Gigamon Introduces NetFlow Generation Application

Gigamon on Wednesday announced a forthcoming application to generate and export NetFlow records from within the Visibility Fabric™. As a part of the Applications Layer of the Unified Visibility Fabric architecture, the NetFlow Generation application will create NetFlow records, then send the information to one or multiple NetFlow collectors or analyzers. Gigamon has traditionally focused on creating features and functionalities to help optimize the tools infrastructure, however, NetFlow Generation will allow our Visibility Fabric to optimize the network. The application can maximize the efficiency of the network itself by assuming the processing necessary to generate NetFlow information that had previously been dedicated within the switch, thereby reducing the burden to the network.

read more

Gigamon Introduces NetFlow Generation Application

Gigamon on Wednesday announced a forthcoming application to generate and export NetFlow records from within the Visibility Fabric™. As a part of the Applications Layer of the Unified Visibility Fabric architecture, the NetFlow Generation application will create NetFlow records, then send the information to one or multiple NetFlow collectors or analyzers. Gigamon has traditionally focused on creating features and functionalities to help optimize the tools infrastructure, however, NetFlow Generation will allow our Visibility Fabric to optimize the network. The application can maximize the efficiency of the network itself by assuming the processing necessary to generate NetFlow information that had previously been dedicated within the switch, thereby reducing the burden to the network.

read more

Verizon to Add SAP HANA to Cloud Infrastructure

Verizon Enterprise Solutions on Wednesday announced a memorandum of understanding with SAP that outlines plans to deploy the SAP HANA® platform in Verizon’s data centers, making it available to customers across Verizon’s cloud offerings, including eCloud, Managed Hosting and the new Verizon Cloud. SAP HANA is SAP’s market-leading in-memory platform. This is the most recent enterprise-class service to be added to Verizon’s cloud environment, as the company creates the enterprise cloud ecosystem.
Verizon brings the full power and functionality of enterprise-class technology to the cloud while providing clients flexibility and control over their cloud environment. The company is developing an ecosystem of enterprise technologies that are designed to run on Verizon’s Infrastructure as a Service platform.

read more

In IaaS and PaaS Convergence, It’s PaaS That Should Lead

Recent commentaries by cloud industry luminaries Reuven Cohen & Krishnan Subramanian address key issues related to relative importance and potential longevity of an independent Platform-as-a-Service (PaaS). In his commentary, Reuven poses, “Do consumers really care about the difference between IaaS and PaaS?” The answer to this question is most likely, no, but that doesn’t eliminate the need for distinction, it merely is a matter of how best to deliver the value of cloud computing to users.
In his commentary, Krishnan does an excellent job of exploring one way to classify PaaS as either service or container orchestration. However, in some ways, the distinction introduces more confusion. For example, his use of Docker illustrates how convergence of IaaS and PaaS actually makes sense for the industry and, thus, diminishes his key point that there’s value in the cloud application layer existing as a distinct layer within the cloud stack.

read more

Growing Customer Lifetime Value with Gamification & Communities

In this webinar, our featured guest Kim Celestre, Sr. Analyst at Forrester Research will share findings from the new report: “Benchmark B2B Social Marketing Efforts,” just released this month. Kim will highlight the top social marketing tactics that have achieved the highest level of satisfaction and positive business outcomes for B2B Marketers. Join us to see which tactics made the list – you may be surprised at what they are.
Kim will also share her predictions on the future of communities as they move beyond just the customer support function and start influencing buying behaviors earlier in the customer lifecycle through strategies such as gamification, and ultimately driving higher ROI.
Liz Courter, Community Manager at Marketo, will showcase how her company has been successfully leveraging online communities to grow customer lifetime value.

read more

How do you put a price tag on the cloud?

By Richard Campione,  President, Cloud & Data at Services Business at ServiceSource

A recent CIO Zone article stated “cloud computing is increasingly becoming the rule and not the exception.”  With cloud computing becoming so pervasive and commonplace in our day-to-day lives and businesses, everyone has differing opinions on how to quantify the true value of the cloud.

So, how exactly do you put a value on and quantify the business benefits of the cloud?

On its surface, the cloud brings economies of scale that can be quantified through traditional metrics such as cost savings and performance improvements.  For ServiceSource, a company focused on harnessing the power of big data to increase recurring revenue and customer retention for our clients, the real benefit of the cloud is the ability to do things that you couldn’t otherwise do, and the unprecedented agility it affords.

Let’s start with agility

I frame this …

Top Three Reasons to Switch to Cloud Data Security

Companies are increasingly moving their data security to the cloud. By the 2015, 10% of overall IT security enterprise product capabilities will be delivered in the cloud, according to a study conducted by Gartner. In fact, the cloud data security market is expected to reach $4.2 billion by 2016.
Are there compelling reasons to move your own data security to the cloud? I am a firm believer that cloud security is a godsend to companies dealing with sensitive information, particularly small and medium sized enterprises (SMEs). Here are the top reasons to consider moving your data security to the cloud.

read more

Top Three Reasons to Switch to Cloud Data Security

Companies are increasingly moving their data security to the cloud. By the 2015, 10% of overall IT security enterprise product capabilities will be delivered in the cloud, according to a study conducted by Gartner. In fact, the cloud data security market is expected to reach $4.2 billion by 2016.
Are there compelling reasons to move your own data security to the cloud? I am a firm believer that cloud security is a godsend to companies dealing with sensitive information, particularly small and medium sized enterprises (SMEs). Here are the top reasons to consider moving your data security to the cloud.

read more

2014 Trends – The Year of the Insider Threat

If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, there is now an added layer of complexity and sophistication when it comes to protecting who can access what types of sensitive data. The cloud makes it easier for organizations to conduct business, but that simplicity also translates into easier ways for insiders or un-trusted individuals to steal data – identity has become the new perimeter.
The number of organizations around the globe turning to a combination of traditional computing, virtualization, and public-cloud infrastructure to deliver business applications quickly, efficiently, and cost effectively is growing exponentially. As they migrate systems to the cloud, or leverage the scalability and elasticity of cloud computing to deliver entirely new applications, they can run headlong into security and compliance issues that must be solved to protect systems and make auditors happy. In addition to protecting privileged access to servers and network gear, virtualization and cloud computing add important new items that need to be locked down. First, organizations need to protect virtualization and cloud management consoles that provide unprecedented administrative power to create, configure, delete and copy network and server resources. Second, organizations must ensure the cloud management application programming interfaces (APIs) that transfer enormous administrative power to scripts, programs and DevOps tools are adequately controlled. Companies that want to ensure their data remains safe regardless of whether it is in a traditional database, in the cloud, or some variation of both, now need to seriously consider the security ramifications of having a lax privileged user policy – especially in an era where a few clicks of the mouse in the console, or a few commands in a script can wreak havoc.

read more

2014 Trends – The Year of the Insider Threat

If last year underscored anything, it was the significant and far-reaching impact of breaches by trusted insiders – case in point, the Edward Snowden affair. What makes this such a critical trend for 2014 is the fact that as more and more organizations are adopting cloud strategies, there is now an added layer of complexity and sophistication when it comes to protecting who can access what types of sensitive data. The cloud makes it easier for organizations to conduct business, but that simplicity also translates into easier ways for insiders or un-trusted individuals to steal data – identity has become the new perimeter.
The number of organizations around the globe turning to a combination of traditional computing, virtualization, and public-cloud infrastructure to deliver business applications quickly, efficiently, and cost effectively is growing exponentially. As they migrate systems to the cloud, or leverage the scalability and elasticity of cloud computing to deliver entirely new applications, they can run headlong into security and compliance issues that must be solved to protect systems and make auditors happy. In addition to protecting privileged access to servers and network gear, virtualization and cloud computing add important new items that need to be locked down. First, organizations need to protect virtualization and cloud management consoles that provide unprecedented administrative power to create, configure, delete and copy network and server resources. Second, organizations must ensure the cloud management application programming interfaces (APIs) that transfer enormous administrative power to scripts, programs and DevOps tools are adequately controlled. Companies that want to ensure their data remains safe regardless of whether it is in a traditional database, in the cloud, or some variation of both, now need to seriously consider the security ramifications of having a lax privileged user policy – especially in an era where a few clicks of the mouse in the console, or a few commands in a script can wreak havoc.

read more