Topics: Data Centers
One of my technicians has been working on a client site for the last couple of weeks, the poor lad has been in Las Vegas of all places terrible I know. Whilst on site he got caught up in several conversations with the networking team discussing how they measure network efficiency. Did they look at how fast data travelled across the network, how much power the network consumed or how easy it was for end users to get what they expected from the network. Of course how you choose to measure the effectiveness of anything within your IT estate is up to you and should be aligned to you business goals. There are any number of tools available out there to help you measure your network speeds and indicators of performance.
Even if your an established Network Manager or your new to the role and inherited a network full of problems, what are the top 3 things that are creating networking to be less than excellent?
I asked amongst our technicians and clients and this is what they had to say.
IP Telephony: Is it secure?:
Securing your business has always been an important task. We keep all of our data under lock and key, you keep your accounts in secure locations and you train and develop your teams to be security concious. We all know that the fight to keep our clients and our business safe is never ending. This week I want to bring you attention to your phones, in particular the areas of your business where you are taking advantage of the power of VoIP. I have been watching the evolution of VoIP with interest since the start of my career in technology way back in the 90's. At the time I was working with an Avaya reseller who supplied the IP-Office system. Back then the networks we had could not really support VoIP and it has taken a little while for our networks to catch up and provide the service required to enable truly business class communications. Now VoIP is a well known communication platform and helps us to connect in the way it was always intended. What many Telecom providers might not have mentioned to you is exactly how easy it is to hack a VoIP call once it has left your network and the impact this can have on your business.
These days we are all familiar with hacking, and you do not need to be a celebrity to be a high profile target. Imagine the conversations happening across your business and what is involved. Take for example sales and finance teams discussing payment terms and details, highly secure information is being passed verbally on these calls every day. If you are hacked you could find account details, payment information and personal details are being stolen and used for someone else benefit. Where does this leave your business? With a breach you are unaware of, possibly out of PCI compliance and facing hefty fines!
Cisco’s Application Centric Infrastructure (ACI) is the global networking behemoths slant on SDN, and combined with their cutting edge Nexus 9k range of DC switches, they believe now is the time that you should all start looking at the transition… But what is ACI and why should you adopt it now?
Topics: Data Centers
superheroes are everywhere these days! You see them in the cinema, on our TV and if you have children probably adorned on various articles of clothing and games! These range of heroes out there is amazing from the law men of Mega City 1 through to Earth's mightiest heroes The Avengers. Acting as a protection against the evils of the world in all its forms. And it is the latter group of super powered characters that I was watching only recently at the cinema that got me thinking about cyber security.
The premise for the latest movie is all about protection and security, as Tony Stark and Bruce Banner accidentally create a new foe for themselves, whilst trying to protect the planet from all kinds of nasty things. Their new Nemesis breaks into their systems, steals information and escapes out to the wider world through their network and computer systems. The information stolen is then used to bring about certain doom for the earth. Sound familiar? Network vulnerabilities being exploited an, information stolen and all fingers pointed at some one who should have been able to deal with the breach before it became an issue. So what can the Avengers teach us about keeping our networks and company information safe?
Then To Now:
Your company's network infrastructure is most likely one of the most important elements to running your enterprise. The network supports every area of the company from delivering services to each and every department that improve daily operations, through to offering analytics that help your company develop and grow. Go back about 10 years ago and you simply needed to make sure that your business systems could support the flow of information around the business and you could afford to work in silo's of IT designed for specific tasks, not so in todays converged and application driven world. So what do you need to consider when looking at your IT infrastructure, and how do you align these decisions to business goals?
As a global infrastructure specialist we have helped many of our clients understand the new world of networking and how virtualization, cloud, IoT, SDN, and mobility are changing the face of their business. Our check-list below outlines the key actions we go through to help global enterprises identify the right solutions to achieve their business goals.
Figuring out how to meet client demands and grow margins isn't easy. But once you figure out the basics, you've opened the doors to tremendous opportunities for growth and learning.
Cisco ACI and IT Security
As our data centers start to change and the method by which information is moved around the business, new challenges are being presented everyday to network teams across the globe. Cisco ACI comes to the rescue with the automation of IT security policy provisioning across devices and servers, and sets up specific policies for each application and tenant using microsegmentation. Policy-based provisioning. For IT Security.
Whatever your aims and pain points, our specialists will meet with you to discuss what you want to achieve from your network infrastructure.