How To Stop Cyber Crime From Ruining Your Company’s Reputation

Listen to the Podcast

July 31st, 2007

Jim DohertyAccording to the International Crime Complaint Center or IC3 the number of cyber crime complaints has skyrocketed from a little over 6,000 in 2000 to over 1 million as of June of 2007 with a total dollar loss from these crimes, which are usually fraud, estimated at $647 million. Many of the complaints involve reports of identity theft, such as loss of personal identifying data, unauthorized use of credit cards or bank accounts, etc. The threat for corporations is that cyber crime not only steels its intellectual property and customer data, but its reputation and trust relationship with customers which have a much large material impact then the initial crime. I talk with Jim Doherty Chief Marketing Officer and Senior Vice President for CipherOptics about strategies to defend against cyber crime. This issue is too important not to listen to. Enjoy, Nick

Purchase a Transcript of this Podcast: $25

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.








Lippis Report Issue 87: A New Era in Networking Emerges: Network Virtualization

July 30th, 2007

The three pillars of IT computing, networking and storage have always been embraced in an odd dance of shifting functionality responsibility as Moore´s Law continues to break down, blur and redistribute lines of responsibility across the three pillars in an effort to increase application performance. For example, networking has always off loaded tasks that were once done by computers. In fact some of the first routers were DEC mini and micro VAX systems back in the early 80s. This trend continues today with more computer functions such as load balancing, caching, security and certain aspects of computer operations migrating to the network fabric. Access to and configuration of storage has gone through huge changes over the years, thanks to networking, with the introduction of Network Attached Storage (NAS) and Storage Area Network (SAN). Computing functionality, applications acceleration, storage access and many other functions have shifted into the network fabric. The latest shift is network virtualization where better utilization, increased flexibility and application performance is promised in the data center and the overall enterprise. In this Lippis Report we dive into the new topic of network virtualization; a new IT paradigm is born ushering in the virtual enterprise. Cisco´s Data Center 3.0 and its VFrame appliance announcement at Networkers and $150M investment in VMware are leading the change in data center architecture, control and management.

Read the rest of this entry »

Complete Guide for Securing MPLS Networks
Keep your company´s information secure wherever it goes.

Get the White Paper

July 30th, 2007

By CipherOptics

Enterprises are demanding virtual private networks (VPNs) instead of costly leased lines and Ethernet and IP services instead of DS1 and DS3 services from their service providers. MPLS is now the best way for service providers to respond to those customer demands by providing Virtual Private LAN Services (VPLS), or Layer 2 MPLS VPNs, and IP VPNs, or Layer 3 VPNs. However, VPNs are limited in their ability to serve the growing security needs of enterprise networks. VPNs enable a separation of enterprise traffic over the same service provider network, but do not enable a secure communication between the remote VPN sites. In order to avoid any risk of losing data, having it accessed or otherwise compromised, enterprises need to take an active role in protecting their data in motion on shared MPLS networks.

Routed Access: An Option for Resilient Services

Get the White Paper

July 30th, 2007

By Cisco Systems

Real-time applications are heightening the demands on today´s enterprise networks. Worker productivity is increasing and more communication and collaboration tools are available than ever before. Simplifying application deployment, decreasing network downtime, and maintaining application and network predictability have never been more critical for the success of your enterprise. By using the intelligence and resilience of Cisco© routing protocols such as Enhanced Interior Gateway Routing Protocol (EIGRP), your switches in the access layer or wiring closet deliver the mechanisms for fast and deterministic network recovery from failures.

This paper explains the role that a Routed Access solution can play in increasing network availability for real-time applications, decreasing network complexity, and enabling a standard set of configuration and troubleshooting tools for fast network implementation and timely resolution to network issues.

Delivering High Availability in the Wiring Closet with Cisco© Catalyst© Switches

Get the White Paper

July 30th, 2007

By Cisco Systems

The corporate network is mission critical, especially as Unified Communications such as IP telephony and collaboration are deployed. As part of this deployment IT leaders are taking a new look at the role of the wiring closet in providing the high availability expected from their network investments. The wiring closet was once relegated to an area of the network where corners were cut, since at worst a group of users would lose connectivity to a file server. Not any more. To deliver high availability applications, the wiring closet needs to be designed for high reliability.

Securing the Wiring Closet with Cisco® Catalyst® Switches

Get the White Paper

July 30th, 2007

By Cisco Systems

As enterprises continue to rapidly deploy more applications on their IP network to gain the efficiencies of a single, converged network, the demands on the network: and in the wiring closet itself: intensify. Historically, network managers have focused on ensuring that the core and distribution layers of the network were well designed, because these were the primary aggregation points in the network. During a failure, these points could impact large numbers of users. With increasing network security threats launched from the wiring closet, however, the wiring closet has now become the new front line of defense in preventing attacks and ensuring the health of the entire network. This paper provides an overview of some of the primary security threats in the wiring closet and how Cisco® Catalyst© switches can help mitigate these security threats before they impact the network.

A New Business Model for IP Telephony Drives Consolidation and Attrition

Listen to the Podcast

July 24th, 2007

Zeus KerravalaZeus Kerravala, Yankee Group SVP and I review the enterprise IP telephony market and discuss the latest industry changes including the ShoreTel IPO, Inter-Tel & Mitel merger, Avaya going private, Nortels implosion, Siemens reasserting, Microsofts overhang and Ciscos strong position. It is becoming very clear that the enterprise IP telephony business model is in play as it shifts to a software and services industry forcing consolidation and attrition. We get to the heart of the matter and provide the insight you expect from a Lippis Report podcast. We squeezed a little time in for Cisco´s major Data Center 3.0 announcement too. The audio quality is not as good as we normally deliver, but the content is great!! Enjoy.

Purchase a Transcript of this Podcast: $25

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.








Lippis Report Issue 86: Communications-Enabled Business Processes (CEBP): An Outlook

July 16th, 2007

In this Lippis Report we explore the emerging market for Communications- Enabled Business Processes (CEBP) and provide an outlook. Late last summer the IP telephony industry accelerated its software focus with the Unified Communications and CEBP initiatives and offerings from all major suppliers. Unified Communications is in essence a single launch point or portal to gain access to multiple communication applications with tools such as click-to-call, instant messaging, click-to-conferencing, and many others. CEBP injects communications into business process in order to reduce human and system delay, hoping to speed workflow and increase the response of an organization to business events. Unified Communications is being delivered to market via packaged software and massive distribution channels thanks to Microsoft and IBM. CEBP is different. Each enterprise will have a unique entry point for CEBP based upon their process improvement priorities, funding, and project business case strength. CEBP, by definition is a custom project. There are business process modeling consulting organizations, which are today´s efficiency engineers, working through business process to save an organization time and money. But CEBP promises to be much more; it promises to deliver a new kind of agile and competitive organization that can respond to business events quickly, satisfy customers more deeply, and in the process create competitive barriers of entry. We explore these hopes and promises and provide an outlook for the CEBP market.

Read the rest of this entry »

Event-Driven Architectures in the Responsive Enterprise

Get the White Paper

July 16th, 2007

By Avaya

To be competitive in today´s real-time world requires greater business agility than ever before. Organizations and their people are working faster, and have to respond ever more quickly and effectively to real-time business events. The rigid silos that exist today between business applications and communication capabilities limit information exchange and impede enterprise agility. The good news is that new solutions are emerging that can flexibly link applications, business intelligence, and communications together to create a new class of synergistic business processes that increase the ability of an enterprise to respond to threats and opportunities.

Communications-Enabled Business Processes (CEBP) help enterprises enhance operational efficiency, worker productivity and customer satisfaction by streamlining human engagement in critical business processes. These solutions integrate with business process applications to predict and sense events, then respond by managing real-time multi-channel communication with process users and decision-makers. This speeds response times, reduces human delays, and frees workers from managing communications details so they can focus on making decisions and resolving issues before they impact customers.

This white paper introduces the concept of Event-Driven Architecture (EDA) and describes the key role it plays in enabling new business strategies for Communications-Enabled Business Processes. This is one of the best CEBP papers I have read.

SAP NetWeaver® AND ENTERPRISE SERVICES ARCHITECTURE
Using IT Practices to Bridge the Worlds of Business and IT

Get the White Paper

July 16th, 2007

By SAP

Organizations that can enable complex IT services quickly and cost effectively have a significant competitive advantage. But this kind of agility requires an IT infrastructure that enables the seamless integration of business processes and information in disparate applications, collaboration among all involved parties, and the rapid management and adaptation of business processes. Traditional IT infrastructures make the rapid development of flexible IT services nearly impossible. Building business processes that span organizational units means building links between heterogeneous systems, an expensive and time-consuming proposition. And modifying existing functionality can be prohibitively difficult or even impossible.

Web services and service-oriented architectures are huge strides in simplifying application integration. Web services offer a standardized and vendor-agnostic way to cope with heterogeneous systems and to create interoperability. But Web services are insufficient to the task. They are too granular to be efficient building blocks for enterprise business scenarios, and they do not yet provide a way to ensure semantic interoperability. To efficiently develop new business solutions that leverage existing applications, you need business-level building blocks that aggregate the benefits of multiple Web services and that simplify interoperability between them. In other words, you need Enterprise Services Architecture.

Improve the Event Resolution Process
Top 10 Requirements Identified

Get the White Paper

July 16th, 2007

By AlarmPoint Systems

This paper provides business and IT leaders with a brief introduction to the strategic benefits associated with an effective alignment between IT services and the business processes IT supports. IT operations must adapt faster with more strategic direction than any other business unit within an enterprise to remain effective. This paper examines the necessary requirement for Event Notification and Resolution applications. While most IT organizations have monitoring and trouble ticketing applications in place, they are still missing a key component. Interactive alerting applications bridge the gap between the IT applications and the personnel who can solve IT events, thereby ensuring IT services continue uninterrupted.

Safeguarding Our Nation´s Campuses and Facilities
A Dozen Best Practices from the Emergency Alerting Experiences of the Department of Defense

Get the White Paper

July 16th, 2007

by AtHoc

Campuses and facilities have accelerated their search for effective emergency notification systems in light of the recent tragedy at Virginia Tech and the hostage situation at NASA´s Johnson Space Center in Houston. The Department of Defense has been using sophisticated emergency alerting platforms for years, and its experiences and best practices can serve as a valuable resource for any organization or facility looking to bolster emergency communications for a single or multiple connected facilities. From creating a multi-channel alerting network over an existing IP network to connecting its systems to other first response organizations, the DoD has set the standard for effective emergency alerting. This paper outlines the parallels that can be drawn between facilities´ current needs and those of the DoD, and it outlines the dozen best practices that should be considered when selecting an emergency notification solution.

Communications-Enabled Business Processes: The Next Change Agent

Listen to the Podcast

July 16th, 2007

David Butler, Director of Business Solutions...David Butler, Avaya´s Director of Business Solutions and Partners in Emerging Technologies and Julien Courbe, BearingPoint´s Managing Director of Financial Services Technology join the Lippis Report podcast to discuss the emerging communications-enabled business processes (CEBP) market. CEBP promises to deliver a new kind of agile and competitive organization that can respond to business events quickly, satisfy customers more deeply and in the process create competitive barriers of entry. But how will CEBP be brought to market? Is CEBP customized for every corporation or will there be packaged or partially pre-defined and integrated solutions? Find out by listening to this podcast.

Purchase a Transcript of this Podcast: $25

We have many podcasts transcribed, however some we do not. In the case that your purchased podcast transcription is not available, a four day delay will occur. Thank you for your support.