Tuesday, May 10, 2011

Interop 2011 - VIPRION 2400 and vCMP

Peter Silva talks with Paul Szabo, F5 Sr. Architect, about the new VIPRION 2400 and vCMP, the industry’s First Virtual Clustered Multiprocessing Technology.  With the VIPRION 2400’s chassis-based architecture, customers enjoy enhanced availability features and the flexibility to scale their ADC infrastructures without changing network, application, or device configurations, leading to dramatically reduced OpEx. VIPRION running vCMP gives enterprises the unprecedented ability to have complete, logical separation of software versions and instances on a single, highly scalable device.

ps

Resources:

Technorati Tags: F5, interop, Pete Silva, security, business, education, technology, internet, big-ip, VIPRION, vCMP

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

EMC World 2011 - ARX Hybrid-Cloud Demo

I visit with Michael Fabiano, Corporate Systems Engineer with F5, at EMC World 2011 for a Hybrid-Cloud Demo featuring F5's ARX.

ps

Resources:

Technorati Tags: F5, interop, Pete Silva, arx, business, storage, technology, emc big-ip

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Interop 2011 - F5 in the Interop NOC

I visit with Paul Vesper and Ken Bocchino of the F5 Consulting Team to share & show how F5 is providing many of the critical infrastructure components of the largest temporary network in the world.

ps

Resources:

Technorati Tags: F5, interop, Pete Silva, security, business, education, technology, internet, big-ip

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Monday, May 9, 2011

Interop 2011 - Find F5 Networks Booth 2027

I show you how to find F5's booth at Interop 2011 and give it a go at the Big Claw Challenge for some fabulous prizes!

ps
Resources:
Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Wednesday, May 4, 2011

Lost Your Balance? Drop The Load and Deliver!

It’s not named dough, melted cheese, mushrooms and pepperoni balancing.  Its called Pizza Delivery.  The user makes a request either over the phone or on-line with all the context of the ingredients and specifics of the request.  The Pizza Parlor then confirms the delivery location, gets to work and tries to deliver it to the destination as fast as they can.  The request arrives, both parties validate the order sometimes with a two-person handshake and the user consumes the content that was delivered.  Somewhat similar but much faster is what happens when a user makes a request from a web application.  They type in the location they want to go to, the ADC considers such contextual information like user, IP address, browser type, location and other variables to then deliver the specific content that is being requested – as fast as possible.  It’s not about load balancing an application, it’s about Application Delivery.

If you’ve lost your balance, then your equilibrium might be off and that is not a good thing.  You might have blurred vision, trouble hearing, dizziness and headaches and your decision making process could be off kilter.  You are slow to react, misunderstand requests, and give someone something they didn’t ask for or something different than what they asked for.  You are unable to take requests, process the information load and deliver an answer. 

Load balancing an application is no longer sufficient to ensure that the right users are receiving the right information at the right time, quickly, efficiently and securely.  Load balancing almost seems like an afterthought, or late in the process of delivering an application. You need to take into context the various variables of the user request and deliver that application based on the contextual information.  We use contextual information all the time to make our little daily decisions.  Which jacket to wear?  Well, what’s the temperature; is it raining; what am I doing; what’s the forecast; does it have pockets; does it have a hood; is it zipper or pull over and so forth.  Of course all this happens in an instant and we select what is needed.  You can’t make application delivery decisions simply based on ‘next in line,’ those judgments need to consider all the available information to make an informed application delivery decision.

ps

Resources:

Technorati Tags: F5,F5 News,Interop,NOC,IPv6,BIG-IP,application delivery,network,Pete Silva, event, #50waystousebigip,50 Ways,availability,BIG-IP

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]

Wednesday, April 27, 2011

Unplug Everything!

Just kidding…partially.  Have you seen the latest 2011 Verizon Data Breach Investigations Report?  It is chock full of data about breaches, vulnerabilities, industry demographics, threats and all the other internet security terms that make the headlines.  It is an interesting view into cybercrime and like last year, there is also information and analysis from the US Secret Service, who arrested more than 1200 cybercrime suspects in 2010.  One very interesting note from the Executive Summary is that while the total number of records compromised has steadily gone down – ‘08: 361 million, ‘09: 144 million, ‘10: 4 million – the case loads for cybercrime is at an all time high – 141 breaches in 2009 to a whopping 760 in 2010.  One reason may be is that the criminals themselves are doing the time-honored ‘risk vs. reward’ scenario when determining their bounty.  Hey, just like the security pros!  Oh yeah….the crooks are pros too.  Rather than going after the huge financial institutions in one fell swoop or mega-breach, they are attempting many more low risk type intrusions against restaurants, hotels and smaller retailers.  Hospitality is back on the top of the list this year, followed by retail.  Financial services round out pole position, but as noted, the criminals will always have their eye on our money.  Riff-raff also focused more on grabbing intellectual property rather than credit card numbers.

The Highlights:

  • The majority of breaches, 96%, were avoidable through simple or intermediate controls; if only someone decided to prevent them. 
  • 89% of companies breached are still not PCI compliant today, let alone when they were breached. 
  • External attacks exploded in 2010, and now account for the vast majority at 92% and over 99% of the lost records. 
  • 83% of victims were targets of opportunity.  Most attacks are opportunistic, with criminal rings relying on automation to discover susceptible systems for them. 
  • Most breaches aren’t discovered for weeks to months, and most breaches, 86%, are discovered by third-parties, not internal security teams.
  • Malware and ‘hacking’ are the top two threat actions by percentage of breaches, 50%/49% respectively, along with tops in percentage of records 89%/79%.  Misuse, a strong contender last year, went down in 2010.
  • Within malware, sending data to an external source, installing backdoors and key logger functions were the most common types and all increased in 2010.
  • 92% of the attacks were not that difficult.

You may ask, ‘what about mobile devices?’ since those are a often touted avenue of data loss.  The Data Breach Report says that data loss from mobile devices are rarely part of their case load since they typically investigate deliberate breaches and compromises rather than accidental data loss.  Plus, they focus on confirmed incidents of data compromise.  Another question might have to do with Cloud Computing breaches.  Here they answer, ‘No, not really,’ to question of whether the cloud factors into the breaches they investigate.  They say that it is more about giving up control of the systems and the associated risk than any cloud technology. 

Now comes word that subscribers of Sony’s PlayStation Network have had their personal information stolen.  I wonder how this, and the other high profile attacks this year will alter the Data Breach Report next year.  I’ve written about this type of exposure and felt it was only a matter of time before something like this occurred.  Gamers are frantic about this latest intrusion but if you are connected to the internet in any way shape or form, there are risks involved.  We used to joke years ago that the only way to be safe from attacks was to unplug the computers from the net.  With the way things are going, the punch line is not so funny anymore.

ps

Resources:

Technorati Tags: F5, data breach report, threats, Pete Silva, security, malware, technology, Verizon, cyber-threat, social engineering, attacks, virus, vulnerability, web, internet, cybercrime, identity theft, scam, data breach, psn, Sony, PlayStation

Connect with Peter: Connect with F5:
o_linkedin[1] o_rss[1] o_facebook[1] o_twitter[1]   o_facebook[1] o_twitter[1] o_slideshare[1] o_youtube[1]