Redefining WAN in Light of Cloud

Redefining WAN in Light of Cloud

Thanks in large part to investor-driven demand for constant double-digit growth, the WAN optimization market has taken a substantial beating, and as a result the term “WAN optimization” has become something of a lament. Vendors looking to distance themselves from the term have latched onto the “software-defined” bandwagon, and the result is “SDN WAN” or “SD WAN.” However, the need for WAN optimization is not going away; in fact, it is only going to increase because the WAN is a critical component of cloud-based deployment models. Cloud is not a magic fix for all that ails IT. The laws of ...

Read More

Top 5 Trends in 2015 for Unifying PC and Mobile Management

Top 5 Trends in 2015 for Unifying PC and Mobile Management

Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are typically insufficient in current tablet form factors. However, carrying a laptop around with you everywhere you go just so you can access email is not very practical either. The reality is that we live in a multi-device world where the average worker employs 3 – ...

Read More

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

Leveraging Security Policy Orchestration to “Bake Security in” to SDDC Environments

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application discovery and availability monitoring Service dependency mapping Change design and workflow automation Network topology and policy analysis Policy optimization and violation guidance Policy violation notification Take a look at it.  

Read More

posted by Tracy Corbo   | February 17, 2015 | 0 Comments

WAN Cloud_300x190

Thanks in large part to investor-driven demand for constant double-digit growth, the WAN optimization market has taken a substantial beating, and as a result the term “WAN optimization” has become something of a lament. Vendors looking to distance themselves from the term have latched onto the “software-defined” bandwagon, and the result is “SDN WAN” or...

Read More »



posted by Steve Brasen   | February 12, 2015 | 0 Comments

Juggling Endpoints_300x190

Have you ever tried to create a major slide presentation on a tablet? Or edit a large spreadsheet? Or write a long document? Probably not. While it’s certainly possible to perform more substantial business tasks on a tablet, the small screen real estate and limited system resources (e.g., processing speed, memory, graphic support, etc.) are...

Read More »



posted by Jim Frey   | January 30, 2015 | 0 Comments

cloud infrastructure_300x190

The New Year is always a good time for new beginnings, and 2015 is no exception.  With the start of 2015, my coverage focus at EMA is shifting and evolving.  After 22+ years in the network management space, including over six years as an industry analyst, I am starting a new chapter by shifting my...

Read More »



LAN Network Diagram_300x190

I have a new guest blog just posted at for Tufin around Security Policy Orchestration.  You can check it out here. It discusses the benefits to using Security Policy Orchestration when defining software-defined data centers (SDDCs).  By supporting a centralized security policy across physical and virtual networks via a single interface. Security  change management provides many benefits including: Application...

Read More »



posted by Jim Miller   | January 9, 2015 | 0 Comments

flash and HDD_300x190

Flash technology has proven to be a disruptive force in the storage marketplace. Server and network performance gains over the last decade have been substantial, but the hard drive performance needle has hardly moved. This situation has resulted in server utilization being reduced while waiting on storage input output (I/O) operations to be completed. Server...

Read More »



posted by Dennis Drogseth   | January 5, 2015 | 0 Comments

IT-management-diagram-person_300x190

If you think that ITSM is static and old hat, think twice. A huge number of innovations are just emerging—some have been a long time in coming; while others are unexpected surprises—as analytics and automation are changing the ITSM game dramatically. Here are some trends that I’ve seen in 2014 that I expect will grow...

Read More »



posted by Steve Brasen   | December 30, 2014 | 0 Comments

Keyboard_300x190

Reflecting on my earlier career in IT management, I have to confess to a level of astonishment at how naïve IT administrative practices were just a decade or two ago. Failure events were common, and most organizations just accepted as immutable fact the reality of systemic firefighting. IT services critical to business operations were all...

Read More »



posted by David Monahan   | December 19, 2014 | 0 Comments

Vectra_Threat_Certainty_Index_300x190

Working in information security for the past 20 years, I have seen a lot. Though there have been many multi-million dollar impact breaches, the recent Sony Pictures hack and subsequent data exposure and extortion is probably the most impactful to a company out of the previous breaches this year. Recent articles revealed that some employees...

Read More »



Security and assessment module_300x190

When I started out in security, only very large organizations with a mature set of business processes dared to talk about implementing some form of governance, risk, and compliance (GRC) or enterprise program (e-GRC). They generally did it in an attempt to get ISO or similar certification, or to “move their programs to the next...

Read More »



posted by Jim Frey   | December 10, 2014 | 0 Comments

NetMan Image_300x190

The dual revolutions of consumerization and cloud have certainly caused much disruption within and around IT. And universally they have also increased the expectations of IT end users. IT-enabled workers and the lines of business they represent are looking for a fast response to new technology needs combined with high levels of service quality—all at...

Read More »



Page 1 of 3612345»102030...Last »