Every IT professional already knows that the proliferation of log files generated by Security Information and Event Management (SIEM) solutions can be overwhelming to manage. There are multiple SIEM tools that analyze and automate this tremendous amount of data to provide alerts that help troubleshoot network issues, quickly remediate threats, and identify potential non-compliance vulnerabilities.Read More
Now that we’ve talked about how how to make IT Investments for the future and how TCO and ROI differ, let’s look at a few examples and see where TCO and ROI analysis might come into play for a business.Read More
When employees first began using corporate email and content management systems to communicate and share their ideas, little did IT teams know what they had in store. In “store” being the operative word.
Such systems like Microsoft Exchange and Microsoft SharePoint would soon take exponentially larger and larger bites out of the storage available on a whole range of corporate servers, file shares and, even, enterprise storage networks.
IT teams soon had a real mess on their hands. Frequent requisition requests for new storage capacity weren’t usually greeted well by budget owners. Then, there was the on-going time required from IT to help “discover” key content of older emails or files--in keeping with various compliance, legal or audit requirements.
“Microsoft Exchange and Microsoft SharePoint would soon take
exponentially larger and larger bites out of the storage available…IT teams soon had a real mess on their hands”
For highly regulated industries, like those in Life Science or Financial Services, the need to effectively track, preserve and discover data became even more critical.Read More
For many virtual desktop users, the most frustrating time of day is the morning. This is when users arrive at work and, en masse, attempt to boot up their virtual desktops. This can trigger a so-called boot storm. During a boot storm, the demand is too high for the network to handle effectively, causing sluggish performance and driving users—who are just trying to start their workdays on the right foot—crazy.Read More
As the cost of solid-state technology decreases and its capacity increases, flash technology has steadily been making inroads into the enterprise storage architecture, to the point where flash has become a standard component of most storage solutions. Just how much flash is necessary, however, is the question confronted by directors of infrastructure who are trying to balance cost with their companies’ needs for high performance.Read More
Jealous of the pure power of all-flash but concerned about cost? The latest generation of all-flash arrays have a couple of tricks up their sleeve that make the difference in usable capacity and cost between flash and spinning disk much less significant: inline deduplication and compression.
The addition of Storage Lifecycle Policies (SLP’s) in Symantec NetBackup 7.6 has provided backup administrators with a very effective tool for managing backup/snapshot, image, duplication, and replication.
While SLP’s simplify these tasks, careful consideration is required when you’re monitoring and managing the policies and the components utilized in your NetBackup environment.
The SLP administration window we all know and love, shown below, is a great tool for managing SLP’s. But there are other things you should consider to help manage your SLP’s.
To help manage your SLP’s and make sure they’re optimized, please consider these (8) additional configuration tips.
VMWorld 2014 is a wrap!
By Sean Gilbride, Director of Professional Services and Matthew Trottier, Virtualization Practice Manager
After spending 3 fun-filled days out in sunny San Francisco at VMworld 2013, we wanted to take some time to share our impressions of this year’s event and the most note-worthy products and announcements.
Author: Sean Gilbride, Director of Professional Services Operations