Tuesday, April 14, 2009

One Minute Video: Evolved Packet Core







id='single2'
name='single2'
src='player.swf'
width='640'
height='390'
bgcolor='undefined'
allowscriptaccess='always'
allowfullscreen='true'
wmode='transparent'
flashvars='file=http://www.youtube.com/watch?v=73vK4FRGjdw&image=http://www.convergedigest.com/images/screens/epc1-screen.jpg&skin=beelden&skin=/jwplayer/beelden.zip&plugins=gapro-1&gapro.accountid=UA-21408860-1'/>
http://www.alcatel-lucent.com

One Minute Video: Application-assured Business VPNs







id='single2'
name='single2'
src='player.swf'
width='640'
height='390'
bgcolor='undefined'
allowscriptaccess='always'
allowfullscreen='true'
wmode='transparent'
flashvars='file=http://www.youtube.com/watch?v=73vK4FRGjdw&image=http://www.convergedigest.com/images/screens/epc1-screen.jpg&skin=beelden&skin=/jwplayer/beelden.zip&plugins=gapro-1&gapro.accountid=UA-21408860-1'/>
http://www.alcatel-lucent.com

One Minute Video: Stepping Up Ethernet








presented by: Houman Modarreshttp://www.alcatel-lucent.com

One Minute Video: Beamforming





http://www.quantenna.com

Alcatel-Lucent's LGS Wins Prime Contractor Spot on GSA's Alliant Contract

LGS, the subsidiary of Alcatel-Lucent dedicated to serving the U.S. government community, has won a prime contractor spot on the U.S. General Services Administration (GSA) Alliant Government-Wide Acquisition Contract (GWAC). LGS was one of 59 companies selected to compete for projects under the Alliant contract, which has a ceiling of US$50 billion.


As a government-wide acquisition contract, Alliant offers a way for both civilian and Department of Defense agencies worldwide to purchase all components of integrated Information Technology (IT) solutions in three major areas including Infrastructure, Application Services and IT Management. LGS will compete for government projects over a five-year base period, which may be extended for one five-year period.
http://www.LGSinnovations.com

Hurricane Electric Interconnects with 400+ IPv6 Networks

Hurricane Electric, which provides colocation and IPv6 Internet backbone services, announced that its network now connects with over 400 IPv6 networks. The company said it has quickly surpassed its Q3 2008 IPv6 peering milestone, increasing its number of connected networks by 33%.


"It's only a matter of time before IPv4 address space runs out completely," said Mike Leber, president of Hurricane Electric. "We're doing our part to ensure the smooth transition to the inevitable IPv6 Internet."


In addition to their network growth, Hurricane Electric is known for its services to the industry. IPv6 Self Certification and the free IPv6 tunnel broker service, located at http://tunnelbroker.net, allow network engineers, system administrators, and end users to participate in the future of the Internet.
http://ipv6.he.net

Solera Networks Raises $7 Million for Network Forensics

Solera Networks, a start-up based in Utah, has raised an additional $7 million in Series B venture funding for its network forensics software solutions.


Solera Networks has made significant advancements in high-speed network forensics solutions for both virtual and physical networks, including technology to capture, index, search, and replay all network traffic. Solera Networks' flagship product is the DS Series, a line of high-performance network forensics appliances, including software-only virtual appliances that capture, record, search and archive 100% of network traffic at speeds up to 10Gbps. DS appliances sit passively on the network, undetected, not impacting the performance of the network in any way. Captured traffic is written to an adaptive replacement cache and presented in multiple industry-standard formats, including PCAP, or as regenerated traffic delivered at recorded, throttled or accelerated playback speeds. Regenerated traffic appears to other devices or segments as normal network traffic with all original metadata.


The new funding was led by new investor Allegis Capital. Solera Networks' existing investor, Canopy Ventures, is also participating in the round. Proceeds from the funding will be used to accelerate growth in sales and marketing activities, including opening the company's new office in Washington, DC and expansion of its Japanese operations.


Solera Networks president and CEO, Steve Shillingford said, "We've always believed that today's information assurance strategies are missing a fundamental component - the ability to go back in time to quickly find the source of a breach, remediate the failure, and fortify the network. We see this funding as validation for the need to shift toward planning for these inevitable failures by investing in network forensics solutions like those from Solera Networks."http://www.soleranetworks.com

Orange Business Services Partners with Indonesia's PT Telekomunikasi

Orange Business Services and PT Telekomunikasi Indonesia (TELKOM), Indonesia's leading telecommunications and network services provider, announced a partnership to provide advanced network services including IP VPN to Indonesian and multinational enterprises in the country. At the same time, Orange also appointed TELKOM as a distributor of its global network services to meet the needs of TELKOM customers who are expanding in international markets.


"As the principal provider of telecommunications services in Indonesia, TELKOM is focused on expanding and improving our service capabilities in Indonesia," said Rinaldi Firmansyah, CEO of PT Telekomunikasi Indonesia. "We are pleased to partner Orange Business Services to deliver the sophisticated ICT solutions that companies in Indonesia need to remain globally competitive. Furthermore this cooperation will enhance our product portfolio to provide our corporate customers more choices with more reliable services, and at the end, it will give us the opportunity to serve our customers better.
http://www.orange-business.com
http://www.telkom.co.id

Xilinx Announces Restructuring, Job Cuts

Xilinx expects to reduce its global workforce by up to 200 positions, or 6%, resulting in a pre-tax charge of approximately $11 to $13 million in the June quarter primarily related to severance pay expenses. Additionally, Xilinx is implementing other short-term cost savings including executive salary reductions and a broad-based employee salary freeze. Over the longer term, the company expects to implement further supply chain efficiencies. This is expected to result in changes to the structure and location of certain global operations, which are expected to provide the company with further cost savings over time.
http://www.xilinx.com

Tellabs Partners with KGP Logistics

Tellabs is partnering with supply chain specialist KGP Logistics to increase solution availability to Independent Operating Companies (IOCs) in North America. Tellabs said this partnership enables it to focus on what it does best: creating innovative technology solutions to help service providers succeed. IOCs provide telephone, Internet, business, wireless and other telecom services in defined rural and suburban areas.


KGP plans combine the Tellabs 1000 Multiservice Access Platform with a full range of equipment sourcing, logistics, deployment solutions and best-in-class technology. KGP will offer IOCs customized network solutions to deliver advanced services to users.
http://www.tellabs.com

Deutsche Telekom's "Rain of Flowers" Marketing Campaign

Deutsche Telekom is covering the Berlin television tower at Alexanderplatz with the "longest love message in the world" as part of a new "Rain of Flowers" marketing campaign.


"With its brand promise 'Life is for sharing', Deutsche Telekom wants to help those who want to share special moments with others," explained Hans-Christian Schwingen, Head of Brand Strategy and Marketing Communication.


During the FIFA World Cup in 2006, DT transformed the sphere of the TV tower into a landmark ball commemorating the event.
http://www.telekom.com

Alcatel-Lucent Launches Web Services Gateway Release 3.0

Alcatel-Lucent announced Release 3.0 of its OmniAccess 8550 Web Services Gateway (WSG), a Service Oriented Architecture (SOA) appliance that lets enterprises and service providers deliver an open and secure Web services environment for their customers' business-to-business transactions and Web 2.0 services.
Protected by the Web Services Gateway, a service provider could allow an entertainment company, for example, to provide its movie schedule information to a user without jeopardizing either the third party or service provider's security.


Key technology developments in the Alcatel-Lucent 8550 WSG Release 3.0 include:


  • Detailed, context-sensitive capture of usage patterns that lets organizations monitor and adapt to security breaches -- including fraudulent transactions from trusted users


  • Efficient, flexible, high-performance policy evaluation and contextual policy enforcement for protection of private information


  • Granular views of user-centric Web services, ensuring authorized individuals (including those offering third-party services) have access to the information they require


  • Enhanced monitoring of user interactions and Web services, ensuring specified service level agreements.
http://www.alcatel-lucent.com

Alcatel-Lucent Releases New OmniSwitch OS

Alcatel-Lucent released a new version of its OmniSwitch OS with various security enhancements. The Alcatel-Lucent Operating System 6.3.4 release expands the OmniSwitches security features set enabling:

  • The network to evaluate and enforce endpoint device health: With the CyberGatekeeper Host Integrity Check agent now integrated into the OmniSwitch, it will restrict end-user access to remediation servers only.


  • The creation of easily defined "user profiles" mapped to network and security policies: This allows an IT manager to set user profiles based on an individual's role in the organization that define access for network, application, priority, bandwidth and compliance needs.


  • The delivery of captive portal as an explicit, web-based user authentication option: Captive portal captures packets for a non-authenticated user and redirects to a predefined web page that asks the user to provide his credentials to be authenticated before being allowed to the network. This is in addition to already available authentication methods through Alcatel-Lucent Access Guardian and safely allows controlled network access for guests with uncontrolled endpoint devices.


In addition, this AOS release brings an entire set of new features improving network availability, performance and uptime, with in particular Ethernet Ring Protection (ERP), compliant with ITU-T G.8032 standard, maintaining a loop-free topology, data path redundancy and fast recovery times of less than 50 milliseconds for Ethernet ring topologies.
http://www.alcatel-lucent.com

Telefónica and Nokia Partner to Mobilize Education in Latin America

Telefónica and Nokia have signed a strategic agreement to bring educational content to remote schools in Latin America through the use of mobile technology. The agreement will help expand the current scope of Telefónica Foundation's "Proniño" and "Educared" social programs. The first implementation is planned for Chile, where Telefonica's mobile broadband and Nokia's mobile software will enable isolated schools to have access to high quality educational content. The agreement will be later expanded to other countries in Latin America and will prioritize schools where Proniño works.


During the annual Telefónica Leadership Conference, which is taking place this week in Miami, Telefónica COO Julio Linares, said: "This agreement fits our Spirit of Progress, which implies that we want to enhance people's lives as well as the progress of the communities where we operate, by delivering innovative services based on information and communications technologies. Wireless connectivity opens up strong opportunities of development and integration in Latin America".


Nokia's CEO, Olli-Pekka Kallasvuo, who was a guest speaker at the conference, said: "This partnership demonstrates the significant social benefits that mobile technology can deliver, reaching communities and children who previously had very limited educational opportunity in an inspiring and accessible way."http://www.educared.nehttp://www.telefonica.es

Verizon Business 2009 Data Breach Study Finds Significant Rise in Targeted Attacks

More electronic records were breached in 2008 than the previous four years combined, fueled by a targeting of the financial services industry and a strong involvement of organized crime, according to the "2009 Verizon Business Data Breach Investigations Report" (DBIR) released this week.


This second annual study -- based on data analyzed from Verizon Business' actual caseload comprising 285 million compromised records from 90 confirmed breaches -- revealed that corporations fell victim to some of the largest cybercrimes ever during 2008. The financial sector accounted for 93 percent of all such records compromised last year, and a staggering 90 percent of these records involved groups identified by law enforcement as engaged in organized crime.


"The compromise of sensitive information increased dramatically in 2008, and it's past time to be vigilant about enterprise security," said Dr. Peter Tippett, vice president of research and intelligence for Verizon Business Security Solutions. "This report should serve as another wake-up call that good security and a proactive approach are paramount to running a business in this day and age -- particularly since the economic crisis is likely to trigger a further increase in criminal activity."


Verizon Business said it witnessed an explosion of attacks in 2008 targeting personal identification number (PIN) information together with associated credit and debit accounts. The geographic distribution of external data breach sources continue to show high activity in Eastern Europe, East Asia and North America. In fact, the 2009 report shows that these regions accounted for 82 percent of all external attacks.


Some key findings of the 2009 Report:

  • Most data breaches investigated were caused by external sources. Seventy-four percent of breaches resulted from external sources, while 32 percent were linked to business partners. Only 20 percent were caused by insiders, a finding that may be contrary to certain widely held beliefs.


  • Most breaches resulted from a combination of events rather than a .single action. Sixty-four percent of breaches were attributed to hackers who used a combination of methods. In most successful breaches, the attacker exploited some mistake committed by the victim, hacked into the network, and installed malware on a system to collect data.


  • In 69 percent of cases, the breach was discovered by third parties. The ability to detect a data breach when it occurs remains a huge stumbling block for most organizations. Whether the deficiency lies in technology or process, the result is the same. During the last five years, relatively few victims have discovered their own breaches.


  • Nearly all records compromised in 2008 were from online assets. Despite widespread concern over desktops, mobile devices, portable media and the like, 99 percent of all breached records were compromised from servers and applications.


  • Roughly 20 percent of 2008 cases involved more than one breach. Multiple distinct entities or locations were individually compromised as part of a single case, and remarkably, half of the breaches consisted of interrelated incidents often caused by the same individuals.


A complete copy of the "2009 Data Breach Investigations Report" is available at http://www.verizonbusiness.com/resources/security/reports/2009_databreach_rp.p df.
http://www.verizon.com

Crossbeam Unveils 4th Gen Processing Blades for its Security Platform

Crossbeam Systems introduced its fourth-generation application and network processing blades for its X-Series Next Generation Security Platform aimed at carrier and large enterprise networks. The X-Series platform delivers deep packet processing at "real world" rates of 40 Gbps with low-latency, enabling high-touch security services. Processors on the new blades provide more than double the performance of the previous generation, enabling further consolidation of packet processing applications onto the Crossbeam chassis. Along with the new blades,
Crossbeam is also releasing the latest version of its open secure X-Series Operating System (XOS).


A key innovation of Crossbeam's XOS open operating system is its Secure Flow Processing technology -- which sequences traffic flows through security applications running on the X-Series, according to each company's unique policies. Network traffic can be directed through a series of security applications, such as proceeding from a firewall to IPS for deeper rules-based inspection. The ability for customers to serialize and parallelize traffic via Secure Flow Processing is one of the powerful and unique benefits of the X-Series, facilitating the virtualization of security within data centers and throughout the enterprise without sacrificing performance.


"The traditional approach to security, in which every new threat or compliance mandate requires adding more special-purpose appliances and network gear to the security infrastructure, is simply too complex, too difficult to manage and too expensive to be considered viable," said Chet Gapinski, vice president of engineering at Crossbeam. "The X-Series delivers a proven carrier-class architecture for network security, providing the only open and extensible platform that easily scales on demand while driving down costs through massive network consolidation. Our new modules, combined with XOS 8.5, significantly extend these capabilities and benefits."http://www.crossbeam.com