The Raritan Blog

Cost Savings with Micro Data Centers

Posted on May 4, 2018 by Gento  |  Comments (2)

Major changes in data centers operations have historically involved the location of data processing. At one time, this function was moved off-site to mainframes, but the advent of microcomputers, now known as desktops or PCs, brought data processing back to the customer’s own data center. Cloud servers and collocated data centers resulted in data processing being performed off-site once again.

Today, some organizations are using micro data centers to process data on their own premises. This solution can provide performance improvements that justify the initial expense of a data center and has the potential to gain wide acceptance in the near future.


5 Reasons to Prioritize Rack-Level Management Now

Posted on April 25, 2018 by Gento  |  Comments (17)

If you’re an IT leader, you’ve probably made significant investments in data center management over the past few years. That’s because the success of the organization you serve depends heavily on the technical and economic performance of your data center. So the more digital your organization becomes, the smarter you have to be about how you manage your data center infrastructure.

Chances are, though, that you’ve focused on aggregate management of your data center as a whole. That’s good – but it will only get you so far. To fully optimize the value your business derives from its data center capex and opex, you must aggressively pursue operational excellence at the rack level.


What is an intelligent PDU?

Posted on April 25, 2018 by Gento  |  Comments (16)

An Intelligent Power Distribution Unit (iPDU) is a networked power distribution unit that increases the efficiencies of data centers with real-time remote power monitoring, environmental monitoring, and data center infrastructure integration. Intelligent rack PDUs deliver technologies which enables a smarter IT infrastructure so you can stay ahead of problems before they occur. They help achieve the ultimate goal of any data center manager, maintaining uptime while reducing cost.


Weak Links in Security Part 2: How to Create a Secure Network Configuration

Posted on April 25, 2018 by Gento  |  Comments (11)

The 2017 Data Breach Investigations Report (DBIR) revealed that 51 percent of breaches involved the use of malware. Of these breaches, 66 percent were initiated via phishing campaigns that used malware infected email attachments. As discussed in Part 1: Configuration Is the Biggest Security Threat, there are five steps that businesses need to take to mitigate configuration security risks. These steps include: endpoint protection, strong passwords, a restricted number of login attempts, alternative authentication, and limited access to critical systems. Upon completing these steps the next task will be to ensure that all devices, communications, logging, and vulnerability responses are properly configured to create a secure network for your vital business data.


Weak Links in Security Part 1: Configuration Is the Biggest Security Threat

Posted on March 28, 2018 by Gento  |  Comment (1)

The rise in cyberattacks and ransomware thefts has caused businesses to shore up their IT infrastructure defenses. While the boost in security protocols is a step in the right direction, many businesses are unaware of a key threat -- improperly configured IT devices and systems. For example, postponing or altogether forgetting to change a default password can leave your vital business data ripe for the taking.


Page 2 of 43 pages  < 1 2 3 4 >  Last ›

Subscribe

Upcoming Events

Cisco Live 2018
March 6-9, 2018  •  Melbourne, Australia
DataCloud Asia 2018
March 22, 2018  •  Singapore
DCD Indonesia
Apr 5, 2018  •  Jakarta
Data Centre World Hong Kong
May 16 – 17, 2018  •  Hong Kong
CDCC China
May, June, July, Nov 2018  •  Wuhan, Hangzhou, Chengdu, Beijing

View all Events

Latest News

Legrand Makes 451 Research’s List of Largest Data Center Technology Suppliers
Posted on May 4, 2018
Finding Weak Links in Your Security Policy and How to Safeguard Data Centers Will Be Addressed by Raritan Speaker at AFCOM Conference
Posted on March 8, 2018
Raritan Introduces Secure Switch for KVM Access to Government and Military Computers
Posted on March 6, 2018
Ashley Fox of Raritan Inc. Recognized as 2018 CRN Channel Chief
Posted on February 27, 2018
Packet, Myriad Supply, Raritan, and Data Center Knowledge to Participate in ‘Managing the Edge’ Webinar
Posted on November 12, 2017

View all news