Lippis Report Issue 67: Extracting Human and System Delay from Business Process

September 18th, 2006

I have often written and talked about the third or strategic phase of IP telephony into which the communications industry is entering. The third phase of IP telephony products and services is based on a value proposition that enterprise customers will receive strategic value plus economic efficiency. The emphasis will now be on strategic value, which is wrapping communications around business process. Up until now the communication industry has been focused on delivering economic efficiency. This strategic phase promises to extract delay, both human and system from business process, increasing enterprise agility or the ability of a company to react to real time events or market changes.

Read the rest of this entry »

Increasing Networked Application Performance

Listen to the Podcast

September 18th, 2006

Dave TrowbridgeTo deliver high performance applications and increase user productivity, IT and network management groups would like to identify the source of application performance problems in real time. But to be truly effective, the identification of problems needs to be in terms all parties can understand and act upon. A view of all major applications flowing across a network being discovered in real time which multiple groups can use to collaborate andScott Safe troubleshoot performance degradation issues is discussed with Scott Safe and Dave Trowbridge, both of Network Physics. Network Physics´ recently released NetSensory 6.0 and its Business Reporter delivers on the above. Listen and learn how.

Frontier Airlines: A Case Study in Application Performance

Get the White Paper

September 18th, 2006

By Network Physics

Frontier Airlines is a low fare airline that provides service from its Denver hub to 47 destinations in 29 states, spanning the nation from coast to coast as well as in seven cities in Mexico and one in Canada. Frontier´s MPLS WAN is a critical resource for the airline. It connects the company´s data center in Denver to offices and airports throughout North America. It supports both important customer-facing applications, such as seat assignment, electronic ticketing, curbside and online check-in, as well as all the logistical and management applications necessary for running a major airline. But even as the network was rapidly expanding to support Frontier´s business objectives, performance was slowly degrading, and the company´s traditional SNMP device-based management system couldn´t give the IT staff the visibility they needed to meet their Service Level Objectives (SLOs). See how they did it by downloading this white paper.

Using QRadar® to Monitor and Protect Your VoIP Investment

Get the White Paper

September 18th, 2006

By Q1 Labs

The prospect of implementing Voice over Internet Protocol (VoIP) has generated considerable excitement among IT professionals. Whether you implement the technology yourself or lease the service from a well-known provider, the cost savings associated with a successful VoIP implementation are enormous. As with any relatively new technology, however, VoIP carries with it a variety
of new security vulnerabilities as well as more opportunities for well-known types of attacks, such as Denial of Service (DoS), that security professionals need to consider when deploying it. Although many VoIP solution companies work hard to secure their VoIP gear and their overall solutions, an attacker can easily exploit a VoIP deployment using a variety of different techniques. This paper discusses those common techniques and how QRadar® can be used to protect your VoIP investment.

Part Two: IP Telephony Industry Not Ready Yet says CDMs CIO and Systems/Networks Manager

Listen to the Podcast

September 11th, 2006

Jerry WeinerIn this Part Two special edition "Lessons Learned" podcast, Peter Palmisano, CIO and Jerry Weiner, Manager of Systems and Networks both of Camp Dresser & McKee continue to discuss their experience, both pros and cons, about deploying a multi-national converged network. This is, by far, one of the best podcasts we have recorded, and is full of useful advice and insights from two leading IT executives. They will tell you what to look out for and what works. Peter PalmisanoThe huge questions raised are: Is the IP telephony industry ready to support connected remote offices, a fully converged network, disaster plans and more? You will hear it from executives that are living with it right now. The first part of this interview is available in the Lippis Report Download Library. This is a must listen podcast. Special thanks to Viola Networks for sponsoring the "Lessons Learned" series. Enjoy, Nick

Lippis Report Issue 66: Network Admittance Control Options

September 4th, 2006

We´ve covered Cisco´s network access control (NAC), Microsoft´s Network Access Protection (NAP) and the Trusted Computing Group´s Trusted Network Connect (TNC) security architectures. All of the above are infrastructure based network access control architectures with differing enforcement models and client requirements. The complexity, high cost and lack of availability of these access control approaches has given way to the rise of NAC appliances, which we explored in Lippis Report 64 ?¬¢‚Äö√ᬮ?√¨The Road to Network Admission Control," and Lippis Report podcast, ?¬¢‚Äö√ᬮ?√¨Network Admission Control Simplified." Many Lippis Report readers and podcast listeners told us that what is important to them is how their chosen infrastructure company is deploying access control. Most Network/IT executives see network access control from an infrastructure investment protection point of view. That is, there is little interest in switching major infrastructure vendors solely on network security. So in this edition of the Lippis Report, we asked Cisco Systems, ProCurve Networking by HP, Foundry Networks, Extreme Networks, Nortel, Juniper and 3Com to tell us about their network access control solutions.
Read the rest of this entry »

IP Telephony Industry Not Ready Yet says CDM´s CIO and Systems/Networks Manager

Listen to the Podcast

September 4th, 2006

Peter PalmisanoIn this part one special edition "essons Learned" podcast, Peter Palmisano, CIO and Jerry Weiner, Manager of Systems and Networks both of Camp Dresser & McKee discuss their experience, both pros and cons about deploying a multi-national converged network. This is by far, one of the best podcasts we have recorded and is full of useful advice and insights from two leading IT Jerry Weinerexecutives. They´ll tell you what to look out for and what works. The huge questions raised are: Is the IP telephony industry ready to support connected remote offices, a fully converged network, disaster plans and more? You´ll hear it from executives that are living with it right now. The second part of this interview will be distributed September 12th. This is a must listen podcast. Special thanks to Viola Networks for sponsoring the lessons learned series. Enjoy, Nick

Foundry Network Admission Control Architecture

Get the White Paper

September 4th, 2006

This white paper details Foundry Network´s approach to network admission control. End points are proactively checked for compliance with IT security policy and either denied network access, or quarantined where tools are offered to help them come into compliance. The paper provides guidelines establishing guest access to restricted network zones, including internet access. Best practices are provided, as well as a look at the future of endpoint admission control by reviewing short and long term trends and prospects for these technologies. This includes a look at Foundry´s web authentication capabilities, and how clientless admission control might be added to admission control.