Monday, April 20, 2009

Proxy Caching_Wan Optimization

WAN optimization is one of the techniques to improve the speed of functional tools so as to maximize the business performance and to proactively solve the problems.

WAN optimization products seek to accelerate a broad range of applications accessed by distributed enterprise users via eliminating redundant transmissions, staging data in local caches, compressing and prioritizing data, and streamlining chatty protocols (e.g., CIFS).

Improving the application response time is the main benefit that is accrued out of WAN optimization and this is essential where there is centralization of servers and IT resources. When you optimize WAN, you are also saved from the cost of upgrading the band widths.

WAN Optimization is a superset of WAFS in that it also addresses:

Component techniques of WAN Optimization include WAFS, CIFS proxy, HTTPS Proxy, media multicasting, Web caching and bandwidth management.

A few WAN/Internet Optimization techniques:

Compression - Relies on data patterns that can be represented more efficiently. Best suited for point to point leased lines.

Protocol spoofing - Bundles multiple requests from chatty applications into one. Best suited for Point to Point WAN links.

Traffic shaping - Controls data usage based on spotting specific patterns in the data and allowing or disallowing specific traffic. Best suited for both point to point leased lines and Internet connections.

Equalizing - Makes assumptions on what needs immediate priority based on the data usage. Excellent choice for wide open unregulated Internet connections and clogged VPN tunnels.

Connection Limits - Prevents access gridlock in routers and access points due to denial of service or peer to peer. Best suited for wide open Internet access links , can also be used on WAN links.

Simple Rate Limits - Prevents one user from getting more than a fixed amount of data. Best suited as a stop gap first effort for a remedying a congested Internet connection or WAN link.

Proxy caching accelerates service requests by retrieving content saved from a previous request made by the same client or even other clients. Caching proxies keep local copies of frequently requested resources, allowing large organizations to significantly reduce their upstream bandwidth usage and cost, while significantly increasing performance. Most ISPs and large businesses have a caching proxy. These machines are built to deliver superb file system performance (often with RAID and journaling) and also contain hot-rodded versions of TCP.

Wednesday, April 15, 2009

Beware of a disease called FORWARDITIS

As an organization that is into managing Information Security and Network Security, it is our duty to warn every Email user about the hazards involved in forwarding mails without cleaning them up.

Typically people who have the urge to share mails tend to hit the forward button without cleaning up the mails.

What we mean is, the email ids of all of the recipients and the mail ids within the mail itself get forwarded to the recipients.

The problem lying herein is that the scamsters capture all these Mail ids and sell it on the internet to other scamsters, Viagra dealers, marketers etc.

When a mail is sent with lots of mail IDs in the CC list, Internet Service Providers’ and the Mail Servers of organizations automatically send these mails to junk folders. And subsequently they have the option to Blacklist the sender.

Also it is very annoying for the receiver to keep scrolling down to reach the actual content.

If you need to send a mail to multiple recipients, then insert their Mail Ids in the BCC column. And remove all the mail Ids from the content, CC field.

Also when a mail arrives,typically you should get suspicious when:

· A mail/greeting comes with an attachment from an unknown sender.

· A mail which says you should forward it to as many people as you can in order to help a cause.

· A mail that asks for help ( Like the one about a long suffering girl who will get funds if you forward mails etc.)

· A mail that says URGENT, IMPORTANT.

· A mail that claims Authenticity by referring to agencies like CNN, BBC, NASA, FBI etc. without furnishing reference links.

If all this is confusing and if you want to find out if a message is true or not, just copy the subject line and Google it or better still, visit dedicated sites like that maintain an updated database of such scams.

Alternatively, if you would like more technical help, get in touch with us.

Please do communicate and spread this message to your friends so that they too dont fall prey to the disease called Forwarditis.

Friday, April 3, 2009

"The Unified Move"- Embracing a unified approach with UTM

Below is an excerpt from the article " The Unified Move - The security market is increasingly embracing an integrated approach with UTM" by Shanteri Mallaya appearing in the Security Feature section of ChannelWorld.
Enterprises in India are showing willingness to leverage technology at their disposal to protect their most vital corporate assets from external and internal trouble. As a result, IT security has become and will continue to remain de facto. The challenge lies in using the right security component in warding off threats, filtering content, and keeping organizations safe. As companies are in pursuit of the panacea to their security requirements, there is a tilt towards looking at a holistic, cost-effective, durable solution instead of a makeshift approach.
Agrees Venkata Ramana Murthy, prime Mover at 22by7, "the individual, niche component of UtM functionality — say a component filtering mechanism may not necessarily be superior in performance to that of a niche vendor." Nevertheless, the channels are fairly receptive to the UtM idea. This is an emerging technology that throws up new business opportunities for them at a time when conventional technologies are not getting them sufficient margins or giving cross-selling opportunities anymore.

Mr. Murthy of 22by7 adds, "UtM is a successful single point alternative that i can pro-pose to customers."

Venkata Ramana Murthy of 22by7 concludes, “Globally, there is a trend towards the virtual machine, so all security standards have to evolve towards this. Businesses providing security solutions have to look at this seriously and evolve best of breed solutions."
For the full article, please read the issue of ChannelWorld dated Feb 15 2009.