article thumbnail

Overcoming the Equation: Security = Friction

CTOvision

Wait, that might be vulnerable to a comic book dictionary attack (bonus points for Superman fans), so let’s add some numbers and special characters: M4xyZ!ptL#K. We’re not done yet, though – badges for physical access, PKI, USB keys, SmartCards, soft certs, biometrics, Network Access Control, firewalls, IPS/IDS, SIEM … I could go on and on.

Security 249
article thumbnail

Averting turbulence in the air

CIO Business Intelligence

She is also mindful of security: “Is it too adventurous to book the ticket through an unfamiliar travel agency, or should I book through the airline itself?” is asking all merchants to have an “automated” technical solution for their public-facing web applications—meaning a web-based application firewall (WAF) is now a must.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

unique network topology (including load balancing, firewalls, etc.). connected to differing forms of storage (not to mention storage tiering, backup etc.) QoS), and storage (connectivity, tiering, caching). Because a complex. landscape will include many servers (often virtual machines) linked by. manner with unique rules.

article thumbnail

Technology Short Take #70

Scott Lowe

What will happen when you combine GPUs and persistent storage? It seems to me that the ever-increasing application of persistent storage technologies in lots of difference places is going to change lots and lots of things. Is the era of the storage admin over ? Marco van Baggum describes his experience in working with NSX 6.2.3

Vmware 60
article thumbnail

5 Reasons Why Ansible is the Best CM Tool Out There?

Cloud Musings

With over 1300 modules, Ansible simplifies several aspects of IT infrastructure, including web, database, network, cloud, cluster, monitoring, and storage. It effortlessly integrates with any area of the IT infrastructure, be it provisioning virtual machines (VMs) or creating firewall rules.

Tools 94
article thumbnail

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Insightful and informative posts like this go a long way, in my book, to convincing people why DevOps is culture more than tooling (vendors often have it the other way around).

Windows 60
article thumbnail

Technology Short Take #84

Scott Lowe

Anthony Burke gives a little bit of a sneak peek at some functionality from the upcoming v3 release of PowerNSX: searching NSX Distributed Firewall (DFW) rules. Insightful and informative posts like this go a long way, in my book, to convincing people why DevOps is culture more than tooling (vendors often have it the other way around).

Windows 60