Thursday, February 28, 2013

10 network virtualization, SDN and data center companies to watch

  Do enterprise security teams want "Big Data Security"? | West Virginia auditor blasts Cisco, state for "oversized" router buy
 
  Network World Network Architecture

Forward this to a Friend >>>


10 network virtualization, SDN and data center companies to watch
After years of venture capital and start-up focus on consumer-focused tech companies, enterprise networks and the data center are back in vogue. Read More


WHITE PAPER: Ixia Anue

The Evolving Visibility Challenge
Network monitoring has become more complex over the last few years, due in large part to virtualization and convergence. Learn how a state-of-the-art monitoring system that maximizes your existing monitoring tool investment can help you attain greater visibility into your network without adding complexity. Say goodbye to virtual blind spots. Learn More

WHITE PAPER: Riverbed

Steelhead Cloud Accelerator Solution Brief
Learn how enterprises must tackle these challenges for SaaS applications to remain a viable option. Read now.

Do enterprise security teams want "Big Data Security"?
A big theme at the RSA Conference this year is a concept known as Big Data Security -- the idea that massive amounts of data related to both network security and of business context should be stockpiled to be analyzed to pinpoint malware, rogue insiders and stealthy attacks aimed at stealing sensitive data. Read More

West Virginia auditor blasts Cisco, state for "oversized" router buy
West Virginia wasted millions in federal grant money when it purchased 1,164 Cisco routers for $24 million in 2010, a state audit concluded. Read More


WHITE PAPER: AccelOps

BYOD Monitoring Strategies solution brief
This solution brief highlights how AccelOps' integrated security, performance and availability monitoring software allows you to confidently and securely support mobile device access to sensitive corporate IT resources. Read Now

Juniper's "device fingerprinting" security technology gets mixed reviews
Detection and blocking of security threats against organizations often is done through IP address-based methods and reputation services, but Juniper this week launched an effort to encourage security managers to abandon IP-based detection in favor of the "device fingerprinting" its security gear now supports to pinpoint devices used in online attacks. The idea is getting mixed reviews so far. Read More

It's an unstructured world and Rackspace wants to play in it
Databases and the information in them used to be simple, but not any more. Not all data fits into neat spreadsheets and SQL databases. Hence, the rise of NoSQL databases to handle this mass of unstructured data. Read More


WHITE PAPER: Silver Peak Systems, Inc.

ZLTO Meets 5 Minute RPO with Silver Peak and Dell EqualLogic
When faced with their EqualLogic replication not completing due to limited WAN bandwidth and consistently missing their RPO, ZLTO needed a solution. Learn how using Silver Peak's virtual appliances reduced their bandwidth used for replication by 86%. Learn more.

Review: Office 365 turns up the heat
Latest blend of Exchange, SharePoint, and Lync servers in the cloud combines an excellent feature set with easier setup and management Read More

Cisco, EMC data center coalition feels on solid ground
VCE looking ahead as market leader in converged infrastructure despite competitive strain between founders Read More

Cloud security forecast: Murky with an 80% chance of finger pointing
Despite the best efforts of cloud service providers and industry groups like the Cloud Security Alliance, cloud security remains a troublesome issue for IT execs. Read More

Juniper Networks tried to sell enterprise assets: report
Juniper Networks (NYSE: JNPR) reportedly shopped around its enterprise assets to rivals last year but found no takers for properties such as the NetScreen security business it acquired in 2004. Read More

 
 
 

SLIDESHOWS

10 tech company social media bloopers

Social media blunders are nothing new, and the technology industry is not immune to them.

JOIN THE NETWORK WORLD COMMUNITIES

As network pros you understand that the value of connections increase as the number of connections increase, the so called network effect, and no where is this more evident than in professional relationships. Join Network World's LinkedIn and Facebook communities to share ideas, post questions, see what your peers are working on and scout out job applicants (or maybe find your next opportunity).

Network World on Facebook

Network World on LinkedIn

MOST-READ STORIES

1. Juniper Networks tried to sell enterprise assets: report

2. 10 network virtualization, SDN and data center companies to watch

3. 10 LinkedIn tips to boost your networking success

4. Forrester: 70% of 'private clouds' aren't really clouds at all

5. Android phone blasts into space aboard satellite

6. West Virginia auditor blasts Cisco, state for 'oversized' router buy

7. iPhone 6 rumor rollup for the week ending Feb. 22

8. Hottest products at RSA Conference 2013

9. 14 dirty IT tricks, security pros edition

10. Hottest products at Mobile World Congress 2013

 

Do You Tweet?
Follow everything from NetworkWorld.com on Twitter @NetworkWorld.

You are currently subscribed to networkworld_network_architecture_alert as networking.world@gmail.com.

Unsubscribe from this newsletter | Manage your subscriptions | Subscribe | Privacy Policy

If you are interested in advertising in this newsletter, please contact: bglynn@cxo.com

To contact Network World, please send an e-mail to customer_service@nww.com.

Copyright (C) 2013 Network World, 492 Old Connecticut Path, Framingham MA 01701

** Please do not reply to this message. If you want to contact someone directly, send an e-mail to customer_service@nww.com. **

 

No comments: