The Raritan Blog

Increase Operational Efficiencies and Security With Remote Power Management and Server Access

Posted on August 21, 2018 by Rick Gonedes

They say that life happens in a blink of an eye. In the case of Choice Hotels International, which operates more than 6,300 hotels worldwide, life happens at a much faster pace. At the heart of one of the world's largest lodging companies is its global reservation system. When someone checks in or out, a room is looked at, or a reservation is made, the transaction is promptly processed via Choice's data center. The challenge of course is that any downtime not only means lost revenue, but dissatisfied customers. This challenge is all too familiar for many corporations; fortunately, a solution exists whereby a virtual presence within an offsite data center is created.
 


Disruptive Technologies Changing Data Centers: Part 3

Posted on August 14, 2018 by Rick Gonedes

Disruptive Technologies Changing Data Centers Part 3

Content originally sourced from 451 Research.

Disruptive technologies will have the unique opportunity to positively impact data centers. In Part 2 of this series, we explored two technologies that are staged to change the very system and infrastructure of IT systems. In this final portion of our disruptive technologies series, we want to take a look at two technologies that will bring heightened levels of agility to data centers for a fraction of the cost.


Disruptive Technologies Changing Data Centers: Part 2

Posted on August 6, 2018 by Rick Gonedes

Content originally sourced from 451 Research.

The technological world is constantly innovating and evolving. Rather than break the rules, data centers can be found at the heart of these positive, yet disruptive changes. In Part 1 of this series, we explored two disruptive technologies that will help to meet the growing demands for data generation, security and storage. Now, we want to examine two technologies that will have the power to change the infrastructure and design of IT systems.


The True Cost and Causes of a Data Center Breach: Part 1

Posted on July 25, 2018 by Jessica Ciesla

For the past few years, data breaches have run rampant amongst the news headlines. These breaches are defined as events whereby an individual's personal information, such as their name, Social Security number, financial or medical record, banking credentials, or credit card is put at risk or stolen. Recent studies have revealed that data breaches are either the result of an internal or external malicious attack, system error, or human error. While the causes of data center breaches vary, the result is typically costly for any organization.


Physical Security and Audit-Readiness at the Rack

Posted on July 23, 2018 by Jessica Ciesla

As a growing volume of sensitive data increasingly floats across your cloud and virtualized infrastructure, it’s easy to think about security and compliance in non-physical terms. That’s because compliance mandates such as HIPAA, PCI, and GDPR require your organization to protect data no matter where it resides. And if an attacker breaches your environment through a phishing email or an unpatched vulnerability, there’s no telling where they can wind up as they probe laterally across your network.


Page 3 of 76 pages  < 1 2 3 4 5 >  Last ›