The Lippis Report Issue 59: Cisco’s Network Access Control Troubles

May 30th, 2006

Image of a SatelliteCisco´s network security program has been a huge success. Its self-defending network ad campaign has won advertising awards and deservedly so as they communicate the power a network has to secure an IT environment in the simplest of terms. Cisco´s trusted network investments are as huge as its wins. It´s number one in terms of market share and revenues in Worldwide Firewall/VPN security appliances, and Network intrusion detection and prevention, according to IDC. They clearly have thought leadership and the prowess to organize a market segment around their security technology as its Network Admission Control or NAC program has demonstrated. But with all of Cisco´s success NAC remains elusive to most organizations. Why? Because it´s too complex and extremely costly.
Read the rest of this entry »

A Standards-Based Network Admittance Control: Fact or Fiction?

Listen to the Podcast

May 29th, 2006

The Trusted Computing Group’s Steve Hanna of Juniper and Paul Sangster of Symantec provide us with a progress update on the Trusted Network Connect (TNC) standards effort to deliver an open network admittance control approach. Download this two-page presentation to follow along with part of the discussion. It’s a great discussion on network admittance control and which parts are and can be standardized to avoid vendor lock-in. Enjoy, Nick

TNC Interop slide presentation

View the Presentation

May 26th, 2006

The Trusted Computing Group’s Steve Hanna of Juniper and Paul Sangster of Symantec provide us with a progress update on the Trusted Network Connect (TNC) standards effort to deliver an open network admittance control approach. Download this two-page presentation to follow along with podcast. It’s a great discussion on network admission control and which parts are and can be standardized to avoid vendor lock-in. Enjoy, Nick

Spyware and Spam blocking Strategies

Listen to the Podcast

May 26th, 2006

I interview Patrick Peterson, VP Technology of IronPort. IronPort provides e-mail and web defense appliances blocking spyware and spam from desktops and exploits entering into an enterprise via port 80. We discuss three general industry models available to defend e-mail and web traffic with associated pros and cons. These defenses are appliances, network or software-based. It’s a great discussion if you need to know how to stop spam and spyware from stealing productivity and clogging your IT infrastructure. Enjoy, Nick

Mitel Readies Going Public

May 25th, 2006

We found out last week that Mitel´s long awaited planned IPO is just a few weeks away. While the offering price has not been established this is a milestone in the IP telephony market as the financial markets will sort out valuation for this market segment. Today Avaya has a market cap of $5.4B and was ranked 20th in the fastest-growing companies in one year profits in the April, 2006 edition of Fortune magazine´s top 500 companies. Synergy Research Group estimates that IP telephony line shipments grew by a compound annual growth rate or CAGR of 68.7% from 2002 to 2005 and estimates market revenues were approximately $4B worldwide in 2005, while they expect revenue growth of $10.7B by 2009, a 28.2% CAGR. As IP telephony grows, TDM-based systems are expected to decline at a CAGR of 38.1% from 2005 until 2009, again according to Synergy.

Mitel´s IPO will be closely watched by every major IP telephony supplier and those eyeing their own IPO´s such as ShoreTel. Rumor has it that ShoreTel is approaching revenues of $100M and has been profitable for some time. While Mitel´s revenues are over 3 times that number they have not been profitable. A good IPO for Mitel will raise all boats in the IP telephony sea and fill its coffers with resources to boost marketing, R&D and sales.

The Decision to Deploy IP Telephony on Demand

Get the White Paper

May 25th, 2006

The popularity of IP telephony is growing steadily as an increasing number of companies realize its cost savings and enhanced productivity benefits. Far from being forced into a one-size-fits-all solution, businesses now have a choice in how best to implement IP telephony. Today, a company can choose from the following when looking for its own IP telephony ?¢‚Ǩ?ìbest fit": 1) Premises-based; 2) an IP centrex service; or 3) a hosted, network-based IP telephony service offered by a service provider. This paper explores the IP telephony purchase decision of Pro-Star Insurance as it evaluated the pros and cons of these alternatives.

Securing Data Transmission on Metro Ethernet Networks

Get the White Paper

May 25th, 2006

This paper provides key strategies for securing data in motion while in transit over Ethernet networks. It provides authentication, confidentiality and integrity tactics for layer 2 and 3 Metro Ethernet networks. Protecting data in motion using industry standard encryption and hashing protocols such as IPSec and AES or 3DES to provide layer 3 and 2 are explained and explored in this paper providing the reader insight into network security design options.

Network Admission Control by ConSentry

Get the White Paper

May 23rd, 2006

Local area networks (LANs) are more open than ever, making them vulnerable to external as well as internal threats and posing a complex security challenge for enterprises. Creating guest access is an important configuration as contractors, partners and visitors require access to either corporate resources or to the Internet or to both. Wireless technology and open jacks make it easy for rogue hosts to connect to a network. Mobile employees with laptops rove between public Internet ?¢‚Ǩ?ìhot spots", home networks, and the protected LAN, potentially exposing the network to viruses and other malware. Consequently, IT is looking for a comprehensive LAN security solution that protects business information, improves business continuity, and helps the organization comply with governmental regulations. In this white paper, defending an enterprise through network admission control (NAC) is explained.

Assuring QoS in Today’s Enterprise Networks by Prominence Networks

Get the White Paper

May 20th, 2006

To successfully deploy Voice or Video over an IP network, Quality of Service (QoS) needs to be an integral part of any implementation plan. Only with effective end-to-end QoS can users fully enjoy the features and cost savings of converged networks. However, QoS methodologies, such as Differentiated Services (DiffServ) or Integrated Services (IntServ) are difficult to manage and scale. In this white paper Prominence Networks provides a QoS implementation strategy that is seamless, effective and scaleable.

The Lippis Report Issue 58: Avaya Redefines On Demand Hosted IP Services

May 16th, 2006

In Lippis Report Issues 52, 54 and 56 I discussed the growing market for hosted IP services. I explored hosted IP contact centers, the hybrid public/private IP telephony model and the favorable economics behind hosted IP telephony for the small to medium and multi-national firm. On May 2nd in a small conference room full of industry analysts in Las Vegas and streamed to hundreds of other analysts around the globe, Avaya announced its ?¬¢‚Äö√ᬮ?√¨Avaya On Demand" solutions at Interop. This was one of the most significant announcements in the hosted marketplace, and is important for three reasons: first, Avaya is the only equipment supplier to offer two physical hosted arrangements with equipment being in an Avaya or a partner´s data center; second, Avaya´s go to market strategy, or channel strategy, is unique and compelling since it enables margin starved VARs who previously only supplied equipment to customers to now offer residual based hosted services; third, pricing is set at attractive rates. In this Lippis Report we review the ?¬¢‚Äö√ᬮ?√¨Avaya On Demand" (AOD) service, its potential implications and discuss which market segments are best served by it.
Read the rest of this entry »

Securing Fixed and Mobile End-Points via Bundled Services

Listen to the Podcast

May 15th, 2006

The anti-virus market distribution channel is changing for small to medium sized businesses. Soon, gone will be the days when IT security personnel managed AV client software. AV is increasingly being bundled into communication services offered by ISPs and other service providers for both fixed and mobile end-points. In this podcast I discuss these trends with Curtis Cresta, VP & GM North America Ops of F-Secure, the leader in services based security. If you thought your cell phone, smart phone or PDA were safe, think again. Take notes on this one.

Encryption Penalty Eliminated with CipherOptics Ethernet Security Gateway

Listen to the Podcast

May 9th, 2006

Scott Palmquist joins the program to discuss the network encryption market and CipherOptics’ new Ethernet Security Gateway. Protecting data in “motion” has become top of mind for most IT executives as they look to close network security vulnerabilities. There’s a great discussion on layer 2 versus layer 3 encryption, protecting data in motion versus at rest, where to apply encryption and the elimination of the encryption performance and latency penalty. Enjoy, Nick

The Lippis Report Issue 57: Next Generation Contact Centers

May 6th, 2006

All of the major contact center providers such as Avaya, Nortel, Siemens, Genesys, Cisco, Alcatel plus NEC and Huawei in Asia Pacific are addressing short and long term challenges and opportunities in their contact center offerings. In the short term, most are providing incremental functions and features such as SIP, presence, mobility, reporting, etc. What differentiates these players are their market share and long term vision. The ones who embrace web services and SOA, enabling IT developers to mold, shape and inject communications deeply into business process, will be the winners. For IT departments are starting to view contact centers as one of the leverage points for IP telephony to deliver on its productivity promise.
Read the rest of this entry »

Managing the Performance of Converged Networks

Attend the Webinar

May 1st, 2006

Note: Before clinking on the link above, please use Internet Explorer with pop-up blockers disabled. If you would like to view the webinar twice, please delete cookies and internet files after the first viewing.

With new applications both real-time and non-real-time running over corporate networks, IT management needs tools with a view into networked applications to baseline, troubleshoot, secure and optimize their IT investments. Nick Lippis will deliver an industry overview on new developments occurring in converged networking and best practices on how to manage the performance of converged networking.

Leslie Miller of NetScout Systems discusses how the nGenius © Solution can help to mitigate the risks inherent in managing performance in a converged network environment. Her presentation focuses on a lifecycle approach to managing networks and applications through a VoIP deployment. Engaging a unified performance management solution to view VoIP in context with other networked application traffic increases the potential for a successful rollout, and ultimately leads to optimized performance of both business and voice applications.