GDT Webinar Series – How to Fail at Security? Reserve Your Spot

Blogs

Dell EMC DP4400

That’s exactly what you’ll get with Dell EMC’s Integrated Data Protection Appliance Two words: data protection. There probably isn’t a more important combination of words in the IT industry. Obviously, Dell EMC agrees―their latest IDPA (integrated data protection appliance) is a turnkey, pre-integrated appliance that brings together protection storage, search

hybrid Cloud experience

By Richard Arneson If you listen closely, you can practically hear IT professionals the world over asking themselves the same question―“If I utilize the public cloud, how can I maintain control and enjoy the security I get from on-premises infrastructures?” And if that question does indeed steer them away from

SD-WAN for Application Enhancement

By Richard Arneson Remember the days when a new software application meant downloads, licenses, and minimum RAM and processing power requirements? Or when applications resided in a corporate data center and were accessed over expensive, leased lines from service providers, only then to be handed off to the Internet? Expensive,

WAN Optimization

Aside from the list of positives you’ve likely heard about SD-WAN (and there are many), there’s one thing it isn’t―WAN Optimization. Many incorrectly use SD-WAN and WAN Optimization interchangeably. That isn’t to say SD-WAN doesn’t greatly optimize networks, just that it’s not technically WAN Optimization, which was introduced roughly fifteen

Cisco HyperFlex

Hyperconvergence has been getting a lot of press in the last few years, and rightly so. It provides pretty much everything that legacy IT infrastructures don’t―flexibility, scalability and simplicity. It enables, in a single system, the management of equipment to handle a wide range of workloads, such as database management,

mobility managed solutions

By Richard Arneson If mobility isn’t one of the most used words of the past ten (10) years, it’s got to be a close second. And mobility is no longer just about using Smart phones or tablets to purchase Christmas presents and avoid trips to the shopping mall. Mobility is

Protection for your own backyard

By Richard Arneson An 18-month-old study by the Ponemon Institute, an independent research and education organization that works to advance privacy management practices for businesses and government agencies, discovered that, even though malicious insiders compose the largest, most costly source of security breaches, over seventy-five percent (75%) of businesses largely

market growth

According to an IDC report that was released in 2017, it was predicted the SD-WAN market would grow from a then $700M to over $8B by 2021. They’ve revised that figure. Now it’s over $9B. SD-WAN is often, yet incorrectly, referred to as WAN Optimization, but that’s actually a perfect

Cloud Migration Costs

When you consider the costs of doing business, you might only see dollar signs―not uncommon. But if your organization is planning a cloud migration, it’s important to understand all costs involved, both hard and soft. Sure, calculating the hard costs of a cloud migration is critically important―new or additional hardware