Archive for November 2015

One of the quotes that Albert Einstein is credited with is: “The definition of insanity is doing the same thing over and over again and expecting different results.” If that is indeed how insanity is defined then there is no part of IT that is more insane than the corporate WAN. I’ll explain why I say that below.

In a broad partnership, the networking and mobility giants team on R&D, customer service, network management, multivendor systems, and more.

I believe it was at Cisco Live 2014 that then Cisco CEO John Chambers said the industry would see “brutal consolidation” as vendors look to grow their portfolios to address the needs of an increasingly complex technology landscape. Today, with rising trends such as mobility, cloud, software-defined networks, network functions virtualization, and big data, that complexity is unquestionably at an all-time high — and that’s driving a definite need to deliver end-to-end, turnkey solutions that let customers deploy technology faster.

Winning in the digital era is predicated on speed. If an organization can move fast, it can capture share quickly and leapfrog the competition. Those that take too long to react to business opportunities will fall behind and join the likes of Radio Shack, Circuit City, and other companies that couldn’t make the shift to digital.

Prior to the Thanksgiving break, Check Point Software posted this blog alerting security professionals to the dangers of something called “web shells”. While web shells have been around for a few years it seems the awareness of what they are and how they operate is still relatively low so I thought I would take the time to explain what the threat is.

Web shells are scripts or executable software that can be uploaded to an unprotected server and then opened from a browser to give cyber criminals a web based interface to run system commands.  A web shell can be thought of as a backdoor into the system that can be run from a browser.  For any particular web server, the web shell script must be in the same programming language that the server is running on.  Examples of this are php, asp, jsp, perl, Ruby, Python or Unix. So if a server is running Python, the web shell must also be in Python.

The market for enterprise communications tools continues to heat up.

This week, France-based company Atos Origin announced it is acquiring Unify for $371 million ($340 Euro) to move into the enterprise unified communications market. For those not familiar with Atos, it is one of the larger European-based IT service companies.

This week, Juniper is holding its “NXTWORK 2015” customer summit in Silicon Valley. At the event, Juniper made a number of data center announcements. These announcements come about a month after Juniper rolled out its “Unite” architecture aimed at the enterprise campus (disclosure: Juniper Networks is a client of ZK Research). While the two announcements are aimed at different parts of the network, there is a common focal point, and that’s helping businesses build networks that are cloud-ready. The Unite architecture was focused on simplification, whereas Juniper’s play in the data center is more about customer choice and automation.

Earlier this year the most recent ZK Research – Tech Target Network Purchase Intention Study was conducted.  The survey revealed that securing mobile devices represents the top security challenge for businesses.  The survey also showed that 25% of businesses now want to purchase security using an “as a service” model to simplify the deployment and on going management of security technology.

Check Point Software now can kill both of these birds with a single stone.  Earlier this year, Check Point acquired an Israeli based security company called Lacoon for $8 million.

Lacoon enhances Check Point’s mobile security and BYOD solution, Capsule, which is an alternative mobile device management (MDM) and mobile enterprise management (MEM) offering. Capsule offers core MDM capabilities such as remote wipe but also advanced features such as malware protection, segregation of business and personal data, mobile DLP and other features critical for scalable BYOD.



Insight and Influence Through Social Media
ZK Research: Home
Google+
Twitter
LinkedIn
Facebook
RSS Feed
ZK Research is proudly powered by WordPress | Entries (RSS) | Comments (RSS) | Custom Theme by The Website Taylor