Tuesday, August 30, 2011

VMworld 2011: Interview with VMware’s Sanjay Aiyagari

I interview Sanjay Aiyagari, Senior Partner Architect with VMware.  We discuss the growth of VMworld, cloud computing, scalability, and Metro vMotion.

ps

Related:

Technorati Tags: F5, vmworld, integration, Pete Silva, security, business, vdi, vmotion, application delivery, cloud, virtualization, vmware

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

VMworld 2011: VDI Single Namespace

I chat with F5 Technical Marketing Manager Alan Murphy who whiteboards the VDI Single Namespace solution.  Instead of having to find your virtual desktop, have your virtual desktop follow you.

ps
Related:
Technorati Tags: F5, vmworld, integration, Pete Silva, security, business, vdi, vmotion, application delivery, cloud, virtualization, vmware
Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Monday, August 29, 2011

VMworld 2011: Sign Up for F5's DevCentral

I show how easy it is to sign up for F5's DevCentral community site from the floor of VMworld. Sign up at Booth 1131 and receive a 'I'm a Cloud Ninja' T-shirt.

ps

Technorati Tags: F5, vmworld, integration, Pete Silva, security, business, education, devcentral, application delivery, cloud, virtualization, vmware

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

VMworld 2011: Find F5 Networks

I show you how to find the F5 booth #1131 at The Venetian in Las Vegas during VMworld 2011.

ps

Technorati Tags: F5, vmworld, integration, Pete Silva, security, business, education, technology, application delivery, cloud, virtualization, vmware

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Wednesday, August 24, 2011

Audio White Paper - High-Performance DNS Services in BIG-IP Version 11

With an increasing number of devices, applications, and services on the Internet, it’s becoming more difficult to achieve network and application response times that deliver a quality user experience. This problem is not only a bandwidth issue—it’s also closely tied to network and infrastructure architecture.  To provide high-quality user experiences on the Internet, networks must be designed with optimized, secure, highly available, and high-performance IP services. Domain Name System (DNS) is one of the most difficult, but important, IP services to optimize and secure. DNS Services in F5 BIG-IP version 11 provides an intelligent DNS architecture that delivers high performance and scalability while negating the effects of network attacks.  Running Time: 14:17  Read full white paper here.  And click here for more F5 Audio.

ps

Technorati Tags: F5, integration, data center, Pete Silva, security, business, dnssec, technology, application delivery, dns, cloud, gtm, dynamic, web, internet, security, hardware, audio, whitepaper, big-ip

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1] o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Tuesday, August 23, 2011

SANS 20 Critical Security Controls

A couple days ago, The SANS Institute announced the release of a major update (Version 3.0) to the 20 Critical Controls, a prioritized baseline of information security measures designed to provide continuous monitoring to better protect government and commercial computers and networks from cyber attacks.  The information security threat landscape is always changing, especially this year with the well publicized breaches.  The particular controls have been tested and provide an effective solution to defending against cyber-attacks.  The focus is critical technical areas than can help an organization prioritize efforts to protect against the most common and dangerous attacks.  Automating security controls is another key area, to help gauge and improve the security posture of an organization.

The update takes into account the information gleaned from law enforcement agencies, forensics experts and penetration testers who have analyzed the various methods of attack.  SANS outlines the controls that would have prevented those attacks from being successful.  Version 3.0 was developed to take the control framework to the next level.  They have realigned the 20 controls and the associated sub-controls based on the current technology and threat environment, including the new threat vectors.  Sub-controls have been added to assist with rapid detection and prevention of attacks.  The 20 Controls have been aligned to the NSA’s Associated Manageable Network Plan Revision 2.0 Milestones.  They have added definitions, guidelines and proposed scoring criteria to evaluate tools for their ability to satisfy the requirements of each of the 20 Controls.  Lastly, they have mapped the findings of the Australian Government Department of Defence, which produced the Top 35 Key Mitigation Strategies, to the 20 Controls, providing measures to help reduce the impact of attacks.

The 20 Critical Security Controls are:

  1. Inventory of Authorized and Unauthorized Devices
  2. Inventory of Authorized and Unauthorized Software
  3. Secure Configurations for Hardware and Software on Laptops, Workstations, and Servers
  4. Secure Configurations for Network Devices such as Firewalls, Routers, and Switches
  5. Boundary Defense
  6. Maintenance, Monitoring, and Analysis of Security Audit Logs
  7. Application Software Security
  8. Controlled Use of Administrative Privileges
  9. Controlled Access Based on the Need to Know
  10. Continuous Vulnerability Assessment and Remediation
  11. Account Monitoring and Control
  12. Malware Defenses
  13. Limitation and Control of Network Ports, Protocols, and Services
  14. Wireless Device Control
  15. Data Loss Prevention
  16. Secure Network Engineering
  17. Penetration Tests and Red Team Exercises
  18. Incident Response Capability
  19. Data Recovery Capability
  20. Security Skills Assessment and Appropriate Training to Fill Gaps

And of course, F5 has solutions that can help with most, if not all, the 20 Critical Controls.

ps

Resources:

Technorati Tags: F5, SANS, integration, cloud computing, Pete Silva, security, business, education, technology, application delivery, cloud, context-aware, infrastructure 2.0, web, internet

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]