44)(cid:70)(cid:77)(cid:77)(cid:90)(cid:1)(cid:44)(cid:66)(cid:87)(cid:66)(cid:79)(cid:66)(cid:72)(cid:73)(cid:13)(cid:1)(cid:81)(cid:83)(cid:74)(cid:79)(cid:68)(cid:74)(cid:81)(cid:66)(cid:77)(cid:1)(cid:83)(cid:70)(cid:84)(cid:70)(cid:66)(cid:83)(cid:68)(cid:73)(cid:1) equipment needed for a customer he was helping to design (cid:73)(cid:70)(cid:66)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:85)(cid:70)(cid:83)(cid:78)(cid:84)(cid:1)(cid:86)(cid:84)(cid:70)(cid:69)(cid:1)(cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:68)(cid:73)(cid:66)(cid:79)(cid:72)(cid:70)(cid:66)(cid:67)(cid:77)(cid:90)(cid:15)(cid:1)(cid:38)(cid:66)(cid:68)(cid:73)(cid:1) (cid:66)(cid:79)(cid:66)(cid:77)(cid:90)(cid:84)(cid:85)(cid:1)(cid:66)(cid:85)(cid:1)(cid:40)(cid:66)(cid:83)(cid:85)(cid:79)(cid:70)(cid:83)(cid:13)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:1)(cid:85)(cid:73)(cid:70)(cid:83)(cid:70)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:83)(cid:70)(cid:70)(cid:1) a data center, Information Support Concepts, a provider of (cid:73)(cid:66)(cid:84)(cid:1)(cid:66)(cid:1)(cid:86)(cid:79)(cid:74)(cid:82)(cid:86)(cid:70)(cid:1)(cid:87)(cid:66)(cid:77)(cid:86)(cid:70)(cid:1)(cid:74)(cid:79)(cid:1)(cid:66)(cid:86)(cid:69)(cid:74)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)- (cid:67)(cid:66)(cid:84)(cid:74)(cid:68)(cid:1)(cid:66)(cid:81)(cid:81)(cid:83)(cid:80)(cid:66)(cid:68)(cid:73)(cid:70)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:87)(cid:86)(cid:77)(cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:84)(cid:84)- rackmount products, was right for the job.............page 12 (cid:83)(cid:74)(cid:85)(cid:90)(cid:1)(cid:80)(cid:71)(cid:1)(cid:66)(cid:79)(cid:1)(cid:80)(cid:83)(cid:72)(cid:66)(cid:79)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:8)(cid:84)(cid:1)(cid:42)(cid:53)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:85)(cid:84)(cid:13)(cid:1)(cid:67)(cid:86)(cid:85)(cid:1)(cid:85)(cid:73)(cid:70)(cid:90)(cid:1) (cid:78)(cid:70)(cid:79)(cid:85)(cid:15)(cid:1)(cid:34)(cid:68)(cid:85)(cid:74)(cid:87)(cid:70)(cid:1)(cid:79)(cid:70)(cid:85)(cid:88)(cid:80)(cid:83)(cid:76)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:74)(cid:84)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) (cid:83)(cid:70)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:69)(cid:80)(cid:1)(cid:69)(cid:74)(cid:71)(cid:71)(cid:70)(cid:83)(cid:70)(cid:79)(cid:85)(cid:1)(cid:85)(cid:73)(cid:74)(cid:79)(cid:72)(cid:84)(cid:15)(cid:1) (cid:78)(cid:80)(cid:84)(cid:85)(cid:1)(cid:86)(cid:84)(cid:70)(cid:69)(cid:1)(cid:85)(cid:70)(cid:68)(cid:73)(cid:79)(cid:74)(cid:82)(cid:86)(cid:70)(cid:15)(cid:1)(cid:42)(cid:85)(cid:1)(cid:74)(cid:79)(cid:87)(cid:80)(cid:77)(cid:87)(cid:70)(cid:84)(cid:1)(cid:83)(cid:70)(cid:78)(cid:80)(cid:85)(cid:70)(cid:1) ■Siemon VersaPOD is a family of open racks, cabinets, (cid:39)(cid:80)(cid:83)(cid:1)(cid:74)(cid:79)(cid:84)(cid:85)(cid:66)(cid:79)(cid:68)(cid:70)(cid:13)(cid:1)(cid:68)(cid:80)(cid:79)(cid:84)(cid:74)(cid:69)(cid:70)(cid:83)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:69)(cid:74)(cid:71)(cid:71)(cid:70)(cid:83)(cid:70)(cid:79)(cid:68)(cid:70)(cid:1) (cid:84)(cid:68)(cid:66)(cid:79)(cid:84)(cid:1) (cid:80)(cid:71)(cid:1) (cid:79)(cid:70)(cid:85)(cid:88)(cid:80)(cid:83)(cid:76)(cid:14)(cid:66)(cid:85)(cid:85)(cid:66)(cid:68)(cid:73)(cid:70)(cid:69)(cid:1) (cid:69)(cid:70)(cid:87)(cid:74)(cid:68)(cid:70)(cid:84)(cid:15)(cid:1) and cable management products designed to take advan- (cid:67)(cid:70)(cid:85)(cid:88)(cid:70)(cid:70)(cid:79)(cid:1)(cid:66)(cid:1)(cid:87)(cid:86)(cid:77)(cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:84)(cid:84)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:79)(cid:70)(cid:83)(cid:1) (cid:34)(cid:68)(cid:85)(cid:74)(cid:87)(cid:70)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:69)(cid:80)(cid:70)(cid:84)(cid:1)(cid:79)(cid:80)(cid:85)(cid:1)(cid:83)(cid:70)(cid:82)(cid:86)(cid:74)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) tage of vertical space between cabinets and racks.....page 13 (cid:86)(cid:84)(cid:70)(cid:69)(cid:1)(cid:85)(cid:80)(cid:1)(cid:68)(cid:73)(cid:70)(cid:68)(cid:76)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:84)(cid:80)(cid:71)(cid:85)(cid:88)(cid:66)(cid:83)(cid:70)(cid:1)(cid:225)(cid:66)(cid:88)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:66)(cid:1)(cid:87)(cid:86)(cid:77)- (cid:81)(cid:83)(cid:70)(cid:84)(cid:70)(cid:79)(cid:68)(cid:70)(cid:1)(cid:80)(cid:71)(cid:1)(cid:66)(cid:72)(cid:70)(cid:79)(cid:85)(cid:84)(cid:1)(cid:80)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:1)(cid:85)(cid:66)(cid:83)(cid:72)(cid:70)(cid:85)(cid:84)(cid:13)(cid:1) ■ The ITWatchDogs I/O Expander adds 32 configurable ports (cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:70)(cid:89)(cid:81)(cid:77)(cid:80)(cid:74)(cid:85)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:85)(cid:80)(cid:80)(cid:77)(cid:1)(cid:86)(cid:84)(cid:70)(cid:69)(cid:1)(cid:85)(cid:80)(cid:1)(cid:66)(cid:85)(cid:85)(cid:66)(cid:68)(cid:76)(cid:1) (cid:67)(cid:86)(cid:85)(cid:1)(cid:74)(cid:85)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:86)(cid:84)(cid:70)(cid:1)(cid:68)(cid:83)(cid:70)(cid:69)(cid:70)(cid:79)(cid:85)(cid:74)(cid:66)(cid:77)(cid:70)(cid:69)(cid:1)(cid:66)(cid:68)(cid:68)(cid:70)(cid:84)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:85)(cid:66)(cid:83)- Key Points to a Series II environmental monitor to increase sensor and (cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:1)(cid:85)(cid:73)(cid:83)(cid:80)(cid:86)(cid:72)(cid:73)(cid:1)(cid:76)(cid:79)(cid:80)(cid:88)(cid:79)(cid:1)(cid:84)(cid:70)(cid:68)(cid:86)(cid:83)(cid:74)(cid:85)(cid:90)(cid:1)(cid:225)(cid:66)(cid:88)(cid:84)(cid:15)(cid:1)(cid:105)(cid:34)(cid:1) (cid:72)(cid:70)(cid:85)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:70)(cid:79)(cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:66)(cid:1)(cid:69)(cid:70)(cid:70)(cid:81)(cid:70)(cid:83)(cid:1)(cid:74)(cid:79)(cid:84)(cid:81)(cid:70)(cid:68)(cid:85)(cid:74)(cid:80)(cid:79)(cid:15)(cid:1) relay output capacities........................................page 13 (cid:87)(cid:86)(cid:77)(cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:80)(cid:77)(cid:1)(cid:85)(cid:90)(cid:81)(cid:74)(cid:68)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1)(cid:85)(cid:70)(cid:84)(cid:85)(cid:84)(cid:1)(cid:66)(cid:1) (cid:53)(cid:73)(cid:70)(cid:1)(cid:84)(cid:70)(cid:68)(cid:80)(cid:79)(cid:69)(cid:1)(cid:66)(cid:81)(cid:81)(cid:83)(cid:80)(cid:66)(cid:68)(cid:73)(cid:13)(cid:1)(cid:81)(cid:66)(cid:84)(cid:84)(cid:74)(cid:87)(cid:70)(cid:1)(cid:80)(cid:67)(cid:84)(cid:70)(cid:83)(cid:87)(cid:66)- (cid:114)(cid:1) Vulnerability assessments are valid ongo- ■ Relatively simple tweaks to how existing infrastruc- (cid:85)(cid:66)(cid:83)(cid:72)(cid:70)(cid:85)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:80)(cid:81)(cid:70)(cid:79)(cid:1)(cid:80)(cid:83)(cid:1)(cid:77)(cid:74)(cid:84)(cid:85)(cid:70)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:81)(cid:80)(cid:83)(cid:85)(cid:1)(cid:84)(cid:70)(cid:83)- (cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:74)(cid:84)(cid:1)(cid:67)(cid:66)(cid:84)(cid:70)(cid:69)(cid:1)(cid:80)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:84)(cid:84)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1) ing audits of computer systems, networks, (cid:87)(cid:74)(cid:68)(cid:70)(cid:84)(cid:13)(cid:117)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:1)(cid:52)(cid:85)(cid:70)(cid:81)(cid:73)(cid:70)(cid:79)(cid:1)(cid:47)(cid:80)(cid:83)(cid:85)(cid:73)(cid:68)(cid:86)(cid:85)(cid:85)(cid:13)(cid:1)(cid:81)(cid:83)(cid:70)(cid:84)(cid:74)(cid:69)(cid:70)(cid:79)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1) (cid:68)(cid:80)(cid:79)(cid:85)(cid:70)(cid:79)(cid:85)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:81)(cid:66)(cid:85)(cid:85)(cid:70)(cid:83)(cid:79)(cid:1)(cid:80)(cid:71)(cid:1)(cid:68)(cid:66)(cid:81)(cid:85)(cid:86)(cid:83)(cid:70)(cid:69)(cid:1)(cid:79)(cid:70)(cid:85)(cid:88)(cid:80)(cid:83)(cid:76)(cid:1) and software. They can be employed by ture is managed can go a long way toward reconciling (cid:85)(cid:73)(cid:70)(cid:1)(cid:52)(cid:34)(cid:47)(cid:52)(cid:1)(cid:53)(cid:70)(cid:68)(cid:73)(cid:79)(cid:80)(cid:77)(cid:80)(cid:72)(cid:90)(cid:1)(cid:42)(cid:79)(cid:84)(cid:85)(cid:74)(cid:85)(cid:86)(cid:85)(cid:70)(cid:15) (cid:85)(cid:83)(cid:66)(cid:71)(cid:224)(cid:68)(cid:13)(cid:1)(cid:44)(cid:66)(cid:87)(cid:66)(cid:79)(cid:66)(cid:72)(cid:73)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:15)(cid:1)(cid:34)(cid:77)(cid:85)(cid:73)(cid:80)(cid:86)(cid:72)(cid:73)(cid:1)(cid:81)(cid:66)(cid:84)(cid:84)(cid:74)(cid:87)(cid:70)(cid:1) skilled IT staff or outside contractors. stagnant budgets and growing demands...............page 14 (cid:105)(cid:53)(cid:73)(cid:70)(cid:79)(cid:1)(cid:74)(cid:85)(cid:1)(cid:78)(cid:66)(cid:76)(cid:70)(cid:84)(cid:1)(cid:68)(cid:80)(cid:79)(cid:85)(cid:66)(cid:68)(cid:85)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:83)(cid:74)(cid:70)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1) (cid:80)(cid:67)(cid:84)(cid:70)(cid:83)(cid:87)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:68)(cid:66)(cid:79)(cid:1)(cid:81)(cid:83)(cid:80)(cid:87)(cid:74)(cid:69)(cid:70)(cid:1)(cid:74)(cid:79)(cid:71)(cid:80)(cid:83)(cid:78)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:1) ■Buying Guide: PDUs & UPSes...........................page 15 (cid:70)(cid:79)(cid:72)(cid:66)(cid:72)(cid:70)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:77)(cid:74)(cid:84)(cid:85)(cid:70)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:84)(cid:70)(cid:83)(cid:87)(cid:74)(cid:68)(cid:70)(cid:1)(cid:74)(cid:79)(cid:1)(cid:80)(cid:83)(cid:69)(cid:70)(cid:83)(cid:1)(cid:85)(cid:80)(cid:1)(cid:68)(cid:80)(cid:77)- (cid:69)(cid:70)(cid:87)(cid:74)(cid:68)(cid:70)(cid:84)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:68)(cid:66)(cid:79)(cid:79)(cid:80)(cid:85)(cid:1)(cid:67)(cid:70)(cid:1)(cid:66)(cid:68)(cid:85)(cid:74)(cid:87)(cid:70)(cid:77)(cid:90)(cid:1)(cid:84)(cid:68)(cid:66)(cid:79)(cid:79)(cid:70)(cid:69)(cid:1) (cid:114)(cid:1) A variety of tools are available to test operating systems. More specialized (cid:77)(cid:70)(cid:68)(cid:85)(cid:1)(cid:66)(cid:81)(cid:81)(cid:77)(cid:74)(cid:68)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:14)(cid:77)(cid:66)(cid:90)(cid:70)(cid:83)(cid:1)(cid:73)(cid:70)(cid:66)(cid:69)(cid:70)(cid:83)(cid:1)(cid:74)(cid:79)(cid:71)(cid:80)(cid:83)(cid:78)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:15)(cid:1)(cid:42)(cid:85)(cid:1) (cid:9)(cid:71)(cid:80)(cid:83)(cid:1)(cid:70)(cid:89)(cid:66)(cid:78)(cid:81)(cid:77)(cid:70)(cid:13)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:84)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:70)(cid:79)(cid:69)(cid:81)(cid:80)(cid:74)(cid:79)(cid:85)(cid:1)(cid:224)(cid:83)(cid:70)- ■Product Spotlight: PDUs & UPSes ...................page 16 tools are used for Web application vul- (cid:84)(cid:85)(cid:86)(cid:69)(cid:74)(cid:70)(cid:84)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:73)(cid:70)(cid:66)(cid:69)(cid:70)(cid:83)(cid:1)(cid:74)(cid:79)(cid:71)(cid:80)(cid:83)(cid:78)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:70)(cid:84)(cid:81)(cid:70)(cid:68)(cid:74)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1) (cid:88)(cid:66)(cid:77)(cid:77)(cid:84)(cid:10)(cid:13)(cid:1)(cid:85)(cid:73)(cid:74)(cid:84)(cid:1)(cid:85)(cid:70)(cid:68)(cid:73)(cid:79)(cid:74)(cid:82)(cid:86)(cid:70)(cid:1)(cid:66)(cid:77)(cid:80)(cid:79)(cid:70)(cid:1)(cid:72)(cid:70)(cid:79)(cid:70)(cid:83)(cid:66)(cid:77)(cid:77)(cid:90)(cid:1) ■ It would seem that cloud computing is energy-efficient. (cid:66)(cid:79)(cid:90)(cid:1)(cid:87)(cid:70)(cid:83)(cid:84)(cid:74)(cid:80)(cid:79)(cid:1)(cid:74)(cid:79)(cid:71)(cid:80)(cid:83)(cid:78)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:85)(cid:80)(cid:1)(cid:85)(cid:83)(cid:90)(cid:1)(cid:85)(cid:80)(cid:1)(cid:69)(cid:70)(cid:85)(cid:70)(cid:83)(cid:78)(cid:74)(cid:79)(cid:70)(cid:1) (cid:69)(cid:80)(cid:70)(cid:84)(cid:1)(cid:79)(cid:80)(cid:85)(cid:1)(cid:81)(cid:83)(cid:80)(cid:87)(cid:74)(cid:69)(cid:70)(cid:1)(cid:84)(cid:86)(cid:71)(cid:224)(cid:68)(cid:74)(cid:70)(cid:79)(cid:85)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:85)(cid:80)(cid:1)(cid:84)(cid:86)(cid:81)(cid:81)(cid:80)(cid:83)(cid:85)(cid:1) nerability testing. However, as with most questions that seem to have simple (cid:74)(cid:71)(cid:1)(cid:85)(cid:73)(cid:70)(cid:83)(cid:70)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:81)(cid:66)(cid:85)(cid:85)(cid:70)(cid:83)(cid:79)(cid:84)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:74)(cid:79)(cid:69)(cid:74)(cid:68)(cid:66)(cid:85)(cid:70)(cid:1)(cid:66)(cid:1)(cid:87)(cid:86)(cid:77)(cid:79)(cid:70)(cid:83)- (cid:83)(cid:70)(cid:78)(cid:70)(cid:69)(cid:74)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:66)(cid:68)(cid:85)(cid:74)(cid:87)(cid:74)(cid:85)(cid:90)(cid:15)(cid:1) (cid:114)(cid:1) Penetration testing is the most complex answers, the reality is a bit thornier...........................page 18 (cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:84)(cid:70)(cid:83)(cid:87)(cid:74)(cid:68)(cid:70)(cid:13)(cid:117)(cid:1)(cid:47)(cid:80)(cid:83)(cid:85)(cid:73)(cid:68)(cid:86)(cid:85)(cid:85)(cid:1)(cid:84)(cid:66)(cid:90)(cid:84)(cid:15)(cid:1) (cid:53)(cid:73)(cid:70)(cid:1)(cid:85)(cid:73)(cid:74)(cid:83)(cid:69)(cid:1)(cid:80)(cid:81)(cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:66)(cid:79)(cid:1)(cid:66)(cid:72)(cid:70)(cid:79)(cid:85)(cid:14)(cid:67)(cid:66)(cid:84)(cid:70)(cid:69)(cid:1)(cid:87)(cid:86)(cid:77)- form of vulnerability assessment. For ■Staco Energy Products FirstLine P & PL are efficient, reli- (cid:105)(cid:35)(cid:90)(cid:1) (cid:68)(cid:80)(cid:79)(cid:85)(cid:83)(cid:66)(cid:84)(cid:85)(cid:13)(cid:1) (cid:66)(cid:79)(cid:1) (cid:70)(cid:89)(cid:81)(cid:77)(cid:80)(cid:74)(cid:85)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1) (cid:85)(cid:80)(cid:80)(cid:77)(cid:1) (cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:90)(cid:1)(cid:66)(cid:84)(cid:84)(cid:70)(cid:84)(cid:84)(cid:78)(cid:70)(cid:79)(cid:85)(cid:1)(cid:84)(cid:90)(cid:84)(cid:85)(cid:70)(cid:78)(cid:13)(cid:1)(cid:73)(cid:66)(cid:84)(cid:1)(cid:66)(cid:72)(cid:70)(cid:79)(cid:85)(cid:84)(cid:1) SMBs, contracting with outside specialists (cid:66)(cid:85)(cid:85)(cid:70)(cid:78)(cid:81)(cid:85)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:67)(cid:83)(cid:70)(cid:66)(cid:76)(cid:1)(cid:74)(cid:79)(cid:1)(cid:86)(cid:84)(cid:74)(cid:79)(cid:72)(cid:1)(cid:84)(cid:86)(cid:84)(cid:81)(cid:70)(cid:68)(cid:85)(cid:70)(cid:69)(cid:1)(cid:87)(cid:86)(cid:77)- (cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:83)(cid:70)(cid:84)(cid:74)(cid:69)(cid:70)(cid:1)(cid:80)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:69)(cid:70)(cid:87)(cid:74)(cid:68)(cid:70)(cid:84)(cid:13)(cid:1)(cid:70)(cid:74)(cid:85)(cid:73)(cid:70)(cid:83)(cid:1)(cid:66)(cid:84)(cid:1)(cid:1) may be more cost-effective given the high ableUPSesthat support a variety of configurations....page 19 (cid:79)(cid:70)(cid:83)(cid:66)(cid:67)(cid:74)(cid:77)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:15)(cid:1)(cid:34)(cid:1)(cid:77)(cid:80)(cid:85)(cid:1)(cid:80)(cid:71)(cid:1)(cid:70)(cid:79)(cid:72)(cid:74)(cid:79)(cid:70)(cid:70)(cid:83)(cid:74)(cid:79)(cid:72)(cid:1)(cid:72)(cid:80)(cid:70)(cid:84)(cid:1)(cid:74)(cid:79)(cid:85)(cid:80)(cid:1) (cid:81)(cid:70)(cid:83)(cid:84)(cid:74)(cid:84)(cid:85)(cid:70)(cid:79)(cid:85)(cid:1)(cid:84)(cid:80)(cid:71)(cid:85)(cid:88)(cid:66)(cid:83)(cid:70)(cid:1)(cid:80)(cid:83)(cid:1)(cid:66)(cid:84)(cid:1)(cid:69)(cid:74)(cid:84)(cid:84)(cid:80)(cid:77)(cid:87)(cid:66)(cid:67)(cid:77)(cid:70)(cid:1) skill levels required. ■ Access Cable Trays ACT/FloorFlex system offers (cid:70)(cid:89)(cid:81)(cid:77)(cid:80)(cid:74)(cid:85)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:1)(cid:85)(cid:80)(cid:80)(cid:77)(cid:84)(cid:1)(cid:85)(cid:80)(cid:1)(cid:67)(cid:83)(cid:70)(cid:66)(cid:76)(cid:1)(cid:74)(cid:79)(cid:1)(cid:66)(cid:84)(cid:1)(cid:84)(cid:66)(cid:71)(cid:70)(cid:77)(cid:90)(cid:1)(cid:66)(cid:84)(cid:1) Go to Page 10 modular, strong raised flooring parts for a low- TCO installation........................................page 19 ■Buying Guide: Data Center Furniture................page 19 (cid:34)(cid:83)(cid:70)(cid:1)(cid:58)(cid:80)(cid:86)(cid:1)(cid:51)(cid:70)(cid:66)(cid:69)(cid:90)(cid:1)(cid:39)(cid:80)(cid:83)(cid:1)(cid:42)(cid:49)(cid:87)(cid:23)(cid:32) ■Product Spotlight: Data Center Furniture.........page 20 NETWORKING & VPN ■IPv6 uses longer addresses than IPv4, creating a As IPv4 Addresses Dry Up, bountiful supply to meet growing demand. Adoption, however, has been quite slow, and only now, 13 years Enterprises Must Ready Themselves after being initially announced, are organizations begin- For A Change In Protocol ning to embrace the new protocol......................page 1 Key Points ■Upgrading or overhauling a network can be a daunt- ing task for even the most confident and seasoned data by Mike Chapple (cid:66)(cid:86)(cid:85)(cid:73)(cid:80)(cid:83)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:1)(cid:74)(cid:79)(cid:1)(cid:38)(cid:86)(cid:83)(cid:80)(cid:81)(cid:70)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:47)(cid:80)(cid:83)(cid:85)(cid:73)(cid:1)(cid:34)(cid:78)(cid:70)(cid:83)(cid:74)(cid:68)(cid:66)(cid:1) (cid:114)(cid:1) Organizations are slowly beginning to center manager. Here are a few pointers that can make (cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:1)(cid:114) (cid:66)(cid:83)(cid:70)(cid:1)(cid:88)(cid:74)(cid:69)(cid:70)(cid:77)(cid:90)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:68)(cid:85)(cid:70)(cid:69)(cid:1)(cid:85)(cid:80)(cid:1)(cid:84)(cid:80)(cid:80)(cid:79)(cid:1)(cid:71)(cid:80)(cid:77)(cid:77)(cid:80)(cid:88)(cid:1)(cid:84)(cid:86)(cid:74)(cid:85)(cid:15) adopt IPv6, driven by the recent exhaus- your next network overhaul a little less taxing........page 22 The world is running out (cid:80)(cid:71)(cid:1)(cid:42)(cid:49)(cid:1) (cid:42)(cid:79)(cid:85)(cid:70)(cid:83)(cid:79)(cid:70)(cid:85)(cid:1)(cid:70)(cid:89)(cid:81)(cid:70)(cid:83)(cid:85)(cid:84)(cid:1)(cid:84)(cid:66)(cid:88)(cid:1)(cid:85)(cid:73)(cid:74)(cid:84)(cid:1)(cid:81)(cid:83)(cid:80)(cid:67)(cid:77)(cid:70)(cid:78)(cid:1) tion of available IPv4 address blocks. (cid:66)(cid:69)(cid:69)(cid:83)(cid:70)(cid:84)(cid:84)(cid:70)(cid:84)(cid:135)(cid:42)(cid:49)(cid:87)(cid:21)(cid:1)(cid:66)(cid:69)(cid:69)(cid:83)(cid:70)(cid:84)(cid:84)(cid:70)(cid:84)(cid:13)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:74)(cid:84)(cid:15)(cid:1)(cid:42)(cid:79)(cid:1) (cid:68)(cid:80)(cid:78)(cid:74)(cid:79)(cid:72)(cid:1)(cid:78)(cid:80)(cid:83)(cid:70)(cid:1)(cid:85)(cid:73)(cid:66)(cid:79)(cid:1)(cid:66)(cid:1)(cid:69)(cid:70)(cid:68)(cid:66)(cid:69)(cid:70)(cid:1)(cid:66)(cid:72)(cid:80)(cid:1)(cid:66)(cid:79)(cid:69)(cid:13)(cid:1) ■OpenFlow is an open-source, open-standards proj- (cid:43)(cid:66)(cid:79)(cid:86)(cid:66)(cid:83)(cid:90)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:42)(cid:34)(cid:47)(cid:34)(cid:1)(cid:9)(cid:42)(cid:79)(cid:85)(cid:70)(cid:83)(cid:79)(cid:70)(cid:85)(cid:1)(cid:34)(cid:84)(cid:84)(cid:74)(cid:72)(cid:79)(cid:70)(cid:69)(cid:1) (cid:74)(cid:79)(cid:1)(cid:18)(cid:26)(cid:26)(cid:25)(cid:13)(cid:1)(cid:83)(cid:70)(cid:77)(cid:70)(cid:66)(cid:84)(cid:70)(cid:69)(cid:1)(cid:51)(cid:39)(cid:36)(cid:1)(cid:19)(cid:21)(cid:23)(cid:17)(cid:1)(cid:69)(cid:70)(cid:71)(cid:74)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1) (cid:114)(cid:1) The most common approach to IPv6 ect borne of a six-year research collaboration between (cid:47)(cid:86)(cid:78)(cid:67)(cid:70)(cid:83)(cid:84)(cid:1)(cid:34)(cid:86)(cid:85)(cid:73)(cid:80)(cid:83)(cid:74)(cid:85)(cid:90)(cid:10)(cid:1)(cid:66)(cid:79)(cid:79)(cid:80)(cid:86)(cid:79)(cid:68)(cid:70)(cid:69)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:74)(cid:85)(cid:1) (cid:85)(cid:73)(cid:70)(cid:1)(cid:84)(cid:80)(cid:77)(cid:86)(cid:85)(cid:74)(cid:80)(cid:79)(cid:27)(cid:1)(cid:42)(cid:49)(cid:87)(cid:23)(cid:15)(cid:1)(cid:53)(cid:73)(cid:74)(cid:84)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1)(cid:81)(cid:83)(cid:80)(cid:85)(cid:80)- migration is to run both IPv4 and IPv6 Stanford University and the University of California at (cid:66)(cid:84)(cid:84)(cid:74)(cid:72)(cid:79)(cid:70)(cid:69)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:77)(cid:66)(cid:84)(cid:85)(cid:1)(cid:66)(cid:87)(cid:66)(cid:74)(cid:77)(cid:66)(cid:67)(cid:77)(cid:70)(cid:1)(cid:67)(cid:77)(cid:80)(cid:68)(cid:76)(cid:1)(cid:80)(cid:71)(cid:1)(cid:42)(cid:49)(cid:87)(cid:21)(cid:1) (cid:68)(cid:80)(cid:77)(cid:1)(cid:86)(cid:84)(cid:70)(cid:84)(cid:1)(cid:77)(cid:80)(cid:79)(cid:72)(cid:70)(cid:83)(cid:1)(cid:66)(cid:69)(cid:69)(cid:83)(cid:70)(cid:84)(cid:84)(cid:70)(cid:84)(cid:13)(cid:1)(cid:68)(cid:83)(cid:70)(cid:66)(cid:85)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:1)(cid:1) side by side, and to conduct a phased Berkeley that gives users unprecedented ease of con- (cid:66)(cid:69)(cid:69)(cid:83)(cid:70)(cid:84)(cid:84)(cid:70)(cid:84)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:84)(cid:86)(cid:81)(cid:81)(cid:77)(cid:74)(cid:70)(cid:84)(cid:1)(cid:66)(cid:83)(cid:70)(cid:1)(cid:77)(cid:74)(cid:78)(cid:74)(cid:85)(cid:70)(cid:69)(cid:1) (cid:67)(cid:80)(cid:86)(cid:79)(cid:85)(cid:74)(cid:71)(cid:86)(cid:77)(cid:1)(cid:84)(cid:86)(cid:81)(cid:81)(cid:77)(cid:90)(cid:1)(cid:85)(cid:80)(cid:1)(cid:78)(cid:70)(cid:70)(cid:85)(cid:1)(cid:72)(cid:83)(cid:80)(cid:88)(cid:74)(cid:79)(cid:72)(cid:1)(cid:69)(cid:70)(cid:14) migration as enterprises begin to adopt trol over the way their networks operate..........page 23 (cid:85)(cid:80)(cid:1)(cid:85)(cid:73)(cid:80)(cid:84)(cid:70)(cid:1)(cid:80)(cid:79)(cid:1)(cid:73)(cid:66)(cid:79)(cid:69)(cid:1)(cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:83)(cid:70)(cid:72)(cid:74)(cid:80)(cid:79)(cid:66)(cid:77)(cid:1)(cid:79)(cid:70)(cid:85)- (cid:78)(cid:66)(cid:79)(cid:69)(cid:15)(cid:1)(cid:34)(cid:69)(cid:80)(cid:81)(cid:85)(cid:74)(cid:80)(cid:79)(cid:13)(cid:1)(cid:73)(cid:80)(cid:88)(cid:70)(cid:87)(cid:70)(cid:83)(cid:13)(cid:1)(cid:73)(cid:66)(cid:84)(cid:1)(cid:67)(cid:70)(cid:70)(cid:79)(cid:1) the newer protocol. (cid:88)(cid:80)(cid:83)(cid:76)(cid:1)(cid:66)(cid:86)(cid:85)(cid:73)(cid:80)(cid:83)(cid:74)(cid:85)(cid:74)(cid:70)(cid:84)(cid:15)(cid:1)(cid:52)(cid:70)(cid:87)(cid:70)(cid:83)(cid:66)(cid:77)(cid:1)(cid:78)(cid:80)(cid:79)(cid:85)(cid:73)(cid:84)(cid:1)(cid:77)(cid:66)(cid:85)(cid:70)(cid:83)(cid:13)(cid:1) (cid:82)(cid:86)(cid:74)(cid:85)(cid:70)(cid:1)(cid:84)(cid:77)(cid:80)(cid:88)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1)(cid:80)(cid:79)(cid:77)(cid:90)(cid:1)(cid:79)(cid:80)(cid:88)(cid:13)(cid:1)(cid:18)(cid:20)(cid:1)(cid:90)(cid:70)(cid:66)(cid:83)(cid:84)(cid:1)(cid:77)(cid:66)(cid:85)(cid:70)(cid:83)(cid:13)(cid:1) (cid:114)(cid:1) Migrating to IPv6 requires that enterprises The Processor.com home page is frequently updated with (cid:34)(cid:49)(cid:47)(cid:42)(cid:36)(cid:13)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:83)(cid:70)(cid:72)(cid:74)(cid:80)(cid:79)(cid:66)(cid:77)(cid:1)(cid:66)(cid:86)(cid:85)(cid:73)(cid:80)(cid:83)(cid:74)(cid:85)(cid:90)(cid:1)(cid:71)(cid:80)(cid:83)(cid:1)(cid:34)(cid:84)(cid:74)(cid:66)(cid:1) (cid:66)(cid:83)(cid:70)(cid:1)(cid:80)(cid:83)(cid:72)(cid:66)(cid:79)(cid:74)(cid:91)(cid:66)(cid:85)(cid:74)(cid:80)(cid:79)(cid:84)(cid:1)(cid:67)(cid:70)(cid:72)(cid:74)(cid:79)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:85)(cid:80)(cid:1)(cid:70)(cid:78)(cid:67)(cid:83)(cid:66)(cid:68)(cid:70)(cid:1) invest in upgrades of legacy equipment and new articles and hardware news to help you keep current. (cid:66)(cid:79)(cid:69)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:49)(cid:66)(cid:68)(cid:74)(cid:71)(cid:74)(cid:68)(cid:13)(cid:1)(cid:66)(cid:79)(cid:79)(cid:80)(cid:86)(cid:79)(cid:68)(cid:70)(cid:69)(cid:1)(cid:83)(cid:70)(cid:84)(cid:85)(cid:83)(cid:74)(cid:68)(cid:85)(cid:74)(cid:80)(cid:79)(cid:84)(cid:1) (cid:85)(cid:73)(cid:70)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1)(cid:81)(cid:83)(cid:80)(cid:85)(cid:80)(cid:68)(cid:80)(cid:77)(cid:15) Visit www.processor.com today. training for their network engineering staff. (cid:80)(cid:79)(cid:1)(cid:85)(cid:73)(cid:70)(cid:1)(cid:74)(cid:84)(cid:84)(cid:86)(cid:66)(cid:79)(cid:68)(cid:70)(cid:1)(cid:80)(cid:71)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1)(cid:42)(cid:49)(cid:1)(cid:66)(cid:69)(cid:69)(cid:83)(cid:70)(cid:84)(cid:84)(cid:70)(cid:84)(cid:13)(cid:1)(cid:66)(cid:79)(cid:69)(cid:1) Go to Page 10 Page 2 Processor.com July 1, 2011 Subscribe Today/Address Change Form For address change, fill out form below with new information and mail or fax. PLEASE PRINT What type of subscription request is this? ❑ New ❑ Renewal ❑ Cancel (cid:170)(cid:1)(cid:36)(cid:80)(cid:81)(cid:90)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:19)(cid:17)(cid:18)(cid:18)(cid:1)(cid:52)(cid:66)(cid:79)(cid:69)(cid:73)(cid:74)(cid:77)(cid:77)(cid:84)(cid:1)(cid:49)(cid:86)(cid:67)(cid:77)(cid:74)(cid:84)(cid:73)(cid:74)(cid:79)(cid:72)(cid:1)(cid:36)(cid:80)(cid:78)(cid:81)(cid:66)(cid:79)(cid:90)(cid:15)(cid:1)(cid:34)(cid:77)(cid:77)(cid:1)(cid:83)(cid:74)(cid:72)(cid:73)(cid:85)(cid:84)(cid:1)(cid:83)(cid:70)(cid:84)(cid:70)(cid:83)(cid:87)(cid:70)(cid:69)(cid:15)(cid:1) Phone: ( ______ )________________________________ Fax: ( ______ ) __________________________________________ Subscriptions (cid:46)(cid:66)(cid:74)(cid:77)(cid:1)(cid:39)(cid:80)(cid:83)(cid:78)(cid:1)(cid:53)(cid:80)(cid:27)(cid:1)(cid:49)(cid:15)(cid:48)(cid:15)(cid:1)(cid:35)(cid:80)(cid:89)(cid:1)(cid:25)(cid:19)(cid:22)(cid:21)(cid:22)(cid:1)(cid:116)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:17)(cid:18)(cid:14)(cid:19)(cid:22)(cid:21)(cid:22) Contact Name:__________________________________________________________________________________________ (cid:48)(cid:87)(cid:70)(cid:83)(cid:79)(cid:74)(cid:72)(cid:73)(cid:85)(cid:1)(cid:37)(cid:70)(cid:77)(cid:74)(cid:87)(cid:70)(cid:83)(cid:90)(cid:27)(cid:1)(cid:18)(cid:19)(cid:17)(cid:1)(cid:56)(cid:70)(cid:84)(cid:85)(cid:1)(cid:41)(cid:66)(cid:83)(cid:87)(cid:70)(cid:84)(cid:85)(cid:1)(cid:37)(cid:83)(cid:74)(cid:87)(cid:70)(cid:1)(cid:116)(cid:1)(cid:45)(cid:74)(cid:79)(cid:68)(cid:80)(cid:77)(cid:79)(cid:13)(cid:1)(cid:47)(cid:38)(cid:1)(cid:23)(cid:25)(cid:22)(cid:19)(cid:18) (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:20)(cid:20)(cid:21)(cid:14)(cid:24)(cid:21)(cid:22)(cid:25)(cid:1)(cid:93)(cid:1)(cid:45)(cid:48)(cid:36)(cid:34)(cid:45)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:20)(cid:19)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:26)(cid:20) Company Name:________________________________________________________________________________________ Advertising & Reprints Address: ______________________________________________________________________________________________ (cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:19)(cid:21)(cid:24)(cid:14)(cid:21)(cid:25)(cid:25)(cid:17)(cid:1)(cid:93)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:21)(cid:18)(cid:1)(cid:93)(cid:1)(cid:39)(cid:34)(cid:57)(cid:27)(cid:1)(cid:9)(cid:21)(cid:17)(cid:19)(cid:10)(cid:1)(cid:21)(cid:24)(cid:26)(cid:14)(cid:19)(cid:18)(cid:17)(cid:21) City: ___________________________________________ State: ________ Postal Code: _____________________________ Editorial Staff Country:_______________________________________________________________________________________________ (cid:70)(cid:69)(cid:74)(cid:85)(cid:80)(cid:83)(cid:33)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:80)(cid:83)(cid:15)(cid:68)(cid:80)(cid:78)(cid:1)(cid:116)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) Email: ________________________________________ Web Address: ___________________________________________ (cid:37)(cid:80)(cid:1)(cid:90)(cid:80)(cid:86)(cid:1)(cid:73)(cid:66)(cid:87)(cid:70)(cid:1)(cid:66)(cid:1)(cid:79)(cid:70)(cid:88)(cid:1)(cid:81)(cid:83)(cid:80)(cid:69)(cid:86)(cid:68)(cid:85)(cid:1)(cid:85)(cid:73)(cid:66)(cid:85)(cid:1)(cid:69)(cid:66)(cid:85)(cid:66)(cid:1)(cid:68)(cid:70)(cid:79)(cid:85)(cid:70)(cid:83)(cid:16)(cid:42)(cid:53)(cid:1)(cid:78)(cid:66)(cid:79)(cid:66)(cid:72)(cid:70)(cid:83)(cid:84)(cid:1)(cid:88)(cid:80)(cid:86)(cid:77)(cid:69)(cid:1)(cid:67)(cid:70)(cid:1) (cid:74)(cid:79)(cid:85)(cid:70)(cid:83)(cid:70)(cid:84)(cid:85)(cid:70)(cid:69)(cid:1)(cid:74)(cid:79)(cid:1)(cid:77)(cid:70)(cid:66)(cid:83)(cid:79)(cid:74)(cid:79)(cid:72)(cid:1)(cid:66)(cid:67)(cid:80)(cid:86)(cid:85)(cid:32)(cid:1)(cid:36)(cid:66)(cid:77)(cid:77)(cid:1)(cid:9)(cid:25)(cid:17)(cid:17)(cid:10)(cid:1)(cid:22)(cid:21)(cid:21)(cid:14)(cid:18)(cid:19)(cid:23)(cid:21) 1. What is the size of your company 3. What is your annual computer hardware/ (cid:80)(cid:83)(cid:1)(cid:70)(cid:78)(cid:66)(cid:74)(cid:77)(cid:1)(cid:81)(cid:83)(cid:70)(cid:84)(cid:84)(cid:33)(cid:81)(cid:83)(cid:80)(cid:68)(cid:70)(cid:84)(cid:84)(cid:80)(cid:83)(cid:15)(cid:68)(cid:80)(cid:78)(cid:15) (how many employees)? software purchasing budget? ❑ Less than 10 ❑ 200 to 499 ❑ $0 to $9,999 ❑ $100,000 to $249,999 (cid:52)(cid:68)(cid:66)(cid:79)(cid:1)(cid:85)(cid:73)(cid:74)(cid:84) ❑ 10 to 99 ❑500 to 999 ❑ $10,000 to $24,999 ❑ $250,000 to $499,999 (cid:50)(cid:51)(cid:1)(cid:36)(cid:80)(cid:69)(cid:70) ❑ 100 to 199 ❑ 1,000+ ❑ $25,000 to $49,999 ❑ $500,000 to $999,000 (cid:88)(cid:74)(cid:85)(cid:73)(cid:1)(cid:90)(cid:80)(cid:86)(cid:83)(cid:1) ❑ $50,000 to $99,999 ❑ $1,000,000+ (cid:78)(cid:80)(cid:67)(cid:74)(cid:77)(cid:70) 2. How often do you purchase computer (cid:84)(cid:78)(cid:66)(cid:83)(cid:85)(cid:81)(cid:73)(cid:80)(cid:79)(cid:70)(cid:1) hardware/software? (cid:85)(cid:80)(cid:1)(cid:84)(cid:70)(cid:70)(cid:1)(cid:80)(cid:86)(cid:83)(cid:1) ❑ Weekly ❑ Quarterly (cid:88)(cid:70)(cid:67)(cid:84)(cid:74)(cid:85)(cid:70)(cid:15) ❑ Bi-weekly ❑ Annually ❑ Monthly ❑ No Involvement www.Processor.com News Also In This Issue... SECURITY Roudebush VA Medical Center on behalf of sales of between 5 million and 7 million units, ❙ ■ A certain amount of confusion exists about vulner- Kundra Resigns As Federal CIO the U.S. Department of Veterans Affairs. In the company lowered its 2011 forecast by half ability assessment scanners, penetration testing, and Vivek Kundra, appointed two and a half years addition to this “paper persistence,” attrib- to between 2.5 million and 3 million. Though Web application vulnerability assessment. In fact, you ago as the nation’s CIO under the Obama uted in part to doctors who prefer to take it is confident it can sell 800,000 tablets in may hear the terms used interchangeably.........page 1 administration, has resigned from his position notes and read items in hard-copy form, the the second and third quarters, Acer has not ■ Make better use of your security logs and automate in order to accept a fellowship at Harvard. research uncovered “workarounds, com- released guidance for the fourth quarter and your intrusion prevention systems in order to optimize and During his time as CIO, Kundra pushed cloud munication breakdowns, and redundancies shaved 10% off of its PC sales forecast for the monitor your information security equipment.....page 29 adoption, use of consumer technologies, in computerized consult management.” year after experiencing a 29.2% drop in sales and dissemination of information to the pub- However, some of said workarounds may in May. Acer and other tablet manufacturers ■ Perhaps the biggest issue in authentication lic through sites such as Data.gov. He was actually give developers ideas for making are experiencing difficulties in keeping up with today is that there’s no real 100% foolproof authen- critical of big IT contracts that had little EHR systems more useful and intuitive in the massive success of Apple’s iPad. tication system.........................................page 30 chance of success, and his 25-point plan, the workplace, the study concludes. ❙ EU Countries Sluggish ■Pervasive memory scraping has been identified in released six months ago, called for major ❙ PCI Council Issues With E-Privacy Directive For Cookies a growing number of data breach incidents.....page 31 data center consolidation by 2015. However, New Virtualization Guidelines his stated goal of completing a third of the The European Commission has report- ■Product Spotlight: Unified Threat Management.page 32 work in the first six months was not achieved, Given the recent rush to the cloud, ed that just three countries in the and this lack of progress is seen as a likely coupled with a spate of high-profile European Union—Denmark, STORAGE factor in his early departure. security breaches, there’s been Estonia, and the United ■Administrators struggling to keep their users con- ❙ some confusion over the Kingdom—had taken EHR Developers Can Learn nected during or after a disaster event may wonder how proper way to implement steps to follow a set From User Practices they can get access to their users quickly and the best PCI DSS (Payment Card of e-privacy direc- way to allow access for temporary personnel......page 34 Many healthcare providers still use paper Industry Data Security tives issued by the and personal spreadsheets even when they Standard) in a virtual Commission by the MESSAGING have a decent system for electronic health environment. However, stated May 25 dead- & TELEPHONY records in place, according to a recent study industry observers are line. The rest of the conducted by researchers at the Richard L. applauding a recent EU entities have ■ IT departments worldwide are dealing with an email clarification document been dragging their uprising of sorts. No longer are employees willing to from the PCI Security feet on implementing put up with mailbox size limits or limits to the size of Standards Council, which policies to enforce the documents they send.......................................page 36 they say provides the most new directive, which ■ You may not always be able to control emails and IMs comprehensive guidance to requires companies to once they leave the enterprise, but there are things you can date on securing hypervisors obtain permission from do that will put your company in a better situation....page 37 and mixed-mode environments users to store cookies that and addressing critical functions such are associated with advertising CLIENTS as intrusion prevention and firewalls that and user activity on the Web. The have heretofore been left murky in the virtual- Commission recommends that noncompliant ■ dtSearch 7.67 is an updated version of the enterprise and ization context. countries in the union evaluate their cookie developertext retrieval software product line with enhance- use, understand types of consent, and review ❙ ments to the file parsers and converters....................page 31 Acer Sees Sales Decline, new expectations for businesses as part of Adjusts Tablet Shipment Guidance ■ If you are tasked with installing a new OS for your enter- their efforts to implement the directive. Member prise’s workstations or servers, there are specific steps you Computer maker Acer has adjusted its tablet states that fail to implement e-privacy laws can follow for a successful deployment....................page 39 shipment predictions following a sluggish few could face sanctions from the Commission. months in sales. Previously anticipating tablet ❙ ■ GreenSQL Enterprise Edition uses GreenSQL’s Unified Oracle To Acquire FatWire Database Security platform to combine security, caching, WATCH THE Oracle announced late last month that it has auditing, and masking modules ................................page 39 This information provides a quick glimpse of current and historical stock entered an agreement to buy privately held STOCKS prices and trends for 14 major companies in the technology market. FatWire Software, a provider of Web expe- SERVICES rience management solutions. FatWire ■ Does it make sense to spend additional money on a % change from describes its solutions as tools to help enter- service contract?...........................................page 38 Company Symbol Year Ago June 9 $ June 23 $ previous issue prises deliver a rich online experience to users AMD AMD $8.13 $7.64 $7.06 ▼ 7.59% and simplify management of their Web pres- ■Product Spotlight: Apple AAPL $269 $331.49 $331.23 ▼ 0.08% ence. The company was founded in 1996 and Data Center Cleaning Services...................page 40 CA Technologies CA $19.23 $21.98 $22.27 ▲ 1.32% is headquartered in Mineola, N.Y., with global Cisco Systems CSCO $22.57 $15.31 $15.47 ▲ 1.05% offices in 11 countries. The company serves DATA CENTER Dell DELL $12.93 $15.67 $16.27 ▲ 3.83% more than 500 customers in financial services, MANAGEMENT Google GOOG $475.10 $516.73 $480.22 ▼ 7.07% media, technology, manufacturing, retail, ■ Whether certifications are necessary is a question HP HPQ $39.03 $35.46 $35.23 ▼ 0.65% healthcare, and public sector spaces. Oracle that’s more complicated than it seems............page 42 IBM IBM $128.19 $164.84 $166.12 ▲ 0.78% expects the acquisition to extend its offerings Intel INTC $20.32 $21.76 $21.71 ▼ 0.23% for customers wanting to build unified customer ■ If your company still uses tape media for backup LinkedIn LNKD N/A $72.01 $70.32 ▼ 2.35% experiences across channels and give the and archiving, you may be able to save 20 to 50% by Microsoft MSFT $25 $23.96 $24.63 ▲ 2.8% company a complete customer experience purchasingcertified used media....................page 43 Oracle ORCL $22.22 $31.63 $32.46 ▲ 2.62% management solution that helps organizations Red Hat Software RHT $30.78 $42.49 $45.27 ▲ 6.54% drive customer retention and loyalty through The Processor.com home page is frequently updated with Symantec SYMC $14.42 $18.85 $18.93 ▲ 0.42% improved online engagement. Other than a new articles and hardware news to help you keep current. mid-2011 closing timeframe, no other terms of Visit www.processor.com today. NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. the deal were disclosed. July 1, 2011 Processor.com Page 3 Automatic Transfer Switch—ATS Standard Features (cid:116)(cid:1)Out-Of-Phase Source Switching (cid:116)(cid:1)8-15ms Switching Time (cid:116)(cid:1)Programmable Dropout Voltage (cid:116)(cid:1)Programmable Switchback Voltage (cid:116)(cid:1)SNMP And HTTP With DS-Series (cid:116)(cid:1)PCB-Based Reliability (cid:116)(cid:1)Reports Volts, Current, Watts, VA (cid:116)(cid:1)Break-Before-Make Transfer Provide Redundancy To Single-Corded Devices With The Ability To Switch Out-Of-Phase Sources In 8 To 15ms. Providing redundancy on the power-circuit level is critical to maintaining solution. Monitoring Power on the ATS is a unique feature which provides uptime. The ATS Series provides a simple and reliable solution for auto- information about: matically sensing power loss and seamlessly switching to a backup circuit. (cid:116)(cid:1)(cid:1)Amperage Load (cid:116)(cid:1)(cid:1)(Watts) True RMS Power (cid:116)(cid:1)(cid:1)Volt-amps BayTech ATS transfer switch line offers a unique approach to performing the (cid:116)(cid:1)(cid:1)Voltage (cid:116)(cid:1)(cid:1)Internal Temperature transfer by completely severing the connection between the source and load then waiting for the zerocrossing to perform the transfer. This is the driving By combining the ATS and the DS-Series, console server alerts on force behind being able to perform out-of-phase transfers with a low-cost power and transfers can be sent via secure SNMP V3. Bay Technical Assoc. Inc. 5239 A Avenue Long Beach, MS 39560 Tel: 228-563-7334 Fax: 228-563-7335 [email protected] Server Racks *Free Shipping! 42U $799.95 42U CO-LO $1750 WC42U-BK WC42UCO-BLK Your Source For KVMs, PDUs, Rackmount Keyboard Monitors, Accessories See our online catalog at www.iscdfw.com or call (800) 458-6255. Page 4 Processor.com July 1, 2011 News S TAT S & F A C T S have suffered at least one data breach in the ❙ Providing The Latest Insight & Information Majority Of SMBs Don’t Consider past year. The survey, sponsored by Juniper From Leading Research Firms ITIL Support In Buying Decisions Networks, reports that 53% of respondents A global survey of about 850 IT profession- have low confidence that their networks would als that focused on service desk trends indi- avoid attacks in the next year; only 24% say cates that 71% of SMBs didn’t consider ITIL they have high confidence that they won’t suf- (Information Technology Infrastructure Library) fer attacks. The attacks are expensive, with the Tablets, Tablets support a factor when purchasing their service average cost of 55% of the breaches falling desk tools, even though 50% indicated they between $250,000 and $1 million. Employee had adopted some form of ITIL. Additionally, laptops were the most common sources of & More Tablets 91% of those Dimensional Research surveyed those breaches (34%), followed by mobile on behalf of Dell Kace reported they haven’t devices (29%) and corporate desktops (28%). adopted ITIL at all or only use ITIL as a guide- ❙ DHS Unveils New Compliance Rules line. According to Dimensional Research’s Diane Hagglund, the survey shows that IT In an effort to better monitor cybersecurity, departments believe they can gain better effi- the U.S. Department of Homeland Security ciencies by “integrating their service desks with announced updated 2011 performance met- other processes to rapidly provide complete rics for compliance with FISMA (the Federal information about the endpoints they service.” Information Security Management Act). The She adds that even though most organizations metrics touch on a number of areas, including see a value in integrating service desk solu- system inventory, asset management, configu- tions with other systems, “few SMBs have been ration management, vulnerability management, able to implement this important integration.” identity and access management, data protec- The survey found that despite most SMBs tion, boundary protection, incident management, striving to optimize service desks through inte- training and education, remote access, network gration with desktop management, 71% view security protocols, software assurance, and cost factors or technology complexity as having continuous monitoring. A lot of the needed infor- impaired their ability to follow through. Another mation centers around how many items—user finding indicates SMBs prefer ease of use over accounts, DNS names, pieces of certain types advanced features. of equipment, and so on—an agency has. ❙ Demand For SMB IT Services ❙ Desktop OS Trends In The Enterprise On The Rise According to a report from Forrester Research, New research conducted by Techaisle on Windows XP is still the dominant enterprise The tablet market is exploding and shows no signs of slowing down, with new manufacturers VARs, ISVs, and service providers found that operating system with 59.9% of the market, entering the market on a regular basis. The use of tablets in both small business and enterprise 38% offer SMB cloud computing solutions, and despite being a decade old and superseded by settings is on the rise, too. If your enterprise hasn’t yet developed a plan, it needs to. another 11% plan to offer cloud computing in two generations of Windows OSes. Windows 2011. Furthermore, 12% of those that do offer Vista lost ground over the past year and is cloud solutions can deliver all four types of now at 6.2%, down from 11.3%. Windows 7 8.87 million: The number of tablets in use in SMBs with 1 to 1,000 employees, cloud computing services: IaaS, PaaS, CaaS, is steadily gaining ground; a year ago, it had according to Techaisle. About half were purchased by employees who then brought them to work. and SaaS. Techaisle predicts that more chan- 9.5% of the market, but that share has grown nel providers will be offering all four cloud to 21%. In all, about 87% of all corporate com- United States: services to SMBs because it’s easier for SMBs puters run some version of Windows. Macs are The country that remains the biggest market for tablets, IDC says. to invest in services from the same channel penetrating somewhat, however, with growth The United States, Western Europe, and the Asia-Pacific region (excluding Japan) accounted for partner. The study found that more than 50% of up to 11% from 9.1% a year ago. 89% of all tablet shipments during the fourth quarter of last year. SMBs want cloud-based industry vertical solu- ❙ Research Group: tions, but only 28% of cloud computing channel 70 million: IT Spending “Catches Fire” The number of tablets research firm Gartner predicts will be sold this year, providers offer a vertical product. more than four times the 15 million units sold last year. ❙ The “IT spending squeeze” brought about by Windows 8 Demo Sparks Concerns the financial crisis is over, according to Maven Microsoft performed two demonstrations of its Wave, a management consulting firm. In a 2015: The year by which Forrester predicts tablet sales will outpace notebook sales. Windows 8 live tile touch-based interface last recent study, Maven Wave found that the month, and the demos have prompted third- spending freeze ended in the fourth quarter of 48 million: party developers to express concerns about 2010, and new data the firm released covering The number of iPads Apple will sell this year, according to Gartner. The how (and whether) the Silverlight and .NET the first quarter shows continued improvement, company will claim about 70% of the market. platforms will be used in the new operating with the MIT Index (a measure of spending on system. The software giant released a Win8 IT) up 14%. In addition, faster-than-expected introductory video that indicated it would be a hiring drove the MIV Index (a measure of platform based on Web technologies, such as corporate earnings in relation to spending on HTML5 and JavaScript. As such, developers the IT workforce) to $19.44, indicating that for But There’s A Downside familiar with Silverlight and .NET are worried every dollar corporations spend on the IT work- that they may need to learn new skill sets to force, they’ll see $19.44 in corporate earnings. write code for future versions of Windows. For its part, Microsoft has made no comment one way or another about the inclusion of Silverlight and .NET technology. It was almost inevitable that tablet sales would cut into shipments of PCs and note- books, but the hard drive market is also experiencing doldrums because the typical ❙ IP Pros Comfortable tablet PC relies on flash or solid-state drives, according to research firm IHS iSuppli. With Cloud Computing In spite of the burgeoning popularity of cloud Although iSuppli still predicts growth in the hard disk drive market, computing, most IT pros do not fear being dis- other than a small blip in 2013, that growth rate will continue a placed—or replaced—by the cloud. According to steady year-over-year decline: a recent “Future Proofing the Cloud” survey of IT professionals, analysts, and media, IT practition- ers feel that they’ll be involved in the process of converting their companies’ enterprise IT infra- structures into private or hybrid clouds and will ultimately take on the role of provisioning cloud 2010: 7% services for their users and partners. Relating 2011: 4.1% to the popularity of the cloud, the survey—con- ducted as part of the Cloud Leadership Forum— 2012: 3.9% found that 81% of those surveyed agreed with the statement, “By 2015, at least 30% of Fortune 2013: 4.5% 1000 enterprises will deploy at least one busi- 2014: 2.8% ness-critical system in the cloud.” ❙ 2015: 2.1% Study: Cyber Attacks On The Rise A recent Ponemon Institute survey notes that cyber attacks are becoming more frequent and severe and that the majority of businesses July 1, 2011 Processor.com Page 5 News Advertising. Two executives from Qik, a com- method for spouses and significant others is office suite, and 8% use storage and backup ❙ RIM Has Disappointing Quarter, pany Skype had recently acquired, also left the voice and phone (85%), and the top method for services. But when the term “cloud” was taken Announces Changes company. Microsoft is in the process of closing work colleagues is email (73%). out of the questions and users were asked BlackBerry maker Research In Motion’s net the deal, which was announced in May and is about the services they use based on the brand ❙ Consumers Fail To Grasp income for its fiscal 2012 first quarter dropped valued at $8.5 billion, and has yet to take full names, the responses changed dramatically, Cloud Concept 10% from a year ago, hitting $695 million, or control of the company. with about 90% of users saying they are using $1.33 per share. The company sold 13.2 million A new survey of 1,000 American adults from some type of cloud-related service. ❙ Symantec Releases Latest BlackBerry handheld devices, below RIM’s pre- the researchers at Ipsos OTX MediaCT reveals ❙ State Of Spam & Phishing Report Oracle Seeks Billions From Google vious expectations. RIM did have some high- that, for the most part, consumers’ understand- In Java Patent Dispute lights, with first-quarter revenue up 16% from According to Symantec’s June “State of Spam ing of what constitutes a cloud-based service a year ago and international revenue up 67% & Phishing” report, overall spam volumes is tenuous at best. When asked specifically Oracle is seeking up to $6.1 billion in dam- year-over-year. As a result of the overall disap- continue to decline to 2006 levels, making about their use of cloud-based services, 22% of ages from Google in a lawsuit that claims pointing results, RIM says it will begin a “cost up 72.14% of all emails sent. Year-over-year the survey respondents said they use cloud-based Google’s Android software infringes on optimization program” to streamline operations, spam volumes declined by 70.65%, and email, 13% use photo services, 9% use music and Oracle’s Java patents. Oracle sued Google resulting in some employee layoffs. between April and May, volumes declined 10%. videos, 9% indicate that they use a cloud-based last August, claiming that the search company Symantec says that shuttered botnets are willfully infringed on several patents related ❙ New Cloud Usage Models responsible for the declines; however, it’s not to its Java programming language, which it Aim To Ensure Better Security all good news: As in previous months, phish- obtained in January 2010 after acquiring Sun The Open Data Center Alliance, a group ing attacks continued their surge, rising 6.67% Microsystems. The judge presiding over the made up of more than 250 total members between April and May. Automated toolkit use case ordered Google to disclose Oracle’s dam- that have invested heavily in cloud comput- for generating phishing Web sites was also up age claims, which range from an estimated ing technology, released new cloud usage by 24.82%. Cybercriminals are beginning to $1.4 billion to $6.1 billion. Google is disputing models that the alliance says will improve target non-English speakers with their scams; the claim, which it called a “breathtaking figure security in cloud environments. The Provider non-English phishing sites increased 17.73%, that is out of proportion to any meaningful mea- Security Assurance model suggests that cloud with target languages including Portuguese, sure of the intellectual property at issue.” providers should make their security features French, Italian, and Spanish. ❙ Search Giants Form Schema.org evident so that potential customers can easily ❙ Communication Study compare their security offerings. The Security Search entities Microsoft Bing, Google, and Highlights Preferences For Family, Compliance Monitoring model states that Yahoo! have partnered to form Schema.org, an Friends & Colleagues real-time monitoring is essential to providing initiative to aid Web developers in creating bet- improved security and outlines specifically A new Harris Interactive poll, sponsored by the ter, more comprehensible Web page metadata. what aspects of a product or service should mobile VoIP provider Rebtel, finds that adults The new common vocabulary for data markup be monitored. still favor phone calls for communicating. When (an assortment of HTML tags) aims to provide communicating with family not in person, 81% users with more relevant, usable search results ❙ Skype Executives Exit of respondents said they communicate via by giving Web developers a common markup After Microsoft Buys Company voice and phone calls, 80% use email, 57% language that will be recognized by the major A total of eight executives at Skype left the use text and SMS messages, and 51% use search engines. Google has already made efforts company following its acquisition by Microsoft. social networks. The favored communication to strengthen its markup language in the past These executives included David Gurle, vice methods between friends is slightly different, with rich snippets, which included reviews, rat- president and general manager for Skype with 83% using email, 74% using phone and ings, etc., within search results. This change may For Business, and Don Albert, vice president voice, 61% social networks, and 57% text and require increased effort from Web publishers but and general manager for the Americas and SMS messages. The top communication will likely fix issues with automated data analysis. Page 6 Processor.com July 1, 2011 P R O D U C T R E L E A S E S The Processor Product Releases section Manufacturers: includes brief overviews of data center products. Do you have a new product that data center/IT managers would be interested in learning about? All products listed have been released recently, so use this section to get Send your press release or product information up to date with what’s new on the market and to find products you need. to [email protected]. PHYSICALINFRASTRUCTURE standards-based PoE- and PoE+-compliant NETWORKING & VPN Server Automation 9.1 software, which lets devices, including IP cameras, VoIP phones, users provision physical and virtual appli- ■Access Cable Trays and wireless access points. Perle PoE Media ■Attachmate Reflection cation instances across the entire life cycle. ACT/FloorFlex System Converters support auto-negotiation, auto- For The Web 2011 R1 Raised flooring is essential to today’s MDIX, link pass-through, fiber fault alert, Attachmate announced Reflection for the ■HP Hybrid Delivery Environments data centers, switch rooms, and offices. That and loopback for improved troubleshooting Web 2011 R1, a tool designed to help com- & Cloud Services doesn’t mean, however, that it has to be dif- and lower maintenance. panies securely connect local and remote HP introduced new services and ficult. The ACT/FloorFlex System from users to legacy applications on a variety improvements in its hybrid delivery envi- Access Cable Trays is easy to install and sim- ■Siemon VersaPOD of host platforms. The latest version of the ronments, which combine traditional ple to retrofit into existing access flooring, and Siemon announced its new line of product includes features to maximize IT IT infrastructures with private and pub- it’s also a cinch to reconfigure as you need VersaPOD data center cabinets and open flexibility and enhance user productivity lic clouds to get the best of both worlds. to. It’s based on 24- and 48-inch modules to rack systems, which are designed to take and experience, along with support for mul- HP’s new Enterprise Cloud Service – advantage of the vertical space between tiple platforms and browsers. Vulnerability Scanning reduces common cabinets and racks using the company’s security mistakes, while the Enterprise Zero-U accessories. Each VersaPOD sys- ■Black Box Cloud Service – Vulnerability Intelligence tem can support routing for more than PoE L2 Managed Gigabit Switches offering provides information on newly 5,000 cables, and the Zero-U vertical patch Black Box has announced its PoE L2 discovered potential threats. Improvements panels and cable managers can help free up Managed Gigabit Switches, designed for were also made to HP CloudSystem, HP horizontal room converged networks with a mix of wire- CloudAgile, and HP CloudStart, by adding up to less access points, VoIP phones, and 40U of mount- CCTV cameras. The switches carry both ■Infoblox NetMRI ing, cable man- 1,000Mbps Ethernet data and 48-VAC Infoblox has improved its NetMRI agement, and power across twisted-pair wiring to with new network infrastructure automa- patching space. 802.3af-compatible devices. The switches tion capabilities to help accelerate cloud The complete include SFP optical transceiver slots. deployment. New Infoblox automation take full advantage of the standard 2- x 2-foot VersaPOD line features accessible through Infoblox floor panel. The system is optimized for easy includes Zero- ■BMC Software & Unisys NetMRI include dynamic templates, auto- vertical support height adjustment, including U-compatible Advanced Cloud Solutions mation sandbox and customizable tools, stacking, with integrated cable management 1,000mm and BMC Software and Unisys have part- runbook automation, and a blacklist features. And it can put your cables within 1,200mm cabinets and adjustable four-post nered to release and manage advanced option. This solution reflects a combina- 2 inches of the floor surface. For more on this open racks, as well as 600mm cabinets cloud solutions aimed at making users’ IT tion of NetMRI, Infoblox Orchestration product, see page 19. without Zero-U provisions. For more on organizations more responsive and effi- System, and IP address management capa- this product, see page 13. cient where delivering business services bilities in Infoblox Grid technology. ■FieldView Solutions FieldView 4.0 are concerned. The solutions are based ■Staco Energy Products ■ManageEngine EventLog Analyzer 7.0 Aimed at providing administrators a clear on BMC’s second-gen Cloud Lifecycle picture of data center power consumption Tailored FirstLine P & PL UPS Solutions Management solution and Unisys’ cloud The latest release of ManageEngine’s and inefficient power usage, FieldView Standard and optional features help the advisory, implementation, and manage- EventLog Analyzer event and applica- 4.0 is an enhanced data center information FirstLine P and PL tailored three-phase ment services portfolio. tion log monitoring software includes a management system that the company says online double-conversion UPS solutions new agent for log collection, in addition will help effectively manage data center from Staco Energy Products play nice as ■Cisco ASR 9000 Series to agentless log collection capabilities. power usage. The new release gives data they safeguard your data center’s power Aggregation Services Routers EventLog Analyzer 7.0 also now supports center and facilities managers a complete requirements. They’re online double- Cisco announced its line of Cisco ASR RADIUS, Active Directory, and other user view into all aspects of their data centers. conversion units with dual AC inputs and 9000 Aggregation Services Routers, which authentication methods. support for IGBT and DSP. They’re also are designed to give service providers a ■ITWatchDogs I/O Expander highly efficient with laudable power factors, simpler way to architect next-generation ■Oracle Optimized Solution For ITWatchDogs has added an accessory which translate into lower electricity bills Internet tools. The Cisco ASR 9000 series Enterprise Cloud Infrastructure to its line of Series II Environmental moni- and a greener footprint for your organiza- is designed to complement the Cisco Oracle announced the release of Oracle tors with the IOE (Input/Output Expander) tion. The units also feature upstream fil- CRS-3 Carrier Routing System and is Optimized Solution for Enterprise Cloud device. With the IOE, IT staff can increase tering of harmonics and reactive power positioned on the edge of the network. Infrastructure, aimed at helping to acceler- an environmental monitor’s sensor and ate enterprise infrastructure-as-a-service relay output capacity through the addition ■ClearCube Technology Cloud Desktop cloud deployments. The company says of 32 dry contact 0-5VDC analog inputs. 7422 DB9 Digital Fiber PCoIP Zero Client that the system can speed virtual machine & Zero Client Customization Service deployment times by up to 98%, thus low- ClearCube Technology has released the ering TCO and improving productivity for Cloud Desktop 7422 DB9 Digital Fiber enterprises and cloud service providers. Zero Client and Zero Client Customization ■Oracle VM Server For SPARC Service. The company says the 7422 was Users can regulate alarm thresholds for developed upon a request for a DB9 serial Oracle has announced the addition of 0-5VDC signal and open and closed switches. emanating from the powered load. Both connector to connect to peripherals in a Oracle VM Server for SPARC 2.1 to its The three relay outputs allow users to activate models support the use of multiple units in particular environment. The zero client was integrated desktop-to-data-center virtual- auto-dialers, strobe lights, and other external parallel for enhanced protection in aggravat- designed to connect directly to a digital fiber ization portfolio. The Oracle VM Server devices on alarm. The IOE is outfitted with a ed circumstances, and both feature flexible network with an SFP module. Optional fea- for SPARC server virtualization solu- steel rackmount chassis and is powered by a installation options and a two-year full war- tures include a custom case, CAC readers, tion is preinstalled on Oracle’s SPARC 6VDC power adapter. At just $479, the IOE ranty. For more on this product, see page 19. smart card readers, 10/100/1000Mbps fiber T-series servers and allows up to 128 vir- presents a powerful, flexible, and economi- connections, and more. tual machines, or “domains,” on one sys- cal solution for an added layer of monitoring, ■Telect Four-Post tem. It offers live migration capabilities. alarming, automation, and control. For more Adjustable Depth Channel Rack ■ForeScout CounterACT Network Access on this product, see page 13. Telect’s new Four-Post Adjustable Depth Control Virtual Appliance ■Quest Software Total Virtual Data Channel Rack features 12/24 threaded rack- ForeScout launched a virtual appliance Protection & Virtual Infrastructure Assurance ■MovinCool CMW30 mounting holes and includes all the com- version of its CounterACT Network Access Quest Software announced two prod- MovinCool’s new CMW30 cooling ponents needed for installation. Each rack Control solution. The offering lets users man- uct suites designed to protect and manage unit is water-cooled and can be used as a can be adjusted to multiple depths: from age and view any and all devices connect- entire virtualized environments. The suites ceiling-mounted air conditioner for server 20 inches to 36 inches with a smaller ed to enterprise networks in real time. The include Quest Total Virtual Data Protection rooms. It has a cooling capacity of 29,400 bracket and 36 inches to 42 inches with a ForeScout CounterACT Virtual Appliance and Quest Virtual Infrastructure Assurance. BTU/hr for larger rooms and 22,000 BTU/ larger bracket. operates on VMware ESX 3.5 and 4.x. In addition to protecting VMware environ- hr for compute rooms. The CMW30 has a ments, including Microsoft SQL Server, built-in mounting bracket as well as built- ■Thomas & Betts ■HP Converged Infrastructure Platforms Exchange, Active Directory, SharePoint, in flanges and vibration isolators. Catamount Twist Tail Cable Tie HP announced several converged infra- and other applications, the Total Virtual Thomas & Betts Catamount Twist Tail structure platforms designed to streamline Data Protection suite offers recovery capa- ■Perle Systems PoE Media Converters Cable Tie lets installers remove the tail end deployment and accelerate IT delivery. The bilities and includes Quest vRanger and Perle Systems has launched 96 PoE Media of the tie without having to use tools. The new offerings include Converged Systems, the Recovery Manager family of products. Converters, which connect copper to fiber patented design lets the user simply bend and Converged Storage architecture and port- The Quest Virtual Infrastructure Assurance while providing Power over Ethernet to twist off the tail once the cable is installed. folio, Converged Data Center, and the HP suite provides monitoring, storage, and July 1, 2011 Processor.com Page 7 P R O D U C T R E L E A S E S network management tools and includes Storage Manager is powered by Profiler the data as it moves through its entire life- The PowerVault solutions feature eight vFoglight Pro for visibility into VMware and features storage I/O hotspot detection, cycle. Part of the product enhancements allow 8Gbps Fibre Channel ports; the ability to ESX and Microsoft Hyper-V environments. VM-to-physical storage mapping, mul- users of Symantec NetBackup to view a com- hold up to 96 hard drives with additional tivendor SAN and Fibre Channel switch prehensive list of job data at the server, poli- enclosures; and support for remote replica- ■ScaleMatrix Cloud In A Box management, VMware thin provisioning, cy, client, and schedule levels. tion, virtual disk copy, and other data pro- ScaleMatrix unveiled the ScaleMatrix and the Orion Integration Module. The tection tools. Cloud in a Box, which allows compa- SolarWinds Virtualization Manager and ■Business Intelligence Associates nies to deliver public, private, or hybrid Storage Manager are currently available TotalDiscovery.com ■Dot Hill AssuredSAN 3000 Series clouds in hours rather than days or weeks. starting at $2,995 apiece. Business Intelligence Associates released Dot Hill announced that its AssuredSAN ScaleMatrix Cloud in a Box combines the TotalDiscovery.com, a SaaS eDiscovery 3000 Series storage arrays now support 3TB 3Tera AppLogic cloud platform from CA ■Talend Cloud application designed to give users better hard drives, meaning the 2U storage solution Technologies with ScaleMatrix’s hard- Talend announced the release of visibility into data needed by legal for case is able to provide up to 36TB of capacity. ware solutions to deliver on-premises pri- Talend Cloud, a cloud-enabled integra- development. Features include BIA’s Data Along with the expanded storage capabili- vate clouds. tion platform for cloud and hybrid IT Profiler; automated identification, collection, ties, the series also comes with an enhanced environments that provides a common and delivery of data; minimal setup; and high- version of the company’s AssuredRemote ■Silver Peak Systems NX-10000 environment for users to manage the ly secure data preservation and transfer. replication features, which now include new The NX-10000, or NX-10K, from Silver entire life cycle of integration process- wizards and scheduler improvements to fur- Peak Systems is a WAN optimization appli- es, including a graphical development ■Cabinet NG CNG-WEB ther enable disaster recovery protection and ance that supports up to 2.5Gbps of WAN environment, a deployment mechanism, Cabinet NG announced enhancements to business continuity. throughput with 256,000 concurrent ses- and a runtime environment for opera- its CNG-WEB product, which is an optional sions, the company says. Targeted toward tions. Talend Cloud is an extension of module available for the company’s CNG- ■Imation RDX A8 next-gen data centers, the NX-10k boasts the company’s recently released Unified SAFE product. CNG-WEB helps users man- The RDX A8 is the latest hard disk stor- four 10 Gigabit Ethernet interfaces and is Integration Platform. age and file documents on a premises-based age library in Imation’s line of networked optimized for all IP traffic and applications. server or online in a hosted environment. storage devices. It can hold up to eight of the STORAGE CNG-WEB supports viewing, creating, edit- company’s hard drive-based RDX remov- ■SolarWinds Virtualization Manager ing, routing, and scanning documents. able cartridges, which come in capacities of & Storage Manager ■Addonics Blu-ray/DVD DigiCopier up to 1TB each. Targeted toward the SMB SolarWinds unveiled its new Virtual- Addonics Technologies has released a ■Dell EqualLogic FS7500, market, the RDX A8 can be set up for tape ization Manager and Storage Manager solu- new standalone optical disc duplicator capa- Compellent Storage Center SAN emulation or in a JBOD mode. It’s scalable, tions, which let users manage the server ble of copying unprotected BDs, DVDs, and & PowerVault MD3600f/MD3602f and its iSCSI connectivity allows for an easy virtualization layer and optimize storage CDs without the need for a PC. Pricing for Dell has announced three new storage fit into a business network. Sequential transfer performance and capacity for virtualization. the Blu-ray/DVD DigiCopier ranges from solutions: the Dell EqualLogic FS7500, speeds of 75MBps make it suitable for back- SolarWinds Virtualization Manager lets $459 for a product capable of duplicating of the Compellent Storage Center SAN, and ups, the company says. Imation’s distributors users map dependencies and perform foren- one disc at a time to $2,359 for a model that the PowerVault MD3600f/MD3602f. The are currently selling the RDX A8 for $3,395. sic troubleshooting and historic problem can make 11 copies at once. EqualLogic can file-share up to 510TB of analysis, use vSphere Plugin to perform data, supports scale-out CIFS and NFS, and ■NetApp OnCommand virtualization management tasks directly ■Bocada Prism uses Dell’s new EqualLogic software ver- NetApp has announced new technolo- from the VMware vCenter inventory, and Bocada has updated its Prism data pro- sion 5.1. The Compellent Storage Center gies within its OnCommand management support storage and network I/O in capac- tection management suite, adding enhanced SAN is a 16Gbps Fibre Channel solution software for controlling, automating, and ity planning to help efficiently budget and reporting to provide a clear view into the per- built to support the newest applications analyzing a shared storage infrastructure plan for new purchases. The SolarWinds formance of duplication jobs while tracking as well as cloud-based environments. Go to Page 8 Program Details (cid:114)(cid:1) Trade in one old PDU regardless of brand for one new Cyber Switching PDU at a discounted price (cid:114)(cid:1) $100 discount on ePower, $75 on Dualcom S, $50 on Dualcom Plus, and $25 on E Series PDU models (cid:114)(cid:1) All Cyber Switching units are brand new, 100% factory-tested and calibrated with full manufacturer standard warranty (cid:114)(cid:1) One discount per trade-in for each new Cyber Switching PDU purchased with no trade-in limit (cid:114)(cid:1) FREE return shipping of old PDU(s) - certain limitations may apply (cid:114)(cid:1) FREE environmentally-friendly disposal of your old PDU(s) once returned to Cyber Switching To get started, please contact: [email protected], (888) 311-6277, or visit www.cyberswitching.com/cashforclunkers. Page 8 Processor.com July 1, 2011 P R O D U C T R E L E A S E S Continued from Page 7 transfer rates of up to 500MBps (four-bay) or and reliability in an affordable package that is aimed at producing greater optimization 750MBps (eight-bay). optimized for their business needs. ■Polycom UC Intelligent Core Software and efficiency. OnCommand has four fun- & OTX 100 damental elements that compose a cloud: ■Xiotech Hybrid ISE ■Stonesoft StoneGate Mass Security Polycom introduced its UC Intelligent service catalog, service analytics, automa- Xiotech announced the general availabil- Stonesoft’s new StoneGate Mass Security Core software, a unified communica- tion, and self-service. ity of its Hybrid ISE platform, which com- solution features easy plug-and-play installa- tions platform that lets users deploy up to bines SSDs and HDDs using its application- tion and a firewall wizard, as well as support 75,000 devices, from mobile devices to ■Netlist Mini PCI Express SSD aware Continuous Adaptive Data Placement for redundant connectivity using Multi-Link. room-based telepresence offerings. Other Netlist has expanded it embedded flash technology. With the Hybrid ISE platform, StoneGate Mass Security can be used in features include intelligent load-balancing, portfolio by adding the Mini PCI Express admins can deploy thousands of virtual conjunction with Stonesoft’s new StoneGate simplified administration, lower total cost SSD, which offers a smaller form factor, up desktops cost-effectively with high perfor- Express Firewall appliances to increase of ownership, and redundant auto-failover. to 128GB storage with MLC flash, and up to mance and rapid boot-up times. It also helps security at remote offices. Polycom also launched Polycom OTX 64GB of SLC flash. The SSD is ideal for data to eliminate I/O bottlenecks for any I/Ops- 100 for immersive telepresence in smaller ■Tenable Nessus Vulnerability Scanner center servers, networking, storage equip- intensive applications. deployments, the cloud-based Accordent For Android ment, and other embedded purposes and is Media Management System 4.5, the PCI-E 2.0 compatible, supports DDR ONFI ■Xyratex ClusterStor 3000 Tenable announced its new Nessus Vul- cloud-based Accordent Capture Station 2.2 flash, and has bi-directional transfer rates Xyratex announced the ClusterStor 3000, nerability Scanner, a mobile application 5.1, and the Polycom SoundStructure reaching 5GTps (giga-transfers per second). a high-performance Lustre storage solution designed for Android devices. The new app VoIP Interface. designed for HPC users. The ClusterStor allows users to schedule scans and view ■NovaStor NovaBACKUP xSP 12.1 3000 includes scalable storage units with recent reports via remote connection to their ■TIBCO Software TIBCO Web Messaging & Remote Workforce 12.1 high-capacity density and bandwidth. company’s Nessus servers and gives IT TIBCO Software announced its new NovaStor announced NovaBACKUP xSP ClusterStor’s scale-out storage architecture managers an easy way to manage vulnerabil- enterprise-strength messaging solution 12.1 and NovaBACKUP Remote Workforce enables configurations with terabytes to tens ity scans when away from the facility. for mobile and Web applications, TIBCO 12.1. NovaBACKUP xSP is a public cloud of petabytes of storage and from 2.5GBps to Web Messaging. The solution allows backup platform specifically designed for 1TBps of actual file system throughput. MESSAGING & TELEPHONY organizations to service the growing MSPs that features FastBIT 3 technology demand for information via mobile and for faster transfer rates and allows IT pro- SECURITY ■Cisco TelePresence Portfolio Web channels with as much as 500 times fessionals to view and manage multiple cli- Enhancements lower Web overheads compared to tra- ent installations from one central console. ■Application Security DbProtect 6.3 Cisco introduced a number of new tele- ditional HTTP. The end result leads to NovaBACKUP Remote Workforce 12.1 is a Application Security announced enhance- presence products and enhancements as improvements in performance and reduced private cloud solution for SMBs designed to ments to its DbProtect platform. Version 6.3 part of its collaboration portfolio designed total cost of ownership, the company says. provide constant data availability. It protects includes the ability to block real-time attacks to give customers new ways to simply, company data that is sent over the Internet, and unauthorized activity, quarantining quickly, and cost-effectively scale telepres- ■VBrick Systems VEMS Mystro supports Microsoft Exchange 2010, and accounts that behave inappropriately while ence throughout their organizations. The VBrick Systems announced VEMS includes multiple administration tools for immediately alerting appropriate person- new products and capabilities are designed Mystro, a new version of its enterprise easy backups and management. nel of the violation. In addition, DbProtect to enable “any-to-any” interoperability media management system designed to now includes rights management support for between Cisco TelePresence endpoints and make video accessible, personal, and ■Open-E Data Storage Software V6 DB2 and Sybase environments, as well as any standards-based devices. One example scalable and thus remove some of the Enhanced language support has been Oracle Database and Microsoft SQL Server. of the new products is the MX200, which is barriers to enterprise IP video adoption. added to Open-E’s Data Storage Software. ideal for team meetings or personal offices The solution is geared toward corporate, Previously available only in English, DSS ■Check Point Software Technologies and priced so that customers can telepres- educational, healthcare, and governmen- is now available to Russian- and German- ZoneAlarm ence-enable many rooms in their organiza- tal environments and features a user- speaking users. The software has been The latest version of the ZoneAlarm tions. The endpoint can be set up with auto- definable application experience, unified updated with both language packs, which security suite from Check Point Software provisioning and can be up and running in administrative interface, and common are available with the latest release. The new Technologies includes advanced antivi- as little as 15 minutes. The MX200 has a video distribution infrastructure. Mystro release also features usability improvements rus capabilities. The program uses the list price of $21,600. is a modular media management that can and enhanced hardware compatibility. ZoneAlarm DefenseNet cloud-based antivirus combine video broadcasting, videocon- tool and includes featured such as Private ■Intermedia Virtual Receptionist ferencing, collaboration tools, and social ■PMC Tachyon PM8008/PM8018 SPCv Browser mode, DataLock hard drive encryp- Intermedia released its Virtual Recep- media for collaborative broadcasts. A PMC-Sierra has unveiled two new high- tion, SocialGuard Facebook security, and tionist for call routing and phone man- widget-based streaming design lets users performance SAS/SATA protocol con- identity protection services, all designed to agement. Primary features include call embed IP video into essentially any com- trollers for SSD deployment. The 8-port protect across multiple layers. response for local and toll-free calls, inte- munications environment. PM8008 SPCv and 16-port PM8018 SPCv grated voice menu, flexible scheduling, support the 6Gbps SAS 2.1 spec as well as ■NitroSecurity NitroView 8.5 customizable greetings, and online admin- SERVERS the T-10 (INCITS) data protection scheme. NitroSecurity has released a version of istration. Virtual Receptionist can also The PM8018 can exceed 750,000I/Ops, NitroView that incorporates new capabilities route calls across departments to ensure ■Lenovo TS130 & TS430 PMC says. Both PCI-E 3.0-based cards are that improve real-time visibility and Smart calls are always answered quickly. Lenovo announced two new additions available now. Grid data analysis for infrastructure secu- to its ThinkServer product line, the TS130 rity. NitroView version 8.5 features support ■Nuance Communications Dragon and TS430. Both servers feature Intel ■Raxco PerfectDisk 12 for electronic serial numbers, direct log and NaturallySpeaking 11.5 Xeon processors and active management Raxco Software has announced that ver- even collection from Smart Grid devices Version 11.5 of Nuance’s popular speech technology. The TS130 includes enter- sion 12 of its PerfectDisk drive optimizer is such as metering systems, support for spe- recognition software for the PC adds fea- prise-class storage and support for remote enhanced to save energy, reduce fragmenta- cialized industrial security devices, direc- tures aimed at making it easier to create management, and the TS430 features tion, and improve disk I/O for SSDs, virtual tion monitoring within NitroViewADM and documents, send emails, surf the Web, room for 16TB of hot-swappable storage. drives, and thin-provisioned hard drives. It NitroGuard IPS, and expanded NitroView share social status, and interact with proactively prevents file fragmentation from Receiver collection capabilities. PC-based applications. According to ■SGI Nvidia Tesla 20 Series GPUs occurring in the first place while minimizing the company, the new version includes SGI announced availability of the lat- free space fragmentation, the company says. ■Oracle Entitlements Server 11g enhanced commands and social network- est Nvidia Tesla 20 Series GPUs in all Oracle has announced Entitlements ing features, including the ability to search of its server product lines. New Nvidia ■Riverbed Technology Riverbed Whitewater Server 11g, a component of Oracle Fusion or post to Facebook, Twitter, or other sites. products, including the Tesla M2090 Riverbed Technology introduced three Middleware 11g that offers a scalable, V11.5 also adds improved formatting and and the NextIO vCORE Express 2090, new Riverbed Whitewater cloud storage externalized authorization management editing, and a new Dragon sidebar helps along with the CUDA Toolkit 4.0, will gateway models designed to optimize data solution for applications, middleware, and users find and remember common com- be available in the Altix UV, the Altix protection. The new Whitewater 510 and databases. The release also gives devel- mands. In conjunction with the new release, ICE 8400, Rackable, and SGI Prism XL 710 models are purpose-built for SMBs, opers shared services for authorization to Nuance has also launched Dragon Remote server systems. while the Whitewater 2010 model is de- ensure faster compliance and the agility to Mic, which turns your Apple device into signed for the midsized enterprise and quickly adapt policies as markets, regula- a wireless microphone that can control PC CLIENTS targeted use cases in the large enterprise. tions, and requirements change. applications via Wi-Fi. Riverbed also offers a virtual version of its ■Actuate Xenos Enterprise Server 3.0 cloud storage gateway for data protection. ■SpamTitan Technologies ■Nuance Complete Care Actuate has released the latest version SpamTitan On-Demand Nuance has made available its inbound/ of its Xenos Enterprise Server output man- ■Sans Digital SpamTitan Technologies announced the outbound multichannel product for custom- agement software. Built to simplify work- TowerRAID TR4X+(B) & TR8X+(B) release of SpamTitan On-Demand, a cloud- er care call centers. Complete Care offers flow and reduce operational costs, Xenos The new TowerRAID TR4X+(B) and based version of its SpamTitan antispam a “coherent, intuitive customer experience Enterprise Server 3.0 supports traditional TR8X+(B) from Sans Digital are 6Gbps and antivirus virtual appliance. SpamTitan across service channels.” This solution is batch print output as well as transactional, SAS/SATA storage towers that support four On-Demand gives companies all the ben- designed to provide customers with smarter multichannel electronic document pro- and eight drives, respectively. Both are also efits of SpamTitan without the cost of deploy- automated conversations, reduce the num- duction. Xenos ES 3.0 integrates with available bundled with HBAs, which pro- ing local resources or virtualization software. ber of inbound calls, and offer a step-by- Actuate’s ActuateOne business intelli- vide RAID and hot spare features along with SMBs receive high availability, performance, step unified customer experience. gence platform. July 1, 2011 Processor.com Page 9 P R O D U C T R E L E A S E S caching (speeds up database response internal storage and the other with 32GB. ■Datacard CardWizard times), auditing (advanced reporting and The TouchPad uses HP’s webOS and ■Planar d82L Datacard Group announced the release real-time alerts to help enforce compli- can interact with webOS phones, as well. Planar announced the release of the of Datacard CardWizard version 5.3.2 Multiple accessories are available, includ- Planar d82L with AccessChoice, which instant issuance software designed to ing a charging dock, a wireless keyboard, is the firm’s latest slim 82-inch profes- support multiple hardware devices such and a case. sional-grade full-HD LCD optimized as card printers, embossers, PIN entry for space-constrained conference rooms, ■Oracle Enterprise devices, and encoders. The software is control rooms, and signage applica- Taxation & Policy Management 2.3 now fully integrated into the Datacard tions. Features include rack-mountable FP65i financial card printer; features Oracle released Enterprise Taxation electronics; HDMI, VGA, DVI In/ include high security and cost-effective ance policies), and masking (mask per- and Policy Management 2.3, a secure Out, Component Video, and HD-SDI instant card issuance. sonal identity information and credit commercial platform that lets tax and ports; and support for landscape or por- card numbers) modules in one package. revenue authorities optimize revenue trait orientation. ■dtSearch 7.67 Features in Enterprise Edition include collection. The new end-to-end tax and dtSearch announced a new version a database firewall engine that offers revenue management solution is capa- SERVICES of the dtSearch enterprise and devel- real-time protection against internal ble of automating appeals, audit, bank- oper text retrieval software product and external threats, including SQL injec- ruptcy, and suppression to enable faster ■ASG Software Solutions line. dtSearch products offer more than tion attacks, before-and-after change and lower-risk implementations. visionapp CloudFactory 25 fielded and full-text search options. logs, active database monitoring, vir- ASG Software Solutions announced dtSearch’s file parsers highlight hits in tual patching, and real-time data mask- ■Oracle JDeveloper the release of visionapp CloudFactory, popular file types, emails, and nested ing. The software-based platform can be Oracle has announced the release of a tool that’s designed to allow com- installed on enterprise networks, cloud a new version of Oracle JDeveloper, panies to quickly and easily build computing environments, and hosted which includes updates to the Oracle private, hybrid, or public cloud struc- platforms. For more on this product, see Application Development Framework. tures on a uniform platform, be it at page 39. Oracle JDeveloper 11g Release 2 in- their own facilities or in a third par- cludes the following updates and addi- ty’s. CloudFactory consists of three core ■HP Pavilion tional capabilities: support for JavaServer modules called CloudShaper, Cloud- & ProBook Notebooks Faces 2.0 and Facelets standards; updated Robot, and CloudCockpit. attachments. A built-in Spider supports HP announced 11 new notebooks that ADF JavaServer Faces Rich Client Com- static and dynamic Web data. Developer feature AMD’s VISION Technology, ponents (with interactive thematic ■CoreVault product offers 64-bit/32-bit Windows/ including the new Pavilion dv-series, maps); infrastructure changes for OSGi VMware vCloud Powered Hosting Linux C++, Java, and .NET (through designed for entertainment; the Pavil- tooling; a new Oracle ADF Faces CoreVault has announced the release 4.x) APIs, including support for SQL ion g-series, designed for productivity; visual CSS editor; and enhanced sup- of its VMware vCloud Powered Host- data and others. For more on this prod- and the ProBook b-series and s-series. port for RESTful Web Services, Maven ing service, a cloud hosting service uct, see page 31. Each notebook uses AMD’s VISION build process, and Hudson continuous designed with the stringent security technology to improve high-definition integration server. The new JDeveloper needs of cloud computing in mind. Fea- ■GreenSQL Enterprise Edition graphics and videos. 11g release is designed to help boost tures include compliance with HIPAA, GreenSQL has released an Enterprise the productivity of developers, with Sarbanes Oxley, and PCI; hosting on Edition of its all-in-one Unified Database ■HP TouchPad tools and capabilities that are essen- CoreVault’s SAS 70 Type II facility; Security software that combines security HP released two models of its Wi-Fi- tial to enabling the creation of the and availability as an individual service (monitor, alert, and blocking abilities), enabled TouchPad, one with 16GB of Web applications. for SMBs. Page 10 Processor.com July 1, 2011 Detecting Vulnerabilities Continued from Page 1 In general, businesses could use vulner- “Penetration tests are usually per- may or may not have the skills on staff to non-persistent temporary elements, col- ability scanners to measure their risk level, formed by security testing experts,” perform the tests,” he says. “Many levels lecting state information in real time. says Karl Snider, manager of software as a Snider says. “Often an SMB does not of compliance, such as PCI, will dictate Agents provide information about the service and cloud at IBM Rational (www have this expertise available in-house, so the frequency of these tests. It is, however, end point that cannot be determined .ibm.com). “Vulnerability scanners will they will contract with external consul- common for organizations to have quar- remotely, such as applications or ser- identify potential risks and provide enough tants to perform this activity.” According terly assessments and detailed tests upon vices that are installed but not running information to allow the SMB to mitigate to Snider, using an external consultant new software releases.” or changes in files or configuration. or eliminate the risk of attack and data can also allow an SMB to meet third- Application security test tools are very Kavanagh says persistent agents can loss,” Snider says. “A good practice is to party validation requirements. powerful. “They should only be used by be used only on devices that are known assess vulnerability when an environment Web application vulnerability tests trained staff and should only be used to focus specifically on Web applications. assess sites that the SMB has authority to “Some security organizations will con- scan,” Snider says. “Application security “A good practice is to assess sider application vulnerability testing to be testing can have adverse affects, such a portion of a complete penetration test,” as placing a high load on an application vulnerability when an environment is Snider says. “Web application vulnerabil- server and insertion of test data into pro- ity tests are designed to uncover vulnera- duction databases.” bilities that are introduced by the presence Snider continues, “If an application is initially deployed and then rescan the of Web applications.” not robust, it is also possible to cause an Although Web application vulnerability application to crash during the applica- environment periodically.” tests can be performed by security experts, tion testing. For these reasons, a best automated tools are highly recommended practice is to only use application secu- - IBM Rational’s Karl Snider to support the large number of tests across rity testing tools against copies of live the entire Web application, Snider says. applications, and not against the produc- “As with penetration testing, the SMB tion applications themselves.” P and managed, and, thus, the vulnerabil- is initially deployed and then rescan the ity assessment product must be able to environment periodically.” discover and report previously unknown, The frequency of scanning depends Uses For Vulnerability Assessment unmanaged devices. When non-persis- on how often an environment changes or tent agents are supported by the vulner- should change. “For example, infrastruc- Kelly Kavanagh, principal research analyst at Gartner, says vulnerability assessment technolo- ability assessment product, they can be ture scanning should occur daily as sys- gies will typically be used to: deployed to discover unmanaged devices tems and components can be changed on a (cid:114)(cid:1) Establish a baseline of, and changes to, vulnerability conditions for network-attached and provide deeper inspection capabilities. daily basis,” Snider says. “Software appli- devices, applications, and databases, and provide ongoing vulnerability status and In environments where persistent agent cations should be rescanned after every trending over time deployment is not feasible, non-persistent change, upgrade, or patch.” agents can be deployed to managed devic- (cid:114)(cid:1) Report on compliance with security configuration policy Penetration Testing Simplified es, Kavanagh notes. (cid:114)(cid:1) Generate reports with content and format to support specific compliance regimes and Most vulnerability assessment deploy- A “penetration test” typically refers control frameworks ments rely on active network scanning, to a style of testing that investigates Kavanagh says, and there is little demand the overall security of computer sys- (cid:114)(cid:1) Discover unmanaged devices or applications on networks for products that employ only agent- tems, applications, and the underlying (cid:114)(cid:1) Support vulnerability remediation by operations groups with information and based or passive techniques. “However, network environment using a variety recommendations for workarounds, patches, and workflow, and through integration with there are typically areas in larger IT envi- of tools and techniques, Snider says. patch management systems ronments that benefit from these tech- Such tests are often thorough and labor- niques, and Gartner recommends that intensive and are typically employed (cid:114)(cid:1) Prioritize remediation activities through risk ratings of vulnerabilities and assets security-conscious enterprises use a com- at key points, such as the release of a (cid:114)(cid:1) Support shielding or mitigation activities through integration with protection technologies bination of two of the three described mission-critical business application, or such as an IPS or a Web application firewall techniques for comprehensive coverage,” to support a quarterly or annual compli- Kavanagh says. ance objective. Are You Ready For IPv6? Continued from Page 1 In many cases, preparing for this transi- done gradually.” He describes the result- It seems that there are some pockets of tion requires an investment in equipment. ing network environment as “islands of IPv6 adoption around the world. “Many Migrating To IPv6 Enterprises must take stock of the equip- IPv6 connected to the IPv4 network. For educational institutions in the U.S. and Patrick Bedwell, vice president of prod- ment in their data centers and network clos- many enterprises, the challenge isn’t how abroad are IPv6 ready, enabled, and uct marketing at Fortinet (www.fortinet ets and determine whether it is possible to to upgrade to IPv6 but how to manage and active,” says IBM’s Warfield. He reinforc- .com), sums up the scope of the prob- use it in an IPv6 environment. “To support interconnect the islands of IPv4 and IPv6.” es that the phased migration is the most lem well. “With the recent exhaustion of the new standard, most devices will require common approach taken by those enter- Slow To Adopt unassigned IPv4 addresses, networks of an update to support IPv6 as well as IPv4,” prises that are adopting IPv6. “I doubt you every size and shape need to prepare for Bedwell says. Unfortunately, he points out, There are differing opinions on the will find many who have made a complete the coming IPv6 migration,” he says. “In although many products have firmware progress we’ve made toward the IPv6 transition to IPv6, as it would make little short, this means that every device that updates that enable IPv6 support, there is transition. From ARIN’s point of view, the sense to do so,” he says. connects to an IP network will need to still quite a bit of legacy equipment in use migration is moving along well. “There Although IPv6 has been around for support IPv6 in the near future, as content today that simply has no upgrade path. are literally thousands of enterprises work- more than a decade, recent events make and service providers begin to transition According to Michael Warfield, senior ing on deployment of IPv6,” Davis says. it more likely that enterprises will begin more of their infrastructure to IPv6.” researcher with the X-Force threat analysis “We know that globally more than 6,000 to take migration seriously. As the issue One of the most common strategies team at IBM Security Services, “The largest organizations have requested and received gains momentum, we’re likely to see large adopted by organizations planning an barrier to IPv6 transition is staff training,” he allocations of IPv6 address space.” portions of the Internet begin to support IPv6 migration is to run IPv6 alongside of says. Many network engineers have careers However, 6,000 organizations is a drop the newer protocol. P IPv4. This allows users to access resources spanning several decades that took place in the global Internet bucket. On top of on the organization’s network via IPv6 exclusively in an IPv4 environment. As that, the fact that an organization has IPv6 Adoption without restricting access by IPv4 clients. enterprises migrate to IPv6, these engineers received an IPv6 allocation doesn’t nec- ARIN (American Registry for Internet will need to upgrade their skills, requiring an essarily mean that it has actually done Proves Sluggish Numbers; www.arin.net), the regional investment in training and education. anything with it. Sonus’ Konrad thinks IP address assigning authority for North Concerns about equipment upgrade that the picture isn’t quite so rosy. “The Thus Far America, endorses this approach. costs and the available IPv6 talent pool reality is that very few enterprises have According to Nate Davis, ARIN’s COO, may drive organizations to adopt IPv6 in seriously looked at IPv6 migration strate- The Computing Technology Industry Asso- “Today, the Internet is based predominant- a phased approach, bringing parts of the gies,” Konrad says. “This is mostly due to ciation recently announced the results of ly on IPv4. For the foreseeable future, the network online as equipment comes due the fact that within their borders, they run its Business Confidence Index survey. The Internet must run both IP versions, IPv4 and for routine replacement. Mykola Konrad, legacy IPv4 equipment and still have suf- 400 IT shops responding to the survey were IPv6, at the same time.” He underscores the director of enterprise product management ficient addresses available for their needs.” asked specifically about what steps they’ve importance of acting quickly, adding that at Sonus Networks (www.sonusnet.com), However, he thinks that the recent exhaus- taken to prepare for IPv6. At this point, only “Deployment is already underway. Today agrees, adding that “In most enterprises, tion of IPv4 address space, combined with 21% of organizations have upgraded their there are organizations attempting to reach the transition to IPv6 will not be done in the increased use of mobile devices, will networks to support IPv6 and 31% have other organizations’ mail, Web, and applica- one fell swoop. Instead, like most sig- lead to a trend of enterprises migrating to done nothing at all. tion servers via IPv6.” nificant technology migrations, it will be IPv6 over the next four years.

See more

The list of books you might like

Most books are stored in the elastic cloud where traffic is expensive. For this reason, we have a limit on daily download.