Quest Technology Management

Helping clients manage their technology for over 30 years.

9 best practices to boost your clients’ enterprise network performance

 IT Talente by Quest

For your clients to attain the network performance their enterprises need, point them to these nine best practices:

1      Plan for continued bandwidth growth
Your clients will need to prepare for 5G mobility, the internet of things (IoT), video conferencing, collaboration tools, etc. — all of which will accelerate bandwidth demand.

2      Baseline network and cloud services
As cloud migrations snag traffic from beyond your clients’ networks and impact network performance, baselining both cloud applications and the underlying network behavior help define the new normal.

3  Embed security into network design
No longer an afterthought, security needs to be embedded into your clients’ network’s design right from the start.

4      Monitor the network
Without an ability to constantly monitor the network, your clients won’t be able to spot and respond to problem precursors and prevent them from harming network performance and network security.

5      Segment the network
The more your clients’ networks link operations, employees, suppliers, and customers, the more security threats they face. By segmenting the network, your clients can keep attacks on one segment from spreading to others.

6      Embrace the virtualized, software-centric network
Using capabilities like software-defined wide area networking (SD-WAN) and network performance management/application performance management technologies to virtualize systems and functions saves resources and enables automation of key business functions.

7      Commit to real-time network analytics
Network analytics engines can identify redundancies and misapplication of your clients’ resources and power centralized control of functions like security patching, managing software updates and upgrades, and overseeing device lifecycles.

8      Use proof-of-concept network strategies
Requiring proof of concept when your clients procure/configure their networks can prevent problems and mismatches that impact network performance and/or network security.

9      Consider managed network services
As networks become increasingly complex, your clients may be able to benefit from bringing in a network management service provider. Your clients will do best with a provider able to deliver both a breadth and depth of offerings that should include a proven ability to:

Enterprise network performance challenges and the technologies that can help

 IT Talente by Quest

Do your clients strain to keep their data networks at the performance levels necessary to stay competitive?

Four network performance challenges
Your clients may be facing one or all of these:

1   More data traffic and faster, too. Annual global IP traffic is increasing by 24% per year and will hit 3.3 zettabytes (3.3 trillion gigabytes) by 2021, when broadband speeds will have nearly doubled.

Continue reading

Helping your clients toward IT resilience

 IT resilience by Quest

Now that a hefty majority of enterprise systems, applications, and workloads are considered mission- or business-critical, discussions about business continuity and disaster recovery focus on IT resilience architectures employing multiple geographically-distributed data centers that use live application failover to prevent downtime.
Continue reading

Ecosystem or Feudal System?

Game of Thrones playing on iPad

Game of Thrones recently kicked off its fourth season. And as a devoted fan, I cannot help but see the similarities between the battle for control of Westeros, the Iron Throne and the capital city, King’s Landing and the current gamesmanship developing in the IT Channel for control of the end-user experience, the IT infrastructure backbone, and the datacenter.

Much like the Channel, Westeros the fantasy realm of the HBO hit show, Game of Thrones, is made up of different families and kingdoms. For those who remember their Western Civilization courses, it is basically a feudal system under the mercurial rule of a corruptible monarchy, bordered on the north by snow zombies and hordes of non-allied “wildlings” and to the south east by dragons and a very angry ex-pat, who is raising an army to kill everyone back home.

Continue reading

Capitalizing on Quest’s Investments

Hand drawing arrows on glass. All the arrows are pointing to the left except one point up. Stand out from the crowd.

With Cloud adoption growing at an incredible rate, leverage the strengths of Quest’s expanding footprint and Cloud services portfolio to extend the value you provide customers and increase your sales.

 Stand out from the crowd

Drive more monthly recurring revenue by integrating Infrastructure as a Service, Desktops as a Service, Disaster Recovery & Business Continuity and Co-location services into your customer opportunities with  Quest’s recent 120K sq. ft. facility in Roseville, CA and expanding network of global Service Delivery Centers. Continue reading

Ear Holed

American football player against a Cloud background. Talk to your clients about the Cloud or you might get ear holed.
Football games are as much a part of Thanksgiving as turkey, mashed potatoes and pumpkin pie. In football, there’s a term called getting “ear holed”. For those who have never played the greatest sport in America, the best definition I can provide is as follows: Ear Holed: A player being tackled/blocked from the side, leaving ones feet and potentially losing consciousness momentarily, without warning or seeing the hit coming. If you’re more visually inclined, check out this video clip. I think we can all agree no one wants to be #10 from Wisconsin in that moment. Continue reading

Project Crunch

Chalkboard full of business terms relating to project management and motivational topics.
It is that time of year again. The seasons are changing, the days are getting shorter and the end of the year is fast approaching. Customers are wrapping up projects, closing out budgets and starting to plan operations for the New Year. Procurement decisions have been made and the project cycle will continue into the winter. Continue reading

Security Risk and Reward

informationSecurity
Market experts love to talk about Information Security. And why wouldn’t they?! It is a beautiful market of evolving requirements and according to a new report by Global Industry Analysts, it’s projected to surpass $125 billion by 2015. Market research and revenue projections aside, what does the growing need for security practices at all levels mean for the Channel? What does it mean to the SMB space? Even large enterprises get breached, and they’ve invested billions of dollars in information security and have CIO’s and Directors overseeing teams of security admins, network security professionals, and quality control processes for application delivery. Threats can come from any level, Cisco projects that 50 billon devices will be connected to the Internet of Everything (IoE) by 2020. Applications, email, networks, remote workers, Cloud hosted databases. If your clients’ business has touched the internet, it’s likely that automated malware and botnets are searching their systems for vulnerabilities. The motives behind these infected emails, watering hole attacks and zero day threats are not always known until it is too late. Corporate databases are breached, users personally identifiable information (PII) is lost and regulators penalties and damaged consumer confidence is inevitable. Continue reading

Cloud-Reluctant Customers: Do You Walk Away?

Thus far, much of cloud computing has been “coin-operated”. Put in your quarter and out comes X amount of real-time data storage or Y period of email service, forms analysis, payroll processing, etc. The payoff: An affordable OpEx transaction that instantly delivers. So easy, so hassle-free — as long as you “fit in the box” of offerings available from the Cloud Provider. But what about those customers that don’t fit, or that aren’t willing to accept the tradeoff between affordable-instant-easy transactions and what they perceive to be loss of control over their data and processes – do you just walk away? In short, you’d be making a terrible mistake to assume these apparently cloud-reluctant customers are beyond your reach. I recommend checking out this post from Quest’s Director of Sales, Gary Schick, originally published on Channel Partners Peer-to-Peer blog.

Selling Cloud-based Virtual Desktops: A Reality Check

guyTabletWorld
Ideas are cheap, the ability to execute is priceless. Nowhere else in technology is this more apparent than in the delivery of virtual desktops. Why you ask? Because virtual desktops put DaaS providers, their partners, and clients internal IT, directly in the crosshairs of the end users and their expectations. The margin for error is razor thin. If the end user cannot easily access their virtual desktop and work from their preferred device — the best laid plans, and cost benefits for leveraging virtualization at the desktop level are meaningless. Implementing Virtual Desktop Infrastructure (VDI) is not an easy endeavor. Many CIO’s and IT staff have been “restructured”, due to costly mistakes. There are big rewards for those who can successfully deliver DaaS and VDI offerings to the market. And as with anything worth doing there are going to be challenges and risks, especially for those looking for a simple transaction. Continue reading