The Wayback Machine - https://web.archive.org/all/20050101084349/http://www.europeanreseller.com:80/editorschoice2.html
European ,Reseller,Channel,Distribution,Integrators,Magazine

European Reseller Magazine

 

Editors Choice

Here are a selection of articles from our Q4 2004 issue.

Home PageSubscribeAdvertisersExhibitions DiaryAbout UsThe EditorIndustry linksContactsArtwork SpecsReseller OpportunitiesNetwork AwardsNews Items

 

Security Threats of the Future

 

qualys' gerhard eschelbeck 1.png

Gerhard Eschelbeck explains how to tackle the ever-shortening cycle between discovery of vulnerabilities and exploitation.

 

A new breed of automated, Internet-born viruses and worms has taught security managers that relying on human action alone does not work. In each case of recent damaging strikes, we've had advance warning - weeks, even months - to prepare for known vulnerabilities. Yet attackers still were able to hit hundreds of thousands of PCs and servers, crippling vital businesses and services and causing other havoc.The uncertainty of conventional, human-led security efforts frustrates many security managers who are trying to guarantee protection. New research analysing more than 3.8 million network vulnerabilities during a recent 30-month period shows the frustration is warranted. The data were a statistically valid sample anonymously drawn from more than six million scans made by
Global 2000 organisations that were auditing network security.
We learned:
 · Half-Life: the half-life of critical vulnerabilities is 21 days on external systems and 62 days on internal systems, and doubles with lowering degrees of severity.
 · Prevalence: 50% of the most prevalent and critical vulnerabilities are replaced by new vulnerabilities on an annual basis.
 · Persistence: the lifespan of some vulnerabilities and worms is unlimited
 · Exploitation: the vulnerability-to-exploit cycle is shrinking faster than the remediation cycle. 80% of worms and automated exploits are targeting the first two half-life periods of critical vulnerabilities.
These 'laws of vulnerabilities' describe the effects of human-based security efforts, and the persistent ability of attackers to gain full control of systems - including access to highly sensitive information. Resolving issues revealed by this research requires understanding the causes and means for prevention. CIOs, chief security officers, network managers, IT managers, and security specialists should consider new trends in attack technology. Exploitation is
becoming faster with the aid of new automated attack tools that require no special skills for operation. The most effective way to thwart these challenges is to supplement security efforts by humans with automated defences.

Taking Charge With Automated Defences The implications of persistent vulnerabilities and hyper-propagation require addressing network threats in a new way. In the past, the discovery/attack lifecycle curve was one or two years
from advent of discovering a vulnerability to widespread exploitation. Urgency is now rising from a shorter discovery/attack curve - SQL Slammer happened six months after discovery, Nimda was four months, Slapper was six weeks, Blaster came just three weeks after news of the vulnerability, and the Witty worm struck the day after announcement of the vulnerability. The most recent attacks happened faster than any possible human response.
Threats of the future require security managers to make an equal-force response to automation tools used by attackers. Automating defence strategies include:
§ Regular Audits of Security Systems: new automated audit solutions delivered over the web identify everything susceptible to attack, identify and prioritise vulnerabilities, and match them with appropriate remedies, such as patches and new security-device configuration settings.
§ Keep Antivirus Software Up-to-Date: server-based solutions allow automatic scans to ensure systems are protected against older, persistent vulnerabilities.
§ Timely Patch Management. This is a critical process requiring manual implementation, but automated audit scanners can keep security managers posted on which systems need urgent care and facilitate remediation.
§ Ongoing Evaluation of Security Policy. Trend analysis with automated scanning solutions provides data for ensuring that security systems help meet the ever-changing nature of attack threats.

In summary, network security attacks are increasing in number and sophistication. Research demonstrates that many vulnerabilities linger, sometimes without end. New attacks are capable of spreading faster than any possible human response effort. The timely and complete detection of security vulnerabilities with automated techniques and rapid application of remedies is the most effective preventive measure security managers can use to thwart automated attacks and preserve network security.

 

Gerhard Eschelbeck is Chief Technology Officer and VP of Engineering for Qualys, Inc, www.qualys.com
....................................................................................................................................
 

Top of Page

The Impending Death of Tape is a Myth

 

imation's semar majid.png

Semar Majid discusses the importance of innovative tape technology and why this media still remains today, an essential aspect of storing business critical data.

 

How can a robust storage architecture integrate disparate elements including high availability, backup and restore, total cost of ownership, reliability and disaster recovery? The answer is tape. Tape technologies have been meeting customer demands for backup, restoration and archiving for over 50 years. Despite alternative technologies being introduced, tape continues to be extremely popular with businesses and data centres both large and small, evolving alongside the ever-increasing demand for storage. Tape media and cartridges have changed dramatically over the years as improvements continue to be made across virtually every physical parameter, all continually increasing capacity on a single cartridge.

imation dat tape cartridge.jpg

Over a one-year period the data spends over 8,000 hours in the tape cartridge, so it is vital
for the media to store and protect data safely over many recurring lifecycles. Precise data
reading and writing is critical, and prevention of debris entering the cartridge, tape layer
slippage and protection of servo and data tracks is therefore essential.
While some have been predicting the demise of tape as a viable storage medium, it remains
the most cost-effective, flexible and scalable medium for high-capacity, long-term and backup data storage. Indeed, tape is being used far beyond the traditional batch processing and backup/restore functions. It is becoming an increasingly integral, mission-critical,
interactive, near-online storage medium. Data stored on tape is often defined as a value-added proprietary corporate asset. Today, tape technology offers capacity and performance that, a decade ago, was inconceivable. In terms of performance, the new technology means faster access times, and tape storage drives and media are generally less expensive on a per-gigabyte basis than disk or optical storage.

Storage area networking (SAN) is a growing trend enabling users with open systems environments to pool their storage instead of dedicating storage for each server or application. By putting tape drives on the storage network, any server can utilise tape resources on the SAN, allowing back up of more servers with fewer tape drives. Tape virtualisation technology involves the use of a disk cache partitioned into logical tapes as a target for tape operation, and this is common practice in many data centres today. Virtualisation allows for faster read/write access, more efficient tape management, higher access and availability, and multi-user access to files.

imation lto ultrium2 tape cartridge.png

Effective tape management clearly requires understanding the importance, the value, and strategic role of tape storage - it is vital both to the overall operations and long-term health of a business. In addition, tape is easily transportable, ideal for off-site archiving and a critical part of any corporation's disaster-recovery strategy.

Half-inch tape technologies continue to be the most cost-effective solutions for storing and
backing up data as tape cartridges continue to increase in capacity, transfer rates, and
compression ratios. Due to a substantial cost advantage over disk-based storage, the industry has also started using tape for primary storage of large databases, near-line record retrieval in customer service environments, and temporary database expansions. Without doubt, the 'death of tape storage' is a myth, and tape is set to continue to play a pivotal role in the growing requirements for data storage, backup and archiving for years to come.

 

Semar Majid is technical marketing executive at Imation, www.imation.com
.....................................................................................................................................
 

Top of Page

oracle's michel clement.png

Corporate Governance

Michel Clement asks whether your staff know enough to keep you out of jail.

 

In the recent high-profile accounting scandals, corporate governance has become the subject of intense international scrutiny and debate. Solving the complex, entangled issues of making corporations more transparent, accountable and answerable to stakeholders has become a global challenge. Yet, while a great deal of emphasis has been placed - and rightly so - on promoting responsible corporate leadership, far less consideration has been given to the mechanics of bringing a large, geographically dispersed organisation into compliance. Multinational companies with diversified holdings around the world must meet the requirements of multiple governments and regulatory bodies, each with its own reporting criteria, forms, timetables, languages and currencies. And owing to this rapidly changing regulatory environment, employees may be committing breaches of security, confidentiality, business ethics or industry regulations without even knowing it, while following time-honoured business procedures. It is after all people, not businesses, which fail to comply.

Corporate Governance extends beyond the province of the boardroom and executive suite.
It is virtually impossible for any organisation to achieve compliance with all the standards
demanded of it unless every employee has the necessary skills, capabilities and training to
undertake their respective duties in accordance with legal and ethical requirements.

Education is key. In the past, new employees either were given on-the-job training by other
employees or put through a formal training program. Companies now are realising that it is
dangerous to presume that an adequate transfer of knowledge and skills occurred. Does the
new bookkeeper understand the ramifications of Sarbanes-Oxley? How much of two days of
intensive training is retained? Was the company's code of ethics given the weight it deserves?

While traditional methods of training still have a place in the workplace, compliance requires
a more systematic, frequent and well-documented approach. For many organisations, the best way to train and monitor the entire workforce regularly is through web-based training, which can be linked directly to the human resource management system. With employee information stored in one place, training can be tailored to job descriptions, skill requirements and compliance responsibilities. For example, self-guided web and computer learning can be used for the dissemination of general information enterprise-wide, while costly instructor-led classroom instruction can be reserved for specialised occupational and managerial training. Indeed, research firm Gartner Group estimates that, by the end of 2004, more than two-thirds of global top 1000 enterprises will include e-learning as part of a formal Business to Employee (B2E) initiative.

To be clear, compliance cannot occur in an information vacuum. Therefore, it is the company's responsibility to inform employees and external suppliers and subcontractors of their regulatory obligations, the 'due diligence' that must be performed to meet requirement, and the potential risks and liabilities of non-compliance.

The issues surrounding corporate governance are vast and complex, but in implementing a
comprehensive, web-based human-resource management system, companies have a good start. Global research is establishing a direct link between human capital management and shareholder value. By leveraging the intellectual capital and skills of its employees, an organisation can drive new efficiencies and create lasting competitive advantages. A motivated, well-trained workforce is more likely to produce quality services and products, which will engender brand loyalty and customer retention. Moreover, in today's cautious investment climate, the run the company, the greater the funding opportunities. Corporate governance, managed across your workforce, is a sound investment.

 

Michel Clement is Senior Director, Alliances and Channels, at Oracle EMEA, http://partner.oracle.com
......................................................................................................................................
 

Top of Page

Layer 7 Switching

 

broadband-testing's steve broadhead.png

Steve Broadhead asks whether this is a niche product or universal technology?

 

Networking, and Ethernet especially, has seen several stages of evolution over the past 25 years.
From a bus-based, coaxial-cabled topology it has developed into what we have today, with many groundbreaking highlights along the way. One example is when the Ethernet switch was introduced, another was the introduction of Fast Ethernet, and then Gigabit Ethernet and, more latterly, 10-Gigabit Ethernet, with 40-Gig around the corner. So when will this bandwidth explosion stop?
The answer is that, one way or the other, it probably won't. And, as Ethernet moves onto a
higher bandwidth platform each time, so the price per megabyte of that bandwidth falls, often
dramatically.
But is it really as simple as just buying bandwidth as cheaply as possible, or is there more to consider when looking at creating a contemporary Ethernet network? Well, yes there is. The old classic 'throw more bandwidth at a problem and it'll go away' never has worked in either the medium-term or long-term, and certainly will be less and less effective as the applications themselves are getting smarter. Traffic control and optimisation are therefore more important than ever, whatever the bandwidth availability, especially when you're dealing with something as unpredictable as a web traffic, for example, and often relatively low-bandwidth WAN links adding further potential bottlenecks.

Witness the many and famously documented outages that major service providers and portals have suffered from time to time when a huge story breaks on the Internet, or how even the biggest enterprises suffer when worm and viruses hit the Internet, and you see why control and reliability are key to ensuring connections stay hot and users' tempers stay cool - and to ensuring that service providers and enterprises of all types stay in business. Hence, the emergence of Layer 7 switch technology, which filters web traffic, accelerates performance and keeps the Internet terrorists at bay simultaneously.

But, to date, all the Layer 7 products have been aimed at either service providers, storage
solution providers or the major corporate business. Yet, as well as enabling enterprise
applications to run at usable speeds and ensuring an ASP's hosted service stays up, this
technology is also designed to simply - but very effectively - reduce the amount of TCP
requests hitting the servers and thereby extending the life of those servers enormously - a
feature that pretty well any business with two or more servers could benefit from. Within the
confines of Broadband-Testing labs we've witnessed server performance improvements close on 3000% (yes, 30 times) by front-ending them with Layer 7 technology, from the likes of F5
Networks and NetScaler.

So is it a cost thing? Well, the vast majority of the products are hardware based, which
immediately creates a price hike problem. One answer therefore may lie in providing
software-only solutions that you can run on a 'vanilla' server. This is one approach being
taken by new Layer 7 kid on the block, Zeus, whose background is in providing web server
technology - the software, not the hardware - so Layer 7 traffic management is a natural
extension of this initial direction. The company believes that it can offer a software-only
solution for a fraction of the dedicated hardware solutions being offered by most of the
vendors in this market. Importantly, this then offers traffic management solutions to a whole
new small-to-medium enterprise market who can finally take advantage of the performance
improvements, reliability and server cost savings that this technology brings. Are we about to
see a new trend emerging? If so, then it's not before time.

 

Steve Broadhead is Founder and Director of Broadband-Testing, an independent test lab, based in the south of France, www.broadband-testing.co.uk
.......................................................................................................................................
 

Top of Page

Grid Computing: Hype or Reality?

 

oracle's stein surlien.png

Stein Surlien says that Grid Computing is the most talked-about subject in IT, but what is it and should channel partners be concerned?

 

Over the last couple of years, a major focus by companies has been on how to make more efficient use of their IT systems. Many companies have a number of disconnected systems, built up over time, which by their very nature make inefficient use of IT resources. Worse, such systems are expensive to maintain and time-consuming to update. Research ('Beyond Infrastructure', QNB Intelligence, October 2003) confirms many companies simply buy more, or more powerful, hardware when servers get near capacity, rather than seeking ways of using current resources more effectively.

Companies are beginning to speak out, as they're not happy with wasting resources - they're
looking for an alternative. Grid Computing has created a buzz because it is the alternative.
Why?
· It provides an adaptive software infrastructure that makes efficient use of low-cost servers and modular storage, balancing workloads and providing capacity on demand.
· Scaling out with small servers in small increments provides flexibility, performance, and reliability at low-cost.
· New unified management enables you to manage everything cheaply and simply.
 
Imagine that a company needed additional computing power to complete end-of-year tax reports. Rather than purchasing additional hardware, Grid allows surplus processing power from another site to be harnessed. In the same way that plugging into a mains socket provides instant access to a pool of electricity, so Grid will do the same for computing.
 
Smart Channel Partners Adopt Grid Computing
 
Make no mistake, customers are increasingly demanding efficient IT solutions, and wise partners are adopting Grid technologies. But what role does the channel partner play in Grid?
Today, system integrators and major hardware vendors are already working with companies to ensure they carry out the three steps to Grid Computing.
· Standardisation on low-cost, high-density modular servers and storage based on technology such as Intel Itanium processors, blade servers, Linux or Windows.
· Consolidation of clusters of servers and storage shared among one or more data centres.
· Automation of all day-to-day management tasks, enabling a single administrator to handle hundreds of servers simultaneously in clusters.

Major strategic implementations aside, there are opportunities for VARs to offer customers
packaged bundles with 'out-of-the-box' Grid solutions, tailored for specific verticals. ISVs
offering these vertical offerings can validate their solutions on the Grid infrastructure.

After-sales support is another area of opportunity. Technical agreements between vendor and
partner provide customers with a single point of contact, ensuring customers achieve optimum performance from their Grid.

With Grid Computing set to be a 'disruptive' technology, just as the Internet was - it
fundamentally changes the way things are done. The early days of the Internet saw an outburst of hype, from which it is only now beginning to recover. But the fundamental truth is there - the Internet has changed everything. Similarly, there is hype around Grid Computing, but without doubt it is on the same path as the Internet.

This path is a journey, and probably not a short one, but a journey of a thousand miles begins with a single step. Over the next months and years, more and more companies will join those who are already several steps along the way to realising the enormous benefits from Grid Computing. The channel partner that ignores Grid Computing today does so at their peril.

 

Stein Surlien is Vice President, Alliances and Channels, at Oracle EMEA, http://partner.oracle.com
.........................................................................................................................................
 

Top of Page

IP Telephony

 

Andrew Saunders explains how IP telephony can create the virtual enterprise cost-effectively.


Teleworking is one of the main applications supported by IP (Internet Protocol) telephony. IP
enables you to sit down with a telephone handset and a PC, and connect seamlessly to the
enterprise telephone and data network, whether you're at home, in a hotel, or anywhere else in
the world with a broadband Internet connection.

For the individual worker, an IP handset is a way to save some of the time and frustration of
daily commuting and frequent business travel, and so achieve a better work/life balance. For
employers, an IP-enabled communications system dramatically reduces the cost and improves the efficiency of workers at home and in the field, of communication between branch offices, and of communications infrastructure within each single site. It is also the key to cost-effective
'informal' call-centre environments made up of remote teleworkers located anywhere in the world.

We like to think of this flexible, seamlessly connected network of head office, branch office,
home-office and field workers as the 'virtual enterprise'.

A 'virtual enterprise' solution allows a home or remote worker access to the central
communications system simply by plugging an IP handset into either an ADSL/cable modem or the USB port on an Internet-connected PC. The IP terminal automatically establishes a connection with the host communications system, which then treats the remote worker just like any other extension - with direct routing of incoming calls, access to phone settings and voicemail, and toll-free calls to any other extension on the system. Using a speakerphone, remote workers can be paged from the central system, and even hear others being paged, creating a realistic 'virtual office' environment.

Cost savings associated with an IP communications system vary according to the circumstances of the user. Samsung's own experience of IP enabling 10 members of its external sales force with OfficeServ IP has reduced fixed-line costs from an average 90 Euros in call charges to just 33 Euros per person per month in ADSL service charges - not including the even larger savings on mobile phone bills. Communications costs are no longer dependent on individual phone bills, but are a fixed cost.

An IP communications system also enables highly cost-effective 'virtual call centre'
implementations, with ACD (automatic call distribution) software routing calls to both in-house
and remote employees. CTI (computer-telephony integration) client software installed on a remote PC gives remote workers exactly the same call-centre environment as at the main site. The 'virtual call centre' can be extended worldwide: a European company could employ a home worker in, say, Australia to cover incoming calls at night, totally free from call forwarding charges.

Nowadays, an increasing number of IP communications systems support the next-generation
Internet standard known as Session Initiation Protocol (SIP), and are therefore ready and
waiting to support new SIP applications as they are developed. From simple yet useful features like free-hand text messaging between on-site and remote system users, to presence management applications that will reach any device with any type of message, anytime, anywhere, the SIP-enabled future will bring voice and data together as never before.

 

Andrew Saunders is Head of Product Marketing at Samsung Business Communications, www.samsungbusiness.com
..........................................................................................................................................
 

Top of Page

Storage Feature starts here.........

 

Keep Your SANity

 

kodak's alan russell.png

Alan Russell identifies where SAN productivity is failing and what organisations can do to get more from their SANs.

 

In an effort to gain advantage over the competition by enhancing SAN (Storage Area Network) performance, organisations are investing millions of pounds into high-performance SAN environments. But, to deliver these high performance benefits around the clock, SANs must be easy to configure and manage.
However, many organisations are simply not reaping SAN's full benefits, which directly affect their ROI. Typically, organisations are unaware of the SAN's actual performance and utilisation levels - and this leads to further, often unnecessary, investment in their infrastructure. As organisations become more aware of the specific usage of the SAN, so they enable the re-deployment and re-zoning of existing equipment. The result is a dramatic saving of hardware costs and resources that would have been required to implement additional kit.
Cure is one thing, but prevention is quite another, especially when it comes to productivity
and cost. As long as they know how 'healthy' the SAN is, organisations can be warned about
potential problems before they arise. However, many are still waiting until a major problem
occurs, resulting in possible downtime, stress and pressure on IT staff and, of course,
increased financial cost. Simply by knowing the state of the SAN, problems can be efficiently
located and diagnosed, eliminating unnecessary time spent fault finding.

Rapid expansion without control makes it very hard to know what is actually out on the SAN.
Therefore, it is vital to have a full, dynamically updated inventory of the SAN, detailing
active ports and available switch ports - and this gives the ability to plan expansions. The
trend currently, is still to enter the data manually into a spreadsheet, which is dependent on
the information being initially accurate, and places another time-consuming administrative duty
on an already-overworked IT department. Something as simple as a SAN topology diagram gives the ability to see the state of the SAN within seconds, enabling more specific capacity-expansion questions to be answered.

Kodak Service and Support provides a 'SAN-ITY' check, providing an independent SAN review from a global organisation with highly trained professional storage specialists. Kodak is not selling hardware or software in the 'SAN-ITY' check - instead, Kodak is offering a full SAN audit to identify all the SAN devices and host bus adaptors, and provides a SAN topology diagram. Kodak then implements a full performance review to establish the SAN performance over a fourteen-day period and identifies the highest and lowest utilised ports.

Organisations must realise that SAN for SAN's sake is not the answer. Ease of management of a heterogeneous environment is a must, and now a reality, for organisations seeking increased
performance and reduced costs to beat their competitors.

 

Alan Russell is Storage Manager at Kodak, www.kodak.com

..........................................................................................................................................
 

Top of Page

Stark Chooses ExaStore                                                               Michael Chazot

exanet's michael chazot.png

......to speed workflow, increase reliability and save costs.

 

Stark Digital, GmbH, a leading graphic arts house in Pforzheim, Germany, was looking for a low-cost, highly reliable solution to manage its workflow of more than 10,000 pages per week, in all file formats. Stark required a system that would allow workflow to be managed on a network-wide basis. Operators were storing large files directly onto their hard drives, which saved time, but decreased reliability and redundancy for overall job efficiency.

"We looked at EMC and Network Appliances' storage options, in addition to custom solutions offered by system integrators," said Joerg Weippert, Stark's Technical Director. "We chose Exanet's ExaStore to replace our storage islands and create a single storage solution working in heterogeneous network for our Artcom and the RIPs (Raster Image Processors).

 "Now, because of ExaStore's speed, operators are working directly within ExaStore instead of
saving files locally, while all RIPs are getting their data directly from ExaStore to produce
the plates," continued Weippert. "In terms of performance and workflow, this was not
before."

The entire Stark group consists of five companies and 350 employees. Stark Digital concentrates on production of digital plates for both internal users and for outside printers. Stark uses the ExaStore solution as both a production server and file system server, managing data of 10,000 pages per week, consisting of 80 percent PDFs, native data files from Quark, Photoshop, TIFFs, or CTLWs.

"ExaStore is the only next-generation data storage solution designed and tailored specifically
to meet the needs of the graphic arts industry including support for Apple, Windows, Unix, and
Linux, and provides the standard file system APIs: NFS, CIFS and AFP to applications," said
Michael Chazot, Exanet's Vice President of Sales. "We now have ExaStore installations at some of the largest pre-media and printing companies around the world, and our customers have experienced significant productivity improvements among other benefits".

"100% uptime is crucial for Stark's business continuity and will be even more crucial in the
future, as we plan to expand very heavily," said Weippert. "We chose ExaStore because of its
high availability and reliability, management capabilities, native AFP, load balancing and high
performance, which ensure our business continuity, and because, as our storage needs increase, ExaStore's scalable architecture will allow us to add servers and RAID arrays without any planned or unplanned downtime."

"After a short period, the investment will complete its ROI by delivering more security,
reliability, and performance. The system's ability to scale flexibly to any dimension using
hardware components with the best price and performance will continue to decrease costs. Going with ExaStore also provided us with immediate cost savings, as it prevented us from continuing to invest in our other file servers and its self-healing system ensures that all current
software and hardware are running at an optimum, 24x7," Weippert concluded.

Distributed worldwide in the graphic arts industry by Kodak Polychrome Graphics, ExaStore is
used in publishing plants across Europe including, for example, Burda and Interoute in London,
UK.

 

Exanet, www.exanet.com  or call ++44 (0) 870 240 2094

Top of Page

 
Home Page | subscribe | advertisers | exhibitions diary | about us | the editor | industry links | contacts | artwork specifications | reseller opportunities | Network Awards | News Items