Story image

Gartner asks: Do you have a ticking time-bomb in your network?

25 May 2017

Since February 2017, a growing number of network and security vendors have published field notices or confirmed that some product lines have an increasing likelihood of total system failure. Due to vendor NDAs, the defective component has not been officially named but the problems are widely believed to be due to a documented issue in the Intel Atom C2000 chip family.

Gartner believes that the original component manufacturer of the defective component has notified all impacted vendors. However, the actions taken by those vendors have varied, and the impact is huge: we estimate that 150,000 to 500,000 impacted units are deployed globally, including branch office routers (and SD-WAN appliances), WLAN controllers, branch office security and switching appliances, data center leaf and spine switches, and core routers.

Products that fail cannot be rebooted or recovered and replacement is the only remedy. Most impacted vendors are offering replacement programs for products under service contracts to avoid future failures, however we believe some vendors are not owning up to a potential problem within their offerings.

The big issue is that few vendors have proactively notified impacted customers, so many enterprises are unaware of this issue that can have a significant impact on network uptime (which is hard to maintain as-is).  With the potential for network failures impacting business critical processes, it’s time to take notice of this industry wide problem. We provide specific recommendations and a list of impacted/not-impacted products in this just-published research:

Potential network and security equipment failures demand immediate attention

Summary: At least eight network and network security vendors have public notifications about a specific defective component that could cause equipment failure. Months after the initial notification, many I&O leaders are unaware of the need to assess their risk and plan to replace impacted devices.

Article by Mark Fabbi, Gartner Blog Network.

GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
Why AI will be procurement’s greatest ally
"AI can help identify emerging suppliers, technologies and products in specific categories."
Are AI assistants teaching girls to be servants?
Have you ever interacted with a virtual assistant that has a female-based voice or look, and wondered whether there are implicitly harmful gender biases built into its code?
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.
Data#3 to exclusively provide MS licences to WA Government
The technology services provider has won two contracts with the Western Australia Government, becoming its sole Microsoft licence provider.
Why cash is no longer king in Australia
Australia is leading the way in APAC for granting credit on B2B transactions.