Wednesday, 30 June 2010

Be our guest to great wireless! Introducing the Guest Management Portal

Meraki » The Official Meraki Blog
Meraki Enterprise customers will now notice a new feature on the Network-wide Settings page under the Configure tab in Dashboard: the ability to create guest ambassador accounts.  Guest ambassador accounts give an office receptionist the ability to create guest access accounts for Meraki wireless networks.



Guest Ambassador accounts give the user access to a single page in Dashboard: the new Guest Management Portal.   Using the portal the receptionist can create username and password credentials on-the-fly to distribute to guests that will automatically expire after a specified time period.



This new feature makes it even easier to offer hassle-free guest access wireless to your visitors while maintaining the security and access control that you need for your corporate network.
- Posted by Greg Williams

Tuesday, 29 June 2010

AppZero and OpSource Partner

Server application virtualization pioneer AppZero and OpSource, a provider of enterprise cloud and managed hosting, on Wednesday announced a partnership that will make it easy for enterprises and independent software vendors (ISVs) to move their server-based Microsoft and SAP applications from the datacenter to the OpSource Cloud, a cloud service for companies requiring pay-as-you-go flexibility and 100% availability as well as high security and control.

"Our customers have been asking for a simple way to move Microsoft and SAP applications to the cloud quickly and cost-effectively, and we're pleased to team with AppZero to bring them the best solution possible," said Keao Caindec, SVP and Chief Marketing Officer, OpSource. "This partnership is an example of the powerful technology that can be built by taking an ecosystem approach to cloud-building."

read more

New Apple iOS 4 APIs expand iPhone device management

Google Alerts - mobileiron
MobileIron is a server-based application for managing mobile devices. Administrators can create a usage or security policy on the server, ...

Monday, 28 June 2010

SpeedBurst: Faster browsing for guest networks

Meraki administrators utilizing per-user bandwidth limitations now have a new tool at their disposal to ensure that their wireless users have the best possible experience while preventing any one user from hogging bandwidth.  Introducing SpeedBurst, a new feature that allows users to temporarily exceed their bandwidth limit at the beginning of a download while staying within assigned limits over time.  This makes downloads feel speedier and network performance snappier.

You can enable SpeedBurst by using the checkbox that can be found under Configure -> Access Control in the Bandwidth Limit section (see screenshot below).  The checkbox will be grayed out if bandwidth limits are not in use.

SpeedBurst is a great for guest access or event networks where end user experience is critical while at the same time equal network performance for all users is required.  We'll be rolling out SpeedBurst to Enterprise and Pro Meraki networks starting today.


Friday, 25 June 2010

WWDC WiFi – It doesn’t have to be this way!

Meraki » The Official Meraki Blog





WiFi Fail, WWDC 2010
Image courtesy of ars technica

"The networks in here are always unpredictable, they are slow today…  you could help me out if you're on Wifi if you could just stop." – Steve Jobs, WWDC 2010 Keynote

In a previous life, as an engineer at Apple, I demoed the new networking technology I'd built in front of a few thousand developers at Apple's World Wide Developer Conference (WWDC). I was showing off our zero-configuration networking platform, called Bonjour, which involved throwing together a dozen devices on stage and having them instantly talk to each other. Back then, the rule was clear – never, ever rely on the wireless for a high-stakes live event!

Sadly it seems that little has changed. At last week's WWDC, Steve Jobs' new iPhone crapped out trying to load the New York Times over WiFi. I'm not sure which happened first – shutting of the WiFi for conference attendees in an attempt to get the demo back on track, or a head rolling somewhere at Apple HQ – but either way, the aftermath wasn't pretty.

While this was perhaps the most visible conference WiFi fail, it is certainly not the first. Twitter's Chirp, Facebook's F8, Google/IO, and scores of other tech conferences, with large audiences of power-users crammed in one big hall, all had their issues. These environments are challenging, for sure, but the issues that bring down these networks are, by and large, preventable. (See, for example, the fine work by our friends at British Telecom at Le Web – 2,400 concurrent users in one hall pushing 300mb/s!) If you're serving high-density, high-bandwidth environments, here are a couple of tips:

Bandwidth Limits
The pipe to the internet needs to be shared amongst a large group of people, so one of the most crucial aspects is setting an appropriate bandwidth limit per client. This keeps internet access consistent for all users, and prevents one hog from ruining the experience for all. A real-time management console (like ours!) makes it very easy to set a per-client bandwidth limit, and to monitor the number of clients on the network and the overall bandwidth usage, so you can adjust as needed. Of course, you'll want to exempt VIPs (think Steve Jobs) from these limits. With our platform, this is easy – either whitelist their MAC address, or create a separate SSID (aka virtual network) that isn't subject to a limit, with access control locked down to VIPs only.

Dual-Radio 802.11n with Band Steering
802.11n provides much faster speeds than its predecesor, 802.11g.  But not all 11n APs are created equal. Most 11n client, including laptops and iPads, can operate at either 2.4Ghz or 5Ghz (a clean, wide-open spectrum), whereas older clients and iPhones only operate at 2.4Ghz. Also crowding 2.4Ghz are bluetooth headsets, microwave ovens, and cordless phones. A dual-radio access point can operate at 2.4Ghz and 5Ghz simultaneously. To reduce interference, we'll want to clear the 11n devices off of 2.4Ghz. An AP like our MR14 that features Band Steering will proactively steer 11n clients to the 5Ghz radio, reducing contention amongst the legacy devices on the 2.4Ghz radio. Finally, you'll need an AP with an enterprise-grade chipset to support high user densities, like BT did at Le Web with 100+ users per AP.

Optimize Channel Selections
Think of the wireless spectrum as a multi-lane highway. You'd never cram 100 cars into one lane while leaving the others empty, yet this is exactly what happens if you have APs nearby one another on the same channel. It takes more than just putting APs on different channels  to fix this, though. Some channels actually overlap, while others may be occupied by other devices that are out of your control. With typical wireless systems, this can be addressed with site surveys and optimization by a wireless technician. Alternately, in our cloud-managed solution, each AP monitors the airwaves around it, uploading interference data to the cloud. Our servers then analyze this data, along with performance metrics and usage information, and compute the optimal channel configuration and push this down to the APs. This process repeats continually, so the network stays optimally configured even as RF conditions change.

Real-time visibility and support
Over the course of a major conference, conditions can and will change. Being able to monitor bandwidth consumption, identify overly high-density areas, and receive real-time alerts if anything goes awry is immensely helpful. We'd watch our dashboard over the web to monitor bandwidth usage, and ratchet down the per-client bandwidth limit if needed. We also like our dashboard's display of APs by usage – if we see some being overtaxed, we'll just plug in another to share the load. It'll automatically connect to the cloud controller, download the correct configuration, and join the network. And if an unruly attendee unplugs an AP, we'll get an automatic alert.

I hope some of these tips help you plan for big events. Have any tips and tricks that you'd like to share? Let us know!

-Posted by Kiren Sekar

Thursday, 24 June 2010

Expand Networks Redefines WAN Optimization Commercial Model

Cloud Computing Journal
Expand Networks (www.expand.com) the leader in WAN optimization for branch office consolidation and virtualization, today announced an innovative pricing structure for service providers, telcos and public/private cloud providers, enabling them to procure its market leading WAN optimization solution on a monthly subscription based 'pay-as-you-sell' model.

Mirroring service providers own commercial offerings, the new pricing model shifts costs from CAPEX to OPEX and delivers profitable recurring revenue streams immediately. Jim Metzler, Analyst at Ashton, Metzler & Associates comments, "We often hear the phrase 'virtualization changes everything'. Usually that phrase refers to how virtualization fundamentally changes how IT organizations provide computer resources or support desktops. This announcement by Expand broadens the use of that phrase to include the fact that virtualization also fundamentally changes how service providers, telcos and cloud providers will acquire WAN optimization solutions."

read more

Wednesday, 23 June 2010

Meraki ExtendsFree The Net Project In San Francisco To Affordable ...


Meraki Extends "Free The Net" Project In San Francisco To Affordable Housing Complexes


Meraki, the company that is pioneering new technologies to bring the next billion people online, announced today it will "unwire" affordable housing in San Francisco, another milestone in the company's effort to bring free broadband wi-fi access to the city's residents.

"The Meraki mission is to change the economics of Internet access for everyone, including those who live in some of our most underserved communities," said Sanjit Biswas, CEO and founder of Meraki. "For a fraction of the cost of hardwiring these communities, we will bring high-speed Internet access to families who have never had access in their home before. And we're bringing new communities online everyday across the globe."

Already Meraki has established free wireless access in Altamont Hotel and Dunleavy Plaza, two of the city's affordable housing communities that provide single occupancy and family housing to over 100 tenants. Over the coming months, Meraki will extend Free the Net to dozens of similar communities in San Francisco.

Mayor Gavin Newsom and Sanjit Biswas appeared together today at the Altamont Hotel and Valencia Gardens where they spoke about unwiring the city.

"San Francisco is one of the most connected cities in the country and we are excited to support the work of companies such as Meraki in their endeavor to bring wifi access to every neighborhood in the city," said Mayor Gavin Newsom. "It is due to local based companies like Meraki who blend the best technology with the best intentions and an ability to execute which make our city great."

Meraki also said it has added new neighborhoods to its "Free the Net" network in the city. Residents in Noe Valley and Bernal Heights are now connecting to the network. Residents in those neighborhoods as well as those in the Mission, Alamo Square Hayes Valley, Nob Hill, Russian Hill and the Castro can now sign up at http://sf.meraki.com ; to find out how they can help spread access throughout their community. Meraki is providing this free access as it tests its ability to bring wireless access to an entire city.

San Francisco residents have transferred more than 25 terabytes of data on the Meraki network and activity on the network has increased 120% since January of this year. In the meantime, Meraki wireless networks continue to proliferate around the country. Thousands of Meraki networks have been established in more than 100 countries across the globe.

Meraki's technology is unlike any other wireless access technology currently available. Every point in the network communicates with each access point and reports information back to a central server which can optimize speed and performance throughout the network.

Meraki is funding the entire cost for establishing the network across the city, including affordable housing communities. The company is funding "Free the Net" in order to demonstrate to other communities around the world that Meraki technology can be used to create city-wide wireless networks at a fraction of current costs. No public funds will be used to build the Meraki wireless network in San Francisco.

Meraki said it will initially use Wi-Fi technology to build its network, but plans on updating and improving the technology infrastructure with technology innovations developed by the company or others.

The company expects to have "Free the Net" access points up and running in every neighborhood of the city by the end of this year. Meraki makes their new home in San Francisco this wee
k. 

Tuesday, 22 June 2010

OpSource Names Senior VP and CMO – WHIR | My Host Today

Google Alerts - opsource

Cloud and managed hosting provider OpSource (www.opsource.net) announced on Tuesday it has named telecom industry veteran Keao Caindec the company's senior vice president and chief marketing officer.
In this role, Caindec will focus on expanding the company's presence in the high-growth IT services sectors of cloud and managed hosting.
"OpSource has been serving the complex hosting needs of companies like Adobe and SAP for more than eight years," says Treb Ryan, CEO of OpSource. "As a result, we have developed the technology and know-how to scale and deliver mission-critical applications. The high-growth cloud services market represents a huge opportunity for OpSource. Keao has a proven track record in driving growth and adoption for emerging technologies and services, working closely with systems integrators, carriers and the channel to deliver complete solutions. We are thrilled to have him on board."
Caindec has 18 years of marketing leadership experience in managed services, telecommunications and Internet services companies.
At OpSource, Caindec is responsible for the company's worldwide marketing operations including marketing strategy, branding, communications and programs.
Prior to OpSource, Caindec served as chief marketing officer of IT services provider Reliance Globalcom.
Caindec was also CMO of managed data and application delivery firm Yipes Enterprise Services, and a principal and founder of content distribution firm Farallon Technology Resources.
He has also held executive and senior management positions in marketing and business development at British Telecom, MCI Communications, Internap, CyberCash and ATMnet.

Monday, 21 June 2010

MobileIron introduces the enterprise app store

If a device maker like Apple (NASDAQ:AAPL), a carrier like Verizon Wireless or an OS community like Android can offer an app store, why not an enterprise? As application stores are becoming more tailored to specific platforms and even consumer segments, enterprise mobile software developer MobileIron is taking the same approach to enterprise mobility, creating an internal app store that businesses can use to distribute content and software to their growing base of smartphone users.

MobileIron specializes in making smartphones more palatable to enterprise IT departments, providing tools that allow an enterprise to monitor and control where and how employees use wireless voice and data services on a range of high-powered devices. In August, MobileIron introduced the first build of its software, which generates a virtual image of all of an enterprise’s smartphones so an IT administrator can track employee usage in real time as well as set thresholds for the amount and type of data services used. Today, MobileIron added new features to its platform that give more management control to both enterprise end users and to IT. But significantly, the release also contains MobileIron’s enterprise app store platform.

The app store allows enterprises to create a repository of approved content and apps, which employees can then download and use with the full blessing of IT. Rather than just check off what apps are allowed and which are not, though, the app store allows the enterprise much more nuance. An enterprise can create device or employee categories with permissions for certain types of content. Salesmen, for instance, would find Salesforce.com’s app in their approved storefront, while a field engineer would not. Both field engineers and salesman could have access to vehicle navigation services, and while a desk jockey might be able to download that same application, the company could set usage restrictions limiting when he or she could use it (say, business trips) or require the employee to pay the monthly service fee in a separately generated bill.

“Historically the model for enterprise apps has been the ‘push’ model,” said Bob Tinker, CEO of MobileIron. “IT says, ‘Thou shalt have these applications,’ and they are pushed to your device. But we’re starting to learn from the consumer app store model. It allows the employee to self-select the applications he needs to work.”
The app store has proven to be a platform with which users of all technical backgrounds are comfortable working, Tinker said. In many enterprise models where phones most be pre-loaded with apps or a complex over-the-air push of applications and updates, employees may not realize the full benefits of their device. Some might choose non-approved apps from consumer app stores for the mere fact that they’re easier to access. By adopting an app store approach, an enterprise could be as permissive or restrictive as it likes with its smartphone users, Tinker said.

For example, employees who bring their own smartphones to the table could use it as a consumer device and be billed accordingly, but when they access the enterprise app store, the software they download and the service fees would be paid for by the enterprise. A company could restrict all data usage to the list of the apps approved for the app store, which itself could be open or closed. An enterprise that only wants its customers using their phones for legitimate business purposes could limit the store to just those company-paid and approved apps, or it could chose to include a bevy of entertainment and consumer apps that, while approved, must be paid for by the user.

Version 2.0 of MobileIron’s Virtual Smartphone platform is device independent and can support multiple operating systems simultaneously. So far, the Apple iPhone, Microsoft (NASDAQ:MSFT) Windows Mobile, Palm (NASDAQ:PALM) webOS and Research In Motion (NASDAQ:RIMM) BlackBerry and Symbian operating systems are all on that list, but Tinker said the Google (NASDAQ:GOOG) Android platform will be added soon.

For some of the operating systems, MobileIron has had to work within the limitations or restrictions of the distribution platform. Apple’s iTunes App Store, for instance, is the sole source of downloadable software for the iPhone, so MobileIron has developed a solution that allows an enterprise to generate a list of approved apps within the iTunes store. For other OSs, such as BlackBerry or Android, enterprises can build independent app stores that are only accessible to approved devices. Herein lies an opportunity for the operators, Tinker said. While MobileIron is selling the software directly to enterprises that have the resources to host the app store themselves, Tinker said carriers could offer the platform to smaller enterprises or businesses as a managed service.


Sunday, 20 June 2010

Expand Networks Set To Tackle World Cup Bandwidth Hooligans!

Survey claims 54% of workers to use corporate networks to stream World Cup matches to PCs

Expand Networks, www.expand.com, the leader in optimizing WANs for branch office consolidation and virtualization, today came to the aid of beleaguered IT managers who face the challenge of keeping corporate networks productive during the forthcoming football World Cup finals in South Africa. In a recent survey by Internet Service Provider, Eclipse, 54% of working British staff are planning to watch World Cup matches on their office computers resulting in a surge in network traffic and bandwidth usage that could significantly impact the performance and throughput of critical business application and services.

“Just like world class footballers, corporate networks need to be finely tuned to ensure the highest level of performance and agility,” commented Adam Davison, VP corporate sales and marketing at Expand. “Also, in order to perform at their very peak footballers need two key attributes – vision and control. Likewise IT managers need the same tools to gain insight into network activity and the ability to manage network usage. With Expand IT managers get visibility and control over network usage, assuring priority and quality of service is given to business critical applications and services. In doing so they will be able to support England’s world cup bid without scoring an IT own goal.”

Expand’s Accelerator range of wide area network optimisation solutions include a fully integrated Layer 7 quality of service (QoS) engine. By inspecting data flow on the network the QoS engine can identify the traffic linked to users watching live streams of football and then give IT managers a visual “real time” account on how much bandwidth is being consumed. It then allows them to control this traffic ensuring business critical applications can continue to function.

Furthermore, with Expand’s QoS engine you have the ability to control these streams both inbound and outbound from a single device at the core data center or head office meaning a very small investment and rapid deployment.

“Like most, I’ll be hard at work at my PC during kick-off, but of course I may sneak a peek! Difference is, I know my network has the control and visibility to handle it; confident that my football streaming won’t impact business applications performing in the way they should. While you can’t expect all employees to be model employees, with a bit of optimization technology, at least they won’t drive your IT managers completely insane with bandwidth starvation this world cup!”

Friday, 18 June 2010

Meraki Launches Lobby Ambassador, Bringing Powerful Guest Management to Organizations of All Sizes | Meraki

Meraki, the cloud-based wireless networking company, today announced the release of Lobby Ambassador, which provides fine-grained guest management for wireless networks. Lobby Ambassador is the first such system that eliminates complex management appliances and wireless controller hardware, instead leveraging cloud computing and intuitive, web-based software.


Typically, providing wireless access to guests and visitors requires creating an open network that anyone can join, scribbling passwords on post-its, or deploying a back-end system to provide fine-grained access control for guests. All but the largest enterprises often lack the IT resources for these back-end systems, both from cost and complexity standpoints. Yet these organizations are left the most vulnerable by open guest networks. Unlike Fortune 500 corporate campuses, they typically have limited bandwidth, and have neighboring business and residences in range of their wireless network. As a result, abuse of their open guest networks can increase bandwidth costs and slow business-critical network usage.

With this in mind, Meraki designed Lobby Ambassador, an easy-to-use guest management system that can be set up with just a couple clicks. Since the system is part of the Meraki Enterprise Cloud Controller, organizations require no on-site management appliances or additional software licenses. Existing Meraki customers may access Lobby Ambassador immediately via the cloud, with no upgrades to purchase, download, or install on their network.

Lobby Ambassador provides an interface for non-technical personnel, such as receptionists, to give guests temporary access to the wireless network. Guest accounts can be set to automatically expire, or can be deleted when the guest has finished with the network. Lobby Ambassador works in tandem with Meraki’s Virtual Network Isolation, a technology that allows guests to use the same network infrastructure as employees, yet restricts guests from accessing private LAN resources (such as file servers) and prevents viruses from spreading from the guests’ computers to employees’ computers.

Lobby Ambassador provides the following capabilities:

Delegation: Front-desk employees may manage guest accounts without having access to the rest of the system.
Easy for administrators: Web-based software requires minimal training and no installed software.
Easy for end users: Guests can self-register or get an account from a receptionist.
Secure: Set an expiration time for guest accounts, or manually delete guest accounts once they have ended their visit.
Multi-site: Manage guest accounts across buildings or sites over the web.

Remington Colleges, a Meraki customer with 20 campuses around the country, has been using Lobby Ambassador on its networks.

“I’m impressed with the Lobby Ambassador system and foresee it being a really special service we can leverage at our various campuses, not just for security purposes but as another way to market ourselves to prospective students,” said Chuck Farraj, CIO at Remington Colleges. “When new students come to visit the college to decide if it’s the right place for them, it’s a nerve wracking experience. Easing that transition by giving them Wi-Fi access, especially on their WAP-enabled mobile device or smart phone, goes a long way in building a positive first experience.”

“Guest access systems have been around for a while, yet the great majority of wireless networks don’t have one because they are a pain to setup and administer,” said Hans Robertson, VP Product Management and Co-Founder. “We’ve solved that problem. With Meraki Lobby Ambassador there’s no software to integrate, licenses to buy, or dependencies on other infrastructure. Implementation takes about 30 seconds, and it just works.”

Lobby Ambassador is available for immediate use by all Meraki Enterprise Cloud Controller customers.

Join Us: http://bit.ly/joincloud

Thursday, 17 June 2010

Panda Security Launches Beta Version of Panda Global Protection 2011

Panda Security has announced the beta release of Panda Global Protection 2011, its comprehensive solution for protecting against new and unknown threats for advanced home computer users.

The company has also announced that the ten beta testers suggesting the most helpful improvements (see http://www.pandasecurity.com/promotions/betatest/) will each receive a $200 Amazon.com gift certificate.
Designed for active users - those who are most likely to encounter security threats and engage in risky behavior - Panda Global Protection 2011 offers valuable new functionality, including the ability to manage home network security, activate gaming/multimedia mode, which ensures no security-related interruptions for users, and a virtual keyboard and browser to keep confidential information secure from prying eyes.

The new release builds on the core functionality that has positioned Panda Global Protection as the preferred solution among PC power users and features integration with the most advanced cloud-based protection available, minimal resource consumption and highly effective anti-virus engine to protect against known and unknown malware. In addition, Panda Global Protection 2011 includes firewall with WiFi security to block intruders and hackers; Panda USB Vaccine to prevent USB devices from spreading infections; confidential information filters to keep personal data safe; backup and system recovery, and PC performance tuning.
Benefits of the new Panda Global Protection 2011 functionality include:
  • Faster performance with intelligent updates
  • Virtual browser for even safer web access
  • Home network security management
  • Interruption-free gaming and entertainment
  • Remote PC access from any location
  • Password Manager to keep access credentials safe
  • File encryption system protects confidential information from unauthorized viewing
  • File shredding for guaranteed information deletion
  • Virtual keyboard to keep data entered safe from keyloggers and banking Trojans
Panda has also made significant improvements to the spam and phishing filters, detection of sophisticated malware like rootkits, and parental control options.

Panda Global Protection 2011 delivers high-speed, lightweight, real-time protection against known and unknown threats by leveraging the knowledge and experience of millions of users through Panda's unique cloud-based Collective Intelligence technology. More information about Collective Intelligence, including a live malware processing counter, may be found at http://www.cloud-distribution.com/pandacloud.

Wednesday, 16 June 2010

iPad Guzzles Network Capacity


Wireless network provider Meraki has reported that iPad usage consumed more than half the network capacity of one installation despite accounting for less than 10% of the devices on the network.

Wireless network provider Meraki reported that its Network Insight fingerprint technology has been used at an MIT installation that found iPad usage has been consuming more than one-half of the network’s capacity, yet the devices accounted for just 9% of the total devices attached to the network. 

In announcing the results of the test, Meraki didn’t pass judgment on the high use, but it’s obvious that the iPad can turn out to be a huge consumer of network capacity. 

Meraki, which specializes in delivering wireless networking through the cloud, reported this week that tests taken during a week in May compared the use of different devices on a network at MIT’s CSAIL network, the university’s largest interdepartmental laboratory. More than 300MB was transferred during the week by the average iPad user. iPhone users averaged 31MB and iPod Touch users averaged 12 MB. 

The results take on new significance when compared with AT&T’s unveiling this week of metered data plans that include plans with 200 MB and 2GB limits. The average 300MB that was recorded by iPad users in the week would indicate that AT&T subscribers with the larger $25 a-month data plan would come in under AT&T’s limit, although the $15 plan would easily be exceeded by iPad users, at least at the MIT installation.

AT&T has been the exclusive provider of Apple handsets in the U.S.

Meraki touts its Network Insight technology for providing network administrators with a forensics tool to analyze network activity as an aid in troubleshooting. The deep packet inspection technology suffers no drop in performance and operates at line-rate, Meraki said.

“There is incredible excitement around the iPad, yet network administrators are eyeing it with caution,” said Kiren Sekar, Meraki product manager, in a statement. “Administrators need visibility into their networks to see the iPad’s impact.”

Meraki noted that once the Network Insight technology is captured, it is uploaded to the firm’s Enterprise Cloud Controller, which hosts the firm’s network intelligence platform. Network administrators can then access the data through the company’s dashboard management tool.


InformationWeek has published an in-depth report on the expanding profile of data deduplication. Download the report here (registration required).

Monday, 14 June 2010

Panda Security Advances Leadership in Cloud Antivirus

Panda Cloud Antivirus has been upgraded and expanded. The upgrade of Panda Cloud Antivirus Free Edition improves and extends the protection provided by the original free product, and Panda Cloud Antivirus Pro is a brand new commercial version of the product that delivers expanded support services and automation capabilities for greater convenience.

Both products, available for download at http://www.cloudantivirus.com, set the standard in malware detection while consuming minimal PC resources. Acknowledged as the first free "in the cloud" security service for home users, Panda Cloud Antivirus delivers instantaneous protection against real-world threats with next to no impact on computer performance.

read more

Join Us: http://bit.ly/joincloud

Friday, 11 June 2010

Meraki's Enterprise Cloud Controller offsets remote access ...



Meraki's Enterprise Cloud Controller could offset remote access management and wireless network hardware costs for small to medium-sized businesses (SMBs), but will a cloud-based model create challenges a larger enterprise should avoid? This product article explains.

What is Meraki's Enterprise Cloud Controller?
Meraki combines its business-grade 802.11n access points with a cloud-hosted controller solution, offering small and midsized businesses an enterprise-class wireless LAN (WLAN) solution without much upfront wireless network hardware and setup cost. The Meraki Enterprise Cloud Controller provides a centralized console for all of an enterprise's wireless networks and enables remote network and security configuration and monitoring of connected access points from anywhere on the Web. The 802.11n access points, available in single, double and triple radio models, basically configure themselves by automatically connecting to the Cloud Controller. Prices start at £479 for a single 802.11n radio access point and £120 per access point annual subscription rate for the Cloud Controller service.

Which companies is Meraki's Enterprise Cloud Controller best suited for?
Targeted at networks with between 50 and 5,000 users, the Meraki Enterprise Cloud Controller is going after small to medium-sized enterprises. These are organizations with a small or nonexistent IT staff that want a streamlined WLAN solution without installing a lot of hardware. This is also the lower end of the enterprise market that may opt for consumer-grade products, such as standalone access points, based on cost. The Cloud Controller solution brings a relatively low entry point to the features and functionality of higher-end enterprise solutions to address this section of the market. The Meraki solution might also be a good fit for smaller companies that have a number of disparate remote workers or sites, such as convenience stores or retail kiosks. The cloud-based controller would enable centralized configuration and control of those remote wireless networks without having to build dedicated WAN or VPN links to each of the remote locations. While it is possible to scale Meraki's solution up to larger enterprises, companies of that size are more likely to have dedicated networking staff who would probably opt for more traditional WLAN solutions that offer greater scale and localized control.

Are there drawbacks to Meraki's cloud-based WLAN management?
The biggest consideration is ultimately what level of control the organization is willing to relinquish when moving solutions into the cloud. In the case of Meraki's WLAN solution, the vendor handles all of the software updates for both the cloud controller and the access points. While this is likely to be a boon for smaller enterprises with little to no IT staff to perform these updates, many medium-sized customers may take a more conservative approach, opting out of the latest and greatest software code in order to avoid any bugs or issues typically associated with new software releases. Finally, a leap of faith is required to adopt Meraki's cloud-based products. Users of more traditional, hardware controller-based WLAN solutions could keep on running their installed networks if their vendor were to be acquired or otherwise leave the market. With a controller in the cloud, Meraki customers could be left with orphaned hardware if something were to happen to the company however this is unlikely as their investors include Google and Sequoia, two of the largest blue chip VC's on the planet. In conclusion, if Enterprises have bought into the cloud in other areas, Meraki's proposition is extremely disruptive from a cost, flexibility and support perspective, we recommend you check them out at Cloud Distribution.

Join Us: http://bit.ly/joincloud

Thursday, 10 June 2010

Panda Security Upgrades Cloud-Based Anti-Malware Service

Dubbed Panda Cloud Antivrus Pro, the new edition works to protect computer users online and offline by extending the protections in the free product launched last year. The Free Edition is still available and also offers enhanced functions.

As more computing functions continue to exploit cloud delivery models, security issues remain a key concern. But the cloud also continues to be the solution to its own problem. Extending it's cloud-based PC security and anti-malware services, Panda Security today moved to help further alleviate malware fears by expanding its free offerings to include a paid version that automates the updates and upgrades to the service. [Disclosure: Panda Security is a sponsor of BriefingsDirect podcasts.]

The Pro Edition sells for $29.95 and offers both automated updates as well as support benefits and other features.

Cloud Distribution are UK distribution partners of Panda Cloud Security.

read more

Join Us: http://bit.ly/joincloud

Wednesday, 9 June 2010

Meraki Network Insight Technology now Fingerprints Apple iPads

Assisting wireless network administrators in analyzing and supporting their networks, Meraki, the cloud-based wireless networking company, has announced that its Network Insight technology now fingerprints Apple  iPads.

Wireless LAN products from Meraki help the customers to centrally manage access points from an intuitive browser interface. It also offers powerful features with point-and-click simplicity and the user does not have any controller hardware to buy, neither any software to install.

Offering application-level inspection on wireless traffic and capturing forensics information used by network administrators to analyze network activity and troubleshoot client issues, Network Insight is a technology unique to Meraki's Enterprise Wireless LAN. The technology identifies network events (DNS, ARP, HTTP, etc), and client information such as the NetBios name, MAC address, operating system, and device make and model.

“There is incredible excitement around the iPad, yet network administrators are eyeing it with caution," said Kiren Sekar, Product Marketing Manager at Meraki.  "After the iPad's well-publicized DHCP renewal bug, as well as the potential for significant bandwidth consumption, administrators need visibility into their networks to see the iPad's impact and to support their users.  Meraki's enhancements to Network Insight make this simple.”

Network Insight distinguishes Apple  iPads from other devices running the iPhone OS, namely iPhones and iPod Touches, with its current announcement. Network Insight identified iPads as a significant driver of wireless traffic in use at MIT  CSAIL network (covering MIT's largest interdepartmental laboratory). iPads made up 9 percent of all iPhone OS devices on the network yet consumed more than half of the bandwidth for the week ending May 21st.

In November 2008, the company introduced its new Residential Wi-Fi  Pack. This latest offering is expected to enable property managers and owners to provide broadband wireless access throughout apartment complexes, condominiums, hotels and more. The pack features Meraki's newest WiFi device, the Meraki Wall Plug, designed for deployment in large residential complexes. The demand for Wifi at an apartment, condominium and dormitory complexes is on the rise.

Raju Shanbhag is a contributing editor for TMCnet. To read more of Raju’s articles, please visit his columnist page.

Join Us: http://bit.ly/joincloud

Thursday, 3 June 2010

Get Hired: Why Smartphones Change the Workplace

With so many more economical choices for purchasing smartphones, more global workers now choose to bring their own device to work.  That's a double edge sword.  Productivity increases but use of corporate data on employee owned devices translates into increased risk. 

What if the employee leaves and goes to a competitor?  What if the phone is broken or lost?  What happens when that employee phone connects employees' friends, social networks, their media (illicit or virus laden), and games disguising network attacks.  Telecomm is not prepared and IT is overloaded to deal with threats.

With nearly 50% of future phone purchasing moving towards smartphones, employers need a scalable solution to both manage and secure valuable corporate assets.  AT&T executives also pointed out that this week that 40% of iPhones are now going into the enterprise.  IT and Telecom are converging in their need for intelligent mobile device management that secures these assets while providing both a user and business view into costly bills.  MIT Technology Review writes about Service providers harnessing mobile usage patterns this month as well.

By the end of 2011, a recent study from Nielsen states Smartphone deployments will be so rapid that there will be "more smartphones in the U.S. market than feature phones."  Smartphones show higher application usage than feature phones even at the basic built-in application level.  During Nielsen's Mobile Insights survey respondents noted in the last 30 days that users are taking full advantage of device application capabilities.  Apple iPhone OS (32%) and RIM OS (37%) control more than two-thirds of today's market while Windows Mobile, Android and Symbian account for the remainder.  All OS and device suppliers are increasingly aware of the need for diverse business applications – apps that need to be securely managed at scale.  The smartphone Tsunami is cresting and businesses are now realizing these mobile applications represent a significant increase in corporate data usage on devices never before managed.  The next step for IT is proactive user, application and device management.

Join Us: http://bit.ly/joincloud

Wednesday, 2 June 2010

NETGEAR Gains Control of BlackBerry® Smartphone Operations

NETGEAR's CHALLENGE: With a smartphone-reliant workforce that travels internationally, NETGEAR's overage charges and data roaming were exploding. They needed a way to contain costs while gaining control over corporate application data on employees' smartphones. 

MOBILEIRON's SOLUTION: "NETGEAR initially deployed the MobileIron Virtual Smartphone Platform to monitor billing and phone quality issues," says Chris Field, Director of IT Operations at NETGEAR. Based on the strong success, NETGEAR is rolling out MobileIron to more than 250 BlackBerry users.


Download the complete Case Study Here

Join Us: http://bit.ly/joincloud
Newer Posts Older Posts Home