Remote office News
August 15, 2017
Dell EMC's Mozy has unlocked a new encryption key security feature for its enterprise backup product. MozyEnterprise now provides support for the Key Management Interoperability Protocol (KMIP), ...
July 24, 2017
Red Hat's Ceph and Gluster storage roadmaps reflect increased focus on hyper-converged infrastructure, containers and big data, in addition to performance improvements.
June 22, 2017
Red Hat launches open source-based hyper-converged product combining Gluster file system, KVM hypervisor, enterprise Linux, Ansible deployment tool and CloudForms management.
May 12, 2017
Move over SD-WAN. Versa Networks extends software-defined capabilities to the branch with its cloud IP platform.
Remote office Get Started
Bring yourself up to speed with our introductory content
How can your organization take advantage of SD-WAN? Networking expert Lee Doyle explains how SD-WAN adoption can transform your WAN, and why you should consider making the switch. Continue Reading
Defining what backup is, and the tools and policies to manage it in organizations, comprise a key foundational principle for IT administrators. Continue Reading
Micro-datacenters are very small self-contained data center systems that include all the necessary technologies for power, security, cooling and infrastructure management. Continue Reading
Evaluate Remote office Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Copy management systems from the leading vendors offer unique features that can help IT departments consolidate their secondary storage into a single product. Continue Reading
Not every enterprise needs the functionality of a standard VPN client. Expert Judith Myerson explains why a site-to-site VPN may be a better choice for some companies. Continue Reading
When using hyper-converged systems, workload optimization isn't in the cards for all enterprise apps. Start with ROBO configurations and VDI, and assess from there. Continue Reading
Manage Remote office
Learn to apply best practices and optimize your operations.
Edge computing is the next new trend, but recognize its obstacles before riding the wave. Continue Reading
As enterprises became more distributed over the years, a curious trend emerged: MPLS was no longer the golden child of the wide area network (WAN). Its high costs and inflexibility left many network engineers disillusioned. All the while, commercial Internet services became an attractive option for branch connectivity.
But for most enterprises, a hybrid WAN architecture -- one that relies on a mix of access connections -- was not only tricky from a routing perspective. Broadband becoming more than a failover option at branch offices also raised red flags about enterprises' ability to maintain secure networks.
The emergence of a software-defined WAN (SD-WAN), however, is helping enterprises aggregate MPLS and Internet connections without sacrificing their secure networks, even improving them in some cases. As we explore in this edition of Network Evolution, early adopters say they're confident in sending sensitive data over the Internet via SD-WAN platforms.
Also in this issue, Cisco and Microsoft have taken the fight to the cloud as they once again go head-to-head in their ongoing battle for the unified communications market. Learn more about how to decide whether Microsoft's Skype for Business or Cisco's Spark is a better fit for your enterprise.
We also dive into beacons on the network and what you need to know about installing and managing them -- straight from companies that have already deployed them.
Finally, don't miss this edition of The Subnet, in which we explore how an IT pro at a high-tech Midwestern church manages a wireless network that supports thousands of congregants who use the church's mobile app on its WLAN during prayer services.Continue Reading
The hyper-converged appliance market has exploded thanks to their fast deployment and easy management that overcome their limitations. Continue Reading
Problem Solve Remote office Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Cynthia Nustad recalls a time not that long ago when businesses didn't have much flexibility in negotiating contracts with cloud providers. "Maybe you could negotiate on price or add-ons, but the core service was pretty vanilla and hardened," said the CIO at HMS, a healthcare management services company. Back then, agreements that had the provider assuming part of the risk in the event of a breach were a no-go. Today, however, things have markedly changed. The rapid growth of cloud computing has given IT leaders an edge when it comes to negotiating a cloud contract.
In this issue of CIO Decisions, get advice from CIOs and experts on how to procure more safeguards and custom features in your cloud contract that address your business needs. Also in this issue, we walk through UPS' journey from analog to digital business; outline common mistakes companies make when implementing hybrid cloud; take a look at what's under the hood of Etsy's business model; talk to former McCormick CIO Jerry Wolfe about how the spice company is using its platform business model to shake up the food industry; and examine why getting the most out of knowledge workers today requires "Supportive Leadership." Continue Reading
While the consumer world is going Patch Tuesday-less, Microsoft is evolving its Patch Tuesday into Windows Update for Business for enterprise software. Learn what this change means. Continue Reading
Historically, remote office/branch office (ROBO) backup has been a challenge. The cost to send large amounts of data over the wire to a central data center was too expensive for most organizations. So, most ROBO backup happened on-site if at all. But today, data reduction technologies make that kind of transfer possible. This allows shops to centrally manage remote site backup from the main data center. It also enables cloud backup of remote data.
Endpoint data protection, particularly for laptops and mobile devices, has also been fraught with issues. Today those problems have largely been addressed, but, half of all organizations still don't use endpoint backup products, despite the increasingly prevalent use of personal mobile devices to access corporate data. This handbook gives an overview of challenges associated with remote data protection and the products available today to address them.Continue Reading