5 MINUTE BRIEFING DATA CENTER

Subscribe to the 5 Minute Briefing Data Center email newsletter




Five Minute Briefing - Data Center
February 18, 2014

Five Minute Briefing - Data Center: February 18, 2014. Published in conjunction with SHARE Inc., a bi-weekly report geared to the needs of data center professionals.


News Flashes

New data center monitoring software from Compuware adds enhanced analytics to help end users better monitor and understand the network impact on application performance. The new availability analytics span all layers of a business transaction, from the network TCP session all the way up to the application logic.

To provide developers worldwide with remote access to the latest IBM POWER7 and POWER7+ processor-based servers running Linux, AIX and IBM i operating systems, IBM has introduced an application development cloud called the IBM Power Development Platform. The platform provides software developers with no-charge access over the cloud to the servers to build, port and test applications.

Extending Imperva's data center security strategy across the cloud, the company is acquiring cloud security gateway startup Skyfence, and also intends to acquire the remaining shares of cloud-based web application security company Incapsula. Imperva's new strategy is intended to address security gaps within various cloud deployment models.

SOA Software has announced support for IBM WebSphere MQ. According to SOA, the combination of IBM WebSphere DataPower and WebSphere MQ, managed by SOA Software's SOA and API management solutions, means end users can employ their robust WebSphere MQ messaging backbone for the challenges of mobile, cloud, and new market channels.


Think About It

There are reports circulating that Target's point-of-sale files may have been compromised as a result of a phishing email breach that took place at a third-party heating and air-conditioning vendor's site. An employee of the maintenance firm may have opened the malware-infested file, which then infected Target's systems. Whether or not this turns out to be the case, it points to a vulnerability seen in many IT systems - lax security procedures among third-party partners … another lesson in the Achille's Heel of many corporate networks.

Sponsors