Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

09:30 AM

XKL Finds A Niche

Its DWDM appliance gives companies a new option for adding services or increasing bandwidth.

XKL offers a strong proposition for enterprises looking to make the most of their fiber. Let's face it--companies with remote locations looking to meet growing bandwidth needs or add new services such as Fibre Channel have few options.

If distance or site characteristics make fixed wireless impossible, IT pros can build their own connections, lease additional fiber, or use DWDM products aimed at service providers. But plowing new fiber is capital-intensive and can take months. The startup price for leasing strands is lower, but recurring costs will shoot up, and it takes time to get new fiber prepped and spliced. DWDM is attractive, but most gear is aimed at service providers, with the associated hefty price tag and installation complexity. These are not do-it-yourself kits.

InformationWeek Reports

XKL has developed what's essentially a DWDM appliance. Its 1U box with integrated optical service channel hides the cabling, and the fixed configuration is less expensive than a chassis and card design. Besides the expected 1-Gbps and 10-Gbps links, XKL has baked in support for OC-48 and OC-192 and for 1-Gb and 2-Gb Fibre Channel. To meet service provider-like levels of reliability, 5R-model systems provide protection switching, the ability to move traffic from one fiber pair to another in case of a service interruption. Dual hot-swappable power supplies are standard, but XKL can use a mix of AC and DC. XKL's user interface and system management scheme are also enterprise friendly: The command line interface is IOS-like, and instead of requiring the network engineer to wire an alarm panel, the unit natively supports syslog and SNMP.

XKL's products reach up to 80 kilometers out of the box, and amplification options push that to 200 kilometers. Plans are to double that distance.

Still, XKL faces challenges. Competitors, including Transmode, Adva, and Nortel, have products that scale down to enterprises, though their price points and complexity don't scale down accordingly, so far at least. More significantly, service providers own the fiber that XKL's enterprise customers will need to lease, and some will opt to hold out for the greater profits to be had providing lit circuits. To help address this situation, XKL has developed relationships with fiber-access brokers.

Return to the story:
XKL Brings New Life To Dark Fiber

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel function where a lack of checks allows the exploitation of an integer overflow on the size parameter of the tz_map_shared_mem function.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel�s tz_handle_trusted_app_smc function where a lack of integer overflow checks on the req_off and param_ofs variables leads to memory corruption of critical kernel structures.
PUBLISHED: 2021-06-22
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in TSEC TA which deserializes the incoming messages even though the TSEC TA does not expose any command. This vulnerability might allow an attacker to exploit the deserializer to impact code execution, causing information disclosure.
PUBLISHED: 2021-06-22
Trusty contains a vulnerability in all TAs whose deserializer does not reject messages with multiple occurrences of the same parameter. The deserialization of untrusted data might allow an attacker to exploit the deserializer to impact code execution.