Integrating Windows, Linux, Unix, Macs on Computer Networks

Mixed Network Integration

Subscribe to Mixed Network Integration: eMailAlertsEmail Alerts newslettersWeekly Newsletters
Get Mixed Network Integration: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories

When it comes to security, the highest standard to date is the Payment Card Industry Data Security Standard (PCI DSS), a set of requirements for businesses that process payment card information. Developed by Visa, American Express, Discover Financial Services, and other members of the PCI Security Standards Council, the PCI DSS is a collection of policies, procedures, and practices to protect customer account data. The standard includes specific requirements for strictly controlling access to customer data, authenticating business users, monitoring access, maintaining a secure network, and auditing system resources. So, this is one tough standard to break, if followed correctly. But therein lies the rub, because according to a new study out from Verizon this week, a lot of companies aren’t completely following the PCI DSS well enough, which is leading to a marked in... (more)

Accessing Your File Server from Cloud

Here is another use case keeps coming up from customers using Gladinet Cloud. As one potential customer asked: “We search for a solution for our team. We have a file server with Active Directory for our projects, with a team of users travelling around. We need the files and folders accessible for team members outside of office, while other people working on the same project can continue to access files and folders from within the office.” Above is the main use case requirement, then he follows with the second requirement: “We don’t want the work to be solely in Web Interface, nor do we want applications to provide sync after users come back into office.” The second requirement can be translated into: Please provide real time direct access for both users in the office and users outside office. This usually requires a VPN like solution so remote user can login to the ... (more)

Host that Sorry Page on your BIG-IP!

It's not an uncommon problem trying to figure out where to plant that sorry page in the event your farm is down.  It's also not an uncommon solution to just use your BIG-IP to issue a text-only HTTP::respond.  It works, but it's not, how do you say, visually appealing?  You want to say sorry and mean it.  With pictures.  If you take a stroll through the iRules codeshare, you'll notice several solutions to this problem.  All of them work, with a variety of methods, but user kirkbauer's entry takes it to another level.  Kirk's sorry page irule generator (written in perl) takes all the guess work out of the process for you.  Dump the perl script in /var/tmp, give execute permissions to root, and off you go.  Here's a sample configuration, just taking Google's main page: [root@ltm01:Active] mibs # /var/tmp/ Welcome to the F5 Sorry Page iRule Generator This s... (more)

Google Apps Get Into Enterprise Provisioning Systems

An important milestone just got passed by Google – one of the big enterprise identity management vendors out there – Quest Software (full disclosure: I am working for the company) – has added Google Apps as a directory to which they can provision identities and access. One might argue that this is a small thing considering that Quest is by far not the first vendor to enter Google’s ecosystem. Google Solutions Marketplace lists a few hundred solutions and services around Google Apps and Enterprise Search. However, Quest is the first among the big systems management (Quest, HP, CA, BMC, Symantec) and identity management (Quest, Oracle, Sun, Novell) vendors to get in there and this is a very important milestone for Google’s acceptance in the enterprise. Technically, what Quest did was adding a Google Apps “connector” into their identity management and provisioning pla... (more)

HP StorageWorks Adds High-Performance File System

A high-performance, commercially-supported Windows-compatible file server, and advanced authentication are now available with some of the HP StorageWorks platforms. Likewise-CIFS provides the integrated SMB/CIFS solution for Windows client support and Likewise Identity Service provides authentication of non-Windows systems to Active Directory-making it easy to authenticate users, control access to applications and data, and improve security. "Clients with demanding workloads need to rapidly execute file transfers, while ensuring only authorized access to data," said Lee Johns, director, marketing, Unified Storage Division, HP. "The performance and scalability of the HP StorageWorks offerings coupled with Likewise's technology gives clients storage solutions that can grow with their business and provide multiprotocol access to data." Likewise-CIFS is a highly scala... (more)

Truesigna Unveils Zero-Footprint "Password-Less" Enterprise and Cloud Security Against Phishing and Online Fraud

Dallas, TX, February 09, 2012 --( Truesigna ( unveils an authentication solution that is novel, revolutionary and yet simple-to-use, helping companies replace the highly broken “password” technology. The solution practically eliminates passwords from the system and hence traditional Phishing, while helping to defeat key loggers, and session-hijacking. It offers orders of magnitude protection when compared to password technology without the need for any extra gadgets and communication channels. The solution is based on patented technology on user-centric authentication method, offers a viable alternative to passwords and yet retains the simplicity and ubiquitous password experience. Businesses can now authenticate and secure all their transactions including VPN and intranet access with this easy-to-use technology without any major ca... (more)

Is Cloud a Threat or an Opportunity for the Channel?

One of the key tenets of the Cloud is self-service. Anyone from an individual entrepreneur to an enterprise CIO with a valid credit card can subscribe to the Cloud. This has been the biggest driver of Cloud adoption especially among the startups and SMEs. While this is definitely an advantage for the Cloud providers and Cloud consumers, there is one entity in the ecosystem that is intimidated by this paradigm. And, that is the reseller community which is also known as the channel or the Value Added Reseller (VAR). Before we analyze whether Cloud is a threat or an opportunity for them, let’s see their role in the current context. Having worked for the world’s largest software product company, I witnessed the significance of a software reseller first hand. Any software company dealing with shrink-wrapped products classifies their customers into large enterprises, med... (more)

Centrify Announces Day One Support for Apple Mac OS X Mountain Lion With Active Directory-Based Security and Management

SUNNYVALE, CA -- (Marketwire) -- 07/25/12 -- Centrify Corporation, the leading provider of security and compliance solutions that centrally control, secure and audit access to cross-platform systems, mobile devices and applications, today announced that its DirectControl for Mac offering supports the just-released Apple Mac OS® X Mountain Lion operating system with Active Directory-based authentication, access control and Group Policy for users. As Mac computers continue to move onto corporate desktops, IT managers are looking for a way to accommodate their users' choices of platform without having to add additional management infrastructure and hire or train additional staff. While IT desktop support personnel can centrally configure security, desktop and application settings for PC users using Group Policy, Macs are still often managed on an ad-hoc basis, and adm... (more)

Job Posting: Vordel Solution Architect - Syrinx, Boston MA

Syrinx has an opening for a Vordel Solution Architect here in Boston, MA. The job specs are below: Significant background in security technologies such as single sign on, AD, Kerberos, SSL, SAML a plus - (direct experience with Vordel XML Gateway technologies strongly preferred) Experience with Java, JavaScripting, WebServices, XSLT, XML.Basic understanding of Networking and Routing concepts; Reverse Proxy, Load Balancing, TCP/IP, DNS.Security Vunerabilities; OWASP Top 10Knowledge of Security Authentication and Authorization; Certificates SSL/PKI ,SAML,OAM,RBAC,ABAC, STS, LDAP/Active Directory.Knowledge of APIs, REST, JSON, OAuth, SOA/Web services, Internet/network security standards and cryptography.Experience with: API business models; leading Web APIs (Facebook, Google, Twitter); RESTful interactions; HATEOAS; HTTP; HTTPs; JSON; WADL; Oauth, API Management. ... (more)

Introducing Gladinet Cloud Enterprise

Today Gladinet released Gladinet Cloud Enterprise. It is an installable cloud storage solution for enterprises concerned about security, control and compliance. It contains all the Gladinet Cloud Team Edition features you see on and packaged into a Windows Installer (MSI) package. Typically it is a 5-10 minutes installation and configuration process and it will be up and running immediately. Since the package can run onsite, there are some additional feature sets, such as deep Active Directory integration so existing Active Directory users can start using the Gladinet Cloud for Enterprise directly. Another additional benefit is that it allows using Enterprise’s own file server storage, or private OpenStack Swift storage, or private EMC Atmos storage as the backend storage. While, at the same time, if an Enterprise is comfortable with their own Amazo... (more)

Hyper-V Replica Broker Explained

Windows Server 2012 Hyper-V Replica is a built-in replication mechanism for Virtual Machines (VMs). It can in real-time or asynchronously replicate selected VMs from a primary site to a designated replica site across LAN/WAN. Here both a replica site and a primary site are either a Windows Server 2012 Hyper-V host or a Windows Server 2012 Failover Cluster. The former hosts replicated VMs, while the latter is where source VMs run. Hyper-V Replica is an attractive Business Continuity and Disaster Recovery (BCDR) solution since not only conceptually easy to understand, but technically straightforward to implement, as demonstrated by the following schematic and the lab introduced later in this article. Further, with many newly added capabilities and flexibilities in Windows Server 2012 such as Storage Space, continuously available file share, Hyper-V over SMB 3.0, etc. ... (more)