Closing the availability gap with a combo of hyperconverged and recoverability

People want information at their fingertips, faster and more immediately than ever before. Waiting around for pages or apps to load, come back online, or restore simply isn’t an option anymore. Technology needs to be fast, efficient, and reliable—24/7.

A survey of more than 1,000 IT leaders showed that 69 percent believe that this kind of availability for services and applications is a requirement for digital transformation. Yet 82 percent see a gap between what their business requires and what they can actually deliver. This “availability gap” is said to hinder the modern enterprise, as 66 percent of those surveyed admitted that unplanned downtime was holding back digital transformation initiatives.

Clearly, companies would like to close the availability gap—it’s a crucial part of completing a digital transformation. Figuring out how to do that, however, can be trickier. Fortunately, we have some expert advice to get you started. Continue Reading…

Tags: , , ,

Is your enterprise cloud ready for the big leagues? Start with Triple A.

So your organization wants to be more agile—aspiring to spin up new test environments in minutes, speed development processes, and scale infrastructure with ease. Your reflex is to move applications to public cloud to gain agility, but that isn’t always the right option. Sure, some cloud-native applications are well suited to public cloud, but other enterprise applications are not. The cost of recoding, refactoring, and building resiliency into those applications before migration can be prohibitive. Continue Reading…

Tags: , ,

Quick cubicle hacks for a healthier, more productive you

They’re not physically demanding, but desk jobs take a toll on your health.

Sitting is the new smoking” is a common refrain of the ergonomic movement. Research shows that sitting all day has adverse health effects. Sitting for extended periods of time or completing repetitive tasks can lead to musculoskeletal disorders (MSDs), which account for approximately 33 percent of all worker injury and illness cases.

Having a more functional and ergonomic workstation isn’t just beneficial for your back, eyes, and circulation; it also improves your overall productivity. No one wants to dive into a challenging project when their eyes are strained and legs are asleep, right? Continue Reading…

Tags: , ,

Not your father’s antivirus: How new malware detection gives IT a leg up in cybersecurity

IT security is a fundamentally uneven playing field: You have to win every day, but attackers have to win just once. Cyber criminals spend mere pennies compared to the huge investments that organizations make on network defenses, specialized security and compliance systems, and employee education. And IT is always chasing a new target – yesterday’s biggest risk was a Trojan horse, today’s threat is ransomware, but tomorrow’s threat is unknown.

Even IT’s best methods – whitelisting, quarantining, and sandboxing – still can’t prevent the majority of attacks, and they often disrupt employee productivity or increase the burden on IT. So is there a way to prevent malware, like ransomware, even if it’s never been seen before? And can you do so without impacting user productivity? The short answer is yes. Here’s how. Continue Reading…

Tags: , , ,

Is your health care organization prepared for a cyber attack?

healthcare-itRansomware and cybercrime hacking have been two of the most common IT security threats in 2016, but many health care organizations aren’t ready to play defense: Only about 60 percent of surveyed organizations had the security capabilities in place to detect and remediate these attacks.

That’s problematic, of course, but is it surprising? After all, many health care organizations place more importance on HIPAA compliance than security, or they aren’t agile enough to protect themselves against the newest threat. Organizations tend to sink their energy into defending against the latest threat of the day, but lag on improving their entire security architecture. Continue Reading…

Tags: , , , , ,

Before buying a UPS, answer these 4 questions

uninterruptible-power-supplyWhen was your last time downtime incident? If you’re like the respondents in a recent IHS survey, you’ve seen five downtime events in the past month.

That adds up to millions of dollars in lost revenue and productivity – midsize companies reported one downtime event cost approximately $1 million — and possible equipment repairs or replacements. Lost or damaged data is an unquantifiable cost.

If you don’t already have a proper battery backup and power protection plan in place, it’s time to do so. An uninterruptible power supply (UPS) system that costs a few hundred dollars will pay for itself many times over if it gets your organization through even a single power failure. Continue Reading…

Tags: , , ,

Why SSDs are taking over in the data center

Intel SSDThe reports of hard disk drives’ (HDDs) death have not been greatly exaggerated. That’s because solid state drives (SSDs) continue their takeover in consumer devices and the data center.

Sure, HDDs and SSDs each have their own advantages, but the latter is the more modern technology that continues advancing. As prices drop, SSDs are proving their advantages to end users and IT managers.

But there’s another huge motivation for large organizations to pick SSDs over HDDs: complex data. I’ll explain. Continue Reading…

Tags: , , ,

Keeping IT equipment safe from power outages

CyberPower on uninterruptible power suppliesSummer is power season, as demand for electric power spikes. Air conditioning and other power demands strain utilities, making brownouts (temporary drops in voltage) and blackouts as common as mosquito bites. Not to mention severe weather events like thunderstorms, tornadoes, and hurricanes that can knock out electricity.

For many, these outages are mere inconveniences. But organizations risk losing sensitive data when a sudden power outage knocks computers and servers offline, especially if the power remains out for hours. A surge protector won’t save you from these outages, no matter the time of year.

The first line of defense against brownouts and blackouts is an uninterruptible power supply (UPS), which provides continuous power during an outage. But different organizations and different hardware will need different power protections. By understanding power requirements and the types of UPS that are available, you can give your organization the protection it deserves. Continue Reading…

Tags: , , ,

Next-gen mobile computing: Thinking beyond BYOD

HP on thinking beyond BYODThink about how new technologies have changed the way we consume music over the past 50 years. From vinyl to cassette tapes, from CDs to MP3s, and now to digital services like Spotify and Pandora, technological advancements can disrupt entire industries and significantly improve user experiences.

Similarly, the way we do business evolves in less than a generation. Not too long ago, IT managers were faced with the concept of BYOD and the increased complexity it carried due to the proliferation of mobile devices entering the business environment.

Today, commercial mobility involves much more. Employees expect a different style of computing to get work done and make their jobs easier. Every organization needs a mobile strategy that’s versatile enough to address the massive shift in where and how we work. To be truly productive, an organization’s strategy must rely on quality and durable devices, broad security controls, and policies that allow IT to easily manage devices.

There are four components of a smart mobile strategy that moves past BYOD. As you evaluate next-gen mobility solutions, keep these four insights in mind: Continue Reading…

Tags: , ,

This is why every organization needs adaptive and autonomous security

McAfee adaptive threat preventionMore than 300 new security threats are detected every minute. Ransomware and malware are growing at double-digit rates, and mobile malware grew 72 percent in the last quarter of 2015. In the face of advanced targeted attacks, full vector protection and a timely response are major challenges for security teams across every sector. Most organizations rely on a multi-vendor, siloed security infrastructure in which products don’t communicate with one another, allowing attacks to penetrate gaps and invade a network.

IT security staff shortages and a lack of automated processes create these inefficiencies and lapses in protection. Plus, existing security infrastructures lack integration of the inspection, intelligence gathering, analytics, and enforcement components of an enterprise security architecture. These essential elements constitute the underpinnings of cybersecurity best practices known as the protect, detect, and correct process of incident response.

What’s the solution? Integration. Instead of buying the entire “best of” list (the best end point protection, best firewall, best IPS), organizations should be adopting security systems that talk to each other, regardless of the vendor. Knowing how that works and why it’s necessary will help you further strengthen your IT security. Continue Reading…

Tags: , ,