Verifying the Package Contents 2. Installing the Chassis 3. Powering on and Verifying Interface Connectivity Interface Connectivity 4. Initial Configuration Considerations 5. Launching ASDM 6. Step 1 In the main ASDM window, choose Configuration > Device Setup > SSC Setup . Radia Perlman On SDN, IPv6 & Security. The networking pioneer touched on current hot topics in a keynote speech at the 2015 USENIX Annual Technical Conference.
Radia Perlman is a legend in the networking industry, having invented the Spanning Tree Protocol (STP) and then improved on STP with TRILL (Transparent Interconnection of Lots of Links). With a PhD in computer science from MIT, she holds more than 100 patents and is currently a fellow at EMC. Perlman was the keynote speaker at the 2015 USENIX Annual Technical Conference, held this week in Santa Clara, Calif. Her talk, "Network Protcols: Myths, Missteps and Mysteries" focused on the development of STP as well as her trust models for Public Key Infrastructure (PKI). But in her far-ranging discussion, she also expressed her opinion on some of the hot topics of the day, including software-defined networking and IPv6, the most recent version of the Internet Protocol. Perlman started her talk by encouraging audience members to think critically.
More Insights. 4 Keys To A Data Security Strategy. Organizations must prepare for the inevitable security breach and focus on protecting sensitive corporate data.
Here are some ideas to build on. If you’re an IT pro, protecting your company’s security may have recently become part of your job description. This probably didn’t come as a surprise -- more than 40% of companies suffered a breach last year, according to the Ponemon Institute. Maintaining a secure environment is no longer a question of locking down the perimeter or eliminating the chance of an attack. After all, even if you can build a 10-foot wall around your data, someone will always be able to build a 12-foot ladder. While you need to continue to focus on keeping out the bad guys, organizations need to acknowledge the reality that it’s not always possible and develop a plan B when the fail-safe fails. 1. At the highest level, companies are finally starting to get away from the head-in-the-sand approach to data security. Software-Defined Storage Vendors Leading The Pack. There's a lot of buzz about software-defined storage, but the market is just emerging.
We pick five vendors that are leading the space. 1 of 7 (Image: Rodyka/iStockphoto) What is software-defined storage? Imagine all of the really smart code -- deduplication, compression, erasure coding, file systems, object metadata, and management systems -- ripped out of those expensive storage appliances and running on virtual instances or containers in COTS servers. In a nutshell, that's software-defined storage. The rise of SDS also will put an end to RAID arrays.
Longer term, the impact of SDS is in software. This sounds like storage nirvana, but we aren't even close to general solutions that can talk interchangeably with each other through a standard API. The state of the SDS market today is something of a mixed bag. Are there any good software-defined storage solutions on the market yet? More Insights.
The Best Password Managers. OB Roundup When you sign up for a new website account, do you create a complex, unguessable password?
Or do you just use "Password1" for everything? Each simple-minded password you use creates an opportunity for some malefactor to take over your account by a lucky guess or a brute-force attack. And if you use the same password everywhere, one hack or lucky guess means that all of your accounts are compromised. Everybody, even our own John Dvorak, needs to install a password manager and switch to strong, unique passwords. The Basics The typical password manager installs as a browser plug-in to handle password capture and replay.
Some products detect password-change events and offer to update the existing record. When you create a new secure account or update a weak password, you don't want to strain your brain trying to come up with something strong and unique. Entering a password like ev0$80PlJA36D on your smartphone's tiny keyboard can be tough. Two-Factor Authentication: Who Has It and How to Set It Up. Not that long ago, the Heartbleed exploit had us all scared, given that one itty bitty piece of code left everyone's log-in information potentially up for grabs.
Here's an explanation of what it does, courtesty of XKCD. If you're afraid a site you visit might still have the exploit, run its URL though LastPass's Heartbleed Checker. So what is a person afraid for their security to do? Well, you should definitely change your passwords on the sites—regularly! By sheer brute force or simple phishing, passwords are, to be honest, a pretty laughable way of authenticating who you are (or aren't, as the case may be). What you really need is a second factor of authentication.