Archive for: October 2014

BYOD and security: Can you have both?

If you allow employees to use their personal devices for work, are you exposing your organization to new security risks? Attempted security breaches are on the rise, and employee smartphones, tablets and laptops could provide new pathways for malware, viruses and hacking. What can you do to protect enterprise information, applications and networks while still supporting your organization’s bring-your-own-device (BYOD) program?

Read the source article at Home – Dell Community

Dell Welcomes Security Partners Back to Peak Performance Conference

Since first joining SonicWALL in 2006, our annual conference for SonicWALL channel partners was always one of the main highlights of my year. It gave us an opportunity to meet face-to-face with our channel partners from around the world to exchange ideas about vital security industry trends, and learn about their concerns and priorities.

Read the source article at Home – Dell Community

Key Components of Data Center Optimization

With increasing competition and high expectations from customers, businesses are working diligently to provide the best possible value at the lowest possible price for its customers. One way to achieve this is by optimizing the costs which a company is incurring across units.

Read the source article at Data Center Knowledge

Magic Quadrant for Data Center Infrastructure Management Tools (DCIM)

Your data center has become a critical component of your business. So much so that many business initiatives are actually planned around the capabilities of IT.

The emergence of cloud, IT consumerization, and a lot more data has forced the data center to evolve and support new demands.

Read the source article at Data Center Knowledge

Choosing the right devices for BYOD and CYOD

To make the most of your bring-your-own-device (BYOD) or choose-your-own-device (CYOD) program, employees need the right devices. Whatever smartphones, tablets, laptops and other devices you choose, they must help boost mobile productivity, enable enterprise IT management and help maintain security.

But given the wide variety of device types, device vendors and operating systems available today, how do you make your selections? A few simple guidelines can get you started in the right direction.

Read the source article at Home – Dell Community

10 Cool Hybrid On-Prem/Cloud Data Protection Solutions For SMBs

Integrated hybrid data protection solutions, which include an on-premise backup and recovery appliance connected to a cloud storage platform, offer a way for traditional solution providers and managed services providers to keep SMBs safe from disasters.

Read the source article at crn.com

Talking Tech Series: VMware NSX Edge Scale Out with Equal-Cost Multi-Path Routing

This post was written by Roie Ben Haim and Max Ardica, with a special thanks to Jerome Catrouillet, Michael Haines, Tiran Efrat and Ofir Nissim for their valuable input. The modern data center design is changing, following a shift in the habits of consumers using mobile devices, the number of new applications that appear […]]> This post was written by Roie Ben Haim and Max Ardica, with a special thanks to Jerome Catrouillet, Michael Haines, Tiran Efrat and Ofir Nissim for their valuable input.

Read the source article at VMware Blogs

Top 5 Reasons Why Environment Sensors are in All Modern Data Centers

Your data center is a well-oiled machine processing massive amounts of user information, applications and complex workloads. You work hard to keep this machine running optimally with maintenance, powerful software tools, and knowledgeable engineers.

However, as more users connect and demand resources, your business model must evolve.

So how do you keep an eye on an ever-expanding data center platform?

Read the source article at Data Center Knowledge