Networks Whitepapers

Reliable Data Delivery at the Institute for Genome Sciences of the University of Maryland

IGS manages the collection, storing and distributing of terabytes of genomic research data globally. Due to increasing file sizes from an average 5GB to 20GB, data move¬ment over FTP faced growing reliability problems, especially with international long distance transfers. FTP was delivering under 20% network utilization and frequent con¬nection failures were resulting in excessive re-transmission.

Scalable Synchronization of Big Data — Over Distance

Aspera Sync is purpose-built by Aspera for highly scalable, multidirectional asynchronous file replication and synchronization. Sync is designed to overcome the bottlenecks of conventional synchronization tools like rsync and scale up and out for maximum speed replication and synchronization over WANs, for today’s largest big data file stores —from millions of individual files to the

Moving Big Data at Maximum Speed Over Wide Area Networks

In this digital world, fast and reliable movement of digital data, including massive sizes over global distances, is becoming vital to business success across virtually every industry. The Trans¬mission Control Protocol (TCP) that has traditionally been the engine of this data movement, however, has inherent bottle¬necks in performance (Figure 1), especially for networks with high

2013 State of the Endpoint

We are pleased to present the results of the 2013 State of the Endpoint study sponsored by Lumension® and conducted by Ponemon Institute. Since 2010, we have tracked endpoint risk in organizations, the resources to address the risk and the technologies deployed to manage threats.

Lumension® Guide to Application Control Best Practices

The Lumension ® Endpoint Management and Security Suite Application Control (L.E.M.S.S.:AC) provides complete malware protection and increases IT and end-user productivity by preventing any unknown, untrusted or malicious applications from executing. With L.E.M.S.S.:AC, IT administrators can quickly identify all applications running in their environment and enforce a comprehensive whitelist policy that prevents unauthorized applications, malware