Windows 7 networking controls

This week I begin a new series of video screencasts for Dell’s IT Expert Voice Web site. The site has all sorts of useful information for corporate IT folks that are interested in migrating and using Windows 7, and my humble part will be to produce a regular series of videos similar to what I have been doing on my own here. Do check out this video which talks about the differences between Windows 7 and earlier versions when it comes to networking controls.

Painless offsite online backups using 3X Backup

The 3X Systems Backup appliance is a great way to automatically backup a collection of PCs and servers across the Internet at reasonable cost.

We tested version 2.1.6 in August 2009 on a small network of Windows clients and servers.
Windows agents available for 2000 and later versions, including both servers and 64-bit OS’s.

Pros:
• Easy to setup and operate
• Simple and effective offsite backups
• Can scale up storage as disk requirements grow

Cons:
• Only Windows agents supported
• Require recent browser versions such as IE v7 and Firefox v2
• Restoring full domain controller or specific email messages could be easier

Price: base system starts at $2,495.00

3X Systems
1275 Kinnear Road,
Columbus Ohio 43212
614.372.6868
http://www.trustyd.com/

Understanding Application Visibility with Blue Coat PacketShaper

PacketShaper 900
Blue Coat Systems
410 N. Mary Ave.
Sunnyvale, CA 94085
(408) 220-2200
http://bluecoat.com


Price: $2,500 base price

We tested a PacketShaper 900 on a small test network showing how it can discover, classify and prioritize application traffic. We address four different questions that IT managers have about understanding how bandwidth-consuming applications interact over their networks, and how individual applications can be controlled for particular use cases.

Managing your VMware ESX infrastructure with the HyTrust Appliance

HyTrust offers managers and administrators of VMware’s ESX virtual infrastructure a centralized, single point of control for hypervisor configuration, compliance, and access management that is both secure and easy to use through ordinary Web browsers.


We tested the RC version of the product in March 2009 by making a remote connection to HyTrust’s own test lab.

Supports:

  • ESX version 3.5 only (not ESXi)
  • Works with Internet Explorer and Firefox, most current versions.
  • Both Windows Server 2003/2008 domain controllers

Price: $7,500 for the appliance ($3,000 for software only) plus $500 per CPU ESX socket protected plus 25% for maintenance and support per year. Free version available to protect up to three ESX hosts but without any support contract.

Pros:

  • A solid collection of tools to secure your VMware ESX infrastructure
  • Integrates with Active Directory and VMware vCenter policies
  • Fully functional freeware version allows for experimenting and learning before purchase

Cons:

  • Limited to ESX currently
  • Log viewer could be better integrated into the product

HyTrust Appliance 1975 W. El Camino Real, Suite 203 Mountain View, CA 94040 650-681-8100

hytrust.com

Symantec Backup Exec for Windows Servers

An online backup server that covers a wide range of servers and services, this latest version includes the ability to protect Microsoft SharePoint and Exchange servers, VMware Infrastructure, and other sophisticated environments.

We tested Version 12.5 on a small test network with Windows Server 2008 and Mac and Windows clients.

Requirements: Windows 2000/2003/2008 Servers,
Price: $995 for one license, additional agents varies in price from $395 to $3195, depending on what you need to backup.

Symantec Corp.
http://symantec.com/backupexec
20330 Stevens Creek Blvd.
Cupertino, CA 95014

Pros:

  • Easy to setup and operate
  • Free 60 day trial helps you test out the service and become familiar with its operation
  • Granular Recovery Technology allows easy restoration of accidentally deleted files, emails, or documents.
  • VMware and Microsoft Hyper-V virtual server data protection that is easy to manage
  • Integrated online backup for flexible off-site data protection

Cons:

  • Some of the menus are a bit densely packed, such as the Job Setup screens
  • This is not a product for single server environments (there is a separate version for Microsoft’s Small Business Server that is more appropriate)

Deploying applications using Symantec’s Endpoint Virtualization Suite

The suite covers three separate products that have been acquired over the years by Symantec for applications delivery via streaming or virtual layers and a connection broker technology that allows enterprises to manage the way their applications are packaged and delivered to users’ desktops.


We tested Version 6.1 on various test machines in February 2009.

Requirements: Windows XP SP 1 or better with Java J2SE Runtime 5.0 update 6, Windows Server 2003/2008, Windows 2000, Windows Vista

Price: $360 (concurrent license), $270 (per node) for entire suite, Streaming + Virtualization $68, Virtualization only $44. Substantial volume license discounts.

Pros:
• Powerful software management for multiple use cases so that enterprises can configure and deliver a wide variety of applications and situations
• Granular virtualization layer technology
• Competitive price for the features that are included
Cons:
• Complex setup with multiple moving parts
• No common policy management across the various software modules
• Multiple management consoles for each software module

Symantec Endpoint Virtualization Suite
Symantec Corp.
http://symantec.com/
20330 Stevens Creek Blvd.
Cupertino, CA 95014

The six minute firewall from McAfee/Secure Computing

In this short video review, I will show you the most important features of Secure Firewall (form. known as Sidewinder) from McAfee/Secure Computing.


As enterprises depend more on Internet-based applications, it becomes harder to defend your network against blended exploits and attacks that target your specific applications. You need something like this product which is more than a standard firewall that typically relies on intrusion prevention and signature based defenses. Secure Firewall is a network and application security device with numerous protective features built-in that are especially useful for protecting your critical applications and data. Secure Firewall has a great track record in the industry when it comes to emergency security patches and CERT advisories, and comes with solid reporting and analysis features as well as the ability to create rules to defend Web applications.

We tested version 70007 on a small network in October 2008.

Pros:
• Combines inbound and outbound network & application protection for both known and unknown attack vectors
• Simple configuration of the TrustedSource global intelligence, and Geo-Location provide unique protections to reduce your organizations exposure to attack
• SSL & SSH inspection (decryption and filtering) protects against these holes in most deep inspection firewalls today
• Rules can be customized for particular defenses and very granular controls over applications

Cons:
• Uses a variety of management tools, some Windows-based, some browser-based
• Setting up different administrative roles is fairly complex

Info: www.securecomputing.com 55 Almaden Boulevard, Suite 500, San Jose, CA 95113
Product category: Email security appliance
Pricing: Least expensive unit $1,900 up to $70,000 for the largest networks

Making backups with Symantec Protection Network Online Backup

Symantec Corp. http://spn.com

An online backup service that works automatically in the background to make copies of your most critical files and is very easy and economical to use. Online backups have several advantages:
— To aid in recovering files from a lost or stolen laptop
— To provide a simple but effective offsite storage solution for your data
— To keep the costs of backups low and within reach of most businesses

Requirements: Windows 2000/2003 Server, Windows XP, Windows Vista with latest service packs installed, with at least 15% free disk space on the volumes that you want to backup.

Price: $9.99 a month for basic service for 10 GB storage. Premium service is $35 a month for 10 GB with seven year history of backups. Additional fees for more storage capacity, remote access, and online storage for Backup Exec v12 users.

Pros:
— Easy to setup and operate
— Free 30 day trial helps you test out the service and become familiar with its operation
— 24×7 support included
Cons:
— Requires a fast broadband upload connection particularly on the first backup or for very large file collections. Only incremental changes are sent on subsequent backups
— Lack of progress indicators make troubleshooting more difficult

Stopping data leaks with Code Green Networks

Data loss protection is still a new field, but Code Green Networks brings a comprehensive solution to stopping leaks of confidential data to unauthorized users. Is your IT leaving with employees that are getting downsized? Is your customer list now the property of one of your competitor’s? Then you might be interested in the latest data leak prevention appliance from Code Green Networks

Called True DLP, it consists of hardware and software tools that can detect when critical information is being copied from your network to a Web mail account, a removable USB thumb drive, or placed inside a document that is emailed as an attachment, even over an encrypted connection or hidden inside a compressed file ZIP archive.

True DLP
Code Green Networks Inc.
http://codegreennetworks.com

385 Moffett Park Drive, Suite 105
Sunnyvale, CA 94089
(408) 716-4200

Code Green works in conjunction with the Blue Coat Web proxy (to decode SSL traffic) and a series of email encryption products from Zix, Cisco, and Voltage.

Requirements: Just about any network and server configuration is supported. More monitoring and control is available using Windows-based agents for both servers and desktops.

Price: $10,000 for 50 users, more for larger networks. Maintenance fee is an additional 18% annually, and agent support is an additional 20% fee

Pros:

Both structured and unstructured data protected

Automatically encrypts sensitive outgoing data
Straightfoward Web management interface

Cons:

There are a number of ways to install and configure the product, depending on your own network connectivity and which servers you choose to protect

Only Windows endpoints supported with its agents.

Me and the mob

I didn’t really know what to expect when I showed up at the gym at the University of San Francisco last Saturday to participate in the first “Flash Mob Computing” event. But it turned out to be one of those incredible days where I learned a lot, met some great people, and had a blast. During all of this, history was being made as several hundred PCs were networked together to form one of the largest supercomputers.

The idea was an instant, do-it-yourself supercomputer that would be assembled out of individuals’ PCs and only be operating for a period of a few hours. In fact, that was the idea behind a course offered at USF and taught by scientist Pat Miller, who works full-time at the Lawrence Livermore Labs across the bay. Students in his class got more than they bargained for when they signed up last year.

The scene when I arrived at the gym at 8:30 in the morning was what I would call controlled chaos, and plenty of activity for that hour of the morning. It wasn’t the usual crowd of people working out or swimming laps: instead, it was filled with geeks. Not as many people as expected were carting in their own computers – I guess the thought of having all your personal data exposed to the mob was unsettling to some. I was carrying two laptops, care of two vendors who had loaned the equipment to me for other reviews: Acer’s Aspire and a new whitebook from D&H. They joined a really diverse collection of IBM Thinkpad laptops, Dell laptops and desktops, Toshibas, and some whiteboxes that were of every shape and size, including some 100 machines from e-Loan, a local company which was one of the prime supporters of the event.

Those of us that BYOL didn’t have to worry that our data would be disrupted. Every machine that was part of the mob was given a boot CD and the hard disk wasn’t touched. But I guess it is hard to tell someone whose entire life is on their laptop this.

Some of the student projects were naked computers: no case, no frumpery, just the boards and connectors to cobble everything together. The most interesting PCs were the water-cooled over-clockers, one that had its own life-support external case that I guess held the coolant reservoir or something. Others were clearly custom-built jobs with fancy cases.

There were no Macs, save for one machine that was being used by the Web team to update the site: the organizers of the event had asked for only X86-family machines, to keep the number of variables down while they assembled their gigantic supercomputer.

By 10:30 we had roughly 650 PCs on the floor of the gym. They were placed on folding tables that had pre-cut cables organized and laid down their lengths. The cables all terminated at a bunch of Foundry Big Iron super-switches that were located around the room. (Foundry had loaned close to $500,000 worth of gear, which is a significant proportion of the value of the computers on the floor.)

The experiment was supposed to begin around 11, but various problems kept the organizers from running the Linpack benchmark for several hours. Still, the level of organization was impressive: Everyone seemed to know what they were doing, and the numerous reporters had plenty of time to interview the principals as well as talk to various industry luminaries who follow these supercomputer events like groupies of a major rock band. One was Gordon Bell, who was the father of the VAX while he worked at DEC and is now a Microsoft fellow. He was carrying his own laptop, but forgot to bring his CD drive so he wasn’t able to connect to the mob.

What made the day for me wasn’t just seeing all this gear hooked up but the ancillary people and meetings that were happening elsewhere on the USF campus. To augment the day’s activities, we were treated to a series of talks by leading experts, including computer scientists at national laboratories, NASA, HP and Microsoft. While it was a Saturday, I still found myself spending more time at the seminars than I anticipated, just because they were so interesting. It isn’t often that you can sit and learn from the leading thinkers of computer science, and hear about how NASA is doing global climate models, or how Microsoft built its Terraserver, the database of maps of the United States. I really liked Jim Gray’s talk. He is a research fellow at Microsoft and one of the original designers behind the TPC benchmark while he was at Tandem.

“There are two types of supercomputing problems now: finding a needle in a haystack, and finding all the haystacks,” he said. “Computers are good at one or the other, but not both.” As an example, he mentioned skyserver.sdss.org, a site that consolidates and analyzes the leading astronomical observatories around the world, all using Web Services, XML, and some common coding. “Astronomy isn’t anymore about guys sitting up through the night looking through telescopes at the tops of mountains,” he said. “Instead, it is all about reducing large amounts of data down to a form that humans can actually analyze it.” He mentions that Microsoft receives as part of its Terraserver project a box of firewire hard disks from the government, with the terabytes of data that are needed to update the site.

What was most interesting to me, and ultimately the mob’s undoing, were the networking issues around assembling and running such a huge collection of gear. The mob used ordinary 100BaseT Ethernet, which was a two-edged sword. While easy to setup, it was difficult to debug when network problems arose. The Linpack benchmark that was used requires all of the component machines to be running during the several hours of the test, and the organizers had trouble getting all 600-plus PCs to operate online flawlessly. The best benchmark accomplished was a peak rate of 180 gigaflops using 256 computers, but that wasn’t an official score as a node failed during the test. The group was able to complete a test of 77 gigaflops the night before using 150 computers that the university had donated for the experiment. Both of those results are better than the original Cray supercomputers that were created in the early 1990s and delivered around 16 gigaflops – at considerably higher cost, too.

The supercomputer set keeps track of these benchmarks through a Web site called top500.org. Twice a year the site posts the results of the benchmark and the list of the 500 most powerful machines – or at least the most powerful machines that the public is aware of. As one of the supercomputer designers who has worked for the government labs told me, “Those are the top 500 that YOU know about. You can be sure there are plenty of others.” You certainly got the feeling that “other agencies” were keeping tabs on this event. To make the list the mob needed to turn in a benchmark somewhere above 600 gigaflops: Clearly, they were in range if they could have gotten all their gear to contribute and run without problems.

Of course, to be fair, most of the machines on the Top 500 list are custom-build jobs that take weeks or months to assemble, test, and code their specialized operating system software, not to mention spending some dollars to purchase too. (One of the more interesting entries is third on the list, a collection of several thousand Macintoshes, at Virginia Polytechnic University.)

But what we were witnessing was one computer designer called the democratization of supercomputing, or street computing at its best.  Anyone could easily assemble a couple dozen nodes and do this in an afternoon, and the ability to harness occasional collections of PCs to tackle computing problems has already been proven by the peer-to-peer computational experiments of SETI@Home and others that take over your PC as a screensaver when otherwise idle. While the mob wasn’t completely successful, it did prove its point, and it was a fascinating day to watch and be a part of.