2016 Data Center News & Trends Wrap Up

Written by Joe Kozlowicz on Thursday, December 29th 2016

Another year down. Although 2016 was turbulent, to say the least, in the data center world things keep chugging along at an exciting pace. With mega-mergers completing, cloud adoption accelerating, and green energy continuing to make headlines, the data center industry continues to change and grow.

Here are the biggest headlines from around the data center world, plus the most popular posts from our own blog this year. Catch up on the articles getting the most clicks before we say goodbye to 2016 and usher in the New Year.

Continue Reading...

Getting Savvy About Software Licensing Can Save Thousands

Written by Joe Kozlowicz on Tuesday, December 20th 2016

Licensing software for a cloud environment can be tricky: who owns the license? Should you buy it outright or treat is as an operational expense and part of your subscription? But beyond the puzzle of setting up the license itself, there is the problem of software license sprawl and expense in general.

Gartner predicts $332 billion in software charges this year. One report found that of these massive software expenses,  wasted licensing cost an average of $224 per computer. That added up to $7 billion in idle or underused licenses.

Adding software licensing to your list of things to actively manage might sound like a hassle, but reclaiming those expenses will allow you to demonstrate IT cost savings and put that budget towards more valuable projects.

Continue Reading...

vSphere 6.5 Introduces New VM Encryption Features

Written by Joe Kozlowicz on Thursday, December 15th 2016

Encrypting virtual machines within the VMware hypervisor platform has been possible for some time, but can be tricky and it often impacts performance. Often the best solution is to encrypt at the storage level, as VMware does not always support OS-level encryption, either.

That may be changing as the latest version of vSphere includes VM encryption that is simple to implement as a policy. Read on to learn what’s new with this method, how it simplifies administration, and how you can implement it within vSphere 6.5.

Continue Reading...

Organizations Aren’t Worried About Data Security — Only Their Reputations

Written by Joe Kozlowicz on Tuesday, December 13th 2016 — Categories: Security

Many cloud discussions center around data security. When infrastructure is out of corporate control, it’s natural to be concerned about the precautions taken to protect vital information assets. Ultimately, cloud security is not any weaker than on-premise data centers, but it turns out that corporate IT departments aren’t really concerned about losing data, anyway.

They’re worried about what everyone else will think if they lose that data.

With only 25% of companies are equipped to handle data breaches, corporations still cite damage to reputation as the biggest risk of being hacked. A recent study from the International Association of Privacy Professionals found that 83% of public companies in the United States cite the impact to corporate reputation as the number one risk of a data breach.

Continue Reading...

Is it Time for the Password to Go the Way of the Dodo?

Written by Joe Kozlowicz on Tuesday, December 6th 2016 — Categories: Security

Passwords – we love to hate them. Despite scribbled pages of notes and password keepers, we always forget them at the most inconvenient time. (By the way, written notes are a very insecure way to remember your password). They expire before we remember to reset them, as the IT department sets required password change rules. These days it feels like they have to be one hundred letters long, including hieroglyphics, roman numerals, and emojis.

And despite all that, they still aren’t very secure. Every few months we hear about another massive breach. One of the biggest, and most recent, was Yahoo. The company only just reported a 2014 breach that compromised 500 million users’ names, e-mail address, and other personally identifying information. If the password information could be decrypted and used along with this other PII, user accounts across other services – even bank logins – could be accessed. According the 2016 Verizon Data Breach Investigations Report, compromised passwords were used as a means of access for many attacks as well.

Is it time to ditch passwords all together? What might replace them? The technology, it turns out, is just around the corner.

Continue Reading...