博客


{/exp:comment:form} --}

Weak Links in Security Part 2: How to Create a Secure Network Configuration

Posted on April 25, 2018 by Gento  |  Comments (11)

The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.


Weak Links in Security Part 1: Configuration Is the Biggest Security Threat

Posted on March 28, 2018 by Gento  |  Comment (1)

The rise in cyberattacks and ransomware thefts has caused businesses to shore up their IT infrastructure defenses. While the boost in security protocols is a step in the right direction, many businesses are unaware of a key threat -- improperly configured IT devices and systems. For example, postponing or altogether forgetting to change a default password can leave your vital business data ripe for the taking.


The Challenges You Face with IoT and How To Overcome Them

Posted on March 15, 2018 by Gento  |  Comments (11)

Just a few years ago there were roughly 15 billion devices connected to the IoT, or "Internet of Things". By 2020, that number is expected to grow to 30.7 billion - representing about $1.29 trillion across all markets. Countless products - from industrial sensors, workspace management applications, to wearable devices - are all connected to the internet, and to each other. This is allowing them to create and share valuable data every second of the day.


Virtualization and its Challenges for Server Rooms

Posted on March 6, 2018 by Gento  |  Comments (9)

Enterprises have been using server virtualization to consolidate their IT footprint for years, but smaller organizations often experience difficulty in adopting this architecture for their IT infrastructure. Guidance on this process is especially important for small to medium-sized businesses (SMBs), which have limited resources for designing, implementing and managing their infrastructure.

The challenges that SMBs face in virtualizing their data center include the following:


IoT is Taking Over, Secure and Prepare Yourself

Posted on February 23, 2018 by Gento  |  Comments (6)

According to the Gartner research company, the number of devices with wireless internet connectivity is expected to approach 21 billion by the year 2020. That places the average person, globally, in possession of roughly 1.6 wireless devices. In the west, the estimate per person is four to five such devices. This is the Internet of Things (IoT), and the one thing that’s certain is you will have a potentially unlimited number of tech vendors vying for your attention, information, and money.

The first thing we should understand in this coming sea of connectivity is the rights of customers. As a customer in the IoT world you will have the right to;


Page 2 of 42 pages  < 1 2 3 4 >  Last ›

訂閱

近期活動

Cisco Live 2018
March 6-9, 2018  •  Melbourne, Australia
DataCloud Asia 2018
March 22, 2018  •  Singapore
DCD Indonesia
Apr 5, 2018  •  Jakarta
Data Centre World Hong Kong
May 16 – 17, 2018  •  Hong Kong
CDCC China
May, June, July, Nov 2018  •  Wuhan, Hangzhou, Chengdu, Beijing

View all Events

Raritan最新新聞

Legrand Makes 451 Research’s List of Largest Data Center Technology Suppliers
Posted on May 4, 2018
Finding Weak Links in Your Security Policy and How to Safeguard Data Centers Will Be Addressed by Raritan Speaker at AFCOM Conference
Posted on March 8, 2018
Raritan Introduces Secure Switch for KVM Access to Government and Military Computers
Posted on March 6, 2018
Ashley Fox of Raritan Inc. Recognized as 2018 CRN Channel Chief
Posted on February 27, 2018
Packet, Myriad Supply, Raritan, and Data Center Knowledge to Participate in ‘Managing the Edge’ Webinar
Posted on November 12, 2017

View all news