Managing Mobile Devices

They are the best of tools and the worst of tools. Mobile computing devices can support the workforce out in the field or make your most sensitive company secrets public knowledge. The only way to simultaneously unleash your workforce and rein in company threats is to control the risks. Many

Migration Without Mishap

Server migrations come in just about every size, shape and variety — you can change operating systems, hardware platforms, vendors or do any combination of the three. But whether you seek to increase capacity, upgrade to the latest technology or standardize on a particular hardware or software platform, the ability

Reinforcing WiFi Redundancy

Redundancy is routine in the constant scramble to keep a conventional enterprise network functioning. But the wireless infrastructure is often ignored, leaving enterprises vulnerable to malicious attacks and network failure. No longer a hot-spot sideshow, wireless is on track to become the primary enterprise network sooner than you might think.

Wired Versus Wireless Networks: What’s Right For You?

When comparing wired networks to wireless ones, it’s six of one, half dozen of another. Wired network speeds have increased to the gigabit range, providing more rapid, reliable and secure access to stored data. On the other hand, wireless networks offer flexibility, mobility and faster return on investment (ROI). What’s

Social Network Security

Social networking sites are designed to let people reach out to one another. As virtual communities of professions and connections to experts, they can be valuable business resources. But these very interactions that make networking sites valuable are the same ones that can leave corporate networks vulnerable to IT security

Is the Internet the New WAN?

After close to two decades — a lifetime in information technology — the traditional corporate wide-area network (WAN) may be headed for the endangered-species list. The usurper: Internet-based virtual private networks (VPNs). Instead of depending on dedicated leased or owned lines, VPNs use a variety of technologies to carry data

Continuous Data Protection: Securing Data

It’s virtually a no-brainer. Your data is backed up the instant you make a change to it — any change, no matter how small. You can retrieve it immediately. That’s right; no need to hassle with locating and accessing the right backup tape. And the expense is easily justified by

Network Switches Grow Up

Once just hubs that directed network traffic, network switches have steadily gained intelligence. They can now help with user access control of applications and enable fault tolerance to prevent network downtime. This increased functionality not only makes the corporate network run better; it can relieve some of the administrative load

The Pros and Cons of Server Consolidation

One of the hottest prospects to address the high administrative, support and infrastructure costs of the data center is server consolidation. “In the long term, server consolidation is something you absolutely must do,” says Tim Pacileo, executive consultant at Compass American Inc., a metrics-based IT consulting firm based in New

Are Remote Users Threatening Your Security?

The troubling news is remote access remains as much of a security threat for enterprise as it ever was. The good news is that companies can diminish the likelihood of a breach with the right management and technology. “Remote access is probably the key problem to all problems we have