P.O. Box 85518 Lincoln, NE 68501-5518

CHANGE SERVICE REQUESTED

July 28, 2006 Volume 28 Number 30 www.processor.com

Products, News & Information Data Centers Can Trust. Since 1979

fully in compliance, so they just want to In This ISSUE be more compliant than the other guys so that whoever the regulatory body is will go COVER FOCUS after the other guy,” Bloomberg says. “Of Regulatory Compliance Compliance course, that’s really dangerous—more dan- Compliance is a fairly ho-hum topic, but it’s gener- gerous than speeding, in a way.” ating a lot of industry activity, including a new set Involve IT of manufacturers and related products. Handling compliance-related issues often Compliance Control ...... 1 requires complicated processes and proce- Compliance: Do I Need To Worry?...... 9 dures, though an increasing horde of solu- Coping With Compliance ...... 11 Control tions from software and service vendors gives companies a helping hand. Still, it’s a TECH & TRENDS How Regulations Are Changing difficult process integrating compliance Iris vs. Retina Biometrics | 1 into enterprise strategy, particularly when As implementations yield better results and costs The Enterprise IT Landscape employees struggle to understand that com- drop, iris recognition could be the biometric of pliance should be a regular choice for schools, data centers, and companies. by Christian Perry part of business operations • • • and not a separate proce- Create A Disaster Recovery Plan | 28 ALTHOUGH ROLLING EYES tend to greet dure. Many enterprises either fail to create plans for disas- any standard mention of compliance, In a survey sponsored ter recovery and business continuity or create plans there’s no denying the topic is a massive last year by the Security that are inadequate or quickly become outdated. concern for companies of all sizes. But Compliance Council, three while those same organizations struggle out of four organizations Pitfalls Of Server Virtualization | 29 to fall in line with the seemingly endless said they must comply with Virtualization’s potential to save money and to con- flow of regulations, others are brain- two or more regulations, solidate servers and storage is bound to appeal to storming methods to take advantage while almost half must any IT manager who works within a budget or has of them. comply with three or more limited space. Whether you’re talking Sarbanes- regulations. Meanwhile, Oxley, HIPAA, FISMA, Gramm-Leach- organizations are spending Application Monitoring | 30 Bliley, or other regulations, compliance an average of 34% of their Application monitoring of your network infrastructure spins a complex web for companies. IT resources on procedures via automated hardware and software monitoring Securing enterprise perimeters to protect designed to help the compa- tools is integral for maintaining satisfaction as cus- from attacks is one thing, but doing that nies comply with regula- tomers interact with your SME’s online systems. and ensuring that company data and tions. procedures are compliant is another, far “One of the key chal- NEW PRODUCTS more challenging matter. lenges that companies face LaCie Two Big RAID...... 16 Jason Bloomberg, a senior analyst is implementing the appro- SealedMedia Express For Board Communications ...... 17 with ZapThink, compares the process of priate governance,” Bloom- B&L Associates VaultLedger OnDemand...... 18 staying in compliance with speeding berg says. “Governance is Blade Network Technologies HP GbE2c ...... 20 on the highway but speeding less than basically coming up with an ASA Computers 1U Quad Servers ...... 20 the car in the other lane. “[Companies] approach to creating and figure that there’s no way they can stay Go to Page 10 Product Releases | 16 ■ The MT3 series of vertical 60A PDU from Aphel delivers power ranging between 5,000 and 10,000 are, after all, both located in the of access control, especially watts. ■ Aventail introduced the ST2 SSL VPN for same area—the two are distinct if both eyes are used. Frank controlling remote access to a network and support- from one another in what they Fitzsimmons, president and ing NAC initiatives. ■ BMC Software introduced The Eyes measure and especially in how CEO of iris recognition firm Data Center Optimization, which prevents data cen- intrusive they can be for those Iridian Technologies, notes that ter sprawl. ■ ContentWatch introduced two new being scanned. the chances of being mistaken products to its ContentProtect Professional Suite. ■ Iris recognition reads the pat- for someone else with a single Digi International’s new Digi Passport competes terns of, naturally, the iris, eye being scanned are about with traditional KVM over IP devices. ■ Para Have It which is the colored part of the one in a million. But if both Systems released four new additions to the Minute- eye that has enough unique eyes are scanned, the chance man line of UPS power distribution products. ■ As Iris Recognition Matures, SMEs attributes to distinguish one for error drops to one in a tril- SurfControl announced its SurfControl Enterprise person from another. The retina lion. Threat Shield 3.51 with features to prevent informa- May Be Drawn To Biometric Controls is in the back of the eye, where tion leakage via USB. ■ Watchfire’s AppScan and Clear-Eyed Winner the blood vessels come togeth- AppScan Developer Edition help businesses monitor by Elizabeth Millard An important distinction for er, and also has enough unique Although both iris and retina the security of online applications. ■ Websense and • • • this type of biometric is be- characteristics to be used for recognition have been used for CP Secure announced the CP Secure Content WHEN FACED WITH iris or reti- tween iris and retina recogni- identification. access control, the less intru- Security Gateway appliance and Websense Web na scans, the majority of peo- tion. Although people tend to Both forms of recognition sive iris systems soon began to Security Suite package. ple think of early spy or lump the two together—they are highly accurate in terms trump the retina scans. science fiction movies, with Digital camera readers take EACH WEEK a character looking into a a photo of the iris and compare Upcoming IT Events...... 3 Opinions ...... 24, 25 sweeping red light that leaves it against a database, which MarketPlace News ...... 3 Next Week ...... 31 him blinking and uncomfort- Both iris and retina recognition allow the readers to be at least MarketWatch ...... 4 What’s Happening ...... 31 able. But the reality is that 18 inches away from the per- are highly accurate in terms Product Releases...... 16 Two Terms ...... 31 eye-based recognition has son being scanned. Retina come a long way since the of access control, especially scanners, on the other hand, early days and could become tend to make people uncom- The Processor.com home page is updated each week with new articles and hardware news to help you keep current. more popular than even finger- fortable because of the light if both eyes are used. Visit www.processor.com today. print technology. Go to Page 10 Page 2 Processor.com July 28, 2006

For address change, fill out form below with new Subscribe Today / Address Change Form information and mail or fax. PLEASE PRINT Phone: ( ______)______Fax: ( ______)______© Copyright 2006 Sandhills Publishing Company. Contact Name: ______All rights reserved. Company Name: ______Address: ______City: ______State: ______Postal Code: ______Subscriptions: (800) 819-9014 Subscriptions Local: (402) 479-2170 Country:______Subscriptions Fax: (402) 479-2123 Email: ______Web Address: ______Mail Form To:

1. What is the size of your company 3. What is your annual computer hardware/ P.O. Box 85518, Lincoln, NE 68501-5518 (how many employees)? software purchasing budget? Overnight Delivery: ■ ■ ■ ■ Less than 10 200 - 499 $0 - $9,999 $100,000 - $249,999 120 West Harvest Drive, Lincoln, NE 68521 ■ 10 - 99 ■ 500 - 999 ■ $10,000 - $24,999 ■ $250,000 - $499,999 ■ 100 - 199 ■ 1,000+ ■ $25,000 - $49,999 ■ $500,000 - $999,000 ■ $50,000 - $99,999 ■ $1,000,000+ 2. How often do you purchase computer hardware/software? ■ Weekly ■ Quarterly ■ Bi-weekly ■ Annually ■ Monthly ■ No Involvement www.processor.com Advertisers Index COMPANY PAGE COMPANY PAGE COMPANY PAGE COMPANY PAGE 360 TECHNOLOGIES ...... 41 CYBER SWITCHING ...... 15 MAIL FOUNDRY ...... 33 RECORTEC ...... 33

ABACUS SOLUTIONS LLC ...... 43 DATA CLEAN ...... 38 MARX CRYPTOTECH ...... 22 REGENT SALES INC ...... 42

ACCUSYS INC ...... 27 DATA RECOVERY SERVICES ...... 39 MARX SOFTWARE SECURITY ...... 38 ROSE ELECTRONICS ...... 23

ADDLOGIX (COMPUCABLE) ...... 37 DATA RELIANCE CORPORATION ...... 42 MEDIA MASTR MAGNETICS INC ...... 43 SANS DIGITAL ...... 25

ADVENTNET INC ...... 36 DATAMEDIA SOURCE ...... 43 MEDIA RECOVERY ...... 42 SANS DIGITAL ...... 28

ADVENTNET INC ...... 37 DIGITAL BROTHERS GROUP ...... 43 MELLANOX TECHNOLOGIES INC ...... 27 SCRIPT LOGIC ...... 35

AKIWA TECHNOLOGY INC ...... 13 DISKEEPER CORPORATION ...... 38 METAINFO ...... 19 SCRIPT LOGIC ...... 38

ALARMPOINT SYSTEMS ...... 35 DMD SYSTEMS RECOVERY ...... 38 MGE UPS SYSTEMS ...... 36 SECURE COMPUTING ...... 23

ALTIRIS ...... 37 DRIVE SOLUTIONS INC ...... 43 MGE UPS SYSTEMS ...... 38 SECURITY COMPUTER SALES ...... 40

AMERICAN MEGATRENDS ...... 28 EBIZ DATACOM ...... 39 MICRO MEMORY BANK ...... 42 SERVER TECHNOLOGY ...... 13

AMERICAN PROIMAGE ...... 27 ELI SYSTEMS INC ...... 42 MICROLAND ELECTRONICS CORP ...... 11 SERVER TECHNOLOGY ...... 15

AMERIVAULT ...... 39 ENHANCE TECHNOLOGY ...... 26 MIDLAND INFORMATION SYSTEMS ...... 28 SERVERS DIRECT ...... 7

APHEL TECHNOLOGIES ...... 15 EQUIPMENT MANAGEMENT INC ...... 42 MIDLAND INFORMATION SYSTEMS ...... 32 SINCA ...... 43

APPOSITE TECHNOLOGIES INC ...... 22 ESSENTIAL SECURITY SOFTWARE ...... 34 MILLENNIUM MIDRANGE SYSTEMS ...... 43 SMARTDISK CORPORATION ...... 28

ARBOR SOLUTIONS ...... 27 EVOLVING SOLUTIONS INC ...... 41 MOBILE IT INC ...... 27 SMS ASSEMBLY ...... 43

ARBOR SOLUTIONS ...... 29 EXCEL MERIDIAN DATA ...... 28 MOVINCOOL ...... 12 STORAGECRAFT TECHNOLOGY ...... 36

ARECA ...... 29 GEIST MANUFACTURING ...... 13 N-TRON CORP ...... 23 STORSERVER INC ...... 32

ARISE COMPUTER INC ...... 23 GLOBAL DATAGUARD ...... 21 NETMASS ...... 39 SWITCH AND DATA ...... 39

ARXCEO CORP ...... 19 GLOBAL PRINTER SERVICES ...... 42 NLE ...... 42 SYMANTEC ...... 23

ARXCEO CORP ...... 22 HERGO ERGONOMIC SUPPORT SYS ...... 16 NORTHWEST PERFORMANCE SOFTWARE ...... 36 TALLY GENICOM ...... 26

ASA COMPUTERS ...... 6 HERGO ERGONOMIC SUPPORT SYS ...... 17 NRS INC ...... 41 TALLY GENICOM ...... 27

ATLAS SALES AND RENTALS ...... 13 I T TRADING ...... 43 PACE / BUTLER CORP ...... 43 TELECT INC ...... 22

AUGMENTIX ...... 27 I-TECH CO ...... 23 PEGASUS COMPUTER MARKETING ...... 39 TOWER SOFTWARE ...... 36

AVTECH SOFTWARE INC ...... 8 IBASE ...... 11 PEGASUS COMPUTER MARKETING ...... 43 TRANE PORTABLE COOLING ...... 13

AXEL INC ...... 29 IBASE ...... 22 PINION SOFTWARE ...... 38 TST CORPORATION ...... 15

B L TRADING INC ...... 40 IBASE ...... 24 PLANVIEW INC ...... 36 TURTLE - PERM-A-STORE ...... 9

BAYTECH ...... 15 INFORMATION SUPPORT CONCEPTS ...... 17 POWER FACTOR INC ...... 16 VECMAR COMPUTER SOLUTIONS ...... 42

BEANSTALK NETWORKS ...... 39 INTERNATIONAL SYSTEMS MGT ...... 43 PRINTRONIX ...... 32 VIBRANT TECHNOLOGIES INC ...... 42

BITDEFENDER LLC ...... 37 ISTAR USA ...... 17 PRO CURVE NETWORKING ...... 22 VIRTUAL IRON SOFTWARE INC ...... 37

BITDEFENDER LLC ...... 38 ISTOR NETWORKS INC ...... 32 PROMISE TECH ...... 25 WESTERN TELEMATIC INC ...... 14

BREECE HILL LLC ...... 33 IT WATCHDOGS ...... 9 PSC INC ...... 24 WILDPACKETS ...... 18

BRITESTREAM NETWORKS ...... 18 IVIVITY ...... 28 PULIZZI ENGINEERING INC ...... 12 WR CONSULTANT ASSOCIATES ...... 43

BRITESTREAM NETWORKS ...... 22 JE COMPONENTS ...... 43 PULIZZI ENGINEERING INC ...... 14 XOSOFT ...... 35

COMPUREX SYSTEMS ...... 43 KDS ...... 43 PYRAMID COMPUTERS USA ...... 9 XTS INC ...... 34

COMPUTER CONNECTION ...... 42 L & L SYSTEMS ...... 43 RACKMOUNT SOLUTIONS ...... 14 ZEROWAIT ...... 42

COMPUVEST ...... 40 LEXMARK INTERNATIONAL INC ...... 33 RACKMOUNT SOLUTIONS ...... 44 ZYXEL COMMUNICATIONS ...... 22

CYBER ANGEL SECURITY SOLUTIONS ...... 35 LINCO COMPUTER SALES & SERVICE ...... 43 RECORTEC ...... 27 July 28, 2006 Processor.com Page 3 IT ▲ Upcoming Events MarketPlace ▼ NEWS - AUGUST - National Institute of Governmental Purchasing replacing co-managers Anand Chandrasekher The company blamed the shortfall on “aggres- August 5-9 Tampa, Fla. and Eric Kim, who have been moved to other sive pricing” in a slow market. Earnings are www.nigp.org/Events/Forum.htm positions. Net income for ’s second quarter expected to come in at 21 to 23 cents per share • • • • • was $885 million, a more than 50% drop from with revenue of approximately $14 billion. Search Engine Strategies 2006 the $2.04 billion it posted a year ago. Intel Reuters had polled analysts, however, that had August 7-10 expects third-quarter sales to be as low as $8.3 projected an average of 32 cents per share with San Jose, Calif. www.jupiterevents.com billion, well below the expected $9.03 billion. revenue of $14.2 billion. • • • • • ❙ ❙ ❙ SHARE Microsoft To Sue Resellers China Plans 3G Meeting IBM Reports Q2 Revenue August 13-18 IN MAY, THE BUSINESS Software Al- CHINA MAY BE READY to issue 3G licenses FOR THE SECOND QUARTER ended June 30, Baltimore, Md. liance said that of the software sold in the after the country’s leading telecommunications IBM saw net income increase from last year’s www.share.org United States, 21% is pirated. Microsoft is officials meet early next month to discuss stan- $1.83 billion, or $1.12 a share, to $2.02 billion, • • • • • Business Intelligence & Data attempting to fight that software piracy by fil- dards for 3G telephony and mobile television. or $1.30 a share. IBM’s revenue for the quarter Warehousing Conference ing lawsuits against 26 companies in seven China already has its own 3G standard, TD- fell 1.7% from $22.3 billion last year, which August 15-17 states, including Colorado, Georgia, Illinois, SCDMA (Time Division-Synchronous Code included the $557 million IBM received in May San Francisco, Calif. New Jersey, New York, Ohio, and South Division Multiple Access), that officials fear 2005 from Lenovo Group for selling its PC www.sharedinsights.com Carolina. The software giant claims that the may prevent widespread use of 3G, as few business, to $21.9 billion this year. Specifically, • • • • • TDWI World Conference-Summer 2006 companies either sold computers containing manufacturers support the standard. The coun- software revenue rose 5% over last year, up to August 20-25 pirated software or sold the pirated software try hopes to have 3G ready to go for the $4.2 billion, and revenue from hardware for the San Diego, Calif. itself. Microsoft used a number of methods to August 2008 Olympic Games in Beijing. Systems and Technology Group fell to $5.1 bil- www.tdwi.org obtain evidence for the cases, including secret lion, down 7% from last year. • • • • • ❙ shoppers and complaints via Microsoft’s Microsoft Buys Winternals, Forms Alliance Business & Technology ❙ Click Fraud On The Rise Solutions Show antipiracy hotline. MICROSOFT ANNOUNCED it will acquire protec- August 22-23 ❙ tion and recovery tools developer Winternals TWO NEW REPORTS indicate that the amount of Rosemont, Ill. AMD Buys ATI Software. As part of the deal, Mark Russinovich, click fraud continues to increase, despite efforts www.btshow.org ADVANCED MICRO DEVICES announced plans co-founder of Winternals, will join Microsoft’s by search companies Google, Yahoo!, and oth- - SEPTEMBER - to buy graphics chipmaker ATI Technologies Platforms and Services group as a technical fel- ers to limit the problem. A Click Forensics study Data Center World for $4.2 billion in cash and 57 million shares low, and Bryce Cogswell, Winternals’ second says 14.1% of clicks during the second quarter September 10-13 of AMD stock. The deal is worth $5.4 billion. co-founder, will become a software architect at of this year were fraudulent, compared to 13.7% Orlando, Fla. According to reports, AMD will use a combi- Microsoft’s Core Operating Systems division. during Q1. The click fraud rate at Google and www.datacenterworld.com nation of cash and new debt to fund the cash Also, Microsoft and Nortel Networks have Yahoo! was nearly 12.8%, compared to 12.1% Visit Processor at Booth 512 portion of the acquisition deal. ATI sharehold- formed a strategic partnership and entered into a in the first quarter. Research firm Outsell says • • • • • HP Technology Forum 2006 ers and U.S. and Canadian regulators still need four-year alliance. The companies will work the click fraud rate is slightly higher, at 14.6%, September 17-21 to approve the deal before its completion. together to create software that integrates costing advertisers more than $800 million. Houston, Texas ❙ Microsoft’s communications software with Because of this, Outsell says, 27% of advertisers www.hptechnologyforum.com Microsoft Plans Financial Restructuring Nortel Internet telephony hardware and software have slowed pay-per-click advertising and 16% • • • • • NSTEAD OF THE COMMON Fall 2006 Conference I seven categories Microsoft as a unified communications solution. have stopped using that form altogether. September 17-21 had previously used for its financial reporting, ❙ ❙ Miami Beach, Fla. the company announced it will condense them Yahoo!’s Revenue Takes A Dip Feds Want Faster Data Breach Notification www.common.org/conferences/2006 to five operating sectors to gauge its financial YAHOO!’S SHARES dropped last week to their CHAIRMAN OF THE House Committee on /fall/index.html performance. Starting in fiscal year 2007, the lowest in almost two years in after-hours trad- Government Reform Rep. Tom Davis filed • • • • • Interop new categories will be: Client, Microsoft ing. The company reported weak revenue from legislation to amend the Federal Information September 18-22 Business Division, Microsoft Entertainment Internet advertising in its second quarter and Security Management Act by requiring com- New York, N.Y. and Devices Division, Online Services Group, another delay to its Project Panama. Project panies to report data breaches faster than they www.interop.com/newyork and Server and Tools. Microsoft had previous- Panama is an effort to match the ad-selection currently do. The White House OMB (Office Visit Processor at Booth 568 ly created three operating divisions to enhance technology utilized by Google, which would of Management and Budget) would set the • • • • • IT Service Management Forum its agility in future growth management, and increase Yahoo!’s search revenue. In Q2, standards and procedures for incidents of data Conference & Expo this financial restructuring plan will further Yahoo! earned $164 million. breaches that involve personal information. September 18-22 align the company around those divisions. ❙ Earlier this month, the OMB changed the Salt Lake City, Utah Microsoft also announced plans to buy back up Dell Projects Q2 Revenue To Fall Short requirements so agencies must report any data www.jupiterevents.com/itsmf/fall06 to $40 billion worth of its stock in an effort to DELL ANNOUNCED THAT its second quarter rev- breach to the Department of Homeland Se- • • • • • Business Rules Symposium Series reaffirm the company’s confidence in its long- enue and earnings will fall short of projections. curity within one hour of the discovery. September 19-20 term future, according to CFO Chris Liddell. Washington, D.C. www.brainstorm-group.com ❙ Google Remains Strong WATCH THE This information provides a quick glimpse of current and historical stock • • • • • prices and trends for 16 major companies in the technology market. GOOGLE CONTINUES to be successful at its goal Enterprise Architecture STOCKS Conference Series of expanding its advertising business and report- September 19-20 ed second-quarter revenue of $2.46 billion, up % change from Washington, D.C. 77% from a year ago, says CEO Eric Schmidt. Company Symbol Year Ago July 17 $ July 24 $ previous week www.brainstorm-group.com The company earned $721.1 million, about Avaya AV $9.51 $10.58 $10.54 ▼ 0.38% • • • • • $2.33 a share, during the quarter, compared to BEA Systems BEAS $8.87 $11.38 $11.89 ▲ 4.48% Government Technology Conference ▲ East 2006 $342.8 million last year. During the second Computer Associates CA $29.37 $19.10 $19.92 4.29% September 25-28 quarter, Google hired 1,152 new employees and Cisco Systems CSCO $20.12 $17.97 $17.95 ▼ 0.11% Albany, N.Y. spent $699 million on capital projects such as Dell DELL $41.54 $21.57 $20.75 ▼ 3.8% www.govtech.net/gtc/index.php real estate purchases. In a conference call, Electronic Data Systems EDS $19.70 $22.60 $22.83 ▲ 1.02% /GTCEast2006 Google executives talked about their initiatives Google GOOG $312 $407.89 $390.90 ▼ 4.17% • • • • • Intel Developer Forum for the coming year, including graphical and HP HPQ $24.73 $31.20 $31.07 ▼ 0.42% September 26-28 video advertisement services along with a radio IBM IBM $84.60 $73.70 $75.99 ▲ 3.11% San Francisco, Calif. advertising system related to its acquisition of Intel INTC $27.44 $17.84 $17.48 ▼ 2.02% www.intel.com/idf DMark Broadcasting. McAfee MFE $29.69 $23 $23.37 ▲ 1.61% - OCTOBER - ❙ Intel Profit Drops; Announces Reorg Microsoft MSFT $26.19 $22.48 $24 ▲ 6.76% IT Expo Oracle ORCL $14.03 $14.42 $14.98 ▲ 3.88% AFTER ANNOUNCING profits that were below October 3-4 Red Hat Software RHAT $15.78 $23.27 $24.44 ▲ 5.03% Anchorage, Alaska analyst expectations, Intel says it will lay off $3.81 $3.88 $4.02 ▲ 3.61% www.sourdough.net 1,000 managers and plans to continue its reor- Sun Microsystems SUNW ▲ • • • • • ganization analysis through the end of this Symantec SYMC $24.34 $15.22 $15.60 2.5% Gartner Symposium/ITxpo October 8-13 year. In addition, Sean Maloney will become NOTE: This information is meant for reference only and should not be used as a basis for buy/sell decisions. Orlando, Fla. the sole leader of Intel’s sales and marketing, www.gartner.com • • • • • Internet Telephony Conference Advertising Sales: Susan Miller / Brant Washburn / Jim Hakel / Julie Lausterer / Art & Design: Lesa Call / Fred Schneider / Carrie Benes / Ginger Falldorf / Sonja Warner / & Expo West David Bartholomai / Rob Downey / Andy Berkebile / Blake Johnston / Dan Brooks Aaron Weston / Aaron Clark / Lori Garris / Jason Codr / Andria Schultz / Erin Rodriguez / October 10-13 Lindsay Anker San Diego, Calif. Editorial Staff: Ronald D. Kobler / Corey Russman / Michael Dempsey / Sheila Allen / www.tmcnet.com/voip/conference Joy Martin / Rod Scher / Christopher Trumble / Calvin Clinchard / Katie Sommer / Web Staff: Dorene Krausnick / Laura Curry / Kristen Miller • • • • • Michael Sweet / Katie Dolan / Raejean Brooks / Sally Curran / Nate Hoppe / Trista Kunce / Linné ASCDI Fall Ourada / Vince Cogley / Ashley Finter / Tara Simmons / Leah Houchin / Holly Zach / Barbara Subscriptions Advertising Editorial Staff October 18-21 Ball / Sarah Gabelman / Marty Sems / Chad Denton / Kylee Dickey / Josh Gulick / Andrew (800) 819-9014 (800) 247-4880 131 W. Grand Drive • Lincoln, NE 68521 Toronto, Canada Leibman / Jennifer Johnson / Nathan Lake / Blaine Flamig (402) 479-2170 (402) 479-2141 [email protected] www.ascdi.com FAX: (402) 479-2120 FAX: (402) 479-2104 Page 4 Processor.com July 28, 2006 BUYERS’ GUIDE MARKET WATCH

centralized, secure application cre- dential storage and automated retrieval through strong authentica- tion. Only authorized applications Access Control Devices and servers can submit requests for passwords and application IDs. Be Careful cess to what, to ensure people Network Technologies based on only have access to what they its proprietary IDOS (Identity SNAPSHOT Whom You Let In should based on their job func- ), which creates tion, and that access is disabled a permanent and unalterable iden- Cloakware Server Password Manager by Sandra Kay Miller when it is no longer required. SNAPSHOT tity for all users, groups, comput- Express • • • Rob Ciampa, vice president of Trusted Network Technologies ers, servers, and applications by An appliance-based solution providing ACCESS CONTROL: Today, it’s as marketing at Trusted Network Identity embedding a unique identifier secure, automatic, and regular update much about keeping bad guys out Technologies, views the access within each session through data and retrieval of application passwords as it is about letting the right peo- control market as entering a sig- Tiered pricing: $15,000 to $60,000 packet modification using an ple in. Organizations are punching nificant growth phase. “It repre- Both a software and appliance solution Identity Driver. The system is www.Processor.com/Cloakware3 more and more holes in their walls sents a fundamental shift in how providing control by establishing a per- administrated via a Web-based to enable transactions; the bound- we do IT. Over the next three to vasive identity for every user, group, application, I-Manager, and offers ary is getting much more porous. five years, it will be a shift away computer, server, and application fast and easy creation of policies Designed for organizations that Network administrators want to from IT-centric representation of and reports. have over 200 servers to manage, become proactive to enable legiti- business objects to identity-based www.Processor.com/Identity Vernier offers nine EdgeWall the appliance-based solution sup- mate transactions across the net- representation of business 7000 series models to fit a variety ports multiple platforms (Micro- objects.” moving toward providing secure of performance requirements. soft, AIX, Solaris, Linux) and is Robert Grapes, senior access not only on a technical Deployed on the front lines ahead managed via a Java-based admin- product manager for En- level but also on a business level. of switches and wireless access istration console. Policies and terprise Solutions at This shift is occurring due to the points, the EdgeWall delivers password changes can be globally SNAPSHOT Cloakware, believes that access fact that as the world moves into an wire-speed, dynamic, granular control technologies are gathering integrated electronic environment, access control based on vulnera- BlueCat Networks Adonis 1000 momentum as small, private, meaning businesses are online and bility assessment and identity to Starts at $9,995 pure-play companies are being increasingly interactive, executives secure data and applications from snapped up by the major players. are often held responsible for tech- unsecured endpoints. DNS and DHCP bundled onto an enter- nical decisions that will ultimately Centralized administration and SNAPSHOT prise-class appliance for centralized Decisions & Details impact their products, services, management is through a Web- administration and enterprise-wide man- TriCipher Armored Credential System Within the enterprise there are customers, and every stakeholder. based console. Policies are en- agement of IP addresses, configura- Authentication Gateway numerous facets where access con- Here are some of the areas in forced in real-time to verify only tions, and host names trol can be implemented—users, which organizations are install- authorized users with compliant Starts at $40,000 www.Processor.com/BlueCat roles, applications, Web servers, ing access control devices in an endpoint devices can access re- An appliance for automatically managing wired and wireless network access, effort to gain more control over sources. For endpoint compliance, the authentication process for Web- work instead of focusing solely on resources, etc. Even Gartner sees their enterprise. Vernier checks security policies, based applications nefarious activities. the market for access control solu- antivirus software and signatures, “My world is changing,” says tions as “crowded, with many ven- DNS/DHCP patches, hot fixes, personal firewall www.Processor.com/TACS the IT director for a large financial dors providing point products.” At the very heart of network settings, and third-party application services company. “Historically, Sally Sheward, TriCipher’s vice access is the address allocation. requirements. Noncompliant users my job has been to keep everyone president of strategy and business By gaining control over the fun- and endpoints are quarantined, applied throughout the network out, but over the last five years development, points out that it’s damental address allocation of given limited access, or denied from a centralized location. we’ve experienced a rise in busi- resources, organizations can spec- entirely based upon policies. TriCipher takes a risk-based, lad- ness partners as well as different ify granular access policies and EdgeWall supports all third-party der approach to access control with types of access requirements. I controls to all touch points on TACS (TriCipher Armored spend my life punching holes in their network. Credential System). Using my perimeter because that’s how The Adonis 1000 from Blue- multiple credential method- my business runs now,” he says. Cat Networks amalgamates ologies (clientless, device- Evolving business needs are tax- DNS and DHCP services onto based, and token), TACS SNAPSHOT ing traditional access control a 1U, rack-mountable, high- doles out access based upon devices, such as firewalls, because Infoblox Network Identity Appliance availability, hardened appliance. SNAPSHOT the level of risk associated with administrators are pushing them to With the centralized administra- that particular account or user. For Starts at $9,995 Vernier Networks EdgeWall meet the demands for specific indi- tion, administrators no longer have example, a user checking an online 7000 Series vidual user-based policies. Thus, Capable of delivering 300,000 DNS to stay on top of individual threats bank balance may only need a firewalls themselves have become records and 10,000 networks; serves associated with the operating sys- Starts at $9,000 password, while transactions in- overly complex and difficult to more than 30,000 DNS and 100 DHCP tem, BIND, and DHCP. volving large sums of money Enforces identity and endpoint security maintain, which has increased the requests per second A platform-agnostic Java-based require multiple authentication fac- through the authentication, validation, risk profile and made auditing next management console offers rapid tors to complete the transfer. www.Processor.com/NIA and authorization of endpoints and pro- to impossible. deployment regardless of your The TACS Authentication Gate- vides quarantine and remediation for The reality for medium-sized to organization’s infrastructure. way delegates authentication from noncompliant endpoints large organizations is there needs not practical to install and maintain Automatic data population helps Web applications. The appliance to be a cohesive and automated multiple authentication systems. network administrators save time www.Processor.com/EdgeWall ships with a preinstalled Web process for access control. Given Ultimately, the decision comes and cuts down on errors. For server fully integrated with TACS that many IT controls today are down to where in your organiza- existing DNS/DHCP installations, switching and routing devices, as APIs and can easily hook into any also being driven by regulation, tion you need the most control. Adonis can import old BIND, well as most VPNs. SAML-aware application as well it’s critical to know who has ac- Additionally, organizations are DHCP configuration, and Win- as passive and secondary authenti- dows 2000 DHCP dump files Alternative Angles cation technologies. through easy-to-use wizards. Cloakware targets hard coded Regardless of the technology Buying Tips Using existing technologies, passwords, often referred to as you choose for access control, you Infoblox repurposes DNS, DHCP, “headless accounts,” which are need to start with a good under- For organizations in the market for an access control device, Trusted Network RADIUS, and IP Address Manage- routinely overlooked within an standing of who needs access to Technologies’ Robert Ciampa provides the following checklist of key items to ment into a strong identity-based organization’s security schema. what. Determine the access re- consider. access control methodology, pro- These accounts reside in the data quirements of your organization • Current identity organization. Understand how your enterprise organizes viding robust access control on net- center and are used by applica- and implement the technologies its identities, that is, Active Directory, LDAP, etc. work and application fronts. tions to connect to the back end of that will allow access securely and There are two models covering infrastructure such as databases, efficiently. An access control prod- • Security and network infrastructure. Access control is a complement to small to midsized enterprises and ftp, and Web servers. uct can help automate processes firewalls, IDS, etc., not a replacement. The solution you choose should work larger enterprises. The Infoblox “What we’ve found through a and provide oversight and assur- with existing security solutions. 1000 supports up to 20,000 DNS long line of conversations with ance for policy enforcement. P • Applications. Access control solutions can be leveraged with powerful busi- and 70 DHCP leases per second, federal agencies [and] healthcare ness systems such as ERP and CRM; make sure they will work together. and the 1200 model scales to and financial organizations is hard- To see Processor Showcase • ROI. Make sure there is a valid business case for purchasing an access 30,000 DNS and 100 DHCP leas- coded passwords compose about advertisements for products in control device and its value will exceed the purchase, installation, and man- es per second. 90% of the authentication process this category, look in the Showcase agement costs. in the data center,” says Grapes. Index on page 5 and find the Identity To combat this problem, Cloak- • Usability. Choose a solution that tracks to business cases, such as regula- Access Control ads under The I-Gateway is the hardened, ware’s Server Password Manager tory compliance, instead of one based solely upon technology. Communications/Security. in-line appliance from Trusted Express, aka CSPM Express, offers July 28, 2006 Processor.com Page 5 Use To Find Product Information Fast!

Processor contains detailed information on hundreds of products geared toward the data center. We make finding the products you need easy with our color-coded sections.

Each product Showcase or Manufacturer Presentation has a color bar at the top. Your Guide To Products Featured In Processor Simply identify the product category and Services Design, Development, Hosting, Implementation, Manufacturing, Security, Training related color you’re looking for from the Software list on the right (Services, Software, End Application Development, Business Productivity, Communications, Security, System Management Nodes, Communications, or Physical End Nodes Infrastructure) then flip through the Components, KVM, Mobile Devices, Monitors, Peripherals, Servers, Systems publication to find the product section Communications you want. Network Security, Routers, Storage Networking, Switches, Telephony, Wireless

Physical Infrastructure Cabling, Environmental Controls, Fire Protection, Power Distribution, Racks

SHOWCASE SOLUTION INDEX

SOLUTION PAGE SOLUTION PAGE SOLUTION PAGE SOLUTION PAGE Physical Infrastructure Multifunction Appliance ...... 22 Direct Attached Storage ...... 28 Rights & Permissions ...... 38

OEM Security Platform ...... 22 Network Attached Storage ...... 28 Security Suite ...... 38 Environmental Monitoring ...... 13

Switch Storage Area Network ...... 28 HVAC ...... 13 Services

Modular Switch ...... 22 Storage Component ...... 28 Power Distribution ...... 13 Data Center Services

Ethernet Switch ...... 23 Thin Client ...... 29 Power Management ...... 13 Data Center Cleaning ...... 38

Workstation ...... 29 Power Protection ...... 15 End Nodes Equipment Disposal ...... 38

Racks & Furniture KVM & Console Access Software Hosting & Disaster Recovery

Racks & Cabinets ...... 16 KVM ...... 23 Business Productivity Hosting/DR Site ...... 39

Furniture ...... 17 KVM Accessory ...... 23 ERP Suite ...... 36 Media Recovery ...... 39

Printer ...... 27 Network & Systems Mgmt. Multiple IT Services ...... 39 Communications

Server ...... 27 Monitoring ...... 36 Repair Carrier Networking ...... 22

Embedded System ...... 27 Management Suite ...... 36 Repair Services ...... 39 Security

Storage Wireless Management ...... 37 Storage Access Control ...... 22

Disk Based Backup ...... 27 Security Data Backup Services ...... 39 IDS/IPS/DoS ...... 22

Storage Security ...... 28 Access Control ...... 38 Page 6 Processor.com July 28, 2006 2354 Calle Del Mundo, Santa Clara, CA 95054 ASA www.asacomputers.com Email: [email protected], COMPUTERS P:1-800-REAL-PCS FAX: 408-654-2910 Want your business to be more productive? The ASA Servers powered by the Intel® Xeon™ Processor provides the quality and dependability to keep up with your growing business Hardware Systems For The Open Source Community - Since 1989 (Linux, FreeBSD, NetBSD, OpenBSd, Solaris, MS etc.)

6TB + in 5U - $7,600 Storage Solutions Intel® 7501, Dual Intel® XeonTM 2.8GHz IDE, SCSI, Fiber RAID solutions 512 MB DDR ECC RAM Max: 8GB TB storage options 6TB + IDE Storage 3Ware, Hipoint, Adaptec, JMR, Dual Gigabit LAN, CD+FD, VGA Kingston/Storcase solutions Options: SATA Drives, Firewire, DVD+RW, CD+RW, 64 Bit OS Configurations, etc.

1U Dual Itanium IDE - $3,650 Clusters Dual Intel® Itanium® 2 1.4 GHz Rackmount and Desktop nodes 2 GB ECC DDR Switches, Interconnects 1 of 4 x 40 GB HDD KVM or Cyclades Terminal Server Dual Gigabit LAN APC or Generic racks Based on Supermicro 6113M-i

14" Deep Appliance Look Server - $865 1U Dual XeonTM EM64T Intel® Xeon™ 2.8GHZ Processor Superserver -$1,700 40GB Hard Drive SuperMicro 6014H-82 Barebones One 10/100/1000 NIC Dual Intel® XeonTM 2.8 GHz 800 FSB Options: CD,FD, 2ND HD,Your Logo on Bezel 1 GB DDR II-400 RAM Max: 16GB Call for Low Cost Options. 36 GB 10K RPM SCSI Max: 4 HS HDD CD + FD, Dual GigE, VGA, RAILS Options: RAID, etc.

Your Custom Appliance Solution Let us know your needs, we will get you a solution

Your Logo Here

Intel®, Intel Inside®, Intel® Itanium® 2, Intel® Xeon™ , Intel® Xeon™ Logo and the Intel Inside® logo are trademarks of Intel Corporation or its subsidiaries in the United States and other countries.

Prices and availability subject to change without notice. Not responsible for typographical errors. All brand names and logos are trademark of their respective companies. July 28, 2006 Processor.com Page 7 Page 8 Processor.com July 28, 2006 July 28, 2006 Processor.com Page 9 electronic records and often em- ploy open wireless networks.” In these companies, too, there Compliance: could be compliance issues brought on by denial of service attacks or spam, Freericks adds. IT, Inform Thyself The bottom line, many say, is Do I Need To Worry? that smaller companies should be aware of compliance but not over- Experts Say Don’t Fret About It, least another year after the update messaging is recorded, or how ly concerned about the regulations is passed. vendor databases are accessed. if they’re not directly affected by But Don’t Ignore It, Either “The SEC is really looking at Especially tricky is if the client vendor or client considerations. how to change regulations to be or vendor is smaller, which might But as laws change, it’s helpful by Elizabeth Millard “Compliance is a hot topic, but better to SMEs in the future, so limit its resources in terms of to stay current with updates and • • • that doesn’t mean that perhaps even call in a con- CALL IT A GOOD NEWS and bad SMEs have to kill them- sultant to do a quick check news scenario: Likely, a small to selves trying to follow to see where a company midsized enterprise won’t have to regulations that don’t might stand with compli- worry much about compliance apply to them,” says ance. But beware of the right now, but that doesn’t mean Larry Bowden, vice in-depth fix, Bowden it can relax and let the bigger president of IBM Work- notes. Look for a consul- companies fret about it or that place Software Solu- tant that can tailor advice compliance won’t affect it within tions, a division of the and policies according to a few years. company that offers company size, rather than Compliance, the buzzword du hosted compliance ser- one who wants to make jour in technology and financial vices. “Mainly, the issue an SME fully compliant circles, is shorthand for adhering to has brought a lot of unnecessarily. regulations such as Sarbanes-Oxley money for consultants, Instead, compliance can (also called Sarbox) and HIPAA, but there isn’t a big be used as a guide, Bow- which have been put into place to boom in compliance- den adds. After all, many ensure that publicly traded compa- related purchasing by companies could benefit nies are employing adequate finan- smaller companies.” from more comprehensive cial and administrative controls. Another reason that procedures and policies, Most SMEs are exempt from SMEs can feel comfort- and following regulations following the regulations because ed rather than anxious is could provide a handy most aren’t public and don’t deal that the Securities and framework. If a data cen- with healthcare or financial issues, Exchange Commission ter manager and a consul- but they should be aware of how has begun to look at the tant approach the issue customers and vendors are affect- burden to small companies when there’s no need to start scurrying having individuals dedicated to from this angle, it’s likely to be far ed by the laws. Also, Sarbox in it comes to compliance. Many yet,” he says. “There will be time compliance mandates. more efficient than merely trying particular is being rolled out in a that have to follow the laws, such after the SEC’s decisions to put “Compliance is typically not to follow laws. number of stages and could in- as financial firms, have been changes in place.” considered a big issue by SMEs,” “Just watch out for any guerilla clude mandates for SMEs in the struggling with the costs of says Helmuth Freericks, chief answers to the issue, with people future. Having some savvy now putting multiple systems in place. Stronger Focus technology officer of Authentium pushing spreadsheets and wanting about what’s required—even if the In response, the SEC noted in For some SMEs, compliance Software. “Exceptions are the to assign more people to the company doesn’t need to imple- April that it would be revising the will play a larger part in their long- healthcare and public accounting task,” says Bowden. “Compliance ment changes—could protect a audit requirements for small com- term plans. Those companies that fields, but often compliance reg- for SMEs can be taken slowly and business in the long run. panies, eliminating the need to are contemplating going public, for ulations aren’t fully understood built over time. That way it can hire external auditors to certify example, should definitely have not by participants. For instance, drive changes and improvements Varying Opinions internal accounting controls. only accounting and audit proce- many doctors’ offices still don’t rather than become a burden on Like many issues affecting New regulations may crop up, dures in place but also data storage have adequate protection of their resources.” P SMEs, the importance of com- but they probably won’t appear processes, IT security measures, risk analysis reporting, demonstrat- ed improved efficiency through When To Worry About Compliance Companies that don’t plan to go security planning, and appropriate hardware and software. • When a company is about to go public, but compliance procedures haven’t public may have to deal with Companies that don’t plan to been put into place. go public may have to deal with compliance anyway, if they have • If vendors have to be compliant but are lax in communicating that to the compliance anyway, if they have small to midsized enterprise. clients facing the issue. clients facing the issue. For example, if the company has a • When accounting procedures at a company seem to be problematic, or large financial institution or there’s high turnover in that department. pliance depends on whom you until at least mid-2007, says healthcare company such as • If the company has no audit processes in place for financial or accounting ask. Some in the industry feel Thomas Tierney, a consultant at Citibank or Blue Cross as a information. it’s a nonissue that’s been over- IT advice firm Forward Hindsight. client, it’s likely that there could hyped, especially by those sell- Even if new compliance mandates be compliance mandates about • When the CEO and CFO don’t take compliance seriously enough, even ing products and services around are created, though, deadlines for how information is delivered though vendors or clients may see it as a priority. compliance. meeting the mandates would be at electronically, whether instant

Superior Appliance Solutions Protect Your Data with TurtleTM for OEMs and ISVs Transport Cases

www.pyramid-usa.com Pyramid Computer is a leading supplier of branded appliance solutions for OEMs and VARS. We offer a complete range of design, maufacturing and logistics services that allow you to effortlessly deliver a superior product to customers on a world wide basis, and focus • Hot-Swappable HD Case • Turtle Master 5 Blue Transport Case your attention on core business activities. • 10 Hard Drive Capacity • 100-120 High-Density Tape Capacity • Waterproof & Lockable • Waterproof, Lockable, Caster Wheels • Quickly deploy an attractive high quality product with your own brand and image Ask your authorized Turtle Dealer for the July/August special and receive • Minimize your efforts managing manufacturing, a 10% discount on your Master 5 Blue or Hard Drive Case purchase. logistics and hardware support • Reduce inventory costs, risks Contact us at [email protected] • Demonstrable value even at low volumes Perm-A-Store Pyramid Computer USA Golden Valley, MN Phone: (866) 745-3553 763.230.3911 Worldwide Email: [email protected] 800.366.7535 USA Page 10 Processor.com July 28, 2006 Regardless of the outside help recruited by enterprises to deal Increased Confidence Compliance Control with compliance—whether the Continued from Page 1 is sort of scary in a way because help arrives in the form of soft- Chief financial officers are more confident in their companies’ financial report- communicating policies that apply you’d think that giving executives ware or consultants—the in-house ing today, according to a recent survey developed by Robert Half to the organization, as well as giv- better visibility into their finances IT staff must play an integral role Management Resources. Based on responses from 1,400 CFOs from U.S. ing people rules to follow those and [following] the other require- in the process. With multiple reg- companies with 20 or more employees, the report found that that 34% of policies and then enforcing those ments of Sarbanes-Oxley seem to ulations bearing down on the typi- CFOs in the study were more confident in their company’s financial reporting policies and mitigating any policy make common business sense,” cal IT department, it’s a daunting capabilities today than compared to how they felt three years ago. issues that result.” he says. “But in many organi- task to motivate IT to adhere to However, communicating the zations, that would not be a the often thankless task of record The study also revealed that among public companies, 39% of CFOs polled value of those policies can be a spending priority if it weren’t for storage and compliance. feel most confident about the level of internal controls and corporate gover- tough sell. At a recent Sarbanes- the regulations.” “Companies aren’t in the busi- nance in their organizations, a result that suggests the impact of the Oxley conference, Bloomberg ness of complying with regula- Sarbanes-Oxley Act, according to Robert Half Management Resources. spoke with attendees about how Stay Flexible tions; they’re in the business of “The Sarbanes-Oxley Act has prompted public and private companies to bet- the regulations can improve busi- While many experts state that making money by building prod- ter align their technology and finance functions,” said Paul McDonald, execu- ness processes and help improve IT-centric automation is key to ucts and offering services that tive director of Robert Half Management Resources, in a statement. “Replac- accounting. But when he asked successfully handling compli- their customers like better than ing outdated business software with newer systems has enabled firms to executives if they would actually ance demands, real-world evi- [products and services from] capture essential data for more accurate financial reporting and thus meet be following any these compli- dence that automation is the the other guy,” Bloomberg says. critical accounting mandates.” ance-related procedures if it answer isn’t quite widespread. “How can companies be flexible enough and cost effective enough to meet those customer needs bet- example, a policy infrastructure or personnel, companies can be more It’s a difficult process integrating ter than their competition? The a policy life cycle management adept at recognizing which regula- real answer is to be able to lever- capability, where there’s always a tions affect which processes and compliance into enterprise strategy. age IT in more flexible ways.” way to store policies, update them, how they affect them. Flexibility is key, especially in and retire them over time. “Business needs are always weren’t for Sarbanes-Oxley, the Some companies complain that today’s corporate culture, where going to be changing, and compa- answer was a resolute “No.” current compliance solutions there’s no way to determine Expect Change nies need to realize this,” Bloom- According to Bloomberg, com- can’t effectively mesh with their whether existing regulations will By adopting a service-oriented berg says. “One thing about regu- panies aren’t willing to spend existing infrastructure, a problem change or when new regulations approach, companies can organize lations is they’re arbitrary. A legis- massive amounts of money on that can potentially lead to more will emerge. Bloomberg explains their IT departments to meet an lature anywhere around the world compliance-related process im- security holes and compliance that IT should always be involved entire range of business needs, can just make a new one, just provement unless a specific man- problems than what previously in the governance process, where it Bloomberg says. With closer rela- because they feel like it. There’s date instructs them to do so. “This existed. can be called upon to provide, for tionships between business and IT no rhyme or reason to it.” P

“The challenge with the market is that because it’s quick and noninvasive, unlike fingerprints have had about a 100-year lead fingerprint technology. A similar implemen- The Eyes Have It on the iris in terms of being used for identi- tation in another New Jersey district in 2003, Continued from Page 1 with a single pulse of light. Currently in fication,” Fitzsimmons notes. “But devel- also centered on iris recognition, resulted in that has to be focused near the back of development are readers that are better at opment is advancing, and adoption is quicker database searches and lower admin- the eye. capturing information of people “on the increasing, especially at airports.” istration expenses. Because of the advances made in iris move,” Fitzsimmons notes, so that airline So far, he says, an iris system is in place at As such implementations yield better scanning, the field is maturing rapidly, with travelers or those walking in a company eight Canadian airports, as well as Heathrow results and the costs of technology drop, iris readers being developed that can be up to hallway can be scanned without having to Airport in the UK. Saudi Arabia installed the recognition could be the biometric of choice 24 inches away from the eye or do a reading stop and gaze into a reader. technology to track visitors, and Singapore for schools, data centers, and companies of launched a trial program to screen workers every size. “There aren’t any deployable bio- who cross its border every day. metrics that can touch the accuracy of iris A Sampling Of Iris Recognition Products scanning,” says Fitzsimmons. “You can be Looking Ahead recognized against a database in less than As the prices for iris recognition readers two seconds, you don’t have to touch a sen- Product Description Web Site and software go down, Fitzsimmons believes sor that 2,000 other people have touched, and Iridian KnowWho Adds network scalability and processing www.iridiantech.com that more small to midsized enterprises will it’s easy to install.” P Authentication Server speed to enable iris recognition for large- be eager to take advantage of the technology. scale applications Currently, the cost of the readers is around $3,000, but next year Iridian plans to release SPONSORED LINKS IriTech Iris2000 Combines iris and facial recognition and www.iritech.com “iris on a chip,” which will cut the price of LG Iris Technology Division is compatible with third-party camera the readers in half and let users do iris recog- Manufacturer of biometric authentication systems nition on PDAs and other handheld devices. employing iris recognition PC manufacturers could also fuel a boom www.Processor.com/LGIris LG Electronics Connected to a server or database, the www.lgiris.com by building in iris recognition to the hard- Iridian Technologies IrisAccess 3000 desktop unit also features voice prompts ware. In January HP launched an initiative Research, development, and marketing of authentication technologies based and easy installation at a school district in New Jersey, including on iris recognition iris recognition in its blade server there as a www.Processor.com/Iridian Panasonic BM-ET100 PC iris recognition camera that can also be www.panasonic.com way to improve overall school and student IriTech desktop camera used for videoconferencing; does scans at safety and reduce administration costs IriTech's software can be used with any up to 21 inches away from the face related to student attendance. hardware platform and camera system Collaborating with Eyemetric Identity Sys- www.Processor.com/IriTech tems, HP says that it chose iris recognition

Processor’s dedication to the data center/IT industry extends far beyond this weekly print publication. Our Web site, www.processor.com, has a number of (Re)introducing great features you can rely on to help simplify your technology and product research and buying decisions. Processor.com Processor Showcase You should be familiar with the print edition of our Showcase advertising section—it’s the section beginning on page 5 of this issue that displays dozens of products of interest to data center and IT professionals. Now there’s an electronic counterpart with hundreds more products we can’t fit in print.

If you know the specific manufacturer or advertiser you’re looking for, click Browse By Advertiser. If you’re looking to see if a solu- tion exists, click one of the By Category links (either graphics-based or text-based) or the Word/Phrase Search link.

The Word/Phrase Search is the quickest route but choose your keywords wisely to ensure you get the best results.

If you choose the graphics-based browse option, you’ll see instructions on how to use the browsing feature. Pass your cursor over one of the five color-coded categories near the top of the page (Physical Infrastructure, Communications, End Nodes, Software, or Services) then choose the category or subcategory you want and click it. A list of links appears in the left window; pass your cursor over the links, and the product ad displays in the right window. Once you’ve found a product of interest, click the red More link in the bottom right of the ad for more detailed information. July 28, 2006 Processor.com Page 11 Coping With Compliance

Software & Hardware Tools Offer Help Certus: Full-Featured With Sarbox, HIPAA & More Compliance Founded in 2001, this by David Garrett California firm is a • • • What’s Out There leader in high-end com- NO ONE SAW ENRON coming. No tool is a silver bullet, and no pliance software. The Save for a few insiders (some tool can guarantee full compli- Certus Governance who tried to hide the truth and ance. Instead, these tools help a Suite (www.certus.com) some who tried to expose it), the firm come to grips with the some- helps companies plan, business world was grossly sur- times crushing demands of recent implement, monitor, prised by the implosion of one of laws and to structure compliance and audit Sarbox con- its brightest stars. What’s more, projects that meet those demands. trols. the laws passed in Enron’s wake Much of the market’s current The software includes have left more than one firm in a software entails some form of for- “best practice frame- state of confusion over how to malized governance, most often works” for COSO and comply. COSO or COBIT. COSO, short COBIT and has many Most of the new laws aim to for the Committee of Sponsoring building blocks: Certus shore up a firm’s accounting prac- Organizations of the Treadway for Portals (to build tice. And because modern ac- Committee, is a governance sys- accounting portals for counting relies largely on IT, tem designed to promote fair and review and reporting), today’s IT managers have become transparent financial reporting. Certus 404/302 (for the as fluent in Sarbanes-Oxley, COBIT, short for Control Objec- two most famous—and aka Sarbox, as some CPAs. When tives for Information Technology, controversial—sections you add HIPAA, Gramm-Leach- is a governance system that ap- of Sarbox), and Certus Bliley, and recent National Asso- plies solely to IT and includes Audit, among others. ciation of Securities Dealers regu- more than 300 control objectives This last tool cuts the lations to the mix, compliance is for everything from planning to costs of audits by cut- daunting. deployments. ting the time and man- But as with most things, there’s Many of the tools below sport power they demand and help. From large-scale software to COSO or COBIT features and by collecting the docu- smaller apps that tackle only one run the gamut from single-func- ments needed to prove a control’s solution designed for midsized which accounts have too few con- facet of compliance, such as tion software and hardware, efficiency. companies on a budget (it costs trols or no controls at all. encryption, the compliance mar- including encryption tools, to less than $5,000). KnockYourSoxOff also helps ket is hot. Forrester analyst Paul ERM (enterprise risk manage- Knock Your Sox Off The software includes a control you test a control to ensure it Hammerman, for instance, pre- ment) dashboards, governance But not all Sarbox software is inventory that lets you quantify works by recording descriptions dicts the market for Sarbox tools apps, add-ons to existing CRM as large or as expensive as Certus. the risk of each control based on of the test, who did it, and even alone will grow to $376 million and ERP tools, and small data- Macy and Associates’ Knock- the size of the impact. You can employees’ answers to auditors’ in 2008, up from today’s $200 base systems to inventory, test, YourSoxOff (www.knockyour also link general ledger accounts questions. You can also use it to million. and audit controls. soxoff.com) is a Microsoft Access to controls and build reports on Go to Page 12

Industry’s Broadest Line of Hard Drives Hitachi One-Stop Shop For Hard Drives

Microland Electronics Corporation is a leader in the distribution of a comprehen- sive range of high-end systems and storage products of various types, including stor- age subsystems, RAID, and tape backup products to resellers, VARs, and systems integrators throughout the U.S.

Choose Hitachi Ultrastar Drives For Your Enterprise Needs With Hitachi Ultrastar you will have consistent quality, good performance characteris- tics, and low return rates. Hitachi can offer you the same levels of service available to its top five server OEMs, free see units, and competitive pricing. Hitachi Ultrastar Drives are qualified by the top five server vendors worldwide.

HITACHI Form Factor Spindle Speed Capacity Interface DESKSTAR 3.5” 7200 RPM 80,160, 250,400,500 GB ATA, SATA

TRAVELSTAR 2.5” & 1.8” 4200, 5400, 7200 20,40,60,80,100,120 GB ATA, SATA, Enhance

ULTRASTAR 3.5” 10K, 15K RPM 36,73,147,300 GB SCSI (68, 80pin), SAS, FC

MICRODRIVE 1.0” 3600 RPM 6,8 GB ZIF, ATA

More information: www.microlandusa.com Call: 1-800-632-1688 to speak with a Microland Sales Representative

California Headquarters Texas Branch Office 1883 Ringwood Ave. 3724 Arapaho Rd. San Jose, CA Addison, TX 408-441-1688 972-484-7515 Page 12 Processor.com July 28, 2006 email policies using the PostX Coping With Compliance Policy and Rules Engine, which SPONSORED LINKS scans email for keywords that Apani Networks EpiForce Continued from Page 11 installations or an encryption sub- who deals with HIPAA. Among imply the presence of ePHI, such A regulatory compliance security keep audit records of as many system with a private key. A total its many provisions, HIPAA man- as private or confidential. When management system that imple- controls as you like, building of 12 encryption levels are offered dates the near-complete privacy those keywords are found, the ments and enforces network securi- reports indexed by risk on the to lock tapes down; once encrypt- of patients’ health data, a problem email is instantly encrypted. ty relationships and access control www.Processor.com/EpiForce effectiveness of controls. ed, they can only be read by if that data is sent over email. The platform, which includes another Paranoia2 device with the Enter PostX (www.postx.com), software, hardware, and Web ser- Certus Governance Suite Get Paranoid matching user and key. makers of a set of email encryp- vices, also offers read receipts, Consists of several tightly integrated Some tools focus on a single Paranoia2 integrates with tion tools endorsed by the Amer- message tracking, reporting, and corporate governance software mod- ules that create a powerful aspect of compliance, such as standalone drives and tape librar- ican Hospital Association. The message expiration. Sarbanes-Oxley compliance platform encryption. Take Midland In- ies, has a built-in compression PostX platform, which includes www.Processor.com/Certus formation System’s Paranoia2 scheme, and offers data transfer PxMail, PxEnvelope, and Secure- Use What You Have (www.midlandinfosys.com), rates at 68MBps. Email, lets hospitals, clinics, If you depend on a major ven- Compliance 360 which encrypts backup tapes to insurance companies, and other dor’s ERP or CRM app, you may Hosted, on-demand compliance PostX: Safe Email solutions that help companies auto- guard against embarrassing expo- medical firms send encrypted have compliance software on your mate and manage corporate compli- sures of customers’ private data. ePHI, or electronic protected emails to clients without any network already. Take SAP’s ance programs through a single, Paranoia2 comes in two flavors: health information, is a term client-side software. It also gives mySAP ERP Financials (www enterprise-wide application as an external device for turnkey that’s familiar to any IT manager IT managers a way to enforce .sap.com), an accounting tool for www.Processor.com/Compliance midsized and global firms alike. It Formatta has a number of governance fea- Publish, process, and securely Products & Features Comparison tures to cope with Sarbox and manage e-forms while being 508, other regulations (and languages GPEA, and HIPAA compliant www.Processor.com/Formatta Product Web Site Features and currencies) in foreign markets. It’s also COSO-compliant, has an Midland Information Systems Certus Governance www.certus.com A full-featured Sarbanes-Oxley tool for building Sarbox pro- advanced audit and reporting sys- Paranoia2 Suite grams from the ground up, including planning and testing of tem, and boasts a number of Encrypts backup tapes to guard controls industry-specific features. against exposure of customers’ And then there’s Microsoft. If private data www.Processor.com/Midland KnockYourSoxOff www.knockyoursoxoff.com A smaller, Access-based Sarbox tool for managing controls; the notion of spending hundreds of designed for the midsized enterprise thousands of dollars on compli- PostX SecureEmail ance tools is daunting, you can An enterprise-class platform for mySAP ERP www.sap.com Has built-in governance features to assist in designing, test- build a compliance system with encrypting ad-hoc emails internal Financials ing, and documenting controls and dealing with regulations and external to your network the Microsoft tools you already www.Processor.com/PostX across borders have, adding SharePoint and InfoPath to the mix (www.micro Paranoia2 www.midlandinfosys.com Encrypts backup tapes to prevent exposures from loss or theft soft.com). Just ask Remedy Intel- It saved Remedy money, too. “I ligent Staffing, which used Micro- was going to have to hire some- PxMail, PxEnvelope, www.postx.com Tools encrypt email and are endorsed by the American soft tools to build a Web-based one to manage the documentation, SecureEmail Hospital Association; principal focus is HIPAA library where all control docu- but with the solution I don’t need ments are stored. It has basic docu- to,” says Stacy Lax, Remedy’s Smaller firms may opt to build document libraries and other SharePoint & www.microsoft.com ment management features, such director of internal audit. “Right documentation or audit systems with existing Microsoft tools InfoPath as version control, access control, away, the solution has saved us to save on deployment and training costs and timestamps, to give auditors from needing to fill a $35,000 to the raw data they need. $40,000-a-year position.” P July 28, 2006 Processor.com Page 13

Environmental Monitoring HVAC HVAC www.Processor.com/Geist22 www.Processor.com/Atlas www.Processor.com/Trane

Portable Air Conditioning Portable Air Conditioning Convenient, space-saving, Ideal For: quiet, high-efficiency units • Server Rooms provide powerful cooling • Electronic Equipment directly to the area where it • Primary, Supplemental, is needed. or Emergency Cooling Simply ROLL into place, About the size of a candy bar, the tiny new RSMINI can Featuring: PLUG-IN the power cord, support up to 16 remote sensors plus internal temperature • Rentals and Sales ATTACH any accessories, sensor. This compact and powerful unit displays the same • Installs in Minutes and enjoy comfortable cool- user interface, including graphs, as the rest of the • Locations Nationwide RacSense line. The RSMINI is the ideal environmental ing IN MINUTES! monitoring device when space or budgets are tight. To Learn More, Visit www.Processor.com/Trane

Lincoln, NE 68521 1400 Valwood Parkway, Suite 100 Phone: (800) 432-3219 Carrollton, TX 75006 Phone: (972) 406-6026 PO Box 988 Newark, CA 94560 Phone: (800) 972-6600 Fax: (510) 713-3311

Power Distribution Power Distribution Power Management www.Processor.com/ServerTechnology2 www.Processor.com/ServerTechnology www.Processor.com/ServerTechnology3

• Remote Reboot via IP

• Secure HTML GUI, SNMP, RS-232 access

• 120/208 VAC 15, 20 & 30- Amp models

• True RMS Input Current • Dual power feeds in one enclosure Monitoring • Remote Power Management & Pass-Through Console • Group outlet control for up to 4 power circuits Port Access • Remote reboot via IP • Power-up Sequencing • 4 Pass-Through ports for console management of serial • Secure HTML GUI, SNMP, RS-232 access 120/208 VAC devices 15, 20 & 30-Amp models • Link to a second tower for • 4 power outlet receptacles • True RMS Input Current Monitoring group outlet control • Secure in-band or out-of-band communications • Power-up Sequencing • Field-Replaceable internal Global Secure Modem

1040 Sandhill Road 1040 Sandhill Road 1040 Sandhill Road Reno, NV 89511 Reno, NV 89511 Reno, NV 89511 Phone: (775) 284-2000 Phone: (775) 284-2000 Phone: (775) 284-2000 Fax: (7752842065 Fax: (775) 284-2065 Fax: (775) 284-2065 Page 14 Processor.com July 28, 2006 Manufacturer Presentation Manufacturer Presentation Physical - Power Protection Advertisement Physical - Racks & Furniture Advertisement VPC3106 Series Vertical 36” Depth NEBS Server Cabinet Three-Phase Power Distribution Made in the USA & Certified To Seismic Zone 4 The VPC3106 series is designed for maximum power density, by Based on the standard, patented frame design providing 72 amps of output power at 120 volts single phase. The unit of our RS, RSP, and FRS server rack series, has 24 15-amp “three-prong” receptacles (NEMA 5-15R) or optionally this NEBS-compliant configuration has been 20 amp receptacles (NEMA 5-20R). This allows a continuous power tested and certified to meet Telcordia (Bellcore) draw of 3 amps per receptacle if all receptacles are used. All that GR-63-CORE requirements for ZONE 4 seismic power is packed into a very slim, tall package. The unit is 70 inches tall earthquake environments. and only 2 inches deep (excluding the circuit breaker box). The vertical style mounting requires no rack space by allowing the unit to mount in Included in server rack price: the back or side of the cabinet (referred to as a 0U rackmount). The height of the unit allows it to evenly distribute power the length of the • Two sets of L-shaped adjustable 10-32 tapped electronic cabinet. This places power outlets in line with the installed vertical mounting rails centered in the frame equipment, reduces cable clutter, and simplifies installation. • Heavy-duty steel side panels, externally removable The key advantage of the VPC3106 series over traditional rackmount power distribution is in the power density. Traditional power distribution • Bolt-down base with cable entry is single phase and low amperage, 15 amps. The VPC3106 has the • Heavy-duty steel perforated doors with lock- power to replace six of these traditional power distribution units. This able swing handles, corner gussets, and reduces electrical wiring costs by reducing the number of circuits that three-way catches need to be run. (Fewer wire pulls, fewer electrical boxes, and fewer cir- • Heavy-duty solid top panel cuit breakers.) The cabinet installation is also simplified by replacing six • ALL NEBS CABINETS ARE NOT EQUAL. cables with one larger cable. This power density is required for When applying for certification, the manufac- demanding applications such as blade servers, telecommunications, turer determines the amount of weight the rails and broadcast equipment. will support being certified. One leading manu- facturer tests/certifies at only 200 pounds! How The VPC3106 series is made with rugged steel and has a black finish. easy is that to pass? Our rack rails support The unit is 68 inches tall without the mounting brackets and 70 inches 2,500 static pounds and are tested/certified to with the standard brackets installed. (Optional brackets allow mount- support an installed load of 1,000 pounds in ing to virtually any rack or any location.) The input power connector is the event of a quake. Ask our competition what a three-phase 120/208 volt 30 amp, NEMA L21-30P, connector. The their certified load is. After all, isn't that why VPC3106 series comes standard with a 15-foot power cable. There Starting at you're buying this type of cabinet? are three circuit breakers, each protecting a section of eight outlets. $611 The circuit breakers meet UL and NEC requirements for branch circuit • Server rack ships completely assembled protection, ensuring safe and code-friendly installations. Each circuit breaker has an indicator light. To ensure secure connections, the VPC3106 is compatible with the www.Processor.com/RackmountSolutions24 cable restraint and management system KIT-CABLRES-23 (ordered separately).

PULIZZI® ENGINEERING, INC (866) 207-6631 877-785-4994 www.Processor.com/Pulizzi38

Manufacturer Presentation Physical - Power Protection Advertisement Control Power on Any AC Powered Device ... Via Web Browser, Telnet, Modem or Local Terminal Pulsar MX 5000 RT UPS

Starts at $3935

The new Pulsar MX 5000 RT UPS surpasses competing units with its 0.9 power fac- tor delivering 4500 watts of power, built-in redundancy capabilities, hot-swappable batteries, and power modules, along with integrated output receptacles for true plug- and-play functionality. With up to 18kW, this scalable solution provides the highest power density in the industry.

Designed to deliver the highest level of protection for 20 to 110 servers, the online double-conversion Pulsar MX UPS uses modular redundant architecture that can easily scale power and runtime as demand increases or when users require higher levels of availability. Using only 3U (5.25 inches high) for the combination of power and battery submodules, users can configure the new units as freestanding tower or rack-mounted systems.

With built-in network manageability, the Pulsar MX systems are ideal for protecting high-performance workstations and servers in operation-critical server and network rooms. The 5kVA compact unit features front access hot-swappable battery and power submodules, auto battery-test, multilingual LCD, and intuitive power manage- Yes, We are Customer Friendly! ment software. For extended backup time, users can add external battery modules to achieve up to two hours of runtime. To help preserve battery life, the Pulsar MX 5000 RT units accept wide input voltage and frequency ranges to avoid using the batteries unnecessarily. Standard internal bypass ensures added reliability by supplying utility power to connected equipment in the event of a UPS fault.

Call MGE toll free at 800-523-0142

www.Processor.com/MGE July 28, 2006 Processor.com Page 15

Power Management Power Management Power Management www.Processor.com/BayTech3 www.Processor.com/BayTech www.Processor.com/CyberSwitching2

Mpower your Data Center with the M Series 24 Receptacles

RS232 Access LCD Display 8 Rebootable Receptacles RS232 Access LCD Display

24 Receptacle Remote Power Monitoring & Distribution 8 Receptacle Power Control and Monitoring A Cyber Breaker on each outlet (M 820C Plus) • Monitor current on each outlet (M 820C) • Schedule outlets on/off • • Current, Voltage, Power, and Temp Monitoring • Current, Voltage, Power, and Temp Monitoring SNMP management • Login/password security • Event log- • LCD Screen Display • LCD Screen Displays Power Monitoring Information ging • Give outlets descriptive names • Programmable • RS232 Interface 120/208VAC 10,20,30A Models • RS232 interface, 120/208VAC 10,20,30A Models stagger on/off times • Intuitive user interface • Power Distribution and Monitoring In One Unit • Turn On, Off, or Reboot any or All Receptacles

5239 Avenue A 5239 Avenue A Long Beach, MS 39560 Long Beach, MS 39560 Phone: (800) 523-2702 Phone: (800) 523-2702 Fax: (228) 563-7335 Fax: (228) 563-7335 1580 Berger Drive San Jose, CA 95112 Phone: (888) 311-6277 Fax: (408) 975-0941

Power Management Power Protection Power Protection www.Processor.com/Aphel3 www.Processor.com/BayTech2 www.Processor.com/ServerTechnology4

Transfer Switch NEW 10,000 WATT RS232 Port BLADE SERVER PDU! • Designed for standard and blade servers • 60A/208V (10,000 Watts) 4 receptacles • NEMA and/or IEC outlets per side • Local meter and remote monitoring (RS232) • Connect to traditional con- 8 Receptacle Power Control / Monitoring w/Trans Switch • Provide redundant power to single-power supply servers sole port switches • Auto-switches to a secondary power source if the primary • UL60950-1 compliant • Current, Voltage, Power, and Temp Monitoring becomes unavailable (UL489 breakers) • Automatic Transfer Switch • Universal voltage: 120V or 208-240V Nobody Has More • RS232 or Network Interface 120/208VAC 10, 20, 30A Models • Primary select switch to designate the primary & second- Solutions Than Aphel! • Turn On, Off, or Reboot any or All Receptacles ary power feeds • LED lights indicate which power source is in use Resellers Wanted!

5239 Avenue A 1040 Sandhill Road Long Beach, MS 39560 Reno, NV 89511 Phone: (978) 928-1488 Phone: (800) 523-2702 Phone: (775) 284-2000 Fax: (228) 563-7335 Fax: (775) 284-2065 Page 16 Processor.com July 28, 2006 Product✍ Releases or remote monitoring capabilities are avail- inches and depths up to 42 inches and is con- scriber ports and two 10GB uplinks. The PHYSICAL able. Aphel claims the MT3 series’ fuseless figurable in multibay systems. M-series cabi- unit features Juniper’s I-chip packet for- design minimizes reset time, and its isolation nets have been tested to the DoD’s (De- warding engine technology that lets busi- Cable Distribution hardware enhances product grounding. partment of Defense’s) MIL-STD-810F stan- nesses expand services and clients without ■ Telect released its LCX line of rackmount • • • • • dard. The cabinet is built with heavy-duty suffering a performance hit. The M120 also fiber-optic panels with a complete list of ■ There are four new additions to the single- or double-walled extrusions, inter- supports 1+1 and 1:N redundancy configu- standard patch, splice, and combination con- Minuteman line of UPS power distribution nal reinforcing corner keys, and four-way rations for improved reliability. figurations. The LCX line supplies standard products from Para Systems, including 15A crimped and welded corner sockets. M-series bulkhead-style options to fit various applica- and 20A PDUs with eight, 10, or 14 outlets. cabinets have front-to-back stiffeners, cross Security tions. Standard patch panel options include Each allows vertical and horizontal mounting bracing, and an optional seven-gauge welded ■ Aventail introduced the ST2 SSL VPN 4U 72- or 96-port, 3U 48-port, 2U 24-port, in various form factors, including 0U. Prices steel base that can be bolted down. Customers remote access platform for controlling and 1U 12-port. Combination panels have range from $35 to $65. Future announce- can tailor the M-series with a range of indus- remote access to a network and supporting both splice and patch capabilities with ments will include a PDU that can protect try-standard size, cabling, cooling, and power NAC initiatives. The ST2 provides univer- options ranging from 12-fiber with 2U to 96- 30A and 15A devices simultaneously. options with custom color matching. The sal access through a single gateway and fiber with 4U. LCX panels all include indus- front and rear doors open from the center for offers central management for methods of try-standard rackmounting and are available Power Protection access in confined spaces. connectivity. Aventail ST2 SSL VPNs pro- with snap-in patch plates in all standard con- ■ Emerson Network Power announced vide secure connections for devices with nector options, as well as wall-mount distrib- the 1920 VA Liebert PowerSure PSI, which COMMUNICATIONS Windows, Windows Mobile, Linux, and ution boxes. boasts a two-year replacement warranty, Mac OS. Aventail also has added Device programmable voltage settings that let cus- Router Watermarking, which uses certificate-based Power Distribution tomers use the UPS in any country, and ■ Juniper Networks introduced the M120, identification of Windows and Windows ■ The MT3 series of vertical 60A rackmount adjustable voltage window transfer settings a 10 Gigabit-enabled multiservice edge Mobile devices. Other new features include PDUs from Aphel delivers total power rang- for added reliability. The 2U UPS supports router designed for traditional and mobile SSO support with Dual/Stacked Authenti- ing from 5,000 to 10,000W. With Aphel’s replaceable batteries any time and is ready telecommunications providers, cable opera- cation and Forms-Based Configuration, patent-pending rPower technology, users can out of the box with batteries included. tors, and large enterprises. Possible applica- Session Persistence, improved Citrix com- read the high-resolution display from a maxi- Customers can also order PowerSure units tions include scalable multiservice edge for patibility, and a new NAT mode for Smart mum distance of 12 feet or through the enclo- that are network enabled. small to medium-sized points of presence, Tunneling. The EX-750, EX-1600, and sure door’s perforation. Aphel also claims core networks for Internet peering and EX-2500 products will all be available that rPower bolsters installation flexibility by Racks & Furniture route reflector applications, and a collapsed next month for $3,995, $9,995, and connecting to traditional console port switch- ■ Optima EPS released the M2 Series cabi- POP router to provide an edge services and $22,995, respectively. es. The PDUs support both standard and net for mobile applications. The M-series backbone routing platform. The M120 can • • • • • blade servers, and optional RS232 metering cabinet is available in heights from 52 to 77 handle up to 128 Gigabit Ethernet sub- Go to Page 17 Expand Your Storage LaCie Offers Two-disk External Drive By using eSATA as the host from smaller companies interface, the Two Big RAID filling a niche. Simi- Featuring A SATA II PCI-E Card eliminates a potential performance lar units include Gran- bottleneck, with LaCie estimating ite Digital’s SATAVue by Kurt Marko SATA)—that combine outstand- throughput of 110MBps with a (www.granitedigital • • • ing performance with easy (or no) striped volume. While high-speed .com); Trans Intl’s miniG (www SNAPSHOT THE INCREASING popularity of dig- configuration. LaCie, one of the USB and FireWire have become .transintl.com), which is also avail- ital media—whether recorded long-time leaders in the exter- popular drive interfaces, they able in a four-drive model, and G- LaCie Two Big RAID broadcasts or documents stored as nal drive market, has recently cannot match the throughput of Tech’s G-SATA (www.g-technol All include PCI-E SATA II card. PDFs—coupled with incessant introduced some new models in SATA II, also known as SATA ogy.com). For those needing more 500GB: $449 expansion of hard disk capacity its storage line that bundle an 3Gbps, reflecting its signaling than the 1TB a two-drive system 500GB plus spare 250GB drive: $569 has fueled growth in the sales of eSATA interface card with a basic rate. Unfortunately, while all new can currently furnish, MicroNet’s 1TB: $879 external disk systems, while simul- two-disk RAID array. systems have embedded internal PlatinumRAID Pro (www.micro 1TB plus spare 500GB drive: $1,179 taneously increasing the variety of The LaCie Two Big RAID sys- SATA controllers, few if any have net.com) and Sans Digital’s Also available with PCI-X card: add $20 products available. Furthermore, as tem is a compact dual-drive exter- eSATA interfaces, thus LaCie MobileRAID (www.sansdigital disk capacities have outstripped nal unit featuring hot-swappable bundles a controller using either .com) both feature five drives, A compact, external two-drive storage those of removable tape cartridges, SATA II drives and a built-in the older PCI-X (essentially dou- additional RAID levels, and an system supporting JBOD, RAID 0, or external drives have begun replac- RAID controller. It ships with the ble-data-rate parallel PCI) or the eSATA host interface. RAID 1 and using the next-generation ing tape for many backup chores. drives striped in nonredundant faster PCIE serial interface— Some of these competing prod- SATA II interface, complete with PCI Hooking up external disks once RAID 0 for maximum perfor- LaCie’s card sporting two single- ucts don’t include a controller; Express interface card meant dealing with bulky SCSI mance; however, the configuration lane (x1) ports. however, PCI-E eSATA cards are www.Processor.com/LaCie cables and their finicky termina- can be changed via a rear-panel External drives are a common quite inexpensive and available tion requirements, but there are selection switch to either RAID 1 sight at any computer superstore; from a number of OEMs, including now a number of high-speed seri- (mirrored), concatenated (one log- however, few sport built-in RAID SIIG, Sonnet, and Addonics. For the convenience of built-in RAID, al protocols—high-speed USB, ical volume spanning both drives) or an eSATA interface, thus La- those needing fast, easily config- LaCie’s new Two Big RAID bun- FireWire, and eSATA (external or JBDO (two independent disks). Cie’s competition comes primarily ured external storage coupled with dle is a winning combination. P

Power Protection Racks & Cabinets Racks & Cabinets www.Processor.com/PowerFactor www.Processor.com/Hergo2 www.Processor.com/Hergo3

PW9170+ • N+X redundancy for both 19” Enclosure Cabinet Hergo iRack Relay Rack power and logic eliminates 4 Post 19” Relay Rack system-level failure • 42 U x 36” Deep • Easily scalable to adapt to • 4 Mounting Rails • Vertical Mounting Space: changing IT environments, • Front and Rear Lockable 12U, 26U, 42U add power/battery modules Doors, choice of Solid, • Offered in 3 Depths: • True double conversion Tempered Glass or 24”, 30”, 36” Deep online design Perforated • 4 Heavy-Duty Steel • Advanced Battery Mgmt. • 2 Removable and Lockable Uprights doubles battery service life Side Panels • 4 Gliders • Universal components fit in • 4 Dual Wheels • Ships Knock-Down any order without impact- • Easy to Assemble ing UPS operation On Sale and ready to go! • Offering of power mgmt. software for data integrity

2526 Manana Dr., Suite 102 56-01 55th Avenue 56-01 55th Avenue Dallas, Texas 75220 Maspeth, NY 11378 Maspeth, NY 11378 Phone: (800) 706-7009 Phone: (888) 222-7270 Phone: (888) 222-7270 Fax: (214) 654-0083 Fax: (888) 410-0671 Fax: (888) 410-0671 July 28, 2006 Processor.com Page 17 Product✍ Releases

Continued from Page 16 adapter. The conference phone includes a top download speed of 2Mbps. Other fea- Army, Navy, and National Guard and was ■ Websense and CP Secure jointly touchscreen display that provides access to tures include firewall, VPN appliance, used by the DoD to test emerging commu- announced the CP Secure Content Security all the standard Skype features as well as switch, and terminal server functionalities. nication capabilities. Gateway appliance and Websense Web your Skype contacts. The kit will have an The ConnectPort WAN VPN S-EvDO has • • • • • Security Suite package. The joint offering average selling price of $149.99. a built-in Web interface for local manage- ■ LastMile Communications released the delivers Web filtering security, anti-mal- ment, or users can utilize Digi Interntion- WDirect 1000 Information Node, which ware scanning, policy controls, and real- Video al’s Digi Connectware Manager, enterprise- delivers data and media for any size Wi-Fi time protection against Web-based spyware ■ Tandberg announced the availability of grade remote management software. It also deployment. LastMile is targeting the system and viruses. CP Secure’s CSG uses a the Centric 1700 MXP, a high-definition offers a built-in Dynamic DNS server to at campus, enterprise, and municipal uses. stream-based scanning method to filter desktop videoconferencing system. The map Internet host names to dynamic or The wall- or post-mounted system includes a Web and SSL-encrypted traffic without system was designed to deliver extremely public IP addresses. wireless GPRS modem, as well as Wi-Fi and negatively affecting network speeds. The clear and true-to-life visual communication • • • • • Ethernet connectivity. It also features ser- device also offers email anti-malware and between team members located worldwide. ■ Fortress Technologies announced the vices authorization and statistical analysis antispam scanning. The 1700 MXP features an integrated HD availability of the ES520 secure wireless tracking features, as well as system scalabili- camera, a 20-inch flat-screen monitor that access bridge. The bridge combines wire- ty. The WDirect 1000 has a modular design Telephony can easily switch between video calls and less, switching, and security services in a and includes a local memory cache. ■ TRENDnet’s new ClearSky Bluetooth your PC content, and CD-quality audio single device and can function as either an VoIP Conference Phone Kit provides a capability. access point or a self-contained network. END NODES wireless solution to the practicality issues The product features Fortress’ security associated with Skype and other commer- Wireless expertise with the wireless networking Barcode cial VoIP services. The kit includes the con- ■ Digi International introduced its capabilities of Legra Systems, a recent ■ Hand Held Products released a new ference phone base unit and a USB ConnectPort WAN VPN S-EvDO, a com- acquisition. The ES520 features a 32-mile verification system that validates printed Bluetooth 2.0 adapter that connects to merical-grade, upgradeable 3G EvDO maximum range and weighs approximately linear barcode readability and standards a notebook or desktop PC with Skype router. The router is certified on the Sprint 3.5 pounds, a relatively lightweight form compliance. The Quick Check 890 includes installed. The conference phone can then be Power Vision network and delivers average factor. It has passed numerous security tests Quick Check ImageData software, as well placed anywhere within 328 feet of the USB download speeds of 400 to 700Kbps and a performed by such organizations as the U.S. Go to Page 18

SNAPSHOT SealedMedia Enterprise Desktop (the client component) supports SealedMedia Express For Board current and previous versions of all Communications standard desktop and email applica- Information tions, including mobile devices. Policy-based core package is priced at just less than $50,000 for 20 users Only end users authorized to do so (including maintenance, installation, and can open sealed documents and training); additional file formats are also emails, regardless of where they are available stored and used. Additionally, IT Access On A administrators do not have access to Drop-in software solution designed for any protected content. According to senior executives and board members to SealedMedia, a typical corporate control and protect highly confidential installation of SealedMedia Express information takes no more than half a day. Need-To-Know www.Processor.com/SealedMedia For regulatory compliance, SealedMedia Express produces an audit trail of all attempted and “Customers constantly tell us successful accesses of sealed doc- they need to protect executive- uments. Access can also be re- and board-level communications, voked if there is a change in the Basis which often contain highly sensi- board package that makes a docu- tive, business-critical informa- ment out-of-date. SealedMedia Express Solution Protects Supporting up to 20 users, the tion,” says George Everhart, CEO There are a number of approach- SealedMedia Express Core System of SealedMedia. “We ensure such es to protecting board communica- Confidential Executive Communications is composed of policy-based rights information is not accidentally or tions. Content management prod- management, standard document deliberately disclosed, whether ucts, such as EMC’s Documentum by Joseph Pasquini opting to gather board mem- and administrative roles, and stan- through a misaddressed email, a eRoom (www.documentum.com), • • • bers together in one physical dard document formats (Microsoft leak to outsiders, or even the loss and secure email products, such as DATA ENCRYPTION is big busi- location and even making use of Office documents, Sealed Text, of a laptop. This safeguards the Sigaba Secure Email (www.siga ness, but in an ironic twist of fate, couriers to exchange sensitive and Sealed RTF). Other file for- organization’s reputation and ba.com), have taken steps toward it often eludes upper manage- correspondence. Intended to help mats can be added depending upon financial stability.” safeguarding executive correspon- ment. The information distributed management quickly extend the needs of the organization. The The primary focus of the Sealed- dence and communications. In among senior executives and boardroom confidentiality to software encrypts digitized data, Media solution is its use of en- comparison, however, Express for board members within any organi- electronic messaging and digital keeping unauthorized users from cryption to “seal” documents and Board Communications continues zation is often considered highly file formats, SealedMedia offers copying, forwarding, printing, emails within existing desktop to protect a document, even after it confidential in nature. Tradition- its SealedMedia Express for editing, or even capturing a screen- applications without requiring users has left the corporate repository ally, businesses have shied away Board Communications encryp- shot of anything that might be a to remember or manage keys or and been received by the autho- from electronic solutions, instead tion solution. potential privacy concern. passwords. A one-time install of the rized recipient. P

Racks & Cabinets Furniture www.Processor.com/ISC5 www.Processor.com/Hergo4

Low Profile Technical Workstations 19” Server Cabinet • Pre-configured or Made to Order Units • Available in variety of sizes: • Heavy-duty 11-Gauge Steel 6U, 9U, 12U, 15U, or 18U Frames, Legs and Shelf • Cabinet depth choice of Brackets 32”D or 39”D • Frame Sizes: 72” or 84”H, • Quick-release reversible 24, 30 or 36”W hinged doors • High-Pressure Laminated • Universal rack rails fit all Desktops major brand servers • Cable and Power • Vented top and bottom Management Options panel with cable plate • Flat Panel or CRT Monitor • Leveling feet Mounting Solutions To Learn More, Visit: • Nationwide Delivery and www.Processor.com/ISC5 Installation

56-01 55th Avenue Maspeth, NY 11378 Phone: (888) 222-7270 714 N. Watson Road, Suite 302 Arlington, TX 76011 Fax: (888) 410-0671 Phone: (800) 458-6255 Fax: (817) 649-1770 Page 18 Processor.com July 28, 2006 Manufacturer Presentation Communications - Wireless Advertisement Product✍ Releases Continued from Page 17 Ethernet interface. Both units can produce as Adaptus Imaging Technology 5.0, which 22ppm at a resolution of up to 1,200dpi. lets users comply with ISO/IEC standards. The AC122 can handle 22ppm at a resolu- RF Spectrum Analyzer For Wi-Fi Networks It has a menu-based interface and supports tion of up to 600dpi. The AC031cn prints several languages. The Quick Check 890 up to 31 monochrome or eight full-color Is it my Wi-Fi equipment or supports Mac OS, Windows, and Windows pages per minute and copies up to 21 mono- the RF environment? Mobile 2003 and offers RS232 and USB or chrome or seven full-color pages per Bluetooth wireless connectivity. minute, both at up to 600dpi. Spectrum congestion in the unli- • • • • • censed 2.4GHz and 5GHz KVM & Console Access ■ The new Persona M30 ID card printer bands is a leading cause of ■ problems in 802.11 deploy- ATEN expanded its line of LCD KVMs from Fargo Electronics is a monochrome ments. Growing evidence from with the ALTUSEN KL1116, a 16-port version of the company’s C30 and sells wireless infrastructure providers KVM switch housed in a Hideaway con- for $1,695 (single-sided printing) to suggests that 30% of problems sole. The KVM also includes a 17-inch $2,695 (dual-sided). Ink ribbons are avail- reported by Wi-Fi customers are LCD, keyboard, and touchpad. Occupying able in seven colors, and there’s an op- actually due to interference. less than 1U of rack space, the KL1116 tional magnetic stripe encoding module Interference can come from also features a dual-slide design that lets ($599), as well. nearby 802.11 networks as well the console slide back while the LCD stays • • • • • as from a long list of common non-802.11 devices, including cordless phones, wire- visible (the display remains visible even ■ Ricoh has announced new multifunction less surveillance cameras, Bluetooth devices, and microwave ovens. Typical network analysis tools are blind to RF activity. OmniSpectrum provides engineers with a when the server rack door is closed) to let printers for medium- to high-volume envi- portable, easy-to-use solution for determining which devices, Wi-Fi and non-Wi-Fi, IT professionals troubleshoot and manage ronments. The monochrome Aficio MP are using the spectrum, and which are jeopardizing the delivery of Wi-Fi traffic. servers. With two-level password security, 5500, MP 6500, and MP 7500 Series the KL1116 prevents unauthorized users Digital Imaging Systems offer respective WildPackets’ OmniSpectrum from viewing or controlling connected print speeds of up to 55, 65, and 75ppm computers. with a standard 4,300-sheet input tray. OmniSpectrum enhances 802.11 network analysis by identifying not just other • • • • • Security provisions include an Unautho- 802.11 devices, but any devices that are generating signals in the 802.11 frequency ■ Digi International’s new Digi Passport rized Copy Control feature and support for band, even devices that are unauthorized or transient. Based on patented spectrum is meant as a competitor to traditional DOSS. The units also are compatible with intelligence technology from Cognio, OmniSpectrum identifies not only the class of the interfering device, such as a cordless phone, but possible manufacturers and KVM over IP devices, allowing adminis- GBC’s StreamPunch III. Prices range from model numbers of the offending equipment, facilitating problem identification and res- trators to control remote graphical systems $17,000 to $28,000. olution. OmniSpectrum provides the best first line of defense in diagnosing 802.11 using either Microsoft Remote Desktop problems and complements WildPackets’ wireless network analysis products. Protocol, Virtual Network Computing, or Projector XManager for Unix. The Digi Passport ■ InFocus added a new projector to its OmniSpectrum, which includes a Windows application and a CardBus PC card, features the company’s free KVM technol- Work Big family. The Work Big IN42 pro- costs $3,995. ogy, which provides a graphical KVM vides 3,500 lumens and has a 3,000-hour connection over a standard network. The lamp. It isn’t noisy at 32dB, and the device Digi Passport includes integrated IPv6 sup- includes a feedback LED display and a port along with 8, 16, 32, or 48 ports. All keypad, as well as XGA resolution and a To request a demo or place an order: www.Processor.com/WildPackets models come in a 1U rack-mountable recessed lens. The remote offers a laser Phone: (925) 937-3200 package and a smaller 4-port model is also pointer, auto-image, and slide advance. available. The Digi Passport includes Perl InFocus plans to make the $3,299 projector support allowing administrators to write available during Q3. scripts to automate regular tasks, alert administrators to specific situations, or pull Server information from certain logs. Two ■ Sun Microsystems unveiled the Sun Manufacturer Presentation Ethernet ports, two power sources, and an Fire X4500 server, a hybrid data server Communications - Security Advertisement internal modem provide redundancy for that utilizes a four-way server powered by the Digi Passport. AMD Opteron processors. The Sun Fire x64 (x86, 64-bit) server is designed for Britestream Networks & OSST Printer HPC, data warehousing intelligence, digi- ■ Lanier Worldwide launched a range of tal media streaming, digital surveillance, Partner On Scalable Security Appliance multifunction printers, including the BP20 and data analysis. The X4500 server offers and BP20N monochrome laser printers, the up to 24TB of storage with a sustained Britestream Networks and Otto AC122 with monochrome printing and throughput of up to 2GBps from disk to Security & Software color scanning, and the monochrome- and memory. Customers with the Solaris 10 Technologies (OSST) have part- full-color-capable AC031cn. Lanier created OS can utilize Solaris ZFS and Solaris nered to deliver a highly scalable the new MFPs for home offices and small Predictive Self-Healing with the Sun Fire security appliance built on workgroups. The BP20 features a USB X4500 to automatically diagnose, isolate, Microsoft Internet Security & Acceleration Server. The New interface, while the BP20N also features an and recover from many hardware and OSST SecureGUARD combines the strengths of Microsoft’s ISA SecureGUARD Server 2004 and Britestream’s SSL Security NIC to deliver perimeter security, branch-office connectivity, Web caching, and maximum SSL performance in one solution. The wide range of security appliances fit from low-cost to maximum-performance Installation-Free solutions. The SecureGUARD Series can be adjusted to suit nearly all of your busi- ness requirements for content and information security. Simple, fanless, low-noise, and low-cost models for small and midsized businesses up to highly available enter- prise solutions with a maximum of performance. The SecureGUARD appliance product line for Microsoft ISA Server 2004 delivers a Tracking combination of perimeter security, branch-office connectivity, and Web caching in easy-to-use appliances at an affordable price. B&L’s Hosting Option “We are very excited to enter into this partnership with OSST,” says Bob Makes Tracking Tapes Even Easier Weinschenk, CEO of Britestream. “Their delivery of a fully integrated security appli- ance built on Microsoft and Britestream technologies creates a solution that is both highly scalable and easy to deploy.” by Paul Ferrill it’s introduced VaultLedger OnDemand as • • • a hosted service that takes on the task TRACKING BACKUP TAPES has become a without the installation and setup hassles. high-profile task for many companies “We see this product appealing to the under the microscope of government regu- IT department with limited resources that lators. Most IT departments will have to just doesn’t want to deal with the hassles deal with tape backup in some way, at least of installing and maintaining one more for the foreseeable future. Choosing a solid application,” says L.J. DiCarlo of B&L tape management system coupled with Associates. solid processes and procedures is the only Documentation is one key piece for meet- way to ensure compliance when the audi- ing the auditor’s requirements. VaultLedger tors come calling. OnDemand generates a complete audit trail B&L Associates has offered its Vault- to help with regulations including Sarbanes- Ledger product for quite some time. Now Oxley, HIPAA, and Gramm-Leach-Bliley. www.Processor.com/Britestream • (512) 250-2129 July 28, 2006 Processor.com Page 19 Manufacturer Presentation Product✍ Releases Communications - Security Advertisement application faults. The Sun Fire X4500 with a 2-meter cable and a 64-bit/ server can also run many commercial 133MHz PCI-X HBA. It doesn’t require Fast, Invisible Intrusion Prevention Linux distributions. bridging to Ethernet, SCSI, or Fibre Sun also announced the Sun Blade 8000 Channel. It supports RAID levels 0, 1, 10 Without The Expense modular system of servers, which are and JBOD and can be mounted horizon- designed for high-end x86 computing. The tally in a 3U rack with room for a second Sun Blade 8000 modular system uses 25% InfoStation next to it. Arxceo’s patent-pending tech- less space than comparable blade servers nologies, PnPro and Tag-UR-IT, Ally IP-1000 (1Gbps) - $6,495 and is designed to offer twice the through- Components significantly enhance network put with 40% lower power requirements ■ Advantech’s eAutomation Group protection in today’s environment. than leading rackmount servers. Sun Blade unveiled the IPC-603MB, a compact 2U All Arxceo appliances implement these technologies to provide the 8000 is targeted at customers who perform rack-mountable chassis that’s ideal for most robust antireconnaissance server consolidation and virtualization, applications with limited space. The chas- technology in the industry—pro- business applications, large-scale HPC, sis measures 12.2 inches deep and offers viding anomaly-based intrustion and databases running Solaris 10 OS. The support for both ATX and micro ATX prevention while stopping attack- Sun Blade 8000 servers also support motherboards. The IPC-603MB also ers and worms from probing your Linux and Windows, and its server mod- includes the following features: diagnostic network. Ally ip-100 (100Mbps) - $895 ules use dual-core AMD Opteron proces- LEDs, support for two 47 CFM cooling sors with Direct Connect Architecture. fans, and a shock-resistant disk-drive bay The servers support hot-pluggable blade that can hold one 3.5-inch internal HDD Plug and Protect (PnPro) I/O adapters based on the PCI SIG and one slim CD-ROM. Advantech ExpressModule standard and don’t re- includes a 1U-high 300W ATX PSU. The • No TCP/IP or MAC address; cannot be targeted or exploited • Provides quick deployment; 15-minute installation quire new or custom system management chassis supports Socket LGA775 Intel • No client impact; no configuration changes to any other devices tools. Pentium 4 processors up to 3.8GHz. It is • 100% compatible with other network hardware and software • • • • • available for $285. ■ The ES7000/one Enterprise Server from • • • • • Tagged Universal Resource Information Transmission (Tag-UR-IT) ■ Unisys will include support for dual-core Chassis Plans has introduced a new 1U • Anomaly and behavior-based detection; no signatures needed Intel Itanium 2 9000 series processors. enclosure. The F6Chassis Series consumes • Tags, inspects, and preprocesses packets before forwarding onward; hardens According to the company, the 16-way little space but offers a variety of features. network traffic before it enters your network server provides 50% more performance It is designed for both mobile and office • Provides protocol enforcement, antispoofing protection, and antireconnaissance for the price than competitor offerings settings and fits into spaces that are shal- • Stops Denial of Service attacks (DoS, DDoS, DRDoS, etc.) along with "slow and based on older versions of the Itanium low. The chassis is 17.7 inches deep. It has low" network recons—even preventing bouncescans from succeeding processor (Unisys arrived at this conclu- one front-accessible 5.25-inch drive bay, sion from TPC-H benchmark results). one front-accessible 3.5-inch drive bay, and www.Processor.com/Arxceo Prices for the ES7000/one with Intel’s one internal 3.5-inch drive bay. The new dual-core Itanium processors start at F6Chassis Series cases are made of heavy $45,000. 18-gauge steel and incorporate five-fan cooling. Custom front panels, paint, and Toll Free (866) 427-9236 Storage logos are available. Phone (256) 837-8338 ■ The durable, reliable, and speedy REV Fax (256) 837-2888 format from Iomega has doubled in SOFTWARE capacity. Now storing a native 70GB, and up to approximately 140GB of com- Application Networking pressed data, the Iomega REV 70GB ■ Packeteer announced that version 3.2 of Backup Drive also reads and writes origi- its iShared application will be widely nal 35GB hard disk-based REV cartridges, available starting next month. The soft- Manufacturer Presentation Communications - Security Advertisement too. Its rated maximum data transfer speed ware helps eliminate the number of net- is 30MBps compared to the first-gen work devices located at remote offices 35GB format’s 25MBps max. The new (such as branch offices) by using WAFS drive sells for $579.95 (ATAPI) or (Wide Area File Services) with WAN MetaInfo SAFE DHCP Quarantine $599.95 (USB 2.0). One 70GB cartridge is optimization technologies to tie central included; cart prices are $69 or four for offices together with branch offices. This Framework Is The Next Step In Network $249.99. is the first release since Packeteer acquired • • • • • Tacit Networks. The additions from Tacit Access Control ■ A new InfoStation 5-Bay 3Gbps provide improved security and manage- eSATA RAID hard drive enclosure from ment options. Using iShared, business can MetaInfo’s SAFE DHCP DHCP Quarantine Appliance uses MetaInfo’s SAFE DHCP StorCase supports both PCs and Macs, integrate several infrastructure services Quarantine Framework, an extensible architecture for network access control. with Linux support on the way, the com- such as Microsoft’s System Management pany says. The external Infostation comes Go to Page 20 Using the SAFE DHCP Quarantine Appliance and the MAC Address Authentication Module, network users must pass the host integrity scanning and authentication pro- cedures your site requires. A special DNS internal root service, SAFE DNS, resolves Getting started with the service is as simple NetBackup Vault, and Tivoli Storage all queries not specifically configured to the SAFE DHCP Quarantine Web page. as filling out a form over the Web. Once Manager. You control what happens after a user completes and passes the procedures, but that’s complete you’re ready to start track- “We manage a total of around 550 users that fail the procedures remain in quarantine and isolated from the rest of your ing tapes. tapes and typically handle 115 going both network. Paul Foret is an IT consultant for a offsite and returning. VaultLedger On- large financial services firm. “We decided Demand handles all the reporting and to go with the VaultLedger OnDemand scheduling so that all we have to do is product for several reasons. First, we physically move the media. The reporting already had a relationship with B&L, so tools generate all the information we need we trusted them as a company. Second, to meet our regulatory compliance needs,” the product met our needs for a more says Foret. robust tape tracking and reporting tool,” Automated tracking and flexible report- says Foret. ing make VaultLedger OnDemand an VaultLedger OnDemand works with the easy choice for any organization needing same list of legacy and open environments to comply with stringent regulatory audit- as the local installation version. It supports ing requirements. Because it is a hosted reports from multiple applications in- service, there are no software installations cluding CA-1, RMM, BL/LIB, Symantec or upgrades. The initial cost is much lower than purchasing the product out- SNAPSHOT right and requires no resources to run or maintain. B&L Associates VaultLedger OnDemand While there are a number of companies www.Processor.com/MetaInfo $250 per month that offer tape tracking software, as does B&L, you’ll have a hard time finding any 119 S. Main St., Suite 200 Tracks your important backup tapes without the need that offer a service like VaultLedger Seattle, WA 98104 to install or update a local software application OnDemand. Offering VaultLedger as a ser- (206) 674-3700 www.Processor.com/VaultLedger vice puts B&L ahead of its traditional com- petitors and gives it another attractive (206) 674-3800 option for new and existing customers. P Page 20 Processor.com July 28, 2006 Product✍ Releases Continued from Page 19 previous version. The software learns as control; and reporting and identification Server (SMS), domain controller, printing, you talk and does not require upfront of questionable or orphaned accounts. Network & Systems Management DNS, and DHCP services. Integrating training. The program supports Corel The Audit DBT is currently available ■ BMC Software introduced Data Center with Microsoft’s SMS is a new feature of WordPerfect, Microsoft Internet Explorer with the OUM component. Optimization, which prevents data center iShared 3.2 which helps accelerate the and Office (including Outlook), and • • • • • sprawl so that companies require fewer download of SMS packages. Finally, with Mozilla Firefox and Thunderbird. It also ■ Softek announced Softek TDMF IP servers. BMC also offers ITIL-integrated iShared 3.2, customers can install the soft- supports certain (Nuance-approved) (Transparent Data Migration Facility IP) workflows and ITIL-based extensions for ware alongside existing server software Bluetooth headsets, as well as thin client Version 2.5, a component of the Softek managing and optimizing virtualization. to add WAFS services to the company Citrix terminals and other network uses. Nonstop Data Mobility software suite. BMC’s product helps companies automate WAN. Prices for iShared 3.2 start at Softek TDMF IP’s new features help activities over the planning-to-implementation $4,600. Database & Data Mining migrations over TCP/IP within Unix and life cycle for consolidation and virtualization. ■ Lumigent Technologies unveiled an Linux. A Restartable Full Refresh setting BMC’s Data Center Optimization includes Business Productivity enhancement for its Audit DBT database allows existing migrations to restart from BMC Virtualizer 2.5, BMC Performance ■ Nuance Communications released the auditing package. The OUM (Obsolete the point of a broken network connection. Assurance 7.3, and new tools, such as BMC latest version of its speech recognition User Manager) feature automatically TDMF IP allows up to four times more Atrium CMDB, BMC Discovery, BMC software. Dragon NaturallySpeaking 9 lets manages the accounts of transitioned or migration of disk volumes than previous Change And Configuration Management, and users control their Windows-based PCs terminated employees, which lets admin- supported volume sizes. Version 2.5 is BMC Performance Manager 2.1. and applications by giving audible com- istrators limit the security threat that backward compatible with previous Softek mands. The software handles speech at up these accounts pose. Features of the releases and allows long-distance migra- Security to 160 words per minute at up to 99% OUM include integration with human tions over Sun Solaris, IBM AIX, HP-UX- ■ ContentWatch has introduced two new accuracy. According to Nuance, the soft- resource, help desk, and corporate direc- attached storage, Windows 2003 Server, products to its ContentProtect Professional ware’s accuracy is 20% better than the tory systems; centralized visibility and Windows 2000, and Windows NT. Go to Page 21

fewer cables and ports to manage, fewer resources are necessary both in the actual cabling hardware and the man-hour resources to install New Blade Switch and maintain the cabling. The Blade HP GbE2c switch also provides more control over network traffic than a traditional patch panel. Network traffic can With Layer 3 be monitored, and bandwidth can be managed via a Web browser console. The Blade HP GbE2c has to compete with products such as the Cisco Catalyst Blade Switch 3020 Functionality (www.cisco.com). The HP GbE2c offers two primary advantages Blade Network Technologies blade server is the consolidation of SNAPSHOT over the Cisco product, however. multiple servers using common The first is price. While the Cisco Blade Network Technologies resources and management. By Catalyst switch sells for $4,400, Unveils New HP Switch HP GbE2c using blade switches rather than the Blade HP GbE2c comes in at by Tony Bradley Blade Network Technologies patch panels, customers can extend $1,499 more than 60% less at only $1,500. • • • develops and manufactures net- the consolidation to the network.” The other advantage is in the A cost-effective solution with potential DATA CENTER real estate is a work equipment products that are Using blade switches in a blade capabilities and functionality of Layer 3 capabilities offering static and valuable commodity. Equipment resold under third-party brand server environment offers a num- the switch. The Cisco Catalyst is dynamic routing that is too large is not an effective names, such as HP. Its newest ber of advantages over standard a Layer 2 switch. The Blade HP use of available space. Along with blade switch, the GbE2c, was cabling and patch panels. With www.Processor.com/Blade GbE2c is a Layer 2 switch as well the trend of using blade servers to designed in cooperation with HP. fewer cables to worry about, com- in its native form. However, it is cram more processing power into Tim Shaughnessy, director of munications between blade servers opportunity for attack or intercep- user-upgradeable to Layer 3, and less space, network equipment product marketing for Blade Net- have less chance of having prob- tion, even from internal hackers. Blade Network Technologies will vendors have also joined the work Technologies, says, “One of lems. Keeping network data within The other benefit of reduced offer the Layer 3 functionality for blade revolution. the significant reasons for using a the blade chassis also provides less cabling is cost savings. With a small fee by the end of 2006. P

market. The 1U form factor means lower operating costs (because they use less space in the data center), the unique chas- Quad Server Offers sis is designed for optimizing airflow inside the servers, and the servers run cooler and quieter. “Columbia University purchased our 1U quad Opteron servers (the Quad Opteron 870 processors with 8GB memory and the Eight Cores 400GB SATA drives) to run intense simu- lation applications at their physics laborato- ASA Offers High-Powered Enterprise Servers SNAPSHOT ry,” says Hong. “They told us that the 1U Opteron servers were great, that they met With Enterprise Power ASA 1U Quad Servers all the requirements for their intense simu- ASA1178-O4D-SC-R: $3,072.94 lation applications, and the systems ran by Julie Sartain a high-efficiency 1,000W power sup- ASA1189-O4D-S2: $2,811.12 cool and quiet.” • • • ply, and they support 16 DIMM slots, Competition includes Sun Micro- TODAY’S MOST DEMANDING business all optimized for Supermicro’s 1U 1U form factor server offering four dual-core Opteron systems’ Sun Fire x64 server family (the applications require enterprise servers SC818S+–1000 chassis. processors; can be configured to run multiple operat- Sun Fire X2100, X4100, and X4200 designed with enterprise power, and ASA The 1U Quad Servers can be configured ing systems servers; www.sun.com), all powered by Computers has a solution for networking to run multiple, different operating systems www.Processor.com/ASA2 multi- or single-core AMD Opteron speed and efficiency: multicore technolo- such as Linux, Windows, and/or BSD, and processors that run Solaris, Linux, and gy (and/or dual-core computers), the cut- they support dual boot. ASA’s support Windows. All are energy-efficient, reli- ting edge for next-generation systems, group is able to customize the Quad tests on these servers,” says Tai Hong, able, high-powered, and high-perfor- especially in the networking environment. Opteron servers for your company’s specif- product development manager at ASA mance systems. ASA’s new Quad Server has four dual- ic applications, and with 128GB of RAM Computers. “There were no lockups, crash- Other competition includes APPRO core AMD Opteron processors—that capacity for the eight-way option, your es, or errors during the period of testing. Systems’ 1142H server (www.approsys means eight cores, which means light- applications will perform at a level never This means ASA Quad Opteron servers tems.com), also powered by AMD’s ning-fast performance for enterprise seen before. The 1U Quad Servers maxi- seriously take care of the power needed by Opteron dual-core processors (32- and 64- servers. The 1U Quad Servers feature the mize performance and minimize cost. its customers’ applications.” bit). APPRO Systems also boasts the high- Nvidia nForce Pro 2200 chipset-based “Our engineering team has logged hun- The Quad Opteron dual-core servers est power-to-density ratio, as well as scala- board, a 1GHz HyperTransport link, dreds of hours running various stretched are also the most compact servers on the bility, reliability, and performance. P July 28, 2006 Processor.com Page 21 Product✍ Releases Continued from Page 20 organizational hierarchy), or hybrid, provides businesses with the tools they restoring backup data from a disk that has Suite. The latest release is Version 2.1. which combines the bottom-up and top- need to monitor the security of online already been written to tapes and shipped The new additions include PrivacyProtect down approaches. applications. AppScan 6.5 monitors a offsite for storage. and Application Manager. Content- • • • • • number of Web applications using its Web • • • • • Watch’s products have provided Internet ■ Juniper Networks released the latest Services Explorer. This new feature can ■ Symantec announced the release of the filtering and dynamic contextual analysis. versions of its open standard-based simulate application-to-application inter- Veritas Storage Foundation 5.0 product They now also offer antiphishing tech- Odyssey Access Client and Steel-Belted action rather than just user-to-application family. The software was designed to give nologies and improved application man- Radius software, designed to meet the interaction looking for additional security both public and private organizations agement. ContentProtect Professional network access security needs of large flaws. AppScan 6.5 can also prepare a enhanced visibility and control over stor- Suite includes CallingID, which verifies enterprise organizations. OAC version 4.5 number of automated regulator reports. age environments. Storage Foundation 5.0 information about a Web site’s owner- now features priority and preferred net- The new version includes two new ISO can give users a glimpse into an entire ship, including its place and date of origin work connections, wireless suppression, reporting standards (17799 and 27001). storage environment even if it means as well as other details. The software username prompt, and additional EAP The software also includes updated PCI doing so across major servers, applica- alerts a user to suspicious Web sites support. SBR version 5.4 features im- (Payment Card Industry) standards for tions, operating systems, or storage plat- through site verifications, verification proved administration and configuration protecting credit card information. The forms. New with this suite is Storage tests, site warnings, and a configurable capabilities and enhanced administrator software includes features to help penetra- Foundation Management Server. This warning level. Application Manager fea- file permission control and logging. tion testers (such as an alert for weak pass- program provides multihost management tures application monitoring, Web-based Supported operating systems include the words) and improved accuracy to help capabilities across Windows, Unix, and management console, reporting, and secu- latest Microsoft Windows versions, SuSE eliminate false positives. Finally, AppScan Linux operating systems. It also improves rity. ContentProtect Professional Suite Linux Enterprise Server 9, Red Hat DE is a version aimed at developers that an enterprise’s service and security levels has an annual licensing cost of $59.99 Enterprise, Advanced Server 3, and integrates into most development plat- by identifying risks and offering proce- and requires the purchase of at least Solaris 10. forms including Visual Studio 2005, dural suggestions. three licenses. • • • • • WebSphere, JBuilder, and Eclipse to alert • • • • • ■ SurfControl announced the release of developers of potential security holes Telephony ■ Courion announced it has added the SurfControl Enterprise Threat Shield before the application is deployed. ■ Vertical Communications released the RoleCourier to its Enterprise Provisioning 3.51. The latest version of Threat Shield Vertical TeleVantage 7.5. This is the lat- Suite. The role management solution includes a feature designed to prevent Storage est release of Vertical’s communication makes enforcing security policies easier information leakage via the USB interface. ■ Network Appliance announced that it product for the IP-PBX medium. The and lets users effectively leverage roles. This security product also features an is teaming up with BakBone, Comm- software-based offering features a suite of RoleCourier offers a complete approach expanded database that includes signatures Vault, and Syncsort to produce an inno- voice applications including unified mes- to enterprise role management by includ- to protect against pod slurping applica- vative backup application, NetApp’s saging, comprehensive call recording, and ing creation, enablement/disablement, tions—programs that enable an unautho- NearStore VTL Shadow Tape technology. personalized call handling. TeleVantage modification, review, and role analysis. rized transfer of data from a computer to a This integration was designed to acceler- 7.5 also has remote login for mobile Businesses can use RoleCourier to flash drive, iPod, or other small storage ate enterprise data recovery and integrate users, last agent routing for call centers, streamline their role governance: The device. Besides the new USB protection the seamlessly with current backup technolo- expanded support for IP phones, and add-on will identify and compare roles SurfControl Enterprise Threat Shield still gies from all of those involved in the enhanced SIP (Session Initiation Pro- that could overlap in an effort to reduce has an extensive, dynamically updated partnership and Veritas NetBackup by tocol) VoIP functionality. The program is the overall number of roles. RoleCourier database to protect against spyware, Symantec. The new technology will make available as a software update, or it also can take three approaches to role defi- adware, keyloggers, and other threats. it easier for enterprises to adopt and bene- has been integrated with Vertical’s nition: bottom-up (starting with each • • • • • fit from disk-to-disk backup without MP5000 platform to offer full function- user’s existing privileges), top-down (de- ■ The latest version of Watchfire’s changing their existing processes. The ality to customer bases that are up to termined privileges according to an AppScan and AppScan Developer Edition technology automates the process of 100,000 members.

www.Processor.com/GlobalDataGuard Page 22 Processor.com July 28, 2006 Manufacturer Presentation Manufacturer Presentation Communications - Network & Systems Mgmt. Advertisement Communications - Telephony Advertisement

LinktropyTM 4500 WAN Emulator ZyXEL’s New VoIP Solutions From AppositeTM Technologies Bridge the Move to VoIP for the SME Cost savings and improved productivity through digital convergence are some of the key elements driving businesses to change from a traditional phone network to a VoIP network. There’s no denying it; the advantages are clear, and the demand for Prices Start at VoIP networking solutions is on the rise. $2500 ZyXEL’s new SMB VoIP Integrated Access Device (P-2608HWL) and SMB VoIP router (P-2304R) can bridge the move to VoIP for growing businesses. Both products enable multiline VoIP service through one of two options: Simulates Link Conditions: Emulates Any Type of WAN: • Hosted VoIP services • Bandwidth • Terrestrial • Integrating with an existing analog PBX system • Latency • Wireless Both of these options provide easy deployments for service providers, preventing • Packet Loss • Internet businesses from having to replace current analog phones, and leverage existing • Bit Errors • Satellite infrastructure. • 8 FXS Phone Ports (to connect ZyXEL P-2608HWL: All-in-one VoIP IAD up to eight analog phones) The Linktropy 4500 from Apposite Technologies is a new generation of WAN (Integrated Access Device) • ADSL 2/2+ modem emulator, combining unsurpassed precision with unbeatable prices. The Linktropy www.Processor.com/IAD • 4-port Ethernet switch, built-in 4500 simulates WAN bandwidth, delay, congestion, bit errors, and other important router link characteristics at speeds up to 155Mbps. • 802.11g wireless access point • Multimedia Bandwidth The Linktropy 4500 is used to test, benchmark, and troubleshoot networks and Management guaranteeing applications under a spectrum of real-world WAN conditions. Uses for the Linktropy QoS 4500 include: • Built-in ICSA-certified firewall for security • Networking application performance testing • Application turning • Lifeline support • Customer and trade show demonstrations • Network design validation • WAN acceleration product benchmarking • VoIP quality testing • Satellite and wireless network development • TV/IP and IP video testing • 4 FXS phone port connections • WAN bandwidth requirement studies • Web site responsiveness testing • 1 10/100M auto MDI/MDIX • Network specification • Product QA testing ZyXEL P-2304R: Ethernet port VoIP Router • Multimedia Bandwidth The Linktropy 4500 is designed for ease of use. The Linktropy traffic monitor displays www.Processor.com/VoIP Management guaranteeing throughput graphs and statistics to help visualize performance. Integrated Ethernet QoS bridging and IP routing functionality make the Linktropy 4500 simple to install in any • Built-in ICSA-certified firewall/ network while the intuitive, Web-based, graphical interface allows the Linktropy 4500 VPN for security to be set up and configured in minutes. Apposite Technologies - WAN Emulation Made Easy Learn more at Please call www.Processor.com/Linktropy 1.800.255.4101 Call us today at 310-858-1492 for pricing

Carrier Networking Access Control IDS/IPS/DoS www.Processor.com/Telect3 www.Processor.com/Marx www.Processor.com/Arxceo $895

Optical Media Converter & Transport CrypToken - Your Digital Identity Arxceo’s ally ip100 - 100Mbps Intrusion Prevention • Simple, cost-effective T3 or Ethernet extension Easy to integrate into PKI solutions or any certificate-based •Frustrates and prevents attackers from scanning the • T3 signals up to 50km point-to-point on single mode fiber security applications (X.509, CAPI or PKCS#11): Windows network for vulnerabilities • Extend Ethernet up to 30km point-to-point Login - VPN Authentication - Web Access - WLAN Security - • Provides erroneous (and conflicting) results to interac- • Easy to deploy, provision, and manage Email Encryption - Digital Signatures. tive and automated reconaissance methods • Modular design in a variety of compact chassis • Thwarts Denial of Service attacks and various deriva- • Standalone units available for low-capacity applications www.Processor.com/Marx tives (DDoS, DRDoS, and others)

2111 N. Molter Rd 4485 Tench Road, Suite 310 1525 Perimeter Parkway Liberty Lake, WA 99019 Suwanee, GA 30024 Huntsville, AL 35806 Phone: (800) 551-4567 Phone: (770) 904-0369 Toll Free: (866) 427-9236 Fax: (509) 926-8915 Fax: (770) 904-3893 Phone: (256) 837-8338

Multifunction Appliance OEM Security Platform Modular Switch www.Processor.com/Britestream www.Processor.com/iBase79 www.Processor.com/ProCurve2

Britestream and OSST have partnered to deliver a highly • Entry Desktop VIA CN700-based Network Security The ProCurve Switch by HP 4200vl Series: Consists of scalable security appliance built on Microsoft Internet Appliance modular chassis that provide a flexible, cost-effective Security & Acceleration Server. The New OSST • Supports VIA Eden-V4 FSB 400/533FSB up to 1GHz LAN solution as an alternative to stackables. These SecureGuard combines the strengths of Microsoft’s ISA • Supports four 10/100BaseT LAN ports, optional LAN switches offer a proven chassis form factor with high Server 2004 and Britestream’s SSL Security NIC to deliver Bypass function quality and reliability in 1/100 and 10/100/1000 scalable perimeter security, branch-office connectivity, Web • One DDR2 SO-DIMM up to 1GB solutions that integrate easily into any network. Plus a caching, and maximum SSL performance in one solution. • One MINI-PCI expansion slot $1,000 rebate and lifetime warranty on select Switches.

1050 Stewart Drive 48 South Service Rd. 12401 Research Blvd. Sunnyvale, CA 94085 Melville, NY 11747 Austin, TX 78759 Phone: (800) 292-4500 Phone: (800) 392-3299 Phone: (512) 250-2129 Fax: (408) 992-0888 Fax: (425) 928-5715 July 28, 2006 Processor.com Page 23 Manufacturer Presentation Manufacturer Presentation Communications - Security Advertisement Communications - Security Advertisement

TM Symantec Gateway Security 1600 Series SafeWord SecureWire Identity & Affordable protection through eight essential security functions in a single easy-to-manage appliance. Access Management Appliance

Secure Computing's SafeWord® SecureWireTM is designed to simplify access to Robust, integrated and applications, data, and network resources without compromising security by hosting cost-effective protection and managing all external access methods on a single appliance: VPNs, Citrix for central sites, remote applications, extranets, Web mail, and much more. SecureWire can also host and and branch offices with manage all internal access methods: LAN connections, wireless LANs, and even up to 200 users. mainframes. By having one comprehensive appliance to control your access methods, The Symantec Gateway Security 1600 Series is an affordable, reliable, and easy-to- both inside and outside of your manage unified threat management security appliance powered by Symantec’s award- network, administrative and winning technologies. With eight essential security functions tightly integrated, the maintenance costs can be SGS 1600 Series delivers maximum security while reducing the complexity of security greatly reduced. management.

The new SGS 1600 series offers key benefits that will help your organization improve A key component of managing identity is authenticating users. SafeWord® industry- its overall security posture and reduce maintenance cost. leading strong authentication comes standard with every SecureWire appliance to deliver proof-positive identity of all users. SafeWord strengthens network connectivity Proactive Protection - Protects against multiple threats, including viruses, worms, with strong, one-time password user authentication included in the base product. spyware, spam, intrusions, and blended threats, while reducing acquisition, installa- SecureWire also provides native support for Active Directory, LDAP, and RADIUS tion, and management costs with a single-vendor solution. while supporting a wide range of authenticators, including smart cards, biometric devices, and a range of third-party tokens. Security Effectiveness - Combines tightly integrated, on-box, multiple “zero-day” attack detection technologies, including antivirus heuristics, IDS/IPS vulnerability With tight integration to Active Directory, SecureWire is ideal for the growing number attack interception, and Protocol Anomaly Detection. of organizations that manage IT in a Microsoft environment. Companies can easily manage user identities by leveraging their existing Microsoft tools and applications. Accelerated Security Response - Obtains automatic and timely content security updates and software patches as soon as they are available through LiveUpdate, SecureWire can simplify access, management, and compliance for any organization, which keeps your protection up to date without management overhead. from branch offices to large enterprises. Any organization that extends its information assets to internal and external users can benefit from SecureWire. Easy to Manage and Maintain - Comprehensive management capabilities to enable scalable security policy configuration and event/alert management for all security • Simplifies network access and secures every access point functions via an easy-to-use Web-based interface. • Simplifies access management by consolidating policies on a single device • Enables configuration compliance to ensure that only properly configured end-point Trusted Security - Reliable protection from Symantec, the leader in Internet security. devices can access the network • Reduces IT workload by providing a single point of management and reporting For more detailed information on the SecureWire is immediately available Symantec Gateway 1600 Series of though Secure Computing partners products, please visit us at For More Information visit us at: www.Processor.com/Symantec10 www.Processor.com/Secure or call us Copyright © 2006 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered trademarks of Symantec Corporation or its affiliates in the U.S. and other countries. Other names 800.692.5625 may be trademarks of their respective owners. General info 408-517-8000

Ethernet Switch KVM KVM www.Processor.com/N-Tron www.Processor.com/i-Tech75 www.Processor.com/Rose3

Rackmount LCD Drawer w/KVM Over IP $1900 New Product!

Monitor Your Industrial Ethernet Network i-Tech SuperStore for Rackmount LCD Console Drawer UltraMatrixTM Remote Server Management The N-TRON™ 9000 Series is a Gigabit-capable, four-slot • Connects 1,000 computers to multiple user station over IP modular switch, offering fully managed features such as • 15”, 17”, 19” & 20” is also available • Secure encrypted operation with computer access control IGMP Snooping, VLAN, QoS, Trunking, Mirroring, 802.1W • Optional with 8/16 ports KVM • High-quality video up to 1,280 x 1,024. Rapid Spanning Tree, and N-View. The 9000 Series is the • New integrated with Remote Access via CAT5 and via IP • Advanced visual interface (AVI). Easy to expand. ideal switch for connecting Ethernet-enabled industrial • New SUN Solaris Rackmount Keyboard • No need to power down servers to install and/or security equipment. www.Processor.com/N-Tron Free Grd Shipping for all Rackmount LCD KVM Drawers! • Free lifetime upgrade of firmware. Call for other models

30081 Ahern Ave 10707 Stancliff Road 820 S. University Blvd. Union City, CA 94587 Houston, TX 77099 Mobile, AL 36609 Phone: (888) 483-2418 Phone: (800) 333-9343 Phone: (251) 342-2164 Fax: (510) 372-2736 Fax: (281) 933-0044

KVM KVM Accessory KVM Accessory www.Processor.com/Rose4 www.Processor.com/Arise2 www.Processor.com/Rose

LKM-215/217

Multi-User KVM Switch - UltraMatrixTM E-series Rack Mounted KVM Drawer - RackViewTM • Connect 1,000 computers to multiple user stations • 1U/2U Rackmount LCD/Keyboard/Trackball • 15”, 17”, or 19” LCD Panels • PC or multiplatform (PC/Unix, Sun, Apple, others) • 15”or 17” TFT Color LCD • Built-in single or multiple user KVM switch options • Advanced visual interface (AVI) • Trackball or Touchpad • Supports AT/XT, PS/2 and Unix computers • Powerful, expandable, low cost • 6U/8U Panel Mount Available • Front Panel conceals unit when it is not in use • Free lifetime upgrade of firmware • Optional KVM Switch Functions • Keyboard available in international variations • Security features prevent unauthorized access • LCD flat panel and kybrd/trackball can be sold separately

453 Ravendale Drive 10707 Stancliff Road 10707 Stancliff Road Mountain View, CA 94043 Houston, TX 77099 Houston, TX 77099 Phone: (650) 428-0868 Phone: (800) 333-9343 Phone: (800) 333-9343 Phone: (781) 937-9888 Fax: (281) 933-0044 Fax: (281) 933-0044 Page 24 Processor.com July 28, 2006 OPINIONS UPTIME

to a network share. The restore problem was due to a faulty NIC, versions prior to 10D that caused When It Rains, It Pours failed because it lost the connec- and we wasted hours of time try- restores with a large number of tion to the Backup Exec agent, so ing to get the restore to work with small files to fail. There was no we attempted a restore without the a different NIC. knowledge base article or other We recently discovered that and the only recourse is to do a agent, but it failed as well. We Over the course of this testing, it documentation on this failure; the ■ file corruption was occur- full restore of the volume from decided to contact Veritas for help. became clear that our backup serv- only way to find out about it was to ring on the primary file server for backup. This shouldn’t have been er had become unstable, so we spend enough time on the phone! our office in Redmond, Wash. The a big deal; after all, this sort of Frustrating Technical Support made the painful decision to build After upgrading to Backup Exec way we discovered this was not problem is why you do nightly In my years in the industry, the a completely new backup server 10D, we were finally able to suc- the way you want to find out backups. Little did we know that quality of technical support has with a large enough disk array to cessfully restore the problematic about this type of problem. We our problems were just beginning. volume, five days after we started. became aware of this problem when we tried to access some doc- Software & Hardware Failures Lessons Learned umentation that covered critical After notifying our users and Danny Cecil has 19 years of experience in The most troubling aspect of this details of our weekly release plan backing up the files that had product development and information experience was discovering that we UTHOR

and found out that the files were changed since the last backup, we A technology at various companies, including had allowed file corruption to go corrupted. The person who created attempted to restore the volume HP and WildTangent. For the past few years, undetected for over two weeks. To these plans was on vacation when from a tape backup. The restore Cecil has managed data center operations and address this, we are reworking our we discovered the problem, so we process failed repeatedly with the information technology for several Seattle monitoring solution to make sure had no way to figure out what the Backup Exec client crashing. We companies. He is currently the vice president that we catch these types of prob- plans should have said and had no then tried—with limited success— of operations for WildTangent, an online game lems immediately. Almost as dis- choice but to delay our release breaking the restore job up into publishing company in Redmond, Wash. concerting was learning that our until this employee returned from multiple smaller jobs. We tried backup software had a bug for over vacation. Not the sort of thing that restoring to various locations two years that prevented restoring instills confidence in your IT using different parameters, and steadily declined. While we occa- allow the restore to be done locally, large numbers of small files. infrastructure! eventually we were able to restore sionally have good tech support avoiding any possible network Based on this, we’re going to approximately 30% of the data. experiences, we mostly don’t, and issues. We then spent more hours take a couple of actions. While we The Original Problem At this point in the process, one our work with Veritas on this with Veritas tech support to get all routinely restore files from back- Once we discovered this file of the disk drives in the array that problem was not an exception to of our job and media information up, this was the first time we had corruption, we started scanning we were restoring failed. We re- the rule. For some reason software migrated, which ultimately re- tried a restore of this size. We are the server for other problems and placed the drive and started a support techs always think there is quired a reboot of the server. The now going to do large test restores discovered additional files that rebuild of the array. While this was something wrong with your net- reboot triggered a forced chkdsk on once per quarter. The other change had been corrupted. We then going on, we attempted to restore work. They were convinced the the array, which ran overnight but we are going to make is to replace started combing through the event never completed. We then replaced our backup software. It is inexcus- logs and found a single entry from the PERC/4 controller, tried the able for Veritas to ship a backup two weeks back that indicated This shouldn’t have been a big restore again, and it failed again. product that does not reliably that the Master File Table on one Back to Veritas tech support. restore data regardless of the size of our primary file sharing vol- deal; after all, this sort of problem This time, after having already or composition of the file set. umes was corrupted. A corrupted spent hours on the phone, tech sup- MFT means that the integrity of is why you do nightly backups. port informed us that there was Send your comments to the entire volume is in question, a known bug with Backup Exec [email protected]

Manufacturer Presentation Manufacturer Presentation End Nodes - Data Collection Advertisement End Nodes - Components Advertisement

Falcon® 4400 Series Windows®-Based Based On Intel® CoreTM Duo Processor & Mobile Computers Mobile Intel® 945GM Express Chipset The Falcon 4400 Series is an ergonomic mobile computer designed for use throughout the supply chain. User-friendly keypads, an audible beeper, and Embedded Motherboard—MB899 maximized color display complement industry-leading durability.

Technology Features Include: The MB899, a Mini-ITX motherboard, supports the latest Intel® CoreTM Duo proces- • Windows® CE or Windows Mobile® sor and the Mobile Intel® 945BM Express chipset. The latest Intel® CoreTM Duo operating systems processors give you the competitive edge in the ever-growing embedded market. • 802.11b or 802.11g wireless data The Mobile Intel® 945GM Express chipset provides greater flexibility for developers communications of embedded applications by offering improved graphics and increased I/O • An Intel XScale microprocessor bandwidth. • Standard, long, and advanced long range engines This new embedded motherboard • Linear and 2D imager options tailor fit the Falcon 4400 Series to the offers intelligent power management application capability and greater performance per watt, which enhances the end- The Falcon Desktop and Management user experience for medical, multi- Utilities make the Falcon 4400 Series media, industrial automation and effortless to deploy and manage. gaming applications. Creative developers can leverage appli- cation development tools to further cus- MB899 Features: tomize units for specific applications. • Intel® CoreTM Duo processor Three service programs, ranging from a five-business-day repair to an overnight • Mobile Intel® 945BM Express replacement, keep your systems at peak working condition and productivity high. chipset PSC’s consulting services are available to help architect, integrate, deploy, and man- • Two DDR2 DIMM Sockets age mobile wireless systems into your environment, on-time and within budget. • Supports CRT, LVDS, optional TV Deployment project managers lead the wireless network design, site surveys, stag- out or DVI ing, image loading, cabling, and installation activities. • 10/100BaseT LAN, PCI Express Gigabit LAN PSC Inc. is a global provider of automatic data-capture products and services. Wired • SATA x2, USB x6, Digital I/O, Watchdog timer or wireless, PSC offers a broad array of products and services for multiple industries, • PCI x1, PCI-E (x1) x1, Mini PCI x1, optional Mini PCIe x1 including retail, industrial, manufacturing, distribution, transportation, and logistics sectors. For more information, please visit www.Processor.com/iBase www.Processor.com/PSC 1-800-292-4500

959 Terry Street Eugene, OR 97042 Phone: (541) 683-5700 Toll Free: (800) 695-5700 July 28, 2006 Processor.com Page 25 OPINIONS INFO-TECH • INSIGHT

often the airlines’ last option for a significant negative. Not quite the airport check-in kiosk, and Rolling Out Client-Facing maintaining customer loyalty. My the friendly skies it had hoped for. information cards tossed into the own loyalty evaporated long before seatback pockets would have our wheels touched the ground. A Better Plan helped. Small messaging cues can Services? Don’t Raise This airline would have been What this airline should have go a long way toward setting appro- better off not deploying this sys- done was scale back the scope of priate expectations for passengers. False Hopes tem at all because if it can’t figure the initial release. A simplified Customers in all industries ex- out something simple, can we menu structure incorporating only pect consistent experiences that trust it to ensure its planes don’t A few weeks ago I got on a get to Boston. I thought I’d found fall out of the sky? I wish they’d ■ plane and saw something a treasure trove of entertainment. stick to doing what they do best. new on the seat back: an interac- If only. Carmi Levy is a senior research analyst with tive touchscreen. Lessons For IT Info-Tech Research Group, a London, Ontario- The Long Letdown UTHOR I’ve grown accustomed to the This presents some fundamental A based research and professional services firm. new age of flying: no in-flight As I dug deeper into the menu implications for IT. We are going He is the author of Info-Tech's Optimizing Your IT meals, surly service, and just structure, it became painfully through one of the most tumul- Infrastructure best practices methodology, as well enough personal space to remain clear that this lovely looking tuous transitions in the history of as the 2005 research report, “Building the Next breathing. I already had my iPod in screen was half-baked. enterprise technology. Legacy sys- Generation Help Desk.” Levy holds a journalism one pocket and an electronic book Every second choice returned tems that formerly lived behind degree from Montreal's Concordia University and reader in the other. As soon as I the same message: “This service is glass walls and were cared for by has extensive experience in IT project management, saw the seatback screen, though, I not yet available. Thank you for white-coat-wearing specialists are helpdesk re-engineering, high performance team assumed my self-programmed your understanding.” A seatmate now being reborn. By grafting Web leadership, and process redesign. entertainment wouldn’t be needed. crashed his screen by tapping it too services on top of these dusty, old I was wrong. quickly. Another traveler lamented boxes, IT can now deliver formerly the lousy sound quality. Even after closed, green-screen applications to the services that could be delivered do not let them down. IT has the A Screen Of Promise he cranked it to full volume, the the masses. would have kept end-user frustra- power to deliver phased solutions After dutifully reading through distorted sound was still over- The visibility of a given rollout tion in check. You can’t be upset that meet and exceed customer the aircraft safety pamphlet—you whelmed by engine noise. is higher now than it’s ever been. by something you do not miss. expectations. Whether in the air do read it every time you fly, I tried to watch a movie, but it Look no further than Web banking, The airline also failed to proper- or on the ground, take the time to don’t you?—I looked for similar looked like I was watching it your ATM, or a cell phone inter- ly assess the end-user experience. apply a disciplined approach to instructions for the screen. There through the bottom of a pop bottle. face for proof. Many enterprises I somehow doubt they sent testers client-facing applications or risk were none. I gave up. I tried to turn it off, today conduct the bulk of their to the seats to see how the thing losing those clients for good. So I did what every IT geek but it would have none of that. I business with clients who never set worked. If they had, they would And if you’re in the airline indus- does: I let my fingers do the walk- took out my iPod as the screen foot on the premises. They get one have simply left it unplugged. try, consider redirecting the money ing and quickly discovered that flickered uselessly in my face for virtual chance to make the right Finally, they failed to educate the spent on lousy in-flight entertain- this screen held a lot of potential. the rest of the flight. impression. And if they fail, cus- end user. Granted, it’s impossible ment systems toward something The top-level menus promised tomers will seek out competitors by for flight attendants to spend time passengers would actually appreci- access to movies, music, televi- A Flight Of Disloyalty simply moving their mouse. with every passenger to explain ate. Like in-flight meals. P sion shows, and even cartoons— In a market where all carriers are In this case, my airline put in a what is essentially a plaything. But enough material to keep me busy virtually identical in their medioc- barely working system and ended documentation on the corporate Send your comments to for far longer than it would take to rity, little things such as this are up turning a potential benefit into Web site, an on-screen reminder on [email protected]

Manufacturer Presentation Manufacturer Presentation End Nodes - Storage Advertisement End Nodes - Storage Advertisement Introducing the New SuperTrak EX16350/EX16300 16-Port AccuNAS Series SATA 3Gbps RAID Controller From Promise Technology

AN104S SuperTrak EX16350/EX16300 Call For Details highlights: · 16-port SATA 3Gbps advanced RAID controllers Introducing the New AccuNAS Series, the latest enterprise level NAS · Intel IOP 333 (EX16350)/331 (Network Attached System) from Sans Digital your one-stop storage solution (EX16300) processor · RAID support 0, 1, 5, 6, 10, 50 provider. This versatile series features both Linux based and Windows based NAS. · PCIe (EX16350) and PCI-X Our New AccuNAS Series is sure to meet all of your storage needs. (EX16300) host bus interfaces · Web-based WebPAM™ man- • World’s most advanced 1U NAS system featuring an Intel Pentium D agement software Processor w/ built-in Dual Gigabit Network · Linux open source driver available • Built-in NAS-to-NAS Replication · 256MB onboard cache • iSCSI Target Function for unlimited initiator support · Dual controller support • Multiple Volume Snapshots & Snapshot-On-Demand · Optional battery backup mod- • Scalable with AccuStor Fibre or SCSI RAID Subsystem ule available • 47~57MB/s Read, 68~74MB/s Write & 105MB/s Write Burst

Please visit www.Processor.com/SansDigital to see our full line of RAID The SuperTrak EX16350 and EX16300 from Promise Technology are Intel IOP- Storage Products, including Rackmounts with Ultra 320, SCSI, & Fibre Channel based RAID5/6 controllers that combine high performance with unbeatable prices. Interfaces!!! The SuperTrak EX16350/16300 controllers include Promise advanced RAID features such as multiple logical drive support, media patrol, and bad sector remapping for maximum data protection and management.

The SuperTrak series is designed to fulfill the needs of SIs and OEMs with demand- ing data storage requirements. The SuperTrak controllers deliver exceptional multi- drive performance by taking advantage of Intel's XScale IOP I/O processor technolo- gy to offer the ultimate RAID 6 protection for high-level fault tolerance, allowing multi- ple simultaneous drive failures without downtime or data loss so your data is always protected.

Systems now support up to 750GB Hard Drives! For More Information: www.Processor.com/Promise

10038 Pioneer Blvd. Santa Fe Springs, CA 90670 580 Cottonwood Drive Phone: (562) 949-1988 Milpitas, CA 95035 Phone: (408) 228-1400 Fax: (562) 949-3328 Fax: (408) 228-0730 Page 26 Processor.com July 28, 2006 Manufacturer Presentation Manufacturer Presentation End Nodes - Storage Advertisement End Nodes - Printer Advertisement

UltraStorTM - IP SAN Storage System TallyGenicom’s New High-Speed Ultra Fast & Flexible Host Engine from Fibre Channel, iSCSI, and SCSI Serial Matrix Printers Have RS 16 IP - 10/100/1000 RS 8 IP - 10/100/1000 Multiple Connectivity Solutions

TallyGenicom announced the 2265+ and 2280+ models of the 650 and 900 cps serial matrix printer family for time sensitive and Enterprise RAID Performance critical business printing applica- The original UltraStor product line capitalized on Enhance Technology’s hybrid stor- tions in industries such as ware- age expertise by combining SATA disk drives with either a SCSI or Fibre Channel housing, manufacturing, trans- host interface. The UltraStor IP utilizes newer, faster Serial ATA 3Gbps disks and is portation, retail, and others that powered by the latest microprocessor to deliver up to 220MBps over a Gigabit require multipart forms printing. Ethernet network, enough bandwidth to exceed the demanding requirements of many network-based applications. With UltraStor IP, Enhance has created a product that The 2265+ printer is available in a variety of configurations, making it the ideal choice supports multiple hosts and runs on both the Windows and Mac OS platforms while for multiple connectivity environments. The configurations include parallel only, paral- offering easy configuration and integration into virtually any hardware or software lel with serial, internal Ethernet, PCL, and LAN IPDS for IBM AS400/iseries users. environment. List Prices range from $1,845 to $2,227. Key Features Include: The 2280+ is available in a variety of configurations, including serial, parallel, PCL, • Hybrid Serial ATA disk-based storage, compatible 1.5 and 3Gbps disks internal Ethernet, and LAN IPDS. List Prices range from $2,543 to $3,709. The 2280- • Embedded hardware RAID controller with dual GbE ports 2T+ will be available in July 2006 for users that require the ability to print up to nine- • 2U or 3U modular rack design easily integrates into existing storage infrastructures part forms for use in industries such as transportation, customs brokerage firms, and • 2 GbE full iSCSI offload with load-balancing and failover the healthcare field. • One logic volume shared by as many as 16 hosts • Windows VDS/VSS/MPIO support, host access control, and CHAP “By adding this robust and comprehensive product line to our offering, TallyGenicom • Easy LCD control, Remote monitoring, and RAID management over TCP is continuing our commitment to our customers by being the solution provider for their changing serial matrix printer requirements” says Chuck Ward, serial matrix product Full iSCSI Benefits marketing manager at TallyGenicom. The UltraStor IP system has dual GbE ports, supporting full iSCSI offload with load- balancing and failover and one logic volume shared by as many as 16 hosts. Other TallyGenicom continues to support Digital / serial matrix printer users. new features introduced in the UltraStor IP system include MPIO support, S.M.A.R.T. Included with this announcement is the release of the LA650 + and LA800+ for these disk monitoring, target authorization via IP address, and Jumbo frame support. legacy applications. These new printers replace prior models 2265, 2280, 7265, LA650, and LA800. UltraStor Product Availability and Host Flexibility UltraStor IP is available for immediate delivery in the form of a 2U eight-disk RS8 IP model, which has the storage options of 1TB, 2TB, or 4TB; the 3U 16 RS16 IP model can go up to 8TB.

www.Processor.com/Enhance Phone: (562) 777-3488 Fax: (562) 777-3499

www.Processor.com/TallyGenicom • (800) 436-4266 July 28, 2006 Processor.com Page 27 Manufacturer Presentation Manufacturer Presentation End Nodes - Storage Advertisement End Nodes - Components Advertisement

TM Accusys InneRAID InfiniHost III Ex Dual-Port InfiniBand HCA ACS-75190/75191 PATA RAID 1 Box Cards With PCI Express x8 In addition to the deployment of 20Gbps InfiniBand in multicore server platforms, blade server platforms are driving this connectivity performance into mainstream data The ACS-75190/ACS-75191 center and high-performance computing environments. The industry is RAID box is an excellent solu- complementing these computing platforms with a wide range of 20Gbps InfiniBand tion of protecting data and infrastructure solutions from vendors including Cisco Systems, SilverStorm improving system availability for Technologies, and Voltaire. The growing ecosystem of InfiniBand 20Gbps industrial computing and com- technology-based suppliers is heralding the dawn of a new generation of cluster and munication platforms. It per- grid deployments where the bar for application performance and resource forms block-level data mirroring deployment flexibility is being raised to unprecedented levels. to protect data of all types and of any operating systems. It also InfiniHost III Ex dual-port 4X seeks to secure every bit of your InfiniBand HCA (Host Channel data while streamlines the IO MHEA28-XTC Adapter) cards connect to the access serving by its intelligent host system through a PCI DriveRectifier™ technology. Express x8 interface. SDR (single data rate) InfiniHost III Connectivity Form factor Ex cards support dual 10Gbps • ACS-75190: SCSI-PATA • Two 3U compact PCI slots or one 5.25” InfiniBand connections • ACS-75191: PATA-PATA full-height drive bay while DDR (double data rate) • ACS-75192: SATA-SATA versions support dual 20Gbps DriveRectifierTM Technology InfiniBand connections. Features • Assured Real-Time Non-Stop availability InfiniHost III Ex HCA cards • Hardware-accelerated RAID 1 with High Performance deliver the most cost effective (mirroring) • Online drive traveling and array roaming 10 or 20Gbps solution avail- • Support 2.5” PATA notebook disks • Event logging and notification by audible able and feature RDMA (remote direct memory access), hardware transport, and • Driverless: need no driver on host side alarm, pop-up windows, or e-mail advanced per QP (queue pair) QoS services. • Hot swappable hard disks • Web GUI with auto-started agent • Automatically on-line data rebuilding • RS232 interface for firmware update • Dual 10Gbps (MHEA28-XTC and MHEA28-1TC) or 20Gbps (MHGA28-XTC and • On-line bad sector recovery and GUI MHGA28-1TC) 4X InfiniBand Ports • Key lock against unauthorized access • Open API for proprietary GUI and inte- • Integrated SerDes (Serializer/Deserializer) interfaces • LED indicators for disk status display gration • PCI Express revision 1.0a compatible card • PCI Express x8 (20 + 20Gbps full duplex) interface • IBTA version 1.2 compatible • Copper InfiniBand connectors (MicroGigaCN) with media detect circuit for www.Processor.com/Accusys optional fiber media adapter • Linux management and applications package available • Linux and Windows drivers • InfiniBand Compatible Verbs API • Various upper layer protocols Phone: (866) 277-5888 • ROHS-R5 Compliant [email protected] www.Processor.com/InfiniHostEx 408-970-3400

KVM Accessory Printer Server www.Processor.com/Recortec www.Processor.com/TallyGenicom www.Processor.com/@ProImage2

15”, 17”, 19” TFT 2U KVM UNITS High-Speed Serial Matrix Printer From TallyGenicom Flexible Mini Box • Keyboards with touchpads, trackballs and standard mice The 2265+ printer is available in a variety of configurations, • 11” x 3” x 10.5” • Many options available (PS/2, USB, locks, retainers, etc.) making it the ideal choice for multiple connectivity environ- • 800MHz ~ 1.4GHz Embedded CPU • 13.25” deep (15” and 17” models) 14.9” deep (19” model) ments. The configurations include parallel only, parallel • Slim CD / DVD • Supplied with full ext. smooth-action ball bearing slides with serial, internal Ethernet, PCL, and LAN IPDS for IBM • Up to 4 internal Hard Drives • Many other 1U & Panel Mount TFT display configurations AS400/iseries users. List prices range from $1,845 to • 150W to 250W internal ATX Power Supply • USA manufacturer of a variety of rack mount products $2,227. • Optional Rack Mount or Wall Mount Kit

4500 Daly Drive, Suite 100 Chantilly, VA 20151 Phone: (800) 436-4266 1620 Berryessa Road San Jose, CA 95133 Fax: (703) 222-7629 13317 166th Street Cerritos, CA 90703 Phone: (800) 729-7654 Fax: (408) 729-3661 Phone: (562) 483-0111 Fax: (562) 483-0110

Embedded System OEM Server Disk-Based Backup www.Processor.com/Augmentix www.Processor.com/Arbor www.Processor.com/MobileIT $4,999

AugmentixTM A+2851 Server Solution. Delivers the durability, advanced performance, availability, manageability, Professional Network Appliance Hardware Provider More Than A Backup Device . . . With SonicWALL 3440i and serviceability required to keep mission-critical applica- Connecting Everything You Need You’ll Get Continuous Data Protection tions up and running in the most challenging environments. MBX-1736 - Intel AMT & I/OAT Technology Ready Fast recovery time objectives and backup tape performance • Integrated Server Availability Mgmt. provides Monitoring, • Intel Pentium D processor up to 3.8GHz problems are driving demand for high-speed disk-based Control, and Autonomous Recovery Memory up to DDR2 2GB backup. CDP provides enterprise-class features, including • Combines Dell® PowerEdge® components w/ Augmentix • 6 x PCI-E Gigabit LAN / 2 x PCI-E Gigabit LAN with By Pass continuous data protection, remote management, and ruggedization and intelligent server mgmt. engineering • Support SATA HDD (3Gb/s) / Graphic Mode LCM hands-free offsite backup, without enterprise-class cost.

4616 W. Howard Lane, Suite 150 1755 E. Park Place Blvd., Ste. 200 Austin, TX 78728 Stone Mountain, GA 30087 Phone: (512) 334-0111 MOBILE IT, Inc. Toll Free: (866) 884-8462 Fax: (512) 334-0112 2032 Bering Dr. San Jose, CA 95131 Phone: (770) 465-6147 Phone: (408) 452-8900 Fax: (408) 452-8909 Page 28 Processor.com July 28, 2006 what level of performance is acceptable for each process in a SPONSORED LINKS DR scenario? A cost-effective DR Addlogix SnapShot plan doesn’t try to provide 100% Restore an entirely crashed system Plan For performance for all business to a stable working state in seconds processes; instead, it should focus www.Processor.com/SnapShot on providing the minimum need- AmeriVault ed until the business can resume Turnkey solutions for small to functioning normally. medium-sized enterprises restoring The Unthinkable Identify internal dependen- mission-critical data cies. It’s rare to have business www.Processor.com/AmeriVault1 domains that other departments processes function in their own Disaster Recovery Planning Dataside are more knowledgeable about. “sandbox.” The more common In the event of a man-made or nat- For The SME Define objectives. The first step scenario is a cross-departmental ural disaster, Dataside has solu- in creating a DR plan is to define process that involves a wide vari- tions to enable both network and by Chris Jackson should be a living, breathing doc- the objectives of the plan: its ety of personnel and technology. infrastructure redundancy www.Processor.com/Dataside • • • ument that mirrors the growth and scope, foreseeable events to plan Documenting the interconnections DISASTER RECOVERY, aka DR, changes in your own company. for, and appropriate parties to between departments is vital to MailFoundry Archive 2500 planning is akin to creating a will; involve. During the planning successfully planning for their A simple device to install and con- in your heart of hearts you hope How To Create A DR Plan process, these objectives will support during a crisis. figure that can handle backing up you’ll never need it, but not creat- Buy-in. Acquiring executive morph as you progress and over Identify external dependen- large amounts of email in real time www.Processor.com/Archive2500 ing one is foolhardy. Unfor- buy-in for DR planning is essen- time will change as your business cies. Although many companies tunately, many enterprises either tial because creating a robust DR grows. Objectives should be would like to think their success Powerfile Permanent fail to create plans for disaster plan requires multidepartmental defined in relatively simple, clear hinges solely on their own efforts, Storage Appliance recovery and business continuity cooperation. One of the major terms, and threats to your business it’s the rare enterprise that doesn’t An easy-to-install, nondisruptive or create plans that are inadequate mistakes companies make is to should be appropriately measured. partner to some degree with a appliance that offers the com- ponents you need for archiving or quickly become outdated. view DR planning as solely an IT Focus on core business pro- third-party vendor on a routine high-value fixed content and Yet DR planning need not be responsibility. IT will usually be cesses. The next step is to identify basis. Whether it’s a publisher digital assets analogous to cleaning out the one of the main drivers behind the the fundamental business applica- relying on a printer or a manufac- www.Processor.com/Powerfile Augean Stables. The process of DR process, but leaving it entirely tions and personnel required for turer with a sole source vendor, creating a useful, manageable up to your IT staff will produce your enterprise to operate. During companies continually (and opti- StorageCraft Technologies ShadowProtect recovery plan should follow a set gaps in business process compre- this investigative phase, you’ll mally) rely on other businesses to Creates an exact online backup of of standard steps we outline hension, as well as force your IT want to categorize your processes perform tasks outside of their own your entire system, including the below. In fact, your recovery plan staff to investigate business into routine and critical. Remem- area of expertise. Be sure to iden- operating system, applications, ber, you’re creating a disaster tify these dependencies, so you configuration settings, and critical recovery plan; the loss of a single can accommodate them in your data, with zero downtime www.Processor.com/StorageCraft The Value Of Consultants employee or minor application DR plan. shouldn’t constitute a crisis. Al- Investigate solutions. With Hiring a consultant to develop your DR plan is an enticing thought for many IT ways prioritize the processes your objectives defined, your crit- were struck by a hurricane or managers; you’re free of the drudgery involved, and you also get a pair of sea- involved against the DR objectives ical processes enumerated, and other natural disaster, where soned eyes that can bring a wealth of experience to the process. you’ve previously defined. the appropriate parties identified, would you relocate the staff? However, don’t be fooled into thinking it will reduce the amount of effort re- Outline SLAs (service level it’s time to investigate solutions Would you maintain secondary quired by your company; although a good consultant will have more experi- agreements). With your core for maintaining these processes at sites for staff and equipment? ence in DR planning then in-house staff, they won’t know the ins and outs of business processes identified, you the appropriate service levels. Although you should use the your enterprise as well as you should. need to determine metrics for One strategy is to play the “what initial objectives you defined as each process; in other words, if” game. If your home office Go to Page 30

Storage Security Storage Area Network Direct Attached Storage www.Processor.com/Midland www.Processor.com/ExcelMeridian6 www.Processor.com/SansDigital11

AN104S Call For Details

Starting At $3,995 Paranoia2 is the simplest, most cost-effective and easy-to- SecurStor 12i utilizes the latest in IP SAN technology • World’s most advanced 1U NAS system featuring an Intel deploy tape encryption (backup encryption) solution avail- which allows you to quickly deploy, manage and access Pentium D Processor w/ built-in Dual Gigabit Network able. The Paranoia2 tape encryption solution is available your storage from anywhere on the network (Distance is • Built-in NAS-to-NAS Replication as an external encryption device or as a complete private not a factor). Utilizing the latest iSCSI technology to form a • iSCSI Target Function for unlimited initiator support key secure backup encryption subsystem. Paranoia2 uses SAN over Ethernet it lets you get access to any server with- • Multiple Volume Snapshots & Snapshot-On-Demand strong encryption protocol, dual DES3, to protect your data in your enterprise by means of an industry standard iSCSI • Scalable with AccuStor Fibre or SCSI RAID Subsystem (or 11 other different levels). driver which is available for most platforms. • 47~57MB/s Read, 68~74MB/s Write & 105MB/s Burst

2130 Platinum Road 3220 Commander Drive, # 101 10038 Pioneer Blvd. Apopka, FL 32703 Carrollton, TX 75006 Santa Fe Springs, CA 90670 Phone: (888) 682-5335 Phone: (800) 995-1014 Phone: (562) 949-1988 Fax: (407) 571-3101 Fax: (972) 980-0375 Fax: (562) 949-3328

A subsidiary of Alanco Technologies, Inc.

Network Attached Storage Storage Area Network Storage Component www.Processor.com/SmartDisk www.Processor.com/AMI www.Processor.com/iVivity

The SmartDisk NAS drive is a simple-to-use, affordable StorTrends® 3100i is a 3U Dual Dialect™ storage appliance iDiSX 2000 - 10Gbps Ethernet iSCSI Host Bus Adapter network drive. The external drive includes its own 10/100 that is used for both NAS and IP SAN storage. It has 15 iVivity’s full 10Gbps application programmable iSCSI, Ethernet connectivity allowing you to plug the drive directly hot-swap SATA drive bays, hardware RAID support and TCP/IP, and UDP Host Bus Adapter (HBA) for array, appli- into your network. The drive then appears as a local drive capacity of up to 7.5 TB. iSCSI support allows file data and ance, and server OEMs. The iDiSX 2000 HBA offers to each computer connected to your network. The drive block applications, such as Exchange, SQL Server and 10Gbps full line rate throughput, very high IOPS, and low comes in a 250GB version for $279.99 and a 400GB ver- Oracle, to be deployed or stored on the same server as tra- power characteristics combined with standards-based pro- sion for $379.99. www.Processor.com/SmartDisk ditional file services and storage. www.Processor.com/AMI gramming power.

12780 Westlinks Drive 5555 Oakbrook Parkway 6145 Northbelt Parkway Fort Myers, FL 33913 Norcross, GA 30093 Norcross, GA 30071 Phone: (239) 425-4000 Phone: (678) 990-1550, ext. 211 Phone: (800) 828-9264 Fax: (239) 425-4009 Fax: (678) 990-1551 July 28, 2006 Processor.com Page 29 because SMEs typically have less of a cushion than their large coun- Where To terparts. “If something goes Find More Pitfalls Of Server wrong, there’s more of an impact on the business in a very short The March 31 issue of Processor’s time. So it’s doubly important [for Cover Focus section focused on vir- them] to spend the money and tualization and consolidation. To invest the time either to get their view these articles online, click the internal staff trained or to hire a Editorial link in the lower-right cor- Virtualization consultant and a system integrator ner of the All-In-One Search area to set them up,” she says. on the Processor.com home page. per se so much as caveats to be continues. Virtualization in the data It’s More Than Click Browse All Issues and then aware of.” center encompasses storage and Don’t Ignore click the Virtualization & Consolida- “You’ve got to know what networking as well. Having a sense Licensing Contracts Just Technical tion link next to the Mar 31 06 issue you’re doing as with any technol- of the broader scope is necessary to Virtualization offers huge po- listing to view the issue. by Robyn Weisman ogy. You have to study proper making sure that companies set up tential savings in licensing fees, • • • configuration [for your needs] as and maintain their virtual servers but you must make sure you are VIRTUALIZATION HAS come to the well as best practices,” says with as few hitches as possible. familiar with the terms and condi- In addition, Materie says that forefront recently for several rea- Yankee Group senior analyst “There is great potential to save tions of your corporate licensing defragmenting storage allows for sons. The potential to save money Laura DiDio. “The pratfalls come money using server virtualization, contracts, says DiDio. Otherwise, faster access to data by consoli- and to consolidate servers and when you are badly configuring or but the amount of cost savings you may find yourself spending dating file fragments. When the storage is bound to appeal to any misconfiguring or not following will be determined by the particu- more money inadvertently. CPU is not searching all over the IT manager who works within a best practices. Virtualization is lar configuration and the know- “For example, Microsoft allows hard drive—be it virtual or physi- budget or has limited space in like fire. Fire’s a good thing, but how of those setting it up,” DiDio you to install SQL Server on up to cal—for pieces of a given file, which to house servers and stor- you don’t carry a lighted match says. “Some of these things sound four virtual servers on a single you can expect quicker perfor- age devices (in other words, pret- with you at the gas station.” mance and a decrease in bottle- ty much everyone). “A few years necks through I/O channels. down the road, virtualization will Understanding Virtualization The potential to save money and be the standard, the norm,” says While virtualization technology Or Can You? Michael Materie, product line has been touted as the solution to to consolidate servers and storage For his part, Illuminata’s Haff manager for Diskeeper. And server sprawl and management, an says that the benefits of defrag- Processor’s in-depth coverage of organization must have a manage- is bound to appeal to any IT menting storage in a virtual setup virtualization a few months back ment framework and applications manager who works on a budget. are minimal, even though virtual- (see the “Where To Find More” in place if it wants its solution to ization has the potential to cause sidebar for more information) work, Haff says. When these solu- greater disk fragmentation. illustrates that SMEs have as tions falter, “it’s not a failure of facile and straightforward, but physical server. If you don’t know “The problem is that CPU and much to gain, or more, by incor- virtualization per se but a failure there are no shortcuts or silver or understand licenses, you might memory are so much faster than porating virtualization technology to understand components of vir- bullets out there.” be putting four instances on four disks that optimizing disk speed is into their networks. tualization and what it can and physical servers instead—and be like a drop in the proverbial lake,” At the same time, “virtualization cannot do.” Configuration Basics paying for it,” DiDio cautions. Haff says. “As a last tweak, opti- doesn’t solve the world’s prob- Most important perhaps is the First off, make sure your physi- “The problem is that people mization sometimes makes cost- lems,” says Illuminata senior ana- understanding that server virtual- cal components are compatible who negotiate the licensing con- effective sense, but it is not a lyst Gordon Haff. “It’s like any ization is a component of vir- and robust enough to handle your tracts are usually not the same problem standing in the way of technology. There aren’t pitfalls tualization taken as a whole, Haff virtualization needs. In other people who use them. You have adopting virtualization.” P words, make sure you’re using to get your organization working approved memory and drivers and in tandem,” DiDio says. Watch Out For check with your vendor about the SPONSORED LINKS The Fragging Question minimum and recommended hard- Acopia Networks Adaptive These Configuration Issues ware requirements for the virtual Another issue facing those set- Resource Switch servers you are planning to set up. ting up virtual servers is the High-performance file virtualization According to Michael Materie of Diskeeper, here are some configuration “You wouldn’t put a 500-pound increasing disparity between switches that simplify the manage- issues to avoid: ment of file storage resources and man on a Shetland pony, and you high-performing CPU and memo- provide data management services • Certain technologies don’t emulate well. Virtual video cards, for example, can’t put four virtual [Microsoft] ry chips and storage. Accord- www.Processor.com/Acopia will not have the functionality of their physical counterparts—and hardware SQL Servers on a one-processor ing to Diskeeper’s Materie, the support won’t translate over to the virtual counterpart. or two-processor physical server,” fastest hard drives available in Altiris Software DiDio says. the mainstream marketplace run Virtualization Solution Lets you instantly activate, deacti- • In host/guest virtualization setups, the host machine views both the user Haff agrees that monitoring the at 15,000rpm. In contrast, CPUs mode and kernel mode in the guest virtual machine as an application; vate, or reset applications and load placed on your physical and memory are measured in avoid conflicts between applications therefore, kernel stuff on the virtual machine becomes user-level stuff, servers is essential. “If you install nanoseconds. www.Processor.com/Altiris8 which could lead to havoc if it’s fiddled with. A newer, specialized software too many applications using virtu- According to Materie, server architecture called hypervisor, which will be available for Windows Vista alization, you may need more administrators need to look for VirtualIron Software Enterprise-class software solutions Server (it’s already being used on Unix-flavored machines), circumvents resources because even if [the ways to make the slowest compo- this problem. for creating and managing virtual physical server’s] CPU is being nent in the network as fast as pos- infrastructure • Don’t overvirtualize your system. Now that your CPU power is being utilized underutilized, your memory may sible to alleviate bottlenecks. www.Processor.com/VirtualIron more effectively, make sure you have enough memory to run your applica- not be running these virtual SMEs can strive for relative parity VMware VirtualCenter tions and get the fastest storage setup you can afford. machines, and you may need by employing high-performance Provision, monitor, and manage more resources,” he says. hard drive setups. SANs have • At the same time, never get in a situation where you overtax your CPU. your virtualized IT environment DiDio adds that running an dropped significantly in price through a single interface “That’s not a pitfall. That’s just the wrong decision, period,” Materie says. SME makes it particularly impor- over the last several years, mak- www.Processor.com/Virtual tant to get these things right ing them affordable for SMEs.

Storage Component Thin Client Workstation www.Processor.com/areca www.Processor.com/Axel www.Processor.com/Arbor2

The 1st SATA RAID 5 Hot-swap Midtower Chassis in the World!

• Dual Intel Xeon proces- sors up to 3.06GHz • Super X5DAL-TG2 server board/533FSB • Up to 8GB ECC Reg. PCI-Express SATA II 3Gb/s RAID Controller AX3000 - Thin Client Terminal DDR 266 SDRAM Featuring RAID 6 and also 0, 1, 0+1, 3, 5 and JBOD • Allows direct Telnet and TCP/IP connections • 1 8 x AGP Pro 1.5V slot 4, 8, 12, 16, 24ports, Intel I/O Processor, DDR Memory • Emulation for 5250, 3270, Unix, Embedded native client for • 2 64-bit PCI/X 66/133, 2 Online RAID Level/Stripe Size migrations, Online RAID RDP and ICA 32-bit PCI Capacity expansion and RAID level migration simultane- • Optimized Electronics, No OS, No Local Admin necessary • Dual Gigabit LAN Ports ously, NCQ and Staggered Spin-up Support, Battery • Multiple Independent Sessions, 100% Virus immunity • 12” x 9.8” ATX form factor Backup ready, I2C, Full OS Support. • Visit www.Processor.com/Axel or call for a free demo unit

2861 Saturn St. Unit B Brea, CA 92821 28944 State Road 54 Phone: (714) 961-0800 Wesley Chapel, FL 33543 Fax: (714) 961-0899 Phone: (813) 307-0111 2032 Bering Dr. San Jose, CA 95131 Phone: (408) 452-8900 Fax: (408) 452-8909 Page 30 Processor.com July 28, 2006 on the central management consoles shows the status of the network and application infrastructure through various reports. Application monitoring solutions from Keep An Eye On vendors such as Microsoft, Attachmate (for- merly NetIQ), and Network Physics include a customizable set of alerts that can traffic alerts to the appropriate data center staff for resolution. Deviations in the normal applica- Your Applications tion traffic ebb and flow trigger alerts. The application monitoring tool can send alerts Maintain Satisfactory Customer Experience SME can help quell the inevitable finger- via email, SMS, or IM, depending on the pointing that can happen in IT groups during software’s feature set. When shopping for Through Application Monitoring postmortem sessions after a failure. application monitoring software, it’s im- Kobielus also points out the important portant to put configurable alerts as a re- by Will Kelly because you run your business on applica- assets of application monitoring, including quirement because it makes mobilizing the • • • tions,” he says. the maintenance of 7x24 operations, audit appropriate staff to an application issue much APPLICATION MONITORING of your network “Application monitoring also shows your trails (changes, user access), and legal reason easier. For example, if the application moni- infrastructure via automated hardware and customers, investors, and partners industry for compliancy programs such as Sarbanes- toring tool detects server issues, it notifies the software monitoring tools is integral for best practices,” says Kobielus. As much as Oxley and HIPAA (two programs requiring server team to resolve the issue; if it detects maintaining customer satisfaction as they application monitoring can support the cus- application monitoring of user accesses and network issues, it alerts the network team. interact with your SME’s online systems. tomer experience, it can also help monitor events to maintain compliancy). As the Web has become a preferred appli- Scott Safe, vice president of marketing for your applications to see they meet SLAs cations platform, many application monitor- Network Physics, makers of the NP-2000 (service level agreements) you may have in Inside Application Monitoring ing tools are rising to the challenge to include NetSensory Enterprise network application place with customers, making it good for Application monitoring occurs two ways. the monitoring of SOA (service-oriented management appliance, sees the rise of appli- business on multiple fronts. The first is nonserver, typically integrated architecture) and end-to-end monitoring of cation monitoring in the small to medium- Application monitoring tools enable your into the application software, with the system distributed applications. P sized enterprise space driven by the prolif- data center team to better serve internal and monitoring application availability and disk eration of the Web into extranets that tie external customers because your team can be space. Depending on the application, there together partners, customers, and buyers. proactive and armed with real-time alert might be an automated alerting capability. SPONSORED LINKS “Monitoring performance for satisfactory information, so they can hone in and perform Second, the requirement for application AdventNet ManageEngine OpManager customer experience enables you to fix any appropriate remediation within your applica- monitoring has also led to the rise of third- Offers combined WAN, server, and applications issues before you lose customers,” says Safe. tion environment. An application and net- party application monitoring suites that mon- monitoring with integrated help desk, asset man- work infrastructure monitored by an applica- itor “the customer experience,” including agement, and WAN traffic analysis functionality The Importance Of Application Monitoring tion monitoring tool can spare the data center transactions over the Internet between the www.Processor.com/AdventNet13 James Kobielus, principal analyst of data team from being reactive to network/applica- user (customer or partner) and your appli- Certeon S-Series management for Current Analysis, a tech- tion infrastructure issues, freeing them up for cation infrastructure. Typically, such ap- Helps increase the speed, security, and scal- nology analyst firm, sees application moni- other important business-critical tasks. plication monitoring solutions are hardware ability of mission-critical WAN-based applications toring as a subset of application manage- Network Physics’ Safe says that applica- appliances running hardware agents, soft- www.Processor.com/Certeon ment important to providing management a tion monitoring has business relevance ware agents, and sniffer software to monitor Cesura Business Certainty view into an application infrastructure’s because of the importance of maintaining a network traffic. All the application monitor- Helps your IT organization ensure an end-user performance, security, and environment. satisfactory customer experience. The intro- ing data is available from a central manage- performance problem never gets a chance to “Application monitoring is important duction of application monitoring into your ment console. The real-time data appearing escalate to impact your business www.Processor.com/Cesura2

Gigamon GigaVUE-MP Out-of-Band Application Monitoring Tools Data-Access Solution Provides dynamic connectivity for out-of-band monitoring tools such as IDS, sniffers, and Product Features Price URL application monitors www.Processor.com/Gigamon Attachmate • Real-time diagnostics Not available www.attachmate.com Lantronix SecureLinx Management Appliance (formerly NetIQ) • Advanced analysis and reporting A master control center that seamlessly inte- AppManager • Automated Workload Capacity Management across Windows, grates equipment connected by console Suite Unix, and Linux systems servers, KVMs, and remote power managers www.Processor.com/Lantronix1 Microsoft • End-to-end service monitoring integrates applications, infra- $6,099 with 10 Operations www.microsoft.com/mom Operations structure, and end-user perspective monitoring Management Licenses; NetQos SuperAgent Manager 2005 • Monitors health of IT services and applications pricing varies for MOM Tracks and measures user response time without desktop or server agents • Improves operational efficiency of managing IT environments 2005 with SQL Server www.Processor.com/NetQos 2005 Technology Network Physics NP-2000 Network Physics • Problem Management Dashboard that automatically baselines, Starts at $9,995 www.networkphysics.com NetSensory Enterprise NP-2000 sets thresholds, and correlates Report performance for key business functions, NetSensory • Application Performance Troubleshooting that breaks down sites, and services and prioritize troubleshooting www.Processor.com/NP-2000 Enterprise end-to-end response time to server, connection, network, retransmission, and round-trip time components Northwest Performance Software • Planning and SLA Analysis, including creating customized SLA NetScanTools Pro thresholds based on any combination of metrics An integrated collection of Internet information- gathering utilities for Windows Webmetrics • Customized monitors providing real-time, multi-POP monitor- Standard: $330 per month; www.webmetrics.com www.Processor.com/NWPSW AppMonitor ing, as well as real-time alerting Gold: $480 per month; Packeteer iShare • External Web performance monitoring and uptime verification Full-Page Standard: $600 An intelligent overlay between business front- from up to 32 monitoring agents worldwide per month; Full-Page Gold: lines and IP networks, Packeteer appliances • Central management via a Web-based control panel for hosted $750 per month scale to deliver optimal WAN application service management, problem diagnosis, and report generation performance at every location www.Processor.com/Packeteer

successful planning, it’s not nificantly improved your compa- uncommon for an enterprise to be ny’s ability to withstand a disaster. Plan For The Unthinkable unable to fund all the DR solu- Continued from Page 28 processes, and investigated poten- process. By doing so, you can tions and initiatives to meet the Rapid Comeback your guideposts, be aware that the tial solutions, it’s time to make a expose the financial risk for fail- initially defined objectives. This Or Major Setback DR planning process will often business case for addressing the ing to meet one of the previously shouldn’t dishearten you, nor A sound DR plan provides reveal poorly considered objec- risk. If this is the first time your defined SLAs. As you might sus- keep you from attempting to miti- immense value for any size enter- tives, as well as problems and enterprise has conducted a DR pect, your finance department will gate the risks. Instead, use your prise. With the appropriate buy-in threats that were either ignored or planning exercise, you’ll need to be invaluable in developing the DR plan as a tool to continually from all parties, it can help during unknown during that phase of be aware of sticker shock. Mit- business case. Of course, we minimize the risk over time. a crisis, as well as in planning for planning. Whenever you uncover igating risk is never cheap; how- know that they’ve been involved When the gap between financial future risk remediation. When a potential change to your objec- ever, like insurance, you’ll be with the DR planning from the resources and the risks exposed is viewed as a valuable asset instead tives, be sure to walk through the glad you have it when you need it. start, right? high, prioritize each risk and set a of a necessary evil, a DR plan is previous steps for the objective. The key to making a successful realistic timetable for addressing an easy-to-keep-current, compre- Develop business justification. business case for your DR plan is Risk Remediation the risk. It may take two to five hensive snapshot of your compa- Now that you’ve defined your by using the metrics you’ve creat- Despite all the buy-in, inter- years to mitigate the most serious ny’s vital technology and business objectives, identified your critical ed to assign a dollar value to each departmental cooperation, and risks, but each year you’ll have sig- processes. P July 28, 2006 Processor.com Page 31 WHAT’S HAPPENING

Technology) and ISO (International troublesome is the unhappy Unix systems Standards Organization) requirements for administrator who has the root or “super internal IT controls to shape their own user” password and can inflict the most dam- requirements. Libenson says organizations age to the organization. Wolves that deploy products that satisfy require- Symark specializes in helping companies ments outlined by COBIT and ISO can help protect themselves against internal threats solve two problems at once. to IT systems and data breaches by so- Libenson comments on the current state called “trusted users.” Symark’s products of the IAM industry, “The two major busi- focus on protecting heterogeneous IT orga- In Sheep’s ness drivers that have made IAM a ‘must- nizations at the systems level by plugging have’ technology are regulatory compli- inherent security weaknesses in the operat- ance and the need for better data security. ing systems themselves, which can be The number of vendors in the IAM space exploited by hackers or rogue employees. mushroomed since it became clear that The policy language that Symark provides compliance regulations did not only require with its PowerBroker and PowerPassword Clothing financial controls but also internal IT con- solutions is a programming language in trols for all the systems that contribute data itself. Libenson says it provides users with Identity & Access Management to financial documents, statements, and the granularity they need to properly manage reports.” She says many big players entered delegation of root privileges, management of Should Not Be Ignored In The Data Center this market via acquisitions. There have systems access control, and user provision- also been some new, smaller entrants in the ing. “The policy language is rich and can by Chris A. MacKinnon supply-chain applications on Unix or Linux last four years. Symark has been providing create filters that granularly define command • • • boxes. To address the security concerns best-of-breed client-server security solu- arguments, command names, host names, WE WOULD ALL LIKE to trust our employees associated with this type of infrastructure, tions for IAM since 1995. and usernames. That same policy language and coworkers, but according to Ellen the company supports more than 31 versions has detailed mechanisms for defining Libenson, vice president of product man- of Unix and Linux. Libenson says, “Many rules for various types of access.” agement at Symark Software (www.symark industries have seen a large number of merg- Additionally, Symark’s products .com), a maker of identity and access man- ers in the past eight to 10 years, increasing support accountability requirements agement solutions for heterogeneous IT the number of heterogeneous IT environ- by logging keystrokes, user logins, environments, oftentimes they are the per- ments across all sectors. For example, one According to Libenson, larger firms offer password events, and login failures. This petrators on the network. Libenson knows company may use Sun’s product, while large solution suites, and smaller firms provides a complete log of all sessions, that there is enough evidence to make enter- another may use a mix of HP and SUSE.” offer identity management applications including an indelible audit trail of all user prises think twice about the freedom that When combined, these companies could with focus on the Microsoft environment requests. Libenson notes, “Symark’s solu- they are giving their employees. potentially have more than 4,000 Unix/ that center on password management and tions are granular, thorough, and non-intru- According to a recent study conducted by Linux servers with up to 20 different ver- user provisioning, single sign-on, and self- sive, and they fix the inherent security the U.S. Secret Service and Carnegie sions of Unix running on them. And they all service password management tools. She flaws in operating system without altering Mellon University (“Insider Threat Study: must be centrally managed. Libenson says notes, “Many newcomers tend to put the the operating system itself.” Computer System Sabotage in Critical to handle this vast network, one of these Microsoft platform first and neglect The fact that Symark’s solutions do not Infrastructure Sectors”), so-called “trusted companies might have 200 or more systems Unix/Linux and legacy platforms due to the touch the operating system kernel makes users” are responsible for a large number of administrators, all of whom have privileged sheer number of Microsoft servers in the them unique in the IAM space. Libenson sabotage attacks and unauthorized access of access and are managing privileged ac- corporate environment of the Global 2000.” says some competing products use a “main- proprietary information. According to the counts. “Within this type of scenario, a frame” approach, affecting the kernel and study, “the majority of insiders who perpe- secure access control infrastructure must be The Symark Way altering the operating system. Symark does trated sabotage or theft were granted sys- put in place that will pass a compliance So why should data centers be interested in not consider this to be a practical approach tem administrator or privileged access audit and prevent a security breach.” Symark’s approach to IAM? The company in many large organizations, as it often when hired. Destructive acts by insiders Libenson says pressure is coming down provides solutions to help organizations requires a long, costly, and painful de- caused organizations financial losses, nega- from the board level to the IT department. authenticate and authorize both end users and ployment. Libenson says, “When running tive impacts to their business operations mission-critical applications on thousands and damage to their reputations.” of servers, companies know there is never The fact that Symark’s solutions do not any good time to shut them down for a What’s Happening reboot. Symark’s solutions require no ker- In today’s IAM (identity and access man- touch the operating system kernel makes nel modifications, binary replacements, or agement) industry, Libenson says there is system reboots.” little doubt that security and compliance them unique in the IAM space. Symark has a new product on the hori- now go hand-in-hand. Achieving compli- zon that is scheduled to be available this ance and improving data security in the Fortunately, there are a number of com- systems administrators who often have privi- fall. This new product will further assist growing heterogeneous IT environment, monalities in many of the security and leged and unmonitored access to all systems organizations with heterogeneous environ- however, is a challenge. compliance requirements, and many rely on the network. Libenson says the finance ments to improve authorization, authenti- Symark says most Global 2000 organiza- on direction from the COBIT (Control manager who keeps forgetting his password cation, and administration across many tions still run mission-critical financial and Objectives for Information and Related may be a slight cause for concern, but more more platforms. P TWO TERMS Next Week In Processor . . . for Enterprises and Professionals, while McAfee offers its E- ❙ PGP (Pretty Good Privacy) Business Server and E-Business Client. Coming In Our August 4 Issue: What it is: A protocol used for en- ❙ With so many tasks on your agenda, crypting messages developed by Phil Blowfish (Blowfish Encryption Algorithm) hardware maintenance and upkeep is Zimmermann and made available online What it is: Developed by Bruce Schneier, a leading cryptologist often relegated to the back burner. in 1991. The software, which was distributed and founder of Counterpane Internet Security, Blowfish is a sym- That’s why we’ve compiled simple, freely, is widely used by Internet users to encrypt email metric block cipher that uses a variable length (32 to 448 bits) key. effective tips and expert advice for top transmissions sent over the Internet. PGP is an imple- Blowfish is open-source code, so anyone can use it without having data center products, covering what mentation of an asymmetric key encryption algorithm, which to obtain and pay for a license. Thus, it is a good alternative for needs to be done, when it needs to be uses a public and private key to establish the encryption people seeking a strong encryption algorithm at minimal cost. done, and how often. between messages. Why you should care: The key fact about Blowfish is that the You’ll also find: Why you should care: In the digital age, protecting the integri- technology is freely available for use by anyone without incur- • New trends in disaster recovery ty of digital information is critical, especially in a business ring licensing costs. So, Blowfish is yet another tool you can use • A look at how flat file systems could world where so much is done via email, and messages may con- in your quest to secure your information without breaking your change your storage plans tain mission-critical information. PGP is but one method—albeit budget. Unlike privately developed algorithms, Blowfish’s • Tips for better backup free—that can be used to provide security for your email trans- availability in the public domain means the algorithm undergoes • A book review on Susan Snedaker and missions. Sure, there are many private encryption algorithms out frequent testing by researchers trying to break it. Russ Rogers’ “Syngress IT Security there, but one advantage of PGP is that it’s been in the public Project Management Handbook” domain for so long that the protocol is very much battle tested. Related products and manufacturers: According to Bruce Schneier’s Web site (www.schneier.com), more than 150 products Related products and manufacturers: PGP offers PGP use Blowfish. Examples include the Linux 2.5.47 kernel, Novell’s Be sure to visit Processor.com to find each week’s Universal 2.0, PGP Desktop 9.0, PGP Encryption Platform, PGP iFolder, and F-Secure VPN+. The algorithm is available for down- issue online. You can view issues as a PDF or search Universal Series 100/200/500, and PGP Whole Disk Encryption load for various languages, including Java, Visual Basic, and C++. our article database for the information you need. Page 32 Processor.com July 28, 2006 Manufacturer Presentation Manufacturer Presentation End Nodes - Printer Advertisement End Nodes - Storage Advertisement

High-Definition Line Matrix Printer For iStor GigaStorATXTM GigaStorATX is the Newest Generation iSCSI RAID Controller, providing the very Windows-Based Applications best price/performance ratio and most feature-rich integrated iSCSI storage controller The new P7000HD Series prints True TypeTM solution available in the marketplace. iStor Networks offers the GigaStorATX in a fonts, logos, and bar codes accurately, giving multiple port 1GbE and a single port 10GbE version. Both products are designed to users a cost-effective and highly reliable conform to industry-standard ATX form factor specifications, allowing use of off-the- alternative to the laser printing of reports, shelf PC Server and Storage chasses. The GigaStorATX allows OEMs, VARs, and bills of laden, forms, and labels. System Integrators to offer competitively priced, performance orientated storage sub- systems with an integrated storage firmware stack, lowering the cost of overall Created as a cost-effective alternative to maintenance, providing greater ROI and increased customer satisfaction. WindowsTM-based laser printing applications, the new P7000HD series is optimized for • RAID Levels 0,1,10 & Parity graphics printing demanding the highest • One 10GbE XFP pluggable iSCSI port (10GbE) reliability. It is the only line-matrix printer • Up to eight GbE iSCSI ports (GbE) available in the market today that can • Persistent and Adaptive Cache Management operate seamlessly in a Windows environ- • Up to 4GB Standard ECC DDR SDRAM with ment and emulate all of the fine details 72-hour Battery Backup required for TrueType fonts, fine print, logos, and bar codes. • VLAN-based Zoning • Volume Virtualization Printronix designed the P7000HD for applications typically found in manufacturing, • Link Aggregation, Multipathing, and Load banking, distribution, and transportation environments, such as the printing of Balancing reports, bills of laden, multipart forms and bar-code labels. The P7000HD features • Support for up to 16 SATA devices 11-mil (0.28mm), fine-point hammer tips that print at least 180 x 180 dots per inch • IP SAN Device Manager (dpi). This resolution rivals the print quality of laser printers at a fraction of the operat- • Event notification via SMTP mail ing cost. • Enclosure Management Services (Chassis dependent) • RAID level migration • High-Definition print image – 180 x 180 dpi and fine tip hammers • Online capacity expansion • High quality rendering of complex fonts, small point sizes, lines, logos, bar • SMI-S Support codes, and PDF files • Support of Windows, RedHat, SuSe, and MacOS • Direct drop-in replacement for Windows-driven laser printers • Many more features—ask your iStor Sales Representative for the detailed list • P7000 Ultra Capacity HD ribbon – Extra long life with darker sharper print • Integrated Print Management – total visibility and control of image quality GigaStorATX eliminates the need for Server or Motherboard Technology. The tech- and consumables nologies from iStor Networks offer a complete iSCSI storage system-on-a-chip, cou- • Low cost of operation – typically 10x lower than laser or serial matrix pled with an integrated storage virtualization firmware stack and SMI-S-compliant • Forms flexibility – straight paper path and heavy-duty pulling power management suite. • Super rugged design holds up to abuse and harsh environments • 100% duty cycle – designed for relentless printing Product Flexibility, Superior Price, and Best-in-class Performance with up • Whisper quiet operation – models range from 55 dBA, which is less than to1,160MBps cache read performance for faster business continuity and disaster an office laser recovery applications. • Pedestal, quiet cabinet, and zero tear models available Available Now For more information: (800) 665-6210 www.Processor.com/iStor or learn more at or call www.Processor.com/Print 949-753-8999

Manufacturer Presentation Manufacturer Presentation End Nodes - Storage Advertisement End Nodes - Storage Advertisement Encrypt The Data On Your Business Continuity Appliance Backup Tapes With Paranoia2

Backup encryption and data encryption are undoubtedly required to comply with Sarbanes-Oxley, HIPAA, and other govern- ment-imposed security regulations. Most companies haven't taken backup encryption into consideration and have only secured their data on their systems from theft or misuse via access controls, firewalls, and specialty software. Few have taken into account the repercussions of a lost or stolen tape backup. Once your data is written to tape, it’s completely unprotected. There are no access controls, passwords, or audit trails tied to this data. So without a tape backup encryption solution, all security efforts made thus far are useless. This is why a tape backup encryption solution is necessary.

Your tape backup data is your most critical asset and its potential value for abuse by STORServer Business Continuity Appliances are a suite of fully integrated data people outside of your organization is enormous. It’s easy to take your unencrypted protection solutions for backup, archive, disaster recovery, and lifecycle backup from your backup tapes and read it on any drive, unless tape backup encryp- management. Each turnkey appliance includes matched and certified hardware tion was used. Tape backup encryption is your primary defense for safeguarding tape and preconfigured heterogeneous software for easy-to-use, policy-driven, backups. If you are worried about data protection, disaster recovery, and compliance, comprehensive data protection. you need Paranoia2. STORServer EZ Backup is the latest addition to the STORServer Appliance suite. EZ Paranoia2 is the simplest, most cost-effective and easy-to-deploy tape encryption Backup Appliances offer the same functionality as the Business Continuity Appliance (backup encryption) solution available. The Paranoia2 backup tape encryption solu- suite but are built exclusively with IBM components. EZ Backup also offers an entry- tion is available as an external encryption device or as a complete private key secure level solution built on IBM Express. backup encryption subsystem. Paranoia2 uses strong encryption protocol, dual DES3, to protect your data (or 11 other different levels). Encrypted tapes can only be Built for small and medium-sized businesses (SMBs), STORServer Appliances are read by another Paranoia unit with the correct user and hardware private key. scalable, enterprise-wide solutions that support most popular platforms, including Paranoia2 is an external on-the-fly tape backup encryption appliance, sitting between database, email, OS, NAS, SAN, LAN, WAN, and mobile, with just one point of con- the data path and tape storage device. It's transparent to the operating system and tact for warranty and support. the built-in precompression ensures encryption without performance degradation and will in many cases increase your transfer speed and shorten your backup window (up All STORServer appliances are delivered production ready, with everything you need to 68MBps sustained encryption rate). It’s an inline tape backup encryption hardware to begin installing clients right out of the box. Typical client installations are deployed unit that requires no system or software changes and can be used on both stand- within 48 hours. alone and library tape drives.

For a 7-Day Evaluation Unit, www.Processor.com/STORServer Visit www.Processor.com/Midland or Call (888) 682-5335

24 Alta Loma Drive Pueblo, CO 81005 Phone: (719)266-8777 Toll Free: (877) 585-2422 July 28, 2006 Processor.com Page 33 Manufacturer Presentation Manufacturer Presentation End Nodes - Storage Advertisement End Nodes - Printer Advertisement Effortless Backup & Recovery Appliance Multifunction Printer

For users who are interested in purchasing a new MFP but also have extensive finishing requirements, Lexmark offers the new Lexmark X646ef laser printer bundle, which includes the new 4600 scanner, a T644dtn laser printer, and finishing capabilities such as stapling and sorting at an estimated street price of $4,449.

The Lexmark X646ef is the first MFP in its class to feature a standard scan preview function to allow users to view a scanned document before it is processed. It is also the first MFP in its class to feature a USB port to allow users to scan to or print PDFs and images from a USB flash storage device directly from the operating panel. The Lexmark X646ef is the only MFP in its class with a color touchscreen interface and offers the fastest print speed in its class at up to 50ppm. Breece Hill’s BizGuardian™ delivers an automated, highly reliable networked data protection solution for small to medium-sized businesses and departments of distrib- uted enterprises. The new appliance integrates EMC Retrospect backup and recov- ery software with the speed of disk and the portability of tape, providing protection for more servers in less time.

BizGuardian is the only disk-to-disk-to-tape (D2D2T) appliance that fully integrates hardware and software into an easy to own, operate, and manage package.

Easiest to own – Get best-practice backup and recovery strategies out-of-the-box. Backup operations are automatically adjusted without the need for manual intervention; desktops and notebooks are automatically backed up when logged on to the network; and AES-encrypted tapes are created for safe offsite storage. Maintain continuous data protection with built-in disaster recovery (DR) using bare metal restore standards.

Easiest to operate – Eliminate the need for 50 full backups each year. Unlike other backup applications, you’ll get fast backups and unparalleled restore accuracy. Other backup applications can only provide this level of restore accuracy to the day a full backup was performed.

Easiest to manage – No more complex strategies to protect against backup media failure or site-wide disasters. Eliminate complex tape rotation. Create two sets of tapes, one onsite for backup and restores, the other offsite for safety. Rotating 800-LEXMARK tapes is vastly simplified with BizGuardian. www.Processor.com/BreeceHill8 www.Processor.com/Lexmark Breece Hill LLC 246 South Taylor Ave Louisville, CO 80027 740 New Circle Road NW Toll-Free: (800) 941-0550 Lexington, KY 40550

Manufacturer Presentation End Nodes- Server Appliance Advertisement Mail Foundry 1150 - Antispam Appliance Designed For The SME The MailFoundry 1150 antispam appliance blocks 100% of tures in that they don’t rely on brute force checksums, hashes, known spam and viruses with the lowest false-positive rate in or lexical analysis but are based on repeatable message attrib- the industry of less than 1 in 1,000,000. MailFoundry has a utes used by particular spammers. team of human editors who create Spam Profiles around the clock, designed to block specific spam without creating false • For up to 150 users positives. These updates are automatically distributed to • MessageIQ antispam/antivirus engine MailFoundry appliances worldwide every five minutes and • Desktop or shelf-mount chassis immediately applied to defeat spam outbreaks as they happen. 12" (305mm) x 2.1" (54mm) x 11" (279mm) It not only fits on the shelf, it fits in the budget! • Outbound email scanning MailFoundry has developed its own filtering engine, known as • Easy-to-use Web admin interface www.Processor.com/Mail MessageIQ, which runs on a PC-like platform with a hardened • 90-day hardware warranty Linux OS. And while the entry-level 1150 is not designed for • M-F telephone support (7 a.m. to 8 p.m. CST) 1-888-302-6245 rack-mounting, it is compact enough to be unobtrusive. The MessageIQ engine is a multilayer filter, incorporating tradition- The MailFoundry 1150 is available for $799 with a yearly al techniques such as blocked senders, real-time blackhole subscription cost of $99 for up to 150 users and can be lists, and reverse DNS lookup and adds what MailFoundry ordered online at www.Processor.com/Mail or by calling terms spam profiles—custom-built, targeted message identi- 1-888-302-6245. fiers. These human-crafted profiles are similar to virus signa- Page 34 Processor.com July 28, 2006 Manufacturer Presentation Manufacturer Presentation Software - Network & Systems Mgmt. Advertisement Software - Messaging & Groupware Advertisement Access Tracking Manager For Your Essential Taceo™ 1.6.2 Combines Reporting Needs The Privacy Of Encryption

XTS Access Tracking Manager (ATM) is an off-the-shelf enterprise manage- With The Usage Control ment reporting and analysis product for Citrix Presentation Server Enterprise Edition. It’s perfect for quickly running reports on the wealth of data Citrix Of Access & Rights Management collects, including user, application, and server activity. Do this with little effort with our ATM, a product built based on feedback from the Citrix com- Taceo surrounds your sensitive data munity. ATM provides turnkey, comprehensive usage reporting for Citrix with the security of a confidential enve- environments. ATM is not another real-time monitoring product, but instead lope, ensuring that you maintain control a robust historical reporting and analysis product built on a business intelli- over who can access your shared infor- gence platform—no data collection agents or coding required. mation and how it may be used (prevent editing, copy, printing, forwarding, and Benefits: more). • Automatically schedule and distribute reports. • Make procurement and capacity planning decisions based on application Whether using the Outlook toolbar add- usage trends and server utilization. in or securing files from the Taceo appli- cation itself, protecting your sensitive • Provide business-friendly reports that will allow managers to track information has never been this easy. employee application usage. • With ATM’s scalable architecture you can run reports over unlimited Taceo is simple to install and use: time periods, such as for annual audits. • Usage controls prevent unauthorized • Verify security policies with session reporting down to the minute. access & use of sensitive information • Integrate with IT dashboards or central reporting data warehouses with • Encryption ensures your email can only XML integration. be read by your intended recipients • Adhere to compliance and governance with named-user application • Validates the sender as legitimate usage reports over any time period. • Enables HIPAA, Sarbanes-Oxley, and Gramm-Leach-Bliley compliance

Received email or documents protected with Taceo? New recipients follow a Find Out More Today! download link in the message body to register their free Taceo account, allowing (410) 382-8220 them to view protected content they receive at no charge. Simply use Taceo to open www.Processor.com/XTS any protected email—the sender can control how, when, and even how long an intended recipient has access. www.Processor.com/EssentialSecurity

11040 Main Street, Suite 100 Bellevue, WA 98004 Phone: (888) 454-2632 July 28, 2006 Processor.com Page 35 Manufacturer Presentation Manufacturer Presentation Software - Security Advertisement Software - Security Advertisement

ScriptLogic’s The CyberAngel® Security Software— Security Auditing Software: Encryption & Tracking “Hybrid”

Enterprise Security Reporter 3.0 The CyberAngel® Security Software is a unique “hybrid” solution for data protection and computer theft, combining Data Encryption, User Authentication, and Enterprise Security Reporter™ is an agent- Tracking/Recovery in a single and easily implemented solution. With strong industry- less, fast, comprehensive discovery and approved (and exportable) encryption, The CyberAngel® addresses Privacy Acts and reporting solution for analyzing file security, recent Security Breach Notification Laws, which have enormous notification and lia- group memberships and other security set- bility costs, not to mention the loss of customers. tings on Windows servers. Custom configured for each client, The CyberAngel® can be triggered by a two-factor Discover authentication or integrated with existing Windows or Novell passwords. If the Centrally audit security settings from Active authentication is violated, sensitive data and applications (such as a VPN) are Directory and Windows servers across your encrypted and hidden from the unauthorized user, communication ports are blocked, enterprise and a covert signal is sent to The CyberAngel® monitoring center. After capturing the location of the computer, we will immediately send a real-time notification to the reg- Report istered user or organization of the unauthorized attempt to access that computer. Reporting Console Utilize turnkey reports or create your own The CyberAngel® manages all technical support, password recovery, or anything with our intuitive Wizard-based report else the end user may need. Our cost-effective software is compatible with current designer to view the security configuration Windows operating systems, including Windows® 2000, Windows® XP (Home & of your Windows environment Pro), and Windows® XP Tablet. KEY FEATURES Analyze • Encryption of Sensitive Data and Applications Compare two discovery "snapshots" to • User Authentication (One or Two-Factor) detect changes in security that have • Asset/Hardware Tracking & Recovery (LAN, WAN, WiFi, DSL, Modem, Cable, etc.) occurred • Restriction of Unauthorized Remote Access

Notify INDUSTRY STATISTICS Schedule reports to be delivered via any • Over 57% of all network breaches are made from laptops. (FBI) • 1 out of 10 laptops will be stolen or lost each year. (Gartner Group) SMTP-based email system Discovery Console • 97% of stolen computers are never recovered. (FBI) • 32 States have passed the Security Breach Notification Law, which only applies to For a 30-day evaluation, visit www.Processor.com/ScriptLogic unencrypted information. • More than 32 million Americans have had sensitive personal data exposed over the past seven months and nearly 90 million since the ChoicePoint incident last year. • 20% of the customers who received a notification of a breach terminated the rela- tionship due to lack of trust. (Ponemon Study) • $14 million - Average cost per company with a data breach. (Ponemon)

www.Processor.com/CyberAngel Phone: (800) 501-4344 Fax: (615) 837-9175 www.Processor.com/ScriptLogic (561) 886-2400

Manufacturer Presentation Manufacturer Presentation Software - Data Replication Advertisement Software - Network & Systems Mgmt. Advertisement WANSync by XOsoft The WAN-based business continuity platform and data recovery software. Notification & Resolution For SMBs & The Enterprise Next-generation AlarmPoint is an enterprise-wide notification and event resolution platform that centralizes all system events and provides repeatable resolution processes. The AlarmPoint product suite is built to automate event resolution by managing the needs of today's mobile workforce. Designed to filter, suppress, and enrich important events, route those events to the right person on any communications device, WANSync, the definitive, WAN-based business continuity platform and data recovery and give the person the ability to software. This data protection solution provides companies with continuous business data solve, escalate, or enlist others flow and ensures seamless integrity, reliability, and redundancy of business-critical infor- to resolve, AlarmPoint bridges mation resources. WANSync comprises a comprehensive suite of general-purpose syn- the gap between business-criti- chronization and real-time data replication solutions, including: cal IT services and relevant human resources. WANSync Server—for server data replication and increased protection for application servers of any type, including open files and system settings. Powerful system flexibility and capabilities A set of dedicated WANSync solutions provide specific application servers with complete • Role-based Web user interface availability assurance. These business continuity solutions include: • Intelligent event management • Event assignment and WANSync Exchange—an application-aware high availability platform for Microsoft subscription Exchange, providing Exchange disaster recovery and Exchange replication. • AlarmPoint now on any OS WANSync SQL—the most comprehensive WAN-based disaster recovery platform for platform SQL databases, including SQL server replication and SQL data recovery capabilities. • Localized UI language options for 12 languages WANSync Oracle—a disaster recovery solution tailored to handle the specific nuances of Oracle replication and Oracle database disaster recovery. Discover the benefits of an easy-to-maintain event notification and resolution solution built for self-service automation.

• Contact and device management • Personnel and group scheduling • Acknowledgement from Web or any other device • Self-service event reporting For More Information: www.Processor.com/AlarmPoint Visit: www.Processor.com/XOsoft2 Pho: (925) 226-0300 Call: (781) 419-5200 Fax: (925) 226-0310 Page 36 Processor.com July 28, 2006 Manufacturer Presentation Manufacturer Presentation Software - Network & Systems Mgmt. Advertisement Software - Storage Advertisement

NetScanTools Pro is an ideal tool for the network security, administration, training, Internet forensics, and law Are backup and disaster recovery enforcement fields. worries keeping you up at night . . . NetScanTools Pro is an integrated collection of and your users down during the day? Internet information gath- TM ering utilities from StorageCraft ShadowProtect Server Edition will help end your backup headaches. Windows 2003/XP/2000. Research IP addresses, StorageCraft ShadowProtectTM creates an exact online backup of your entire system, hostnames, domain including the operating system, applications, configuration settings, and critical data, with zero downtime. ShadowProtectTM provides a simple view to restore or update names, email addresses, files and folders to your existing backup image files. Save backups to any disk URLs--automatically or device, including USB, FireWire, attached storage devices such as NAS and SAN, with manual tools. and any network location.

Multiple Solutions in One Package ShadowProtectTM Advantages: • Network Information Gathering, Reconnaissance and • Create online server backups with zero downtime Discovery • Reduce or eliminate backup windows • Security Testing: uses active and passive means to look • Restore files in minutes, not hours for networked devices, exposed open ports, and network • Reduce backup complexity while increasing backup reliability activity • Back up only changed data for minimal • Training: assists students in understanding various net- storage consumption work protocols, methods of remote information gathering, • Backup image consolidation for simple management and how networked devices expose information • Schedule full or incremental backups • Recover your servers remotely • Mount point-in-time backups for simple NetScanTools Pro Benefits file and folder recovery • Save time on gathering information • Update point-in-time backups • Remove the guesswork from Internet investigation • Bare-metal server recovery in minutes • Produce clear, concise result reports in multiple formats • Greatly enhances many commonly available network tools To find out how simple and reliable disaster recovery can be, visit: www.processor.com/storagecraft • Best Value at $249 U.S. List (Full Download or CD-ROM) and learn how StorageCraft ShadowProtectTM can help you sleep easier at night. For More Information (866) 882-3389 or StorageCraft Technology www.Processor.com/NWPSW 180 West Election Road, Suite 230 Draper, UT 84020 Free Demo Available!!! (800) 545-4700

Manufacturer Presentation Software - Physical Infrastructure Advertisement MGE Simplifies Asset Management & Supervision Of UPS Systems With New Enterprise Power Management Software MGE’s Enterprise Power Manager v2 can substantially lower special needs of complex three-phase power systems, with the costs for supervising single- and three-phase networked UPS ability to draw any type of power architecture, with multiple lev- systems compared to using major network management sys- els of redundancy, and view the actual power flows on the GUI. tem platforms. Enterprise Power Manager can carry out a scan for all the UPS systems from MGE, using both XML and SNMP Accessible from the Internet and any workstation using a stan- protocols. The open architecture of EPM enables the discovery dard Web browser, users can click a UPS in the presented dia- of UPSes from any other vendor supporting the standard UPS gram to obtain detailed information about the operating and management information base (MIB). It also discovers and configuration parameters in a dedicated window. Enterprise manages other critical power components, such as Power over Power Manager uses Secure Sockets Layer (SSL) encryption For more info, call: Ethernet (PoE) midspans, Intelligent Power Distribution Units along with several levels of passwords for complete security. In 800-523-0142 (PDUs), Source Transfer Switches (STS), and rack monitoring the event of a power emergency, alarms are centralized and systems to give administrators comprehensive control of their transmitted by email or through Short Message Service (SMS). www.Processor.com/MGE2 protected infrastructure. The systems’ real-time logging of events and operations helps users to conduct preventive maintenance of their various This new release of Enterprise Power Manager addresses the UPSes.

ERP Suite Monitoring Management Suite www.Processor.com/PlanView www.Processor.com/AdventNet15 www.Processor.com/TOWERSW

ManageEngine NetFlow Analyzer 5.5 EA (Early Access) TOWER Software, a leading enterprise con- Web-Based Simple Bandwidth Monitoring Tool tent management (ECM) provider, delivers NetFlow Analyzer 5.5 uses Cisco NetFlow data exported electronic document and records manage- from routing devices to analyze network traffic and report ment (EDRM) software solutions. The TRIM on bandwidth usage across the network. With instant real- Context® software solution is a single, inte- time bandwidth usage reports on top applications, conver- grated platform that manages business sations, and hosts using bandwidth; NetFlow Analyzer information through its complete lifecycle. gives valuable insight into bandwidth usage in your enter- prise without the complexity and expense involved in • Document Management PlanView Enterpise: A combination of enterprise software deploying hardware/software probes. • Email Management & best practices that enables you to make better decisions What’s New In Release 5.5 EA: • Process Management around strategies, projects, services, and applications. • Support for Cisco NBAR • Portfolio Management Solution • Scheduling Reports • Web Content Management (NEW!) • Delivers improved visibility and greater strategic alignment • Support for NetFlow V9 • Fewer reduncancies and increased efficiency • IP Address-Based Application Mapping Learn more by visiting www.Processor.com/TOWERSW • Ability to focus limited resources on higher-value work • Interface Grouping and ToS/TCP

8300 N. Mopac, Ste. 100 5200 Franklin Drive, Suite 115 12012 Sunset Hills Rd., Ste. 510 Austin, TX 78759 Pleasanton, CA 94588 Reston, VA 20190 Phone: (800) 856-8600 Phone: (888) 720-9500 Toll Free: (800) 255-9914 Fax: (512) 346-9180 Fax: (925) 924-9600 Phone: (703) 476-4203 July 28, 2006 Processor.com Page 37 Manufacturer Presentation Manufacturer Presentation Software - Security Advertisement Software - Storage Advertisement BitDefender 9 Professional Plus Addlogix SnapShot Now Includes Antispyware Protection! Disaster Recovery Software What is Addlogix SnapShot: BitDefender 9 Professional Plus inte- It is the most powerful and most grates antivirus, antispyware, firewall, and complete computer system and antispam modules into one comprehen- data maintenance software. It sive security package, tailored to meet the allows computer users to easily needs of computer users worldwide. and quickly fix their computer. It can recover lost and/or corrupt- Antivirus + Antispyware NEW! ed files or restore an entirely The mission of this module is to ensure crashed system to a stable detection and removal of all viruses and working state in seconds. spyware in the wild. BitDefender uses robust scan engines, certified by ICSA How it Works: Addlogix Labs, Virus Bulletin, Checkmark, SnapShot allows users to cre- CheckVir, and TÜV. ate "snapshots" (maps of the hard disk sectors and the maps' indexing system) of the computer system and data at different times. Users can then select a specific snap- Firewall shot to recover files or restore the entire system to. Theoretically, Addlogix SnapShot The firewall module protects your data only takes 0.07% total hard disk space to create all the snapshots. However, each and your privacy by filtering the incoming snapshot might contain different amount of user data; therefore each snapshot size and outgoing traffic, controlling cookies, might differ. and blocking malicious scripts and "XXX- dialer" type programs. Selective Data Recovery: Addlogix SnapShot offers a unique feature that allows users to preserve or transfer files and data in the current snapshot to another snap- Antispam shot during a restore process, and therefore not lose any data during the process. Quite simply put, the BitDefender For example, users can create a snapshot of the current system before restoring to a Antispam module deals with the problem selected snapshot. Or users can restore the system with the Advanced Data of spam so you don't have to. Synchronization option, which allows users to manually select the files they want to be transferred to the restored snapshot.

• Recover deleted, corrupted files • Restore an earlier version of a file • Restore the entire system to a clean state after virus attacks • Restore crashed system to working state • Reset publicly shared system to clean, preconfigured states after each session • Remove unwanted software installations • Back out a failed software deployment process • Fix daily user or program problems • Try out software products before actual deployments www.Processor.com/BitDefender • Complete removal of Trojan Horse or spyware (954) 776-6262 800-344-6921 Download Demo Software at www.Processor.com/Addlogix4

Manufacturer Presentation Software - Network & Systems Mgmt. Advertisement

Altiris® Software Virtualization Solution™ STOP WORRYING ABOUT .DLL CONFLICTS Altiris® Software Virtualization Solution™ is a Software Virtualization Solution ensures applications use correct revolutionary approach to software management. files and Registry settings, without modifying the OS and without By placing applications and data into managed interfering with other applications. This software management units called Virtual Software Packages, Software solution allows you to host multiple versions of an application on Virtualization Solution allows you to instantly acti- the same system without conflicts between older and newer vate, deactivate, or reset applications and to avoid conflicts files. And you can easily activate or deactivate your applications between applications, without altering the base Windows instal- based on need by sending a single command to the client sys- lation. Get more information about how Software Virtualization tems. Solution can impact your organization. Get access to Altiris® Try Software Virtualization Solution Juice™, the exciting new site packed with SVS articles, tips, and FREE for 120 DAYS! Software Virtualization Solution integrates with the Altiris service tools. oriented management platform, so you benefit from native inte- Get your free 120-day, fully func- gration with Altiris' award-winning service, asset, and systems • Eliminate application conflicts tional evaluation copy at management solutions. EMA makes it easy to extend capabili- • Instantly repair damaged applications www.Processor.com/Altiris8 ties as your business grows and your business needs change. • Significantly reduce testing time for application rollouts • On-demand application provisioning 888-252-5551

Virtualization Wireless Management www.Processor.com/virtualiron www.Processor.com/AdventNet17

Enterprise-Class Software Solutions for Creating and ManageEngine WiFi Manager 4.5 - Integrated Wireless Managing Virtual Infrastructure LAN Management & Security Software • Consolidate Linux and Windows servers • Enterprise Edition-Support for Large Scale Wireless LAN • Rapidly provision and speed application deployments • Supports More Than 80 Models of Access Points • Provide efficient high availability and disaster recovery • Fault Management Capabilities • Leverage sophisticated policy-based management • Rogue AP Detection and Blocking • Preserve investments in existing OSes and applications • Configuration of Access Points (Bulk &Template-Based)

900 Chelmsford St Tower 1 Floor 2 5200 Franklin Drive, Suite 115 Lowell, MA 01851 Pleasanton, CA 94588 Phone: (978) 849-1200 Phone: (888) 720-9500 Fax: (978) 849-1299 Fax: (925) 924-9600 Page 38 Processor.com July 28, 2006 Manufacturer Presentation Software - Network & Systems Mgmt. Advertisement

Breakthrough Technology: Maximum System Performance – Automatically

It’s a known fact fragmentation cuts • NEW! Enhanced I/O Smart™ directly across the integrity of your intelligently provides transparent systems causing crashes, slowdowns, defragmentation ensuring uninterrupted freeze-ups and even total system failures. system operation.

NEW Diskeeper 10 provides • EXCLUSIVE! “Set It and new adaptive technology Forget It” scheduling designed to wring every last includes SmartScheduling™ drop of performance out of for fully customized and every computer on your automatic defragmentation network. based on individual usage patterns. No more complaints from users waiting 50 seconds • NEW! Enhanced user opening a Word document, interface provides easy 45 seconds saving a file or 70 configuration and scheduling seconds searching for one. as well as reports on disk health, real-time performance With Diskeeper’s advanced and fragmentation statistics. automatic “Set It and Forget It”® technology, peak performance is • NEW! Native 64-bit operating maintained – automatically! systems support. Every system on your network needs Diskeeper 10 Diskeeper, The Number One Automatic “Set It and Forget It” Features Defragmenter with over 17 million • NEW! I-FAAST™ (Intelligent File licenses sold! Access Acceleration Sequencing Volume licensing and Government/ Technology), breakthrough disk Education discounts are available from performance calibration technology that your favorite reseller or call boosts access speeds for the most 800-829-6468 code 4346 commonly accessed files. • NEW! Terabyte Volume Engine™ SPECIAL OFFER defrags large volumes, SANs, RAIDs TRY NEW DISKEEPER FREE and NAS, quickly and thoroughly. FOR 45 DAYS! Download: • NEW! Core enhancements provide www.Processor.com/Diskeeper (Note: Special 45-day trial only available at above link) faster, more thorough defragmentation

7590 North Glenoaks Boulevard ® Burbank, CA 91504 Phone: (818) 771-1600 • Fax: (818) 252-5514

Access Control Rights & Permissions Security Suite www.Processor.com/Marx2 www.Processor.com/PinionSoftware www.Processor.com/ScriptLogic

Single User License Just $299!

CRYPTO-BOX: Protects software and online media Protect CAD & Business Application Files You Share Enterprise Windows Mgmt: Zero In On Security Holes distribution with the powerful AES / Rijndael encryption With Pinion Desktop Packager algorithm on board. Designed for Electronic Software Pinion Desktop Packager provides continuous control over Enterprise Security Reporter™ is an agentless, fast, com- Distribution (ESD), Pay-per-use license management, and how your files are used by recipients, while in use. It blocks prehensive discovery and reporting solution for analyzing online subscription services. Allows secure online activa- clipboard, screen grabbers, printing, saving changes. Also file security, group memberships and other security settings tion, automated remote updates, and web access control. deletes the file from recipients’ PCs! on Windows servers. Visit Processor.com/ScriptLogic Learn more at www.Processor.com/Marx2 • Ideal for individuals and emerging businesses for a FREE 30-day evaluation!

2900 Chamblee Tucker Rd., Bldg. 9 12885 Research Blvd., Ste. 204 6000 Broken Sound Pkwy. NW Atlanta, GA 30341 Austin, TX 78750 Boca Raton, FL 33487 Phone: (800) 627-9468 Phone: (512) 583-5000 Phone: (561) 886-2400 Fax: (770) 986-8891 Fax: (512) 583-5075 Fax: (561) 886-2499

Security Suite Data Center Cleaning Equipment Disposal www.Processor.com/BitDefender www.Processor.com/DataClean3 www.Processor.com/DMD

Attention: OEMs, VARs, Distributors, and End Users Controlled Environment Find out why top commercial and government companies Cleaning and Maintenance use DMD Systems Recovery Inc. Services to Data Centers and Cleanrooms Around We Purchase the World - Since 1979 New, Used, Excess, & Idle Computer and IT Equipment

• Data Center Cleaning Servers, Workstations, Printers, PCs, Networking, • Post Construction Cleaning Monitors, Terminals, Disk, Tape, Storage, SAN Products, BitDefender Now Includes Antispyware Protection! • Zinc Whisker Remediation Laptops, Muxes, Modems, Test Equipment, UPSes, BitDefender 9 Professional Plus integrates antivirus, anti- • Hotspot Remediation Datacom, Telecom, Broadband spyware, firewall, and antispam modules into one compre- • Access Floor Repairs hensive security package, tailored to meet the needs of We Offer computer users worldwide. IF IT’S MISSION Outright Purchase - Ongoing Support - EPA-Compliant CRITICAL, IT’S GOT TO Recycling - DOD Level Data Destruction - Deinstallation - www.Processor.com/BitDefender BE DATA CLEAN! Off-Lease Auditing - Packing

6301 NW 5th Way Fort Lauderdale, FL 33309 Phone: (954) 776-6262 Fax: (954) 776-6462 1033 Graceland Avenue Des Plaines, IL 60016 1315 E. Gibson LN, Ste. E Phoenix,AZ 85034 Phone: (800) 328-2256 Fax: (847) 296-6870 Phone: (602) 307-0180 Fax: (602) 307-0181 July 28, 2006 Processor.com Page 39 Manufacturer Presentation Services - Storage Advertisement AmeriVault Managed Online Backup Service Better Than Ever

ServerVault is AmeriVault’s premier D2D managed backup service that features enterprise backup without the use of agents or plug-ins. ServerVault delivers trusted data protection that automatically synchronizes data backup and offsite storage by simply installing a client and leveraging existing Internet connectivity.

Still using tape? Imagine backups happening in 1/10 of the time, automatically getting secured in a Tier 1 data center, compressed, and encrypted, ready for immediate restore with a few mouse clicks.

What about large restores? AmeriVault deploys portable Mobile Vaults – disk devices that are shipped with large volumes of compressed data. They are high- ly reliable and plug right into a network for disk-to-disk recovery. Optionally, you may also choose to store a local D2D copy via AV- FastBack for LAN-speed restores or bare-metal recoveries.

Key Advantages & Business Benefits

• Immediate Online Restores – Save time for IT staff and end users • Central Management – Consolidate and standardize internal and remote backup • Automatic Upgrades & Scaling - We do the back-end, you can focus on other plans • Wide OS & DB Support – All major OSes, Cluster, VMware, Mac, Lotus Notes • Expert Tech Support – We help optimize service and expedite recovery • Assured Recovery – Digital signature technology verifies data integrity

About AmeriVault • Nearly a decade in managed D2D service • Replicated storage vaults • SAS 70 certified For More Information: • Operating in five Tier-1 data centers www.processor.com/ServerVault • Protecting data from 43 U.S. States Call: (800) 774-0235

Hosting/DR Site Media Recovery Multiple IT Services www.Processor.com/Switch&Data www.Processor.com/DRS www.Processor.com/Beanstalk

Colocation Services NETWORK AND CONFIGURATION SOLUTIONS

Switch and Data's colocation facilities feature customizable Beanstalk Networks brings advanced technology solutions space and power to accommodate your unique require- to small and medium-sized businesses. Once the luxury of ments. Rigorous standards - such as redundant UPS industry "giants," robust networking capabilities are now power and generator backup, robust temperature and available to all businesses on an affordable scale thanks to humidity controls, and fire protection - are built into the Beanstalk’s Internet-based networking and software host- infrastructure of every facility. We safeguard your systems ing services. against physical and virtual intrusions or tampering, with comprehensive security measures that range from 24x7 Data Recovery Services (DRS) offers professional, fast, Beanstalk Networks offers comprehensive technology ser- monitoring and secure access to locking cabinets and economical data recovery caused by hard drive crash, soft- vices that range from software development and cus- cages. ware corruption, human error, or natural disasters. With more tomization, network integration, server configuration and than two decades in the data recovery field, DRS’ engineers delivery, and remote managed services. Our commitment to quality is augmented by our experi- are experts at any hard drive, from notebook Drives to Fibre enced and knowledgeable technical support staff that Channel; RAID configurations; tape media; and corrupted For more information, visit www.Processor.com/Beanstalk. understands your business & is dedicated to your success. databases or email systems.

1715 N. Westshore Blvd., Ste. 650 8650 Freeport Parkway, Suite 150 Tampa, FL 33607 Irving, TX 75063 Toll Free: (800) 455-9922 Phone: (877) 304-7189 Phone: (813) 207-7700 Fax: (214) 441-2431 301 Clematis Street, Suite 200 West Palm Beach, FL 33402 Toll Free: (800) 655-6188 Phone: (561) 655-6418

Repair Services Data Backup Services Data Backup Services www.Processor.com/Pegasus www.Processor.com/eBiz www.Processor.com/NetMass

POS (Point-of-Sale) We offer a Remote Backup solution that ensures the data Remote Office Backup Made Easy. NetMass introduces Barcoding / Scanners / on your servers and workstations, even mobile laptops, is next-generation offsite backup for branch office environ- Barcode Printers backed up and secure. At affordable rates, we can run ments. Convenient multisite, cross-platform protection. daily backups and store them offsite in Philadelphia, using Automated, unattended backup of Windows servers, Sales & Maintenance your existing network. There is no need to purchase tapes, Linux/Unix/Solaris, AS400, Netware, SQL, and Oracle to remember to swap cartridges for backup, or to rely on databases. Live SQL Server and Exchange backup at the • Quality Service someone to transport the tapes to a secure storage facility; brick level. Compliance with Sarbox, HIPAA, etc. A single • Experienced Technicians our solution requires no interaction from you. You can back interface manages all locations. Remote office backup • Fast Return up data from one location and then begin restoring it to solutions start at $150 per month. Standard backup starts • Servicing Major Brands another location, making large data moves a fast and effi- at $5 per month. cient process. Remote Backup is automated, always live, Symbol • Intermec • Zebra nonintrusive, inexpensive, encrypted, and compressed. “The auditors confirmed we had valid backup and Metrologic • Cisco Access Pts. And it’s one less thing for you to worry about. restore processes, and it was incredibly fast – an entire restore took all of five minutes.” Call Us Today! To Learn More, Visit Robert Walston, IT manager, VAALCO Energy www.Processor.com/eBiz

4 Mustang Circle 219 N. Boylan Ave. 112 E. Louisiana, Suite C Forney, TX 75126 Raleigh, NC 27603 McKinney, TX 75069 Phone: (800) 856-2111 Phone: (919) 532-2430 Phone: (800) 731-2737 Pegasus Computer Fax: (972) 564-5027 Fax: (586) 461-0507 Marketing, Inc. Page 40 Processor.com July 28, 2006

With 10 Years of Experience in the HARD DRIVES - IDE & SCSI VIDEO CARDS NETWORK PRODUCT E-Commerce Market, We Offer: IDE Hard Drives 3COM Modules / Hubs / Switches • 50,000 unique products ready to ship today Matrox 1 - 30gb IDE ...... $ Check Web • 120 unique categories of computer and consumer 16 / 32mb Matrox G450 Dual AGP ...... $6 / 30 3C16686, 3C16805, 3C16810 ...... $12 / 46 / 65 electronic products 40 / 80gb IDE 5400/7200RPM ...... $ 30 / 47 32mb Matrox G450 / G550 Dual Head PCI ...... $78 / 80 3C16960, 3C16971, 3C16975 ...... $32 / 75 / 180 • 97% “same day” order fulfillment rate 120 / 160gb IDE 5400/7200RPM ...... $57 / 67 3C16976, 3C16977, 3C16610 ...... $125 / 92 / 130 • Fast and reliable return and exchange process 180 / 250gb IDE 7200RPM ...... $ 85 / 181 32MB Matrox G200 Quad PCI ...... $148 • Same Day Processing time for Government and SCSI Hard Drives 64mb Parhelia P650 / P750 AGP ...... $125 / 185 3C16611, 3C16665A, 3C16951 ...... $75 / 580 / 50 Educational Orders • International Shipping 18-36gb U160 10K SCSI 80pin / 68pin / FC ...... $36 / 69 64mb Matrox G450 MM / Qid Quad MM PCI ...... $565 / 575 3C16954, 3C16980, 3C16980A ...... $73 / 90 / 145 • Wholesale price discounts 18-36gb U320 15K SCSI 80pin / 68pin /FC ...... $57 / 83 nVidia 3C17100, 3C17111, 3C17131 ...... $285 / 390 / 575 • Largest selection of hard-to-find and obsolete products 73-146gb U160/U320 10K SCSI 68pin, 80pin /FC . .$129 / 177 3C17203, 3C17204, 3C17205 ...... $556 / 2377 / 1325 • Telephone sales and tech support 16MB / 32MB Riva TNT / Vanta ...... $8 / 14 73-146gb U320 15K SCSI 68pin, 80pin/ FC ...... $179 / 579 32MB / 64MB Beforce2 AGP ...... $11 / 17 3C17221, 3C17701, 3C17711 ...... $205 / 1185 / 700 ST336607FC / ST3146807LC / MAU3147NP ...... $79/239/567 64MB / 128MB Geforce4 TI4200 AGP ...... $23 / 39 3C17706, 3C17712 3C32700A ...... $3895 / 2605 / 850 300GB U320 10K SCSI80pin / 68pin ...... $ 503/769 Corporate, Gov’t & Educational PO’s Welcomed. 64MB Quadro4 280NVS / 400NVS PCI ...... $125 345 3CGBIC91, 3CGBIC92, 3CRWE825075AUS . .$130 / 185 / 195 GSA Contract GS-35F-0097M Notebook HDDs HDD under 20gb ...... Check Web 64MB Quadro4 200NVS / 280NVS PCI-Express ...... $70 /99 MONITORS / PROJECTORS 20-60gb 2.5” Toshiba / Fujitsu/ Hitachi / WD ...... $40 /57 64MB Quadro4 000NVS / 280NVS AGP ...... $30 / 45 HP / HP Jet Direct Print Servers 80-120gb 2.5” Toshiba / Fujitsu / Hitachi / WD ...... $83/129 64MB Quadro4 380NVS / 750NVS AGP ...... $35 / 215 J3112A / J3113A / J3110A ...... $9 / 59 / 73 40-120gb 2.5” SATA Hitachi / Seagate / Fujitsu ...... $66/195 15 / 17”” Hitachi LCD Monitor Black ...... $150 / 170 64MB PNY Quadro4 700XGL / 500XGL PCI ...... $36 / 42 J3111A / J4169A / J2550A ...... $38 / 200 / 27 17” HP / Compaq 1740 LCD Monitor Black ...... $195 20-60gb 1.8” ZIF / PCMCI Toshiba / Hitachi ...... $59/169 128MB Quadro4 900XGL / 980XGL AGP ...... $140 / 399 J4100A / J4101A / J4106A ...... $80 / 181 / 145 17” Sharp LCD 1280x1024 0.26mm Black / White ...... $161 Visit Our Web Site For 128MB Quadro FX1000 / FX1100 AGP ...... $140 / 399 J6057A / J7934A / J7942A ...... $173 / 383 / 104 3M Company LCD Projector 1200ANSI 5.5LB’s ...... $680 Complete Selection of Hard Drives! 128MB Quadro FX1300 / FX 1400 ...... $399 / 550 J2591A / J3258 / J2591A ...... $58 / 81 / 58 HP Digital Projector VP6121 DLP 1024x768 2000ANSI . . .$665 256MB Quadro FX3000 / FX3400 ...... $299 / 989 J3265A / J4154A / J4110A ...... $132 / 36 / 600 HP Digital Projector xp8020 DLP 3100 ANSI Lum ...... $1940 TAPE DRIVES 256MB Quadro FX3450 / FX4000 ...... $885 / 1090 HP Home Cinema Digital Projector ep7110 DLP Projector L1688A $710 EXABYTE / QUANTUM / IBM J4111A / J4113A / J4844A ...... $48 / 175 / 850 EXB-8900 Tape Drive 8mm Tape 20GB/40GB Int SCSI . . .$375 256MB Quadro FX4400 / FX4500 ...... $1290 / 1450 J4845A / J7934G / J3263A ...... $1727 / 210 / 179 NOTEBOOKS 35/70GB Quantum DL7000 Int. SE SCSI ...... $280 256MB GeForce FX5600 / FX5700 AGP ...... $55 J4135A / J6044A / J3258B ...... $114 / 154 / 89 IBM Tape Drive 100GB/200GB Internal SCSI 00N8016 . . . . .$1080 128mb 3Dlabs Wildcat 4 7110 AGP ...... $250 HP Pavilion dv1000 P-M J6035C / J4102B / J4121A ...... $129 / 106 / 534 2.0GHz 512mb 100gb DVDRW 14” ...... $859 HP / COMPAQ Appian J4167A / J3258A / J2556B ...... $46 / 81 / 89 HP Pavilion zd7000 StorageWorks ESL9595 Tape Drive Lib 330833-B21 . .$14,000 64MB Radeon VE Rushmore Quad PCI ...... $34 P4 3.2GHz 512mb 100gb DVD+RW 17” ...... $1,450 20/40GB Compaq DLT Drive, DLT 1x20GB/40GB Ext. . . .$380 64MB Appian Radeon Typhoon VE AGP / PCI ...... $129 QLogic HPnc8200 PM 20/40GB Compaq Business StorageWorks DAT Int. Auto . . . .$425 64MB Appian X4 DVI-I Quad Monitor PCI ...... $189 QLA220033 / QLA220066 ...... $170 / 90 1.7GHz 40gb 512mb DVD-CDRW WLAN 15.4WXGA XP . .$655 20/40GB HP DLT4000 SCSI SE Narr Sure Store DLT40R .$390 128MB Appian Phoenix Radeon 9000 QD PCI Quad . . . . .$410 HPnc6000 P-M HP SureStore DLT 80K Tape Drive SCSI LVD Rack ...... $780 QLA2312F / QLA2200F66 ...... $450 / 250 ATI / Powered by ATI 1.7GHz 60gb DVD+RW 14” XP ...... $750 40/80GB Hp/Compaq DLT VS80 Int. SCSI LVD/SE ...... $780 QLA210033 / QLA210066 ...... $120 / 260 16MB / 32MB AT Rage ...... $9 / 14 HP Presario V2405 Turion 1.8GHz 60gb DVD+RW 14” . . .$655 200/400GB StorageWorks Ultrium 460e TD LTO Ext...... $1845 QLA2202FCK / QLA2342 ...... $1320 / 1035 100/200GB StorageWorks Ultrium 230i TD LTO Int . . . . .$1600 32MB / 64MB ATI Radeon 7000 PCI ...... $18 / 35 We Have a Large Selection of Notebooks Low Price Guaranteed! 400/800GB Storageworks Ultirum 960 Tape Drive SCSI . . . .$2,150 64MB / 128MB Radeon9200 Pro AGP ...... $17 / 32 LP10000E / LP8000 ...... $749 / 80 200/400GB StorageWorks Ultrium 48 Ext. LTOUltrium .$1600 64MB / 128MB Radeon X300 PCI-E ...... $21 /38 SYSTEMS / SERVERS 128MB Radeon 9600 XT 9600 AGP ...... $70 / 37 Cisco Routers / Modules We sell HP, Compaq, IBM. IBM eServer 326 8848 Rack Opteron Call us or go to our site for more! 128MB Radeon 9700 Pro / 9800 Pro AGP ...... $78 / 91 Switch WSC295012 / WSC2955S12 ...... $550 / 1660 2GHz 1GB SCSI Hot-Swap 1U ...... $859 128MB ATI V3100 / V5100 PCI-E ...... $99 / 355 Routers CISCO1721 / CISCO2612 ...... $650 / 2000 IBM xSeries 445 OPTICAL DRIVES 256MB ATI Fire GL V7100 PCI-E ...... $535 RSAII-EXA 8870 Rack Xeon 3GHz (2P) 2GB ...... $6000 Routers CISCO7206RF / CISCO3845 ...... $2687 / 9400 Sony 650MB Magneto Optical Drive SCSI 5.25” ...... $7 256mb Radeon X850 XT Platinum VIVO PCI-E ...... $285 HP ProLiant ML350 G4 Modules WS-X2861 / WSX5410 ...... $100 / 660 Tower 1 x Xeon 3.4GHz RAM 1GB ...... $980 48x HP CD / Floppy Combo Internal HP DL320 G2 ...... $31 256MB ATI Fire GL X2 / X3 AGP ...... $285 / 615 GIGABIT Module WSG5486 / WSG5487 ...... $ 70 / 230 HP WS xw4300 4X4X24 HP CDR-W EIDE Internal D4398A ...... $11 LAN Adapter GLCSXMM / GLCLHSM ...... $100 / 120 3.2GHz 512MB 80GB DVDRW ...... $1000 52X32X52 Memorex CDR-W External USB 2.0 ...... $26 PRINTERS / SCANNERS / ACCESS 52X24X52X16 Iomega CDRW/DVD External USB 2.0 . . . . .$40 HP 2500CM InkJet Pro Color ...... $85 DIGITAL CAMERAS 10X HP DVD-Rom SCSI Internal C7499A ...... $160 HP StorageWorks HP DeskJet 9680 ColorInkJet / 5850w Color InkJet . .$550 / 95 HP PhotoSmart 735XI 3.0MP 3x optical ...... $74 6X HP DVD-Rom IDE Internal For OmniBook ...... $90 Sony Cyber-shot 5.1 MP 3x Optical DSC-W5 ...... $198 2.4x24x24x8 Samsung CDR-W / DVD Internal Slim ...... $37 HP PhotoSmart 8150 / 8450 Photot InkJet Printer . . . .$54 / 85 ESL9595 P/N 330833-B21 Vivitar Vivicam 10/ ViviCam 20 silver/blue/Red ...... $10/11 HP DeskJet 5440 Photo InkJet Printer ...... $29 Vivitar ViviCam 3915 Digital Camera 5.0MP x2 ...... $71 External Tape Library FLASH MEMORY/USB PEN DRIVE Zebra/Eltron LP2348 Plus Label Printer 120618-001 . . . . .$291 Samsung Digimax 4500 4.1MP 3x Optical ...... $111 256 / 512 / 2gb /4gb Compact Flash ...... $13/19/49/91 Vivitar ViviCam 3340 1.3MP/ViviCam 3695 2.0MP . . . . .$16/25 HP LaserJet 4200n 220V ...... $582 400 Slots 512 / 1gb /2gb Memory Stick ...... $3 / 52 / 88 Creative PC-Cam 900 2.1 MP Flash ...... $35 LaserJet 4250DTNSL 220V Laser Printer ...... $799 512mb / 1gb / 2gb / 4gb Secure Digital . . . . .$19 / 25 / 49 / 96 Logitech QuickCam WebCam w/ Mic USB ...... $17 HP LaserJet 4250TN220V/ LaserJet 4350N 220V . . .$750 / 75 512mb/ 1gb / 2gb Multimedia Card ...... $29 / 56 / 97 / 235 PDAs / PDA Accessories 128mb / 256mb / 512mb USB 2.0 Flash Drive . . .$14 / 15 / 19 HP 5BIN Mailbox w/ stapler for LJ 8000/8100/8150 . . . . .$550 1gb / 2gb / 4gb / 8gb USB 2.0 Flash Drive . . . .$61 / 118 / 228 HP 9200C Digital Sender Flatbed/Sheetfed Scanner Q5916A $2050 HP IPQ H1945/HX2410 PDA USB ...... $265/160 4gb / 8gb / 16gb IDE Flash Drive ...... $199/ 335 / 565 PALM Zire 31 PDA / P80708US ...... $26 We Carry all Types and Brands of MEMORY AND CPUs HP Mirco Keyboard / FA162A#AC3 ...... $16 Please visit our WEB to check TARGUS Universal WI-FI Keyboard ...... $38 ZIP DRIVES We handle full line of new 2.2gb Castlewood ORB Intern/External SCSI ...... $15 /31 888-644-7017 and refrubished CISCO 750mb lomega ZIP Drive External FireWire ...... $59 250mb lomega ZIP Drive Internal ...... $31 networking equipment. MSRP ...... $112,000 250mb HP Zip For E700 V300 N400C N600C N610C ...... $18 Fax: 425-251-5000 CompuVest Price . . $67,000

We’ve been providing dependable computer solutions for over 20 years!

About Security Computer Sales! • Best overall value • More than Great Prices • We’re easy to do business with • Priced right to save you money • Best warranties in the business • It’s SCS for service that never quits • The right place to buy, sell and trade • The best deals on your old equipment • SCS equals “Superior Customer Satisfaction” Blowout Prices X7051 2GB Kit...... $250 X7056A 4GB Kit ...... $1200 Ultra 2 Dual 300MHz CPU, Dual 9.1GB HD, Creator 3d, 256MB RAM ...... $175 Ultra 60 Dual 450MHz CPU, Dual 18.2GB HD, Elite 3D, 512MB RAM ...... $450 540-4934 SUNFIRE 4 x 900MHz/8MB Cache UNIBOARD ...... $1500 540-5605 SUNFIRE 4 x 1.2GHz/8MB Cache UNIBOARD ...... $4500 E250/E220R Dual 400MHz CPU, Dual 18.GB HD, 32-Bit PGX, 512MB RAM ...... $1500

C U R I E T www.securitycomputer.com Y S 2595 Fairview Ave N We carry a Wide variety of Saint Paul, MN 55113-2616 SUN, CISCO SYSTEMS, IBM, COMPUTER Phone: (800) 839-5683 HP, DELL & COMPAQ products S S 145 Webster Street, Hanover MA 02339 www.bltrading.com Fax: (651) 653-4300 A L E July 28, 2006 Processor.com Page 41 NEW - USED - BUY - SELL HP Sales and Rentals #1 Global Source for Specials AL2012E34 470-48T $1,595.00 Toll Free: 888-883-0360 Nortel Networks AL1001E03 5510-48T $3195.00 BUY • SELL • RENT • LEASE • REPAIR AL2033005 450-1SX $169.00 DS1404025 8691SF $1595.00 • SPECIALS • DS1404090 8691SF $3295.00 C6751A OfficeJet K80XI ...... $85 Q1273A DesignJet 4000 42” ...... $8,995 C8392A 7110XI AIO ...... $145 C1316A 9100C Digital Sender...... $1,195 DS1404035 8648TXE $2295.00 C9660A LaserJet 4600...... $750 Q5916A 9200C Digital Sender...... $1,975 DS1404011 8616SXE $3495.00 C6075B DesignJet 1550CM+ 36”...... $6,995 C6074B DesignJet 1050C+ 36”...... $5,495 Largest inventory of switches, routers, hubs in America Color LaserJets LaserJets Up to 80% off LIST PRICES • Full Warranty on all Products C3985A LaserJet 8500DN...... $1,895 C2001A LaserJet4 ...... $175 C4089A LaserJet 8000DN ...... $495 C2037A LaserJet 4+ ...... $195 We Buy and Sell New and Used C9661A LaserJet 4600DN ...... $750 C2039A LaserJet 4M+ ...... $325 Best Pricing C9795A LaserJet 2500L ...... $345 C3166A LaserJet 5SI ...... $495 Network Equipment C7086A LaserJet 4550N ...... $545 C3167A LaserJet 5SI MX ...... $495 Nortel Cisco C7087A LaserJet 4550DN ...... $650 C3916A LaserJet 5 ...... $250 C7098A LaserJet 8550DN...... $1,495 C3917A LaserJet 5M ...... $295 Memory Upgrades C7131A LaserJet 5500N ...... $2,350 C4110A LaserJet 5000 ...... $695 C8546A LaserJet 9500N ...... $4,750 C4118A LaserJet 4000 ...... $295 C8547A LaserJet 9500HDN ...... $5,500 C4120A LaserJet 4000N ...... $325 C9658A LaserJet 5500DTN...... $2,495 C4252A LaserJet 4050T...... $395 NRS Professional C9659A LaserJet 5500HDN ...... $2,795 C4254A LaserJet 4050TN ...... $445 Q1320A LaserJet 3500N ...... $695 C4265A LaserJet 8150 ...... $595 Services offers Q1323A LaserJet 3700N ...... $1,295 C4266A LaserJet 8150N ...... $595 Q2488A LaserJet 1500L ...... $395 C4267A LaserJet 8150DN ...... $795 consulting & Q3670A LaserJet 4650DN...... $2,095 C8049A LaserJet 4100 ...... $495 Q3702A LaserJet 2550L ...... $275 C8050A LaserJet 4100N ...... $595 integration services Q3716A LaserJet 5550DTN...... $3,375 C8051A LaserJet 4100TN ...... $695 C8052A LaserJet 4100DTN ...... $895 Plotters C8521A LaserJet 9000DN...... $2,795 on a project or C4709A DesignJet 750C+ 36” ...... $1,895 C8253A LaserJet 9000MFP...... $4,795 C3198B DesignJet 755CM 36” ...... $2,095 C9124A LaserJet 3300MFP ...... $325 hourly basis - C7789C DesignJet 800PS 42”...... $4,795 C9148A LaserJet 4100MFP ...... $1,295 C6075A DesignJet 1055CM 36” ...... $4,995 Q1860A LaserJet 5100 ...... $895 Brand names and products in this ad are trademarks of their Nationwide C4703A DesignJet 2000CP 36”...... $1,995 Q1861A LaserJet 5100TN ...... $1,095 respective companies. nrs is not affiliated with companies C6019A DesignJet 5000PS 42”...... $5,295 Q2425A LaserJet 4200 ...... $695 Q1254V DesignJet 5500PS 60”...... $11,995 Q2426A LaserJet 4200N ...... $795 Q1274V DesignJet 4000PS 42”...... $10,995 Q2428A LaserJet 4200DTN...... $1,295 Q2432A LaserJet 4300N ...... $1,095 800-503-1349 Call for all New and Used Q3723A LaserJet 9050DN...... $2,995 HP Equipment! Q3942A LaserJet 4345MFP ...... $2,250

360 Technologies Inc. Network Resource Solutions, Inc. • All above equipment is refurbished and 15401 Debba Drive Austin, TX 78734 carries a 90-day parts & labor warranty. • Visa, MasterCard & American Express accepted. [email protected] • Many orders shipped the same day! www.360tech.com WE BUY [email protected] GEAR www.networkrs.com Toll Free: 888-883-0360 Tel: 512-266-7360 Fax: 512-266-7366 IM: HPat360

RS/6000 IBM pSERIES [email protected] • Enterprise Back-up & Recovery Services • New and Re-Certified Equipment Options • Hardware, Software and Professional Service • SAN and NAS Sales and Technical Expertise

SUN MICROSYSTEMS [email protected] • Oracle and Veritas Certified Reseller Optimizing • Sun-Certified Technical Staff Your • Workstations to Enterprise Class Servers Technology • Disaster Recovery Service Provider Investment with HP 9000 “ESI Performance” [email protected] • HP-Certified Technical Staff • Experience • Flexible Financing Alternatives • Veritas and Tivoli Implementation Expertise • Synergy • Workstations, Servers, Parts and Peripherals • Innovation SAN SOLUTIONS [email protected] • New and Re-Certified Brocade, McData Reseller • SAN Certified Technical Staff • SAN Design and Professional Services • SAN Configuration and Qualification Lab

CISCO SYSTEMS [email protected] • Authorized Cisco Reseller • Cisco-Certified Technical Staff • Network Design and Professional Services • Switches, Routers, VPN, Securtiy, Access Products 800.294.4362 www.evolvingsol.com 3989 County Road 116 • Hamel, MN 55340 Main: 763.516.6500 • Fax: 763.516.6555 • [email protected] Page 42 Processor.com July 28, 2006

In July 2006, NETAPP will no longer support www.mediarecovery.com F720 and F760 Filers!

Zerowait provides Network Appliance WANTED! customers with a reliable alternative to NetApp’s high cost of legacy service, support and upgrades. All Magnetic Tape Media Call us today for a competitive quote! 9840 • 3590 • LTO • DLT • SDLT Processor Special F840 w/ NFS SW-- PLEASE CALL AL BASS $14,500 per head Phone: 214-905-1882 Buy two heads and get [email protected] Cluster SW licenses FREE! WWW.ZEROWAIT.COM $$ CASH $$ Toll-Free: 888.811.0808

800-657-9555

Phone: (817) 249-9950 Global Printer Services Fax: (817) 249-9069 5980 Executive Dr. www.regentsales.com Email: [email protected] Madison, WI 53719 BULLSEYE! www.globalprinter.com www.HP4Sale.com 15K, 146GB HDD Pluggable 347708-B21 $495.00 HP LJ 1100 ...... $159 HP LJ 4250N ...... $975 15K, 72GB HDD Pluggable 286778-B22 $319.00 HP LJ 1300 ...... $249 HP LJ 4500 series ...... $1,050 15K, 72GB HDD Pluggable 3R-A3851-AA $325.00 HP LJ 2100 ...... $199 HP LJ 4550 series ...... $1,150 10K, 300GB Pluggable 350964-B22 $575.00 HP LJ 2300 ...... $399 HP LJ 4600...... $1,095 10K, 300GB Pluggable 3R-A4952-AA $595.00 HP LJ 2300D ...... $479 HP LJ 5000 ...... $499 10K, 146GB Pluggable 286716-B22 $345.00 HP LJ 2300DN...... $599 HP LJ 5000N ...... $799 10K, 146GB Pluggable 3R-3841-AA $345.00 HP LJ 4000 ...... $275 HP LJ 5Si ...... $349 HP MSL6000 ULTRIUM 460 DRIVE AD605A $2,900.00 HP LJ 4000N ...... $399 HP LJ 5SiMx ...... $439 FCA2214 2GB 64BIT 133MHZ PCI-X 281541-B21 $685.00 HP LJ 5SiNx ...... $399 HP LJ 4000T ...... $300 48 Port 10/100 Switch Enhanced OsWS-C2950G-48-EI $2,345.00 HP LJ 4000TN ...... $449 HP LJ 8000 ...... $399 24 Port 10/100 Switch Enhanced OsWS-C2950G-24-EI $1,370.00 HP LJ 4050 ...... $265 HP LJ 8000N ...... $499 LTO3 Data Cartridges D2406-LTO3 $71.85 HP LJ 4050N ...... $389 HP LJ 8000DN...... $659 HP LJ 4050T ...... $329 HP LJ 8100 ...... $569 SDLT Media Bar Code Reader SG-XBARCODES-L8 $825.00 HP LJ 4050TN ...... $479 HP LJ 8100N ...... $669 Regent Sales, Inc., Your “On Target” HP LJ 4100 ...... $359 HP LJ 8100DN...... $869 Choice For New, Used & Refurb Equipment

HP LJ 4100N ...... $499 HP LJ 8150 ...... $599 ® HP LJ 4200 ...... $649 HP LJ 8150N ...... $799

HP LJ 4250 ...... $829 HP LJ 8150DN...... $849 PROLIANT • ALPHA • STORAGEWORKS • 800 - 588 - 3554 or 608 - 268 - 4300 Quality • Integrity • Value Fax: 608-268-4343 • E-mail: [email protected] EQUIPMENT MANAGEMENT, INC Phone: (978) 534-2074 Fax: (978) 534-5574 Email: [email protected] [email protected] WEB: www.emisolutions.com 42 Jungle Road, Leominster MA 01453 ****** SWITCH SPECIALS *****

401930-001 254136-001 A7537A Motherboard $5900 $12900 Switch $1795 San Director HP STRKS SWITCH 4/32 311242-001 287055-B21 $12500 283056-B21 $5900 San Switch $3500 SAN Switch 2/16 SAN switch 2/16

A7537A A4688A $5900 311026-b21 $13900 HP Surestore E $17500 HP STRKS SAN Bridge FC 4/1 Switch 4/32 SAN Switch Power Pack • Immediate Availabiltiy • Lowest Prices • Blind Shipment • TERMINALS • MEMORY • PRINTERS • DRIVES • PERIPHERALS • CPU’S • CONTROLLERS and MORE A minority owned business BUY, SELL, TRADE ALL BRANDS...... !

® PRINTRONIX®

New & Refurbished PRINTERSPRINTERS SPARE PARTS • EXCHANGES • SUPPLIES TW-AX • CO-AX • IGPTM QMS® Magnum® DataData RelianceReliance CorCorporporationation “Your Reliable Printer Source” www.datareliance.com Ph: 574-935-9550 Fx: 574-935-9555 July 28, 2006 Processor.com Page 43

Call For Quotes S NCA 800-811-8193 i Same Day Shipping on Most Items PRINTERS Peripherals • Spare Parts • Exchange Programs • Repair •3COM •Micom •ADC/Kentrox •Motorola/UDS/Codex •Adtran •Multitech •BAT Electronics •NBase Xyplex •Bay Networks •Nortel Networks PARTS •Cabletron •Packeteer •Cisco •Paradyne •Commworks/US Robotics •Patton •Digital Link •Racal •General DataComm •Hull Speed •IBM REPAIR •Larsom •RAD •Verilink •Tylink •SynOptics 1-800-332-5321 ...and more! Call us today for Search Our Extensive Parts & Equipment Database at: www.PrinterPartsOnline.com YOUR solutions Buy-Sell-Trade www.Sinca.biz

Millions of Items.... www.lincocomputer.com Digital Digital 770-931-7732

HomeInventory Sales Repair Policies Contact Brotthers Fax 770-931-9416 ➙

Check Out Our Website➙ -- www.lincocomputer.com d b g Group www.dbgweb.com Call if you do not see what you are looking for! [email protected] DEC-Compaq-Cisco-Sun-SGI Depot Repair for Monitors, Terminals, Printers PC’s, and Laptops AlphaServer GS160 Model 16 281-893-8880 Fax: 281-893-8897 Base System for OpenVMS • DY-160CG-AA PayPal [email protected] • One Alpha 21264 Processor 1224 MHz • Four Quad Building Blocks • One 14-Slot PCI Shelf Offering unbeatable solutions for: • OpenVMS Operating System License IBM AS/400 (iSeries) IBM RS/6000 (pSeries) ALSO AVAILABLE: Call or Sun Microsystems • Additional 1224 MHz CPU w/SMP E-Mail HP9000 • Additional Memory For Pricing Cisco Systems • Additional PCI Shelves Buy, Sell, Lease & Rent - New & Used • Additional PCI Options 2 SYSTEMS IN STOCK! 800-605-5446 Authorized ® Reseller Ph: 770-738-1101 • Fax: 770-738-1110 www.abacusllc.com • [email protected] WE WILL BUY YOUR USED HARDWARE!

B U Y & S E L L DEC • Compaq • HP KRONOS 480F TIMECLOCKS Cisco • Extreme • Sun HARD DRIVES Your Leading Independent Reseller With Ethernet, New Battery & Power Supply FLOPPY DRIVES • CDROMS • CONTROLLER CARDS Since 1987 Refurbished, Tested & Air Packed - 30 Day Warranty “SELL Now Summer Sale: $225.00 Each New/Used/Pulls • Notebook/Desktop/Servers US Buying (Ask About Quantity Discounts) All interfaces and capacities YOUR DEC SURPLUS” Classic Pegasus Computer Marketing, Inc. www.driv esolutions.com 800-426-5499 Ph 972-564-3087 • Fax 972-564-5027 818-718-6900 Ph, 818-718-6100 Fax PH: 508-230-3700 Toll Free 800-856-2111 • [email protected] email: [email protected] or [email protected] FAX: 508-238-8250 www.compurex.com

Since 1995 Memory For PC & MAC 818-700-9510 Phone: 310-645-6021 Kieu’s Direct Source, Inc. Fax: 310-645-6041 We Do: We Repair, Buy & Sell: [email protected] DATA RECOVERY HARD DRIVES & 8709 Aviation Blvd • Inglewood, CA 90301 • Fast, Safe & Reliable! TAPE DRIVES • No Files - No Charge. • Drop / Blind Shipments. WE BUY & SELL NEW & USED EQUIPMENT • Free Evaluation. • Corporation, School and • Data Guarantee. Gov’t PO’s Welcome. Routers • Switches • Hubs • Network Modules • Server Options • Guarranty low prices Cisco • Extreme • Foundry • HP • IBM www.kdsdrives.com email: [email protected] Immediate Need For: WE BUY EXCESS INVENTORY!!! www.jecom.com 256 & 512 MEG DDR 2700 & 3200

NEW • USED • PARTS • WHOLE UNITS • REPAIRS • Since 1993 (800) 220-1616 Ph: (877) 715-3686 609-586-7576 Information Fx: (405) 715-3682 MEMOREX/TELEX Fax: 609-586-7581 Technology www.itechtrading.com DISPLAYS, CONTROLLERS, PRINTERS We offer Trading COAX or TWINAX ® OKIDATA COMPUTER TAPE WANTED! We Buy, Sell and Lease IBM DISPLAYS CONTROLLERS PRINTERS Parts, Whole AS/400 • RS/6000 • Servers 1191, 1192 274 287, 387 NEW OR USED 1472, 1481 1374 1187, 1234 Units and System Upgrades 1482, 1483 1387, 1324 We Also Buy 1174 3590E’s • 9840’s • 9940’s • LTO’s Advanced 36 Systems All Other 1488, 1489 1330 Repairs Round Reel Tape • 9 Track • 3490E • Tape Subsystems Brands of www.L-Lsystems.com DLT’s: TK50’s • TK70’s • TK85’s • TK88’s Printers, Terminals, Modems Computer Ph: 918-234-1200 www.mmcpi.com Hardware! L & L Systems Fx: 918-234-1276 7A Marlen Drive Robbinsville, NJ 08691 21 Years Experience 104 South 109th E. Place, Tulsa OK 74128 E-mail: [email protected]

WE BUY TAPE! 800.421.6572 Ph: 770.840.8994 • Fax 770.840.9228 DLT-LTO-AIT-AME-DDS-QIC-3480-3590-9840-Etc. www.ismweb.com • [email protected] New & Used - All Types of Data Tape Media IBM iSeries • IBM pSeries • Sun • HP9000 • Cisco Certified DATA DESTRUCTION Assured We Buy, Sell, Lease and Provide Short and Long Term Rentals 90 Day Warranty on All Refurbished Systems, Memory, Disk & Parts World's #1 Tape Buyer is The Data Media Source Call Us To Save Up To 90% On Used Certified Equipment! Highest values paid - Free pick-up at your site 1-800-252-9268 www.datamediasource.com C ALL ISM FOR ALL YOUR M IDRANGE C OMPUTER N EEDS! Page 44 Processor.com July 28, 2006

(866) 207-6631

Mention This Ad For A Free Cagenut Removal Tool!

Long Wallmount Rack Wallmount Relay Rack Universal Rack Rails Takes Servers Up To 31” Deep • Self-squaring guarantees easy Available in 4U, 6U & 8U assembly • Rack allows mounting of equipment in • Two depths: 13" and 19" a vertical “knobs up” fashion (visual- • Five heights: 8U, 12U, 15U, 18U, ize a pendaflex hanging folder) • Equipment mounts to backpan for and 30U even weight distribution • No more stripped threaded holes • Hinged top cover allows user access to • Ultimate versatility with universal controls rack rail. Use 10-32, 12-24 or m6 • Hinged body allows installer access to connections screws. • Top cover and body keyed separately See our IT70 GSA Schedule #GS- • Rack backpan includes venting and 35F-0208R optional fan mounting with grills • GSA Schedule #GS-35F-0208R www.Processor.com/RackmountSolutions18 www.Processor.com/RackmountSolutions19

NEBS Server Cabinet Shockrack Shipping Case

36”D - Certified to Seismic Zone 4 20", 24" & 30" Depth

Based on the standard, patented Million Mile Warranty: Every SKB frame design of our RS, RSP, and hardshell case is unconditionally FRS server rack series, this NEBS- guaranteed forever. That means if you break it, we will repair it or compliant configuration has been replace it at no cost to you. SKB tested and certified to meet cases have been on the road since Telcordia (Bellcore) GR-63-CORE 1977 and have spent a good deal of requirements for ZONE 4 seismic time flying equipment for military earthquake environments. combat operations. These are tough cases built for a lifetime of service. GSA Schedule #GS-35F-0208R GSA Schedule #GS-35F-0208R

www.Processor.com/RackmountSolutions14 www.Processor.com/RackmountSolutions24

Tabletop / Portable Server Rack Rackmount TFT / LCD Drawer

32” (Usable Depth) - Perfect On or Under Desk Superb Quality • Unparalleled Versatility • 3U, 6U, 9U, 12U and 15U Heights More choices than you ever dreamed of! • Includes 4.5” fan, 25 pcs M6 hardware/cage nuts & levelers • 13”, 15”, 17”, 19” • Black, locking plexi front door and vented rear door • Touch pad, track ball, real mouse • Supports Dell/IBM/HP/Compaq, etc. (univ. mounting rails) • With or without 4-, 8- or 16-port KVM See our IT70 GSA Schedule #GS-35F-0208R • 1U or 2U for independent monitor/keyboard use

www.Processor.com/RackmountSolutions2 www.Processor.com/RackmountSolutions

GSA #GS-35F-0208R Phone: 866-207-6631 www.RackmountSolutions.net