article thumbnail

XDR – A Game Changer for Cybersecurity

CIO Business Intelligence

Organizations have taken a multi-layered approach with solutions and services that span Next-Generation Firewall (NGFW), Endpoint Detection and Response (EDR), Secure Email Gateways, SIEM, and Threat Intelligence, just to name a few. Unfortunately, while these control points provide a degree of detection and response, they still fall short.

HP 98
article thumbnail

Fountainhead: What Is Meant by a "Cloud-Ready" Application?

Fountainhead

unique network topology (including load balancing, firewalls, etc.). than one version of their software. I also wanted to share a brief thought here: What would a "cloud-ready" software suite look like? We all know that large software and platform vendors (think: Oracle, SAP, Microsoft, Symantec, Citrix, CA, IBM, HP etc.)

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

Thinking Out Loud: Targeting the Real Problem

Scott Lowe

Based on what I’ve seen and read so far, it seems like a lot of folks see software-defined networking (SDN), especially hop-by-hop OpenFlow, as the solution to manual VLAN provisioning. The real problem is the configuration and management of network policy: stuff like QoS, VLANs, ACLs, NAT, VRFs, firewalls, load balancing, etc.

article thumbnail

Fountainhead: Infrastructure Orchestration in use within SPs.

Fountainhead

HP, IBM and now even Cisco have solutions in the space, but I believe only Egenera has been doing it the longest, and has the broadest installed base of enterprises in the real-world using it and expanding footprint. In the way virtualization abstracts & configures the software world (O/S, applications, etc.), Ken Oestreich.

article thumbnail

ITAM Isn’t Sexy. But We Need It!

CTOvision

seconds, 288 HP, 200 ft. When it comes to IT management software, what kid says, “Hey, do you want Tivoli Asset Management, or LANDesk IT?”. According to the International Association for IT Asset Management ( IAITAM ), ITAM is Software Asset Management (SAM), Hardware Asset Management (HAM), and Asset Portfolio Management (APM).

Software 165
article thumbnail

Continuous Monitoring – Part 1

CTOvision

A typical enterprise can collect logs and events from firewalls, routers, servers, PCs, and more. In addition, you have to know, and continually update, your asset inventory – both hardware and software. This blog first appeared on George Romas’ HP blog.

HP 253
article thumbnail

- Tech Terror List 2010

Chief Seattle Greek Blog

Yup, we give you a standard HP model with Windows XP, Office 2007 and Anti-Virus loaded on it. Oh, and someone loses their Android smart phone with all the home and cell numbers of half the police command staff but gee we can’t remotely wipe its contents because installing the remote wipe software is the bureaucratic Sign of the CIO Grinch.

Malware 44