GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Blogs

Security Check-up

Choose to ignore it and you’ll pay later (just ask the city of Atlanta) In March of this year, the City of Atlanta found out the hard way what failing to do a security check-up can mean. They were hit with the SamSam ransomware, which created an encrypted wall that

SD-WAN cost savings

Sure, there are many, many benefits of utilizing SD-WAN that go well beyond cost savings, but the dollar signs tend to get the most press (big surprise). But savings aren’t limited to costs reflected solely within IT budget line items―they stretch far and wide, and include, as a byproduct, many

Dell EMC DP4400

That’s exactly what you’ll get with Dell EMC’s Integrated Data Protection Appliance Two words: data protection. There probably isn’t a more important combination of words in the IT industry. Obviously, Dell EMC agrees―their latest IDPA (integrated data protection appliance) is a turnkey, pre-integrated appliance that brings together protection storage, search

hybrid Cloud experience

By Richard Arneson If you listen closely, you can practically hear IT professionals the world over asking themselves the same question―“If I utilize the public cloud, how can I maintain control and enjoy the security I get from on-premises infrastructures?” And if that question does indeed steer them away from

SD-WAN for Application Enhancement

By Richard Arneson Remember the days when a new software application meant downloads, licenses, and minimum RAM and processing power requirements? Or when applications resided in a corporate data center and were accessed over expensive, leased lines from service providers, only then to be handed off to the Internet? Expensive,

WAN Optimization

Aside from the list of positives you’ve likely heard about SD-WAN (and there are many), there’s one thing it isn’t―WAN Optimization. Many incorrectly use SD-WAN and WAN Optimization interchangeably. That isn’t to say SD-WAN doesn’t greatly optimize networks, just that it’s not technically WAN Optimization, which was introduced roughly fifteen

Cisco HyperFlex

Hyperconvergence has been getting a lot of press in the last few years, and rightly so. It provides pretty much everything that legacy IT infrastructures don’t―flexibility, scalability and simplicity. It enables, in a single system, the management of equipment to handle a wide range of workloads, such as database management,

mobility managed solutions

By Richard Arneson If mobility isn’t one of the most used words of the past ten (10) years, it’s got to be a close second. And mobility is no longer just about using Smart phones or tablets to purchase Christmas presents and avoid trips to the shopping mall. Mobility is

Protection for your own backyard

By Richard Arneson An 18-month-old study by the Ponemon Institute, an independent research and education organization that works to advance privacy management practices for businesses and government agencies, discovered that, even though malicious insiders compose the largest, most costly source of security breaches, over seventy-five percent (75%) of businesses largely