Author: Des Nnorchiri

  • Application Monitoring Beyond The Data Center

    Application Monitoring Beyond The Data Center

    The closed environment of a traditional on-premises data center with hardware and software owned and controlled by the enterprise is now a thing of the past. Private, public and hybrid cloud deployments are empowering organizations to use the resources and capabilities of the cloud to drive business efficiency, self-service on demand, resource pooling, enhanced data […]

  • Micro-Segmentation Best Practices

    Micro-Segmentation Best Practices

    With the growth of software-defined networking (SDN) and the evolution of software-defined data center (SDDC) technologies, network administrators, data center operators and security officers are increasingly looking to micro-segmentation, for enhanced and more flexible network security.   In this article, we’ll be considering the nature and characteristics of the process, and looking at ways to […]

  • Strategies For Managing Co-Location

    Strategies For Managing Co-Location

    Outfitting, maintaining and managing a data center can be an expensive, time-consuming and labor-intensive process – one which may be beyond the budgetary or human resources of smaller-scale enterprises. In other instances, an organization’s data management and processing needs may not warrant the investment in a full-blown data center of their own.   For circumstances […]

  • Reducing The Stress Of Data Migration

    Reducing The Stress Of Data Migration

    Life is never static, and for businesses the occasional relocation of data archives, mission-critical applications, infrastructure and services may prove necessary. It can be a complex and at times risky endeavor. There are ways to make the process less stressful, and to reduce the potential for such migrations to be costly, disruptive, or in some […]

  • Data Migration Infographic

  • Enterprise Encryption Best Practices

    Enterprise Encryption Best Practices

    Whether it’s to safeguard internal protocols and hierarchies, or to guard against attacks and data breaches in the escalating scale of current cyber-threats, implementing controls on the way information is transmitted and shared is more crucial to the enterprise than ever. Encryption has been and remains an essential aspect of this process. But how best […]

  • Next Generation Enterprise Campus Networks

    Next Generation Enterprise Campus Networks

    Enterprise networks are no longer confined to simple client-server operations and application workloads, managed in-house. Internet connectivity, mobile workforces, Bring Your Own Device (BYOD) policies, social media integration, the Cloud and Big Data analytics are all contributing to an environment that demands greater versatility and efficiency from the enterprise campus.   In this article, we’ll […]

  • Endpoint Security Tips

    Endpoint Security Tips

    With BYOD (Bring Your Own Device; either personal, or provided by the enterprise) now an integral part of policy in so many organisations, there’s an increased risk of USB flash drives, laptops, tablets, or smartphones holding sensitive data falling into the wrong hands – or being compromised in some way that allows malicious intruders to […]

  • Over the Edge?

    Over the Edge?

    As desktop and mobile owners continue to make a slow transition from previous versions of the operating system to Microsoft’s new Windows 10, enough user experience and feedback has emerged to give so me early assessments of the software giant’s flagship environment.   In this article, we’ll be looking at one of the linchpins of […]

  • Tips on Scaling Your Enterprise Storage

    Tips on Scaling Your Enterprise Storage

    Over time, business conditions change, and the demand for capacity to accumulate and analyse information, applications and documents change. To keep up, your organisation needs the ability to adjust the magnitude of its storage and compute capacities.   As hardware depreciates and traditional methods of storage get superseded by new techniques and technologies, you require […]