Hierarchy of Needs for Content Networking
|
|
- Lillian Bryan
- 8 years ago
- Views:
Transcription
1 Technology, M. Fabbi Research Note 28 October 2002 Hierarchy of Needs for Content Networking Enterprises should understand the hierarchy of needs for content networking, which is illustrated by examining increasing investments and the integration of Internet technologies into business processes. Core Topic Enterprise Networking: Network Equipment Vendors and Technologies Key Issue During the five-year planning period, which networking equipment vendors and technologies will enterprises use to successfully build their networks? The content networking market continues to evolve as established players re-target their offerings toward enterprise solutions, and new vendors seek to raise the bar with new functionality and integration. Understanding the evolution of this market and how it maps to enterprise requirements will help enterprises evaluate emerging content networking technologies. Hierarchy of Needs Gartner uses a model describing an enterprise's Web presence and preparedness to take advantage of Web technologies in its business processes. When considering the network infrastructure requirements that correspond to this model, an associated hierarchy of needs can be developed (see Figure 1). This hierarchy has paralleled the developments of new features for content networking products, such as load balancers, caches and bandwidth management devices, and continues to parallel venture capital investments and new developments from emerging and established market participants. Gartner Entire contents 2002 Gartner, Inc. All rights reserved. Reproduction of this publication in any form without prior written permission is forbidden. The information contained herein has been obtained from sources believed to be reliable. Gartner disclaims all warranties as to the accuracy, completeness or adequacy of such information. Gartner shall have no liability for errors, omissions or inadequacies in the information contained herein or for interpretations thereof. The reader assumes sole responsibility for the selection of these materials to achieve its intended results. The opinions expressed herein are subject to change without notice.
2 Figure 1 Hierarchy of Needs for Content Networking Web Presence Networking Implications Primary Design Principle Year Level 1 Basic Presence Reliable connectivity Basic server redundancy Basic Connectivity 1997 Level 2 Prospecting + High availability User-based redirection Traffic scalability Availability 2000 Level 3 Business Integration Level 4 Business Transformation + + Secure transactions Session persistence Performance optimization Content-based routing Scale Absolute availability Cost containment Management Performance Operational Efficiency Source: Gartner Research Level 1: Basic Connectivity Networking requirements are simple at this first stage provide reliable communications for a basic Web presence. For larger enterprises, this may include simple load-balancing capabilities to enable the Web site to scale to support more users. However, because there are no advanced applications or functions within the site, scale is only required to respond to volume, which can be done simply by adding servers and Layer 3/Layer 4 loadbalancing or clustering technologies. Because most enterprise Web initiatives have moved beyond this level, products that only provide basic connectivity functionality are obsolete or have been rolled into more-advanced offerings. Level 2: Availability Web initiatives at this level involve some degree of user interaction. This may take the form of explicit user login, the use of cookies to distinguish among users or segmenting users into service classes. Networking requirements are significantly more complex because the applications have become more critical to the enterprise, and applications and content are scaled to be tailored to different user classes, content types and applications. From a physical deployment perspective, the Web server architecture will no longer scale to fit onto an increasing number of identically configured servers. Logical groupings of servers to segment the suite of Web functions by user, content or application is the next step. 28 October
3 When moving into this environment, the network must make decisions based on the Web site's architecture. Thus, Layer 4-7 server load-balancing solutions that were developed. Mainstream products can examine the application data stream and redirect traffic using URLs, cookies and other application metrics. In addition, these products add persistence capabilities to ensure transaction completion. Previously, there were as many as 10 competitors in this space. However, the market has consolidated into five vendors: Cisco Systems, F5 Networks, Foundry Networks, Nortel Networks and Radware. The initial focus on availability was targeted within a single data center, and most of the fundamental requirements are now wellunderstood. Follow-up solutions target extended availability to accommodate multiple data centers (global redirection) and multiple Internet service providers (link determination). These new solutions continue to increase overall availability and reliability by taking advantage of redundant or geographically dispersed data centers, as well as redundant service providers. While significantly increasing availability, these new solutions also increase performance. Established vendors have added global redirection technologies by integrating them into their platforms or as stand-alone devices. The emerging market for link determination is a hotbed of startup innovation. Vendors in this area include netvmg, RouteScience, Sockeye Networks and Proficient Networks, as well as F5 and Radware. Level 3: Performance At this level, the Web site starts to deal with transactions that drive top-line revenue for the enterprise. User experiences are important for customer retention and service. For the network, this requires an increase focus on performance not simply looking at how quickly bits flow on the network, but also considering the performance of end-to-end interactions and transactions. A trend for the past 18 months is to migrate functions that reside on the server to dedicated hardware in network appliances. Major performance gains can be made simply by moving processor-intensive and repetitive functions from a general-purpose server to dedicated hardware solutions. The best examples of this trend are server-side caching/content delivery networks and SSL termination, which moved into dedicated appliances to offload processor-intensive functions. With SSL, the next step is emerging with the integration of dedicated SSL hardware into a wide range of high-performance optimization devices. Vendors with integrated solutions include Array Networks, Cisco and F5. Stand-alone and adjunct solutions are available from Ingrian Networks, Nortel, SonicWALL, Radware and others. Moving SSL functions into dedicated hardware enables Web servers to deal with at least an order of 28 October
4 magnitude more users while significantly improving overall endto-end performance. How devices deal with the requirements of connection/session management also is changing. Rather than simply acting as an intermediary between clients and servers and having a one-toone correlation between incoming requests and server connections, new network equipment is assuming the role of a connection proxy, to the benefit of user and server performance. This has most commonly been used to map to the server a huge volume of client HTTP sessions into a small number of persistent sessions. Emerging vendors NetScaler and Redline Networks offer this functionality, as do incumbents such as F5. Similar techniques are being applied to other processor-intensive session interactions, such as Nortel's management of back-end SSL sessions. Level 4: Operational Efficiency The next phase of the development of the content networking market is emerging. Until recently, enterprises with content networking requirements rarely looked at the cost (capital or operational) of content networking solutions. As the market moves toward mainstream enterprise deployment, moretraditional evaluation metrics become important. In addition, the rapid proliferation of point products in this market is ripe for functional, operational and device consolidation. It's not common to see an Internet data center (IDC) with as many as six or more different functional devices, each with different configuration and operational interfaces, and all of which must be connected by a reliable network architecture. New solutions are starting to take a holistic view of content network requirements within the IDC. There are two different philosophical approaches to consolidation. Some vendors are attempting to consolidate of all of the functions with a common platform or architecture. The other approach is to look at two different consolidation points, one inside and one outside the firewall (see Figure 2). We believe that there are two natural consolidation points within the IDC and, ultimately, vendors that support this architecture will be more successful. 28 October
5 Internet Service Provider A Figure 2 IDC Consolidation Points Trends Firewall Cache Web Server Internet Service Provider B Source: Gartner Research Edge Switch Link Determination Traffic Management/ Quality of Service Firewall Load Balancing Security Enforcement Engine Content Switch Server and Cache Load Balancing Layer 4-7 SSL Termination Connection Management Switching Platform Compression In addition to a simple consolidation of functions into morecomprehensive platforms, there is movement toward improved architectures, simpler management interfaces, and improved and automated interaction between content networking and other components within the IDC (such as servers and software). Several vendors are considering a content services switch, where the switch can provide high-speed packet parsing and switching functions with the ability to layer on a suite of services either integrated in the box in a closed architecture, or as part of an open platform when the content switch becomes an enforcement agent for other intelligent devices, such as firewalls, application filters, intrusion detection systems and others. These vendors include Array, F5 and Nortel. In addition, F5 is the leading provider of an open control plane (via its icontrol interface) to enable the automated control and configuration of F5 devices within the infrastructure. This functionality can significantly reduce the complexity and time required to modify complex configurations within the network. Bottom Line: Enterprises often take an overly tactical and shortterm view of their content networking requirements. They apply a temporary solution to a single problem, or a relatively simple application is used as a pilot that will evolve to a more-complex environment. Enterprises that can consider longer-term and more-comprehensive approaches to content networking, including using the hierarchy of needs model, will have stronger, better-performing, longer-lasting solutions. Although upfront capital costs likely will be higher, we believe that enterprises that take a more-strategic view of their IDC requirements will decrease their total costs by at least 15 percent, and will significantly increase the performance and reliability of their 28 October
6 infrastructure by enabling it to more quickly meet the changing needs of their businesses. 28 October
What Are Network Security Platforms?
Markets, J. Pescatore, M. Easley, R. Stiennon Research Note 7 November 2002 Network Security Platforms Will Transform Security Markets An integrated network security platform approach will increase network
More informationCIO Update: The Gartner Firewall Magic Quadrant for 2H02
IGG-09252002-03 R. Stiennon Article 25 September 2002 CIO Update: The Gartner Firewall Magic Quadrant for 2H02 In presenting its latest Firewall Magic Quadrant, Gartner discusses how the firewall market
More informationCisco Application Networking for IBM WebSphere
Cisco Application Networking for IBM WebSphere Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationOracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
More informationCisco Application Networking for BEA WebLogic
Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
More informationFirewall Market Trends
Markets, R. Stiennon Research Note 19 June 2003 Magic Quadrant for Enterprise Firewalls, 1H03 Deep packet inspection technology is driving the firewall market to an inflection point that is characterized
More informationThe Cisco ASA 5500 as a Superior Firewall Solution
The Cisco ASA 5500 as a Superior Firewall Solution The Cisco ASA 5500 Series Adaptive Security Appliance provides leading-edge firewall capabilities and expands to support other security services. Firewalls
More informationKey Findings. Recommendations. Overview. What You Need to Know. 1 of 5 10/11/2010 9:44 AM
1 of 5 10/11/2010 9:44 AM 27 April 2010 Mark Fabbi Gartner RAS Core Research Note G00200313 With the completion of the 3Com acquisition, HP will become a formidable competitor across the entire enterprise
More informationThe Application Delivery Controller Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate response times for end users and provide a high performance, highly secure and scalable foundation for Web applications and rich internet content, application networking
More informationDon't Pay to Support CRM 'Shelfware'
Tactical Guidelines, J. Disbrow Research Note 3 May 2003 Don't Pay to Support CRM 'Shelfware' Enterprises license customer relationship management solutions that are often never totally deployed. Software
More informationCIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader
IGG-04092003-04 M. Nicolett Article 9 April 2003 CIO Update: Gartner s IT Security Management Magic Quadrant Lacks a Leader Vendors in the Gartner IT Security Management Magic Quadrant for 1H03 are driven
More informationIP Centrex and IP Telephony Offer Different Capabilities
Competitive Analysis IP Centrex and IP Telephony Offer Different Capabilities Abstract: As IP Centrex and hosted IP telephony services become more mainstream, organizations must assess which solution is
More informationUnified Communications MQ Selection Criteria for 2003
Decision Framework, B. Elliot Research Note 22 January 2003 Unified Communications MQ Selection Criteria for 2003 Unified communications enable enterprises to control their communication options, leveraging
More informationThe Application Front End Understanding Next-Generation Load Balancing Appliances
White Paper Overview To accelerate download times for end users and provide a high performance, highly secure foundation for Web-enabled content and applications, networking functions need to be streamlined.
More informationCLOUD CLIENTS AND VIRTUAL CLIENTS
CLOUD CLIENTS AND VIRTUAL CLIENTS The Transformation of Virtual Desktops Through Mobility and Cloud Computing Over the past three years, the technology we used to know as virtual desktop infrastructure
More informationSSL VPN 1H03 Magic Quadrant
Markets, J. Girard Research Note 8 April 2003 SSL VPN 1H03 Magic Quadrant The emerging Secure Sockets Layer virtual private network market is standards-based, with good short-term return on investment
More informationNetsweeper Whitepaper
Netsweeper Inc. Corporate Headquarters 104 Dawson Road Suite 100 Guelph, ON, Canada N1H 1A7 CANADA T: +1 (519) 826 5222 F: +1 (519) 826 5228 Netsweeper Whitepaper Deploying Netsweeper Internet Content
More informationDefinition of the Market
Markets, M. Halama Research Note 9 September 2003 Criteria for Pan-European Web Hosting Magic Quadrant, 2H03 Web hosting firms offer greatly differing services to a wide range of customers. Our criteria
More informationThe Importance of Secure URL Re-Write
The Importance of Secure URL Re-Write Overview Because of their significant performance benefits and their ability to enable secure content networking, SSL offloaders have emerged as an integral component
More informationMagic Quadrant for Corporate Telephony in EMEA, 2003
Markets, S. Blood, C. Lock Research Note 2 September 2003 Magic Quadrant for Corporate Telephony in EMEA, 2003 Cisco and Alcatel continue to offer the market's most comprehensive corporate propositions.
More informationThe Evolution of Application Acceleration:
WHITE PAPER The Evolution of Application Acceleration: From Server Load Balancers to Application Delivery Controllers www.crescendonetworks.com Corporate Headquarters 6 Yoni Netanyahu Street Or-Yehuda
More informationWhite Paper A10 Thunder and AX Series Application Delivery Controllers and the A10 Advantage
White Paper A10 Thunder and AX Series Application Delivery Controllers and the A10 Advantage June 2013 WP_ADC 062013 Disclaimer This document does not create any express or implied warranty about A10 Networks
More information5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP
5 Key Reasons to Migrate from Cisco ACE to F5 BIG-IP With support for Cisco ACE load balancer ending, organizations need to find an alternative. Contents Introduction 3 Advanced Architecture 3 Ease of
More informationEnterprise Resource Planning Software Market: Europe, 2002 (Executive Summary) Executive Summary
Enterprise Resource Planning Software : Europe, 2002 (Executive Summary) Executive Summary Publication Date: 20 August 2003 Authors Fabrizio Biscotti Chris Pang Chad Eschinger This document has been published
More informationManagement Update: The Cornerstones of Business Intelligence Excellence
G00120819 T. Friedman, B. Hostmann Article 5 May 2004 Management Update: The Cornerstones of Business Intelligence Excellence Business value is the measure of success of a business intelligence (BI) initiative.
More informationGovernment Insights: Possible IT Budget Cuts
Tactical Guidelines, J. Kost Research Note 6 January 2003 Government Insights: Possible IT Budget Cuts In tough economic times, government leaders pressure CIOs to reduce IT budgets. Although IT investments
More informationBusiness Value Drives VoIP and IP-Telephony Layering
Decision Framework, B. Elliot Research Note 16 July 2003 Business Value Drives VoIP and IP-Telephony Layering Enterprises must view IP telephony and voice over IP projects as functional layers composed
More informationEMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02
Decision Framework, J. Radcliffe Research Note 26 September 2002 EMEA CRM Analytics Suite Magic Quadrant Criteria 3Q02 Europe, the Middle East and Africa Customer Relationship Management Analytics Suite
More informationMicrosoft SharePoint 2010 Deployment with Coyote Point Equalizer
The recognized leader in proven and affordable load balancing and application delivery solutions Deployment Guide Microsoft SharePoint 2010 Deployment with Coyote Point Equalizer Coyote Point Systems,
More informationAppDirector Load balancing IBM Websphere and AppXcel
TESTING & INTEGRATION GROUP SOLUTION GUIDE AppDirector Load balancing IBM Websphere and AppXcel INTRODUCTION...2 RADWARE APPDIRECTOR...3 RADWARE APPXCEL...3 IBM WEBSPHERE...4 SOLUTION DETAILS...4 HOW IT
More informationStingray Traffic Manager Sizing Guide
STINGRAY TRAFFIC MANAGER SIZING GUIDE 1 Stingray Traffic Manager Sizing Guide Stingray Traffic Manager version 8.0, December 2011. For internal and partner use. Introduction The performance of Stingray
More informationHow To Make A Call Center More Independent From The Physical Infrastructure
Market Analysis Software Suites Will Dominate Europe's Call Center Market Abstract: By 2006, sales of IP-based call centers in Europe will exceed those of TDM systems, but adoption of independent server-based
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More informationClinical Decision Support: Core Capability of Evolving CPR
Tutorials, B. Hieb, M.D. Research Note 6 November 2003 Clinical Decision Support: Core Capability of Evolving CPR More-sophisticated computer-based patient record systems can offer increasing value to
More informationTHE CHANGING LINUX LANDSCAPE. The cloud, community distributions and devops are dramatically impacting the market
THE CHANGING LINUX LANDSCAPE The cloud, community distributions and devops are dramatically impacting the market Trends such as cloud computing and devops whereby application development and deployment
More informationBackground. Industry: Challenges: Solution: Benefits: APV SERIES CASE STUDY Fuel Card Web Portal
Industry: Energy; Retail & ecommerce Challenges: Deliver an optimal user experience by balancing traffic across multiple leased links Balance user access and application operation requests among back-end
More informationFrom Secure Virtualization to Secure Private Clouds
From Secure Virtualization to Secure Private Clouds Gartner RAS Core Research Note G00208057, Neil MacDonald, Thomas J. Bittman, 13 October 2010, RV2A108222011 As enterprises move beyond virtualizing their
More informationAV@ANZA Formación en Tecnologías Avanzadas
DESIGNING CISCO DATA CENTER APPLICATION SERVICES (CI-DCASD) Temario This is an instructor-led, lecture/lab course. You will learn how to deploy and configure intelligent network services using the Cisco
More informationDeploying Firewalls Throughout Your Organization
Deploying Firewalls Throughout Your Organization Avoiding break-ins requires firewall filtering at multiple external and internal network perimeters. Firewalls have long provided the first line of defense
More informationManagement Update: CRM Success Lies in Strategy and Implementation, Not Software
IGG-03122003-01 D. Hagemeyer, S. Nelson Article 12 March 2003 Management Update: CRM Success Lies in Strategy and Implementation, Not Software A customer relationship management (CRM) package doesn t ensure
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationConfiguring Citrix NetScaler for IBM WebSphere Application Services
White Paper Configuring Citrix NetScaler for IBM WebSphere Application Services A deployment guide for configuring NetScaler load balancing and content switching When deploying IBM WebSphere Application
More informationLoad Balancing for Microsoft Office Communication Server 2007 Release 2
Load Balancing for Microsoft Office Communication Server 2007 Release 2 A Dell and F5 Networks Technical White Paper End-to-End Solutions Team Dell Product Group Enterprise Dell/F5 Partner Team F5 Networks
More informationGetting More Performance and Efficiency in the Application Delivery Network
SOLUTION BRIEF Intel Xeon Processor E5-2600 v2 Product Family Intel Solid-State Drives (Intel SSD) F5* Networks Delivery Controllers (ADCs) Networking and Communications Getting More Performance and Efficiency
More informationManagement Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor
IGG-10232002-02 P. Phelan Article 23 October 2002 Management Update: Selecting the Right ERP II Service Partner Is a Critical Success Factor Service partner relationships will grow to enable more holistic
More informationIntel Network Builders: Lanner and Intel Building the Best Network Security Platforms
Solution Brief Intel Xeon Processors Lanner Intel Network Builders: Lanner and Intel Building the Best Network Security Platforms Internet usage continues to rapidly expand and evolve, and with it network
More informationAccelerate Your Enterprise Private Cloud Initiative
Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service
More informationAlteon Application Switch Microsoft SharePoint 2013 Integration Guide
Alteon Application Switch Microsoft SharePoint 2013 Integration Guide Version 29.0 March 13, 2013 TABLE OF CONTENTS SOLUTION OVERVIEW...3 MICROSOFT SHAREPOINT 2013...4 RADWARE ALTEON ADC...4 ALTEON AND
More informationDefining the PLM Magic Quadrant by Criteria and Use. We provide the methodology used in developing our product life cycle management Magic Quadrant.
Markets, M. Halpern Research Note 18 March 2003 Defining the PLM Magic Quadrant by Criteria and Use We provide the methodology used in developing our product life cycle management Magic Quadrant. Core
More informationBuilding a Systems Infrastructure to Support e- Business
Building a Systems Infrastructure to Support e- Business NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THE DOCUMENT. Any product and related material disclosed herein are only furnished pursuant and subject
More informationSuccessfully Deploying Globalized Applications Requires Application Delivery Controllers
SHARE THIS WHITEPAPER Successfully Deploying Globalized Applications Requires Application Delivery Controllers Whitepaper Table of Contents Abstract... 3 Virtualization imposes new challenges on mission
More informationWeb Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
More informationRadware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide
Radware s AppDirector and Microsoft Windows Terminal Services 2008 Integration Guide Contents SOLUTION OVERVIEW... 2 RADWARE APPDIRECTOR OVERVIEW... 2 MICROSOFT WINDOWS TERMINAL SERVICES 2008... 2 SOLUTION
More informationHow Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary
How Deal Size Matters in IT Infrastructure Outsourcing (Executive Summary) Executive Summary Publication Date: 2 January 2004 Author Bruce M. Caldwell This document has been published to the following
More informationGlobal Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
W H I T E P A P E R A p p l i c a t i o n D e l i v e r y f o r C l o u d S e r v i c e s : C u s t o m i z i n g S e r v i c e C r e a t i o n i n V i r t u a l E n v i r o n m e n t s Sponsored by: Brocade
More informationConsolidating Multiple Network Appliances
October 2010 Consolidating Multiple s Space and power are major concerns for enterprises and carriers. There is therefore focus on consolidating the number of physical servers in data centers. Application
More informationMicrosoft SharePoint 2013 with Citrix NetScaler
Deployment Guide Microsoft SharePoint 2013 with Citrix NetScaler Deployment Guide citrix.com Table of contents Introduction 3 NetScaler value-add to SharePoint 4 Product versions and prerequisites 4 Deploying
More information2016 Trends in Storage
PREVIEW 2016 Trends in Storage DEC 2015 Henry Baltazar, Research Director Though storage is far from dead, change is coming in the shape of new form factors such as hyperconverged infrastructures and disruptive
More informationGuide to Deploying Microsoft Exchange 2013 with Citrix NetScaler
Deployment Guide Guide to Deploying Microsoft Exchange 2013 with Citrix NetScaler Extensive guide covering details of NetScaler ADC deployment with Microsoft Exchange 2013. Table of Contents Introduction
More informationBSM Definition, Drivers and Inhibitors
Events, D. Curtis, M. Govekar Research Note 11 August 2003 BMC Positions Itself for Business Service Management BMC Software's announcement of its business service management strategy is solidified by
More informationPredicts 2004: Supplier Relationship Management
Strategic Planning, D. Hope-Ross Research Note 17 November 2003 Predicts 2004: Supplier Relationship Management Enterprises using technology to improve supplier relationships should pay attention to changes
More informationApplication Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide
Application Delivery Controller (ADC) Implementation Load Balancing Microsoft SharePoint Servers Solution Guide January, 2009 North America Radware Inc. 575 Corporate Dr., Lobby 1 Mahwah, NJ 07430 Tel:
More informationCIO Update: Enterprise Security Moves Toward Intrusion Prevention
IGG-06042003-03 J. Pescatore, R. Stiennon Article 4 June 2003 CIO Update: Enterprise Security Moves Toward Intrusion Prevention As targeted hacker attacks increase, intrusion prevention is gaining importance
More informationGartner delivers the technology-related insight necessary for our clients to make the right decisions, every day.
Gartner delivers the technology-related insight necessary for our clients to make the right decisions, every day. 2008 Gartner, Inc. and/or its affiliates. All rights reserved. Gartner is a registered
More informationCoyote Point Systems White Paper
Five Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance. Coyote Point Systems White Paper Load Balancing Guide for Application Server Administrators
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationCNS-208 Citrix NetScaler 10 Essentials for ACE Migration
KURSBESCHREIBUNG CNS-208 Citrix NetScaler 10 Essentials for ACE Migration The objective of the Citrix NetScaler 10 Essentials for ACE Migration course is to provide the foundational concepts and advanced
More informationZeus Extensible Traffic Manager in Virtualized Hosting Environments.
Zeus Extensible Traffic Manager in Virtualized Hosting Environments. Zeus Technology Limited Sales: +44 (0)1223 568555 The Jeffreys Building Main: +44 (0)1223 525000 Cowley Road Fax: +44 (0)1223 525100
More informationImplementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing
Implementing Microsoft Office Communications Server 2007 With Coyote Point Systems Equalizer Load Balancing WHITE PAPER Prepared by: Mark Hoffmann Coyote Point Systems Inc. Abstract: This white paper describes
More informationUsers and Vendors Speak Out: Intrusion Detection and Prevention
Market Analysis Users and Vendors Speak Out: Intrusion Detection and Prevention Abstract: With network security concerns multiplying, intrusion protection systems are a hot commodity. But don't count out
More informationStrategic Sourcing Magic Quadrant Criteria: An Explanation
Markets, D. Hope-Ross, J. Woods Research Note 14 March 2003 Strategic Sourcing Magic Quadrant Criteria: An Explanation A new Gartner Magic Quadrant for strategic sourcing applications is being introduced.
More informationA Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC. September 18, 2014.
A Presentation at DGI 2014 Government Cloud Computing and Data Center Conference & Expo, Washington, DC September 18, 2014 Charles Sun www.linkedin.com/in/charlessun @CharlesSun_ 1 What is SDN? Benefits
More information5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance
5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance DEPLOYMENT GUIDE Prepared by: Jim Puchbauer Coyote Point Systems Inc. The idea of load balancing
More informationSelection Requirements for Business Activity Monitoring Tools
Research Publication Date: 13 May 2005 ID Number: G00126563 Selection Requirements for Business Activity Monitoring Tools Bill Gassman When evaluating business activity monitoring product alternatives,
More informationThe Evolution of Traffic Management Systems Peter Christy, NetsEdge Research Group, September 2001
The Evolution of Traffic Management Systems Peter Christy, NetsEdge Research Group, September 2001 In the last five years traffic management systems have grown from obscure and exotic technology to a standard
More informationBusiness Case for a DDoS Consolidated Solution
Business Case for a DDoS Consolidated Solution Executive Summary Distributed denial-of-service (DDoS) attacks are becoming more serious and sophisticated. Attack motivations are increasingly financial
More informationNGFWs will be most effective when working in conjunction with other layers of security controls.
Research Publication Date: 12 October 2009 ID Number: G00171540 Defining the Next-Generation Firewall John Pescatore, Greg Young Firewalls need to evolve to be more proactive in blocking new threats, such
More informationThe Data Management of Things
The Data Management of Things THE IMPLICATIONS OF IOT FOR DATA ANALYTICS The Internet of Things (IoT) is placing new demands on data storage, networking, processing and analytics. For end users, vendors
More informationSPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER
SPECIAL REPORT ENTERPRISE-CLASS SPAM SOLUTIONS A Q&A SESSION WITH GARTNER Exclusive Gartner Analyst Interview with Arabella Hallawell As e-mail volume continues to increase, enterprises are faced with
More informationCOM-19-8868 M. Margevicius
M. Margevicius Research Note 11 September 2003 Commentary TCO Comparison of s vs. Notebooks Differences in technology, price, life cycles and usage patterns dictate that notebook total cost of ownership
More informationWhat CIOs Want to Know About Microsoft Active Directory
IGG-01222003-01 J. Enck Article 22 January 2003 What CIOs Want to Know About Microsoft Active Directory Active Directory deployments are increasing and so are questions about the technology. Gartner addresses
More informationThe Critical Role of an Application Delivery Controller
The Critical Role of an Application Delivery Controller Friday, October 30, 2009 Introduction In any economic environment a company s senior management expects that their IT organization will continually
More informationA10 Thunder and AX Series
WHITE PAPER A10 Thunder and AX Series Evolution of ADCs: The A10 Advantage over Legacy Load Balancers Table of Contents A10 Thunder ADC: Application Delivery Evolved... 3 Business Challenges Solved by
More informationRadware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic
TESTING & INTEGRATION GROUP SOLUTION GUIDE Radware s AppDirector and AppXcel An Application Delivery solution for applications developed over BEA s Weblogic Contents INTRODUCTION... 2 RADWARE APPDIRECTOR...
More informationCNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration
CNS-208 Citrix NetScaler 10.5 Essentials for ACE Migration The objective of the Citrix NetScaler 10.5 Essentials for ACE Migration course is to provide the foundational concepts and advanced skills necessary
More informationOmniCube. SimpliVity OmniCube and Multi Federation ROBO Reference Architecture. White Paper. Authors: Bob Gropman
OmniCube SimpliVity OmniCube and Multi Federation ROBO Reference Architecture White Paper Authors: Bob Gropman Date: April 13, 2015 SimpliVity and OmniCube are trademarks of SimpliVity Corporation. All
More informationVirtualized Security: The Next Generation of Consolidation
Virtualization. Consolidation. Simplification. Choice. WHITE PAPER Virtualized Security: The Next Generation of Consolidation Virtualized Security: The Next Generation of Consolidation As we approach the
More informationBrocade One Data Center Cloud-Optimized Networks
POSITION PAPER Brocade One Data Center Cloud-Optimized Networks Brocade s vision, captured in the Brocade One strategy, is a smooth transition to a world where information and applications reside anywhere
More informationIP Contact Centers Approach Maturity
Decision Framework, S. Blood, T. Wright Research Note 11 December 2002 IP Contact Centers Approach Maturity Enterprises should evaluate IP-based contact-center applications and next-generation architecture
More informationCisco and Citrix Solution
Cisco and Citrix Solution Build Application-Centric Data Centers with Application Delivery Controllers 2014 Cisco Citrix. All rights reserved. Page 1 What You Will Learn Cisco Application Centric Infrastructure
More information7 Easy Steps to Implementing Application Load Balancing For 100% Availability and Accelerated Application Performance
The recognized leader in proven and affordable load balancing and application delivery solutions White Paper 7 Easy Steps to Implementing Application Load Balancing For 100% Availability and Accelerated
More informationWebEx Security Overview Security Documentation
WebEx Security Overview Security Documentation 8/1/2003: WebEx Communications Inc. WebEx Security Overview WebEx Security Overview Introduction WebEx Communications, Inc. provides real-time communication
More informationAbout. Resonate Global Dispatch Microsoft UAG environments. Intelligent Load Balancing for Smarter Networks and Applications
Intelligent Load Balancing for Smarter Networks and Resonate Global Dispatch Microsoft UAG environments About With today s increasing need to be constantly connected, corporations require platforms that
More informationClavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication
Feature Brief Policy-Based Server Load Balancing March 2007 Clavister SSP Security Service Platform firewall VPN termination intrusion prevention anti-virus content filtering traffic shaping authentication
More informationAdvanced Core Operating System (ACOS): Experience the Performance
WHITE PAPER Advanced Core Operating System (ACOS): Experience the Performance Table of Contents Trends Affecting Application Networking...3 The Era of Multicore...3 Multicore System Design Challenges...3
More informationFebruary 2014. Considerations When Choosing a Secure Web Gateway
February 2014 Considerations When Choosing a Secure Web Gateway Introduction Evaluating a Secure Web Gateway (SWG) can be a complicated process and nothing is better than testing a solution in your own
More informationBusiness Case for Data Center Network Consolidation
Business Case for Data Center Network Consolidation Executive Summary Innovations in cloud, big data, and mobility as well as users expectations for anywhere, anytime, and any device access are defining
More informationCisco and Citrix: Building Application Centric, ADC-enabled Data Centers
: Building Application Centric, ADC-enabled Data Centers Cisco Application Centric Infrastructure (ACI) integrates Citrix NetScaler Application Delivery Controller (ADC) appliances to reduce deployment
More informationTIME TO RETHINK PERFORMANCE MONITORING
TIME TO RETHINK PERFORMANCE MONITORING New requirements for application awareness and support for unified communications are challenging performance monitoring appliance vendors to reconsider their approach.
More information