BYOD: How to Secure the Inevitable

by Kevin Flynn, senior product manager at Fortinet The bring-your-own-device (BYOD) phenomenon is disruptive. It tears massive security holes into an already disintegrating perimeter. It causes IT administrators to lose sleep. Passing fad? Not likely. In fact, research shows that if the youngest generation of workforce employees has anything to say about it, BYOD is…

Feds Finally Embracing 21st Century Security

by Security Specialist Paul Kenyon of Avecto Last Fall must have been a time for wound licking in the West Wing of the White House, particularly as it considered the fallout from the WikiLeaks Affair and the vast number of U.S. diplomats who were being embarrassed on a weekly basis by the publication of embarrassing…

Best Practices for BYOD on a Budget

Detecting the rogues While the BYOD DMZ incentive solution works for those that have not accessed the network before, there may be users that have already illicitly accessed the network. If they refuse or are otherwise unlikely to change their system setting to use the new “official” method, you’ll have to find these rogue devices…

Best Practices for BYOD on a Budget

by Jim MacLeod, Product Manager at WildPackets While the bring-your-own-device (BYOD) to work is a growing trend within the IT world, the main issue is that consumer-friendly technology is changing the way people want to work. Smartphones have provided mobile email for a decade, but the market has moved from business phones complete with corporate…

HP’s New DL380p Gen8 Server Sips Power

Many of the performance increases now available in the HP DL380p Gen8 come from Intel’s March release of the Xeon E5-2600 processors and the C6xx chip set family. IT managers have competitive choices, including the Dell R720 and the IBM System x3650 M4, both of which use the E5-2600 family processors. HP DL380p Gen8, a…

Should You be Worried about Hacktivism?

by Geoff Webb, director of Product Marketing at Credant Technologies Hacktivism is hardly a novel concept but there continues to be a vocal debate over what hackers are after and why they pursue specific targets. Should organizations worry in an enterprise-wide holistic sense about how to counter hacktivism or instead focus on a single set…

Business Continuity Planning as Storm Season Approaches

by Paddy Falls, CTO, Neverfail We’ve all heard that “April showers bring May flowers.” But unfortunately, where Mother Nature is concerned, that’s not always the case. Too often, April showers spawn more threatening weather incidents such as severe storms and tornadoes. Once June rolls around, there is also hurricane season to contend with. Business continuity…

SDN has Buzz, But Can it Deliver?

Although details may vary from platform to platform, SDN essentially involves abstracting the network control plane from underlying hardware — a truer form of network virtualization than many of the technologies that have adopted that term in the recent past. The practical benefits here are twofold: it makes the control plane remotely accessible, providing greater…

8 Reasons Why vSphere 5 is Coming Out on Top

6. VMware vMotion over higher latency networks: This almost sounds like magic, but it’s one of the most incredible vSphere features of all. vMotion technology allows IT pros to move a VM from one physical server to another while it is still running without downtime. Now, with vSphere 5, this can be done even in…

8 Reasons Why vSphere 5 is Coming Out on Top

The market heavily anticipated vSphere 5 and its arrival disappointed none. However, it comes packed with nearly 200 new and enhanced capabilities and that can make it a little difficult for some to figure out which features are best to exploit in any given scenario. The tips listed below will get you started in understanding…