Helping clients manage their technology for over 30 years.

Planning Your Hybrid Cloud: 6 Key Steps (part 2)

Architecture blueprint as a model for cloud planning

In my last post I focused on the first two steps in planning for a hybrid cloud: Making sure your IT infrastructure is “cloudified” and assessing your current environment and workloads. In this post, I’ll lay out the final four steps:  Continue reading

Planning Your Hybrid Cloud: 6 Key Steps (in 2 parts)

Information Cloud

By some accounts, better than 50% of organizations are now deploying hybrid clouds — and for some very good reasons:

  • Improved security, because sensitive data can remain behind your private cloud firewall while less sensitive data can be permitted onto a public cloud.
  • Ability to specify where and under what terms and conditions your data is stored.
  • Effective workload balancing without breaking the bank, since using a public cloud to, say, handle peak loads can be far cheaper than keeping everything in-house or moving everything to a public cloud.

To get a hybrid cloud up and running, you need to begin with planning — specifically, a six-step planning process that, fortunately, you do not have to undertake alone. In this post, I’ll focus on the first two steps: Continue reading

IT Security in 2014: How You Can Protect Your Business

Virtual locks representing security

Most security experts — including ours at Quest — will tell you that it’s no longer a question of if attempts to compromise your data, apps, and/or technology infrastructure will happen, it’s now only a question of when.

So what can you do to protect your business in this age when it’s so tough to distinguish between trusted and threatening network traffic, when there’s no longer such a thing as a secure perimeter around your data, when the “attack surface” has never been greater? Continue reading

IT Security in 2014: Challenges and More Challenges

Glass chess pieces

Information technology has become a business essential. We’ve reached the point where our ability to thrive and succeed depends on key software apps and the technology (wherever it may be) that runs them, our access-from-anywhere to the Internet, and our ability to gather and analyze troves of digitized data.

The easiest targets
So important are these capabilities that we often put them into use before we’ve figured out the myriad of ways they’re vulnerable to those with malicious intent. And while smaller enterprises used to be able to escape the worst of these vulnerabilities simply by slipping beneath cybercriminals’ radar, those days are gone.  Continue reading

What to Look For in IT Operations Analytics Capabilities

iPhone sitting on background with map of the world and charts and graphs coming out of the phone.

In my last post, I discussed how IT operations analytics can transform the masses of IT performance data into insight that provides broad, cross-tier network and infrastructure visibility so that …

  1. Issues may be proactively recognized and resolved before they affect your business
  2. Future capacity and provisioning requirements may be anticipated
  3. A performance baseline built from multiple metrics can be established, reducing the time, money, and headaches associated with planning and deploying new projects, such as cloud deployments or virtualization.

But how should you go about choosing an IT operations analytics solutions? This is worth paying attention to, since such solutions are new, called by a number of different names (though likely not for long) and are available both as appliances and cloud-based services. Continue reading

When IT Performance Monitoring Gets a “Big Data” Boost

Businessman standing on Cloud looking at world map covered with image representing Cloud data. And a giant Q from the Quest logo

No doubt you’ve heard about “big data.” It sounds intimidating, invasive, and, well, way too big. But don’t be fooled — “big data” is going to save your IT infrastructure.

The first thing you need to understand about how this is happening (oh yes, it’s already well underway) is that “big data” is something of a misnomer. What we’re really talking about is analytics — automated mathematical tools that work in real time to sift through untold amounts of regular old data, in this case IT performance data, and produce actionable results that go far beyond legacy monitoring capabilities. Continue reading

Why cloud DR pays off in a mission-critical IT world

Not so long ago, the best way to assure your organization would survive a major disruption involved building — and continuously paying for — a dedicated recovery site. Like so many early-generation IT solutions, this one was unaffordable for most smaller businesses.

Happily, the very technologies that generate disruption-causing complexity (see my last post) also provide the kinds of cost-effective capabilities, such as real-time replication and managed disaster recovery services, that today’s heavily mission- and business-critical IT environments require. Continue reading

Apps, Apps Everywhere — But How Secure Are Yours

Did you know that your applications are the most vulnerable part of your IT operations?

iPhone with lock to symbolize Cloud Security. Cloud in background

These days, problems with apps — many of them web-based apps — account for the majority of information security breaches. Over the last year or so, and going forward, application-level attacks have emerged as the preferred vector for gaining access to sensitive (and valuable) data. What’s more, the threats are becoming increasingly acute as complex web apps, as well as mobile apps, play ever greater roles in our business and personal activities.

App vulnerabilities for sale — cheap at the price? Continue reading

What Secure, Enterprise-Grade File Sharing/Syncing Looks Like

Small glimpse of Secure VPN diagram

As I detailed in my last post, file sharing/syncing is quickly transforming how, where and when we work by making our apps and data available and usable on any Internet-connected device. Even if your organization doesn’t have an enterprise-grade file sharing/syncing capability in place, odds are your employees have attempted to make their lives easier by implementing their own consumer-grade alternatives. Continue reading

A Glimpse of What’s on the 2014 Tech Horizon …

Four dice showing 2013. Last die is rotating from 3 to 4 for 2014

As 2013 comes to a close, it’s time to look ahead, and a good place to start is Gartner’s top ten strategic technology trends for 2014, which point to an accelerating velocity of change that we ignore at our peril:

Continue reading