The implications of VMware's NSX network virtualization platform
VMware used its time at last month's VMworld to promote its NSX network virtualization platform -- a platform it boasts can "deliver the entire networking and security model in software." NSX is part of a broader networking and security vision that will include other cloud platforms like OpenStack. According to Jon Oltsilk, ESG senior principal analyst, this "vision" that VMware has concocted has a good chance of becoming a reality somewhere down the road, but for now he believes there are many obstacles that must be overcome. Among the challenges: the need to ensure collaboration among IT teams, a dearth of NSX skill sets and a pronounced lack of confidence in existing virtual networking and security functionality.
Read more about VMware's vision and the obstacles at hand.
Securing a DMVPN spoke
Is your office remote? A dynamic multipoint virtual private network (DMVPN) might be a useful technology to consider. DMVPN is a network that allows data to be securely exchanged between sites without passing through a company's primary VPN server or router -- ideal for connecting remote sites with all other sites, and not just a company's headquarters. In this blog, Charles Galler, a network and UC engineer, outlines how to build such configurations and how to regulate and secure inbound and outbound network traffic.
For more detailed description on how to set up a DMVPN and secure spokes, check out this blog.
Contextual computing could solve your distraction woes
We are in a mobile age where it is easier to be productive on the go, but it's also easier to be distracted by a constant bombardment of tweets, status updates, texts and phone calls. Sure, you can turn off your phone alerts -- but somehow some other device will find you and demand your attention. According to Brian Katz, the solution to this problem is contextual computing. Contextual computing consists of applications that can provide you with the information you need at the appropriate times, in the process anticipating your needs before you even know you have them. As Katz writes, "You wake up in the morning and as you get up today's weather is displayed next to your schedule so you can figure out what to wear. You're running a little early but the car has less than a half a tank of gas so your navigation system directs you to a gas station with the best price but on your way into work. You sit down at work and have to start a proposal, when the phone comes in range of your desk, the word doc that you started yesterday opens up and is displayed ready for you to go. "
To learn more about contextual computing and the art of balancing your needs, read this article.
Network-based mobile device management: Transforming NAC
Network Access Controls (NAC) provide a way for companies to give certain employees access to the network they need, and keep questionable devices and people from accessing important company data. Further integration allows credentials to be attached to access a certain virtual local area network (VLAN). According to Philip Clarke, senior research analyst at Nemertes Research, the growing number of mobile devices is fueling the need for a more finely-detailed control to combat over-usage of IT resources. Enter network-based mobile device management (NMDM). NMDM, writes Clarke, is similar to NAC, but is better equipped to deal with the influx of mobile devices.
Learn more about NMDM and how adopting the technology can help manage your network in a mobile device-centric era.
This was first published in September 2013