Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

4/17/2008
09:30 AM
50%
50%

XKL Finds A Niche

Its DWDM appliance gives companies a new option for adding services or increasing bandwidth.

XKL offers a strong proposition for enterprises looking to make the most of their fiber. Let's face it--companies with remote locations looking to meet growing bandwidth needs or add new services such as Fibre Channel have few options.

If distance or site characteristics make fixed wireless impossible, IT pros can build their own connections, lease additional fiber, or use DWDM products aimed at service providers. But plowing new fiber is capital-intensive and can take months. The startup price for leasing strands is lower, but recurring costs will shoot up, and it takes time to get new fiber prepped and spliced. DWDM is attractive, but most gear is aimed at service providers, with the associated hefty price tag and installation complexity. These are not do-it-yourself kits.

InformationWeek Reports

XKL has developed what's essentially a DWDM appliance. Its 1U box with integrated optical service channel hides the cabling, and the fixed configuration is less expensive than a chassis and card design. Besides the expected 1-Gbps and 10-Gbps links, XKL has baked in support for OC-48 and OC-192 and for 1-Gb and 2-Gb Fibre Channel. To meet service provider-like levels of reliability, 5R-model systems provide protection switching, the ability to move traffic from one fiber pair to another in case of a service interruption. Dual hot-swappable power supplies are standard, but XKL can use a mix of AC and DC. XKL's user interface and system management scheme are also enterprise friendly: The command line interface is IOS-like, and instead of requiring the network engineer to wire an alarm panel, the unit natively supports syslog and SNMP.

XKL's products reach up to 80 kilometers out of the box, and amplification options push that to 200 kilometers. Plans are to double that distance.

Still, XKL faces challenges. Competitors, including Transmode, Adva, and Nortel, have products that scale down to enterprises, though their price points and complexity don't scale down accordingly, so far at least. More significantly, service providers own the fiber that XKL's enterprise customers will need to lease, and some will opt to hold out for the greater profits to be had providing lit circuits. To help address this situation, XKL has developed relationships with fiber-access brokers.

Return to the story:
XKL Brings New Life To Dark Fiber

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Commentary
Cyberattacks Are Tailored to Employees ... Why Isn't Security Training?
Tim Sadler, CEO and co-founder of Tessian,  6/17/2021
Edge-DRsplash-10-edge-articles
7 Powerful Cybersecurity Skills the Energy Sector Needs Most
Pam Baker, Contributing Writer,  6/22/2021
News
Microsoft Disrupts Large-Scale BEC Campaign Across Web Services
Kelly Sheridan, Staff Editor, Dark Reading,  6/15/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-35210
PUBLISHED: 2021-06-23
Contao 4.5.x through 4.9.x before 4.9.16, and 4.10.x through 4.11.x before 4.11.5, allows XSS. It is possible to inject code into the tl_log table that will be executed in the browser when the system log is called in the back end.
CVE-2021-27649
PUBLISHED: 2021-06-23
Use after free vulnerability in file transfer protocol component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to execute arbitrary code via unspecified vectors.
CVE-2021-29084
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in Security Advisor report management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29085
PUBLISHED: 2021-06-23
Improper neutralization of special elements in output used by a downstream component ('Injection') vulnerability in file sharing management component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to read arbitrary files via unspecified vectors.
CVE-2021-29086
PUBLISHED: 2021-06-23
Exposure of sensitive information to an unauthorized actor vulnerability in webapi component in Synology DiskStation Manager (DSM) before 6.2.3-25426-3 allows remote attackers to obtain sensitive information via unspecified vectors.