eWEEK editors recommend new hardware, software and seniices that enterprise IT decision-makers should have on their radar.
rPath X6
rPath X6 is an laaS platform designed to allow development and QA and release engineers to visually construct systems, generate new images, and implement controlled updates and repairs. This enables the management of software and business services life cycle across physical, virtual and cloud environments with the click of a button. rPath X6 offers a "Pushbutton" user experience, which simplifies complex and arcane IT tasks and activities with a visual console driven by dragand-drop gestures and pushbutton commands. It also offers unified software and configuration automation, which allows software stacks to be personalized and activated through the editing of host configuration settings.
Mercury T3000L and T3000H
Developed for headquarters and data centers with large networks, the Mercury T3000 from Talari Networks is said to provide business-class (99.99 percent or greater) reliability and predictable performance by using inexpensive public WAN links. As a result, according to the company users gain 30 to I 00 times the bandwidth per dollar, can reduce monthly WAN service costs by 40 to 90 percent, and have greater reliability and application performance predictability than with existing private WANs that use single-provider Frame Relay or MPLS services. The Mercury T3000 is a 2U rack-mountable appliance that supports WAN bandwidth aggregation up to 500M bps downstream/500M bps upstream full-duplex, while offering I 28-bit AES encryption.
Nasuni Filer 2.0
Nasuni Filer 2.0 is a NAS-like virtual software appliance that links the LAN securely through the Internet to the customer's cloud provider This is designed to provide IT with a safe, accessible way to store local data in the cloud, while managing all aspects of the relationship with the cloud providerThe latest edition of the Nasuni Filer allows IT administrators to set and automatically enforce policies governing how long data stored in the cloud can be recovered after it is deleted (either by age or number of snapshots stored in the cloud). Once the last snapshot that contains a deleted file is retired, that file is permanently deleted.
GlobalSCAPE's MIX
GlobalSCAPE Managed Information Xchange, or MIX, enables an organization to securely exchange business-tobusiness data, including large files and sensitive data. This cloud-based MFT (managed file transfer) service allows enterprises to outsource part or all of their informationexchange needs, thereby reducing costs while increasing efficiencies. GlobalSCAPE recently expanded its cloud services by launching Hosted EFT Server This option is designed for small and midsize companies that want the scale, efficiency and cost-control benefits of a cloudbased MFT solution, but plan to manage the service with internal resources.
CORE INSIGHT Enterprise
Core Security's CORE INSIGHT Enterprise is an automated security testing and measurement solution that continuously and proactively assesses the security of an organization's critical information assets. By traversing exploitable Web application, network and client-side weaknesses throughout the enterprise, INSIGHT reveals paths of exposures to specific assets - providing metrics for validating security controls and addressing data breach threats. The product is designed to automatically pinpoint and trace key exposures within large, changing IT environments. The solution is able to scale to support 10,000 systems, Web applications and users.
Viewfinity's Local Admin Discovery Tool
The free Viewfinity Local Admin Discovery tool allows users to discover user accounts and groups that are members of the local "Administrators" built-in user group on computers in the Windows domain. The presence of "Local Administrators" can present an unwelcome opportunity for computer damage, according to Viewfinity resulting in troubleshooting and repair workfor IT and downtime for users. Often this damage - such as avirusormalware invasion - can jeopardize other computers in the network Having detailed information about which users and groups have administrator rights on corporate desktops allows companies to reassess who should have these rights. Once the Viewfinity analysis has been run, IT administrators can take action, if needed, by removing the users or suspicious groups from the Administrators group.
To get more information about these and other products, go to labs.eweek.com.

Комментариев нет:
Отправить комментарий