In my previous blog, we learned about the basics of adaptive security architecture .We also learnt why enterprises need to focus on a more comprehensive...
Search results for: 7 problem management
What Private Equity Means for SolarWinds Users
Well, that was fast. Less than two weeks after SolarWinds committed to reviewing its “strategic alternatives,” the review is complete and the alternative chosen. The...
Time for SolarWinds Users to Explore Their Strategic Alternatives
Nothing like letting customers know they are important – until they are not! Recently, SolarWinds announced that it is “reviewing its strategic alternatives” with respect...
Four Things to Consider When Making Your Enterprise Network Mobile Ready
Mobile-device adoption for day-to-day business activities has been on the rise thanks to BYOD, smartphone proliferation and high-speed wireless networks. According to ABI Research, the...
Microsoft LAPS: Honest Obituary or False Eulogy to the Death of Passwords?
The famous Latin phrase De mortuis nil nisi bonum (Of the dead, nothing unless good) came to mind last week when Microsoft announced the release of LAPS (Local Administrator Password...
The Rise of Flash and SDS
Enterprises have been forever chasing the dream of retrieving their applications in double time. This has resulted in the creation of a number of storage...
Hacking Hospitality: How to Fight the Cyber-criminals Targeting Business Travelers
Traditionally, financial institutions have remained the top targets of cyber-criminals across the globe. Of late, hackers are eyeing so many other things that, one would normally...
Four More Overlooked but Highly Valuable Help Desk Questions
Sherlock Holmes has the power of deduction that helps him solve rather difficult cases. If only IT technicians develop this as a habit, they can...
5 Best Practices to Be a Successful Project Manager
As a project manager who’s been around a while you would have experienced a visit to the project guillotine. Perhaps, it was due to a...