Story image

Infastructure planning checklist

01 Sep 06

Before planning your next customer’s datacentre installation, GFI has put together a checklist including business problems to be considered.
* Spam: wastes staff time and may be a scam, phising for instance.

* Viruses, Worms and Trojans: can damage computer systems or steal confidential information.

* Non work-related surfing: staff can inadvertently download a virus or spyware and severely impact a business.

* Intellectual Property: can be easily stolen by an employee with an iPod, USB drive, mobile phone, digital camera, CD/DVD or floppy disc.

* Email: an important business communication medium but archiving and retrieval are vital. Emails can easily be deleted or difficult to find which can present legal and productivity problems.

* Conventional fax machines: can impact on staff productivity due to wasted time. Confidential information can be compromised by incoming faxes left lying around the office.

* Mobility: a business needs to efficiently communicate with sales and service staff in the field without having to make individual calls.

* Patching: identifying security holes and staying up to date with patches is a constant chore and failure to do so can affect security on the system.

* Alerts: a business needs to be informed instantly – and automatic actions taken if possible – if there are problems with servers or infrastructure. This enables appropriate technical resources to be deployed before there is a serious impact on productivity.
* Suspicious activity: a business needs to know if it’s being hacked internally or externally. Identifying suspicious activity, such as users accessing confidential information on the network, can prevent security breaches.

LogicMonitor launches container monitoring solutions
Kubernetes monitoring and LM Service Insight provide performance analytics and data retention for microservices and containerised applications.
Commvault fully integrates backup with Cisco Hyperflex
Its IntelliSnap technology has been validated to work with Cisco HyperFlex hyper-converged systems without the need for third-party tools.
Experts comment on record 772mil-user data breach
Dubbed “Collection #1”, the data set contains emails and passwords with over a billion unique combinations of email addresses and passwords.
McAfee Gartner Customers’ Choice for Secure Web Gateway
“We take great pride in being recognised by our customers on Gartner Peer Insights, and their willingness to recommend McAfee Web Gateway technology”
Lenovo invests in ePaper company in bid to revive tablets
As the tablet market declines, Lenovo is making an investment in CLEARlink in order to create a low-power, colour, outdoor-ready display.
OutSystems three APAC Partners of the Year
Of the seven companies named in the OutSystems recent partner awards, three have a strong APAC presence.
Hands-on review: Nvidia GeForce RTX 2080 Ti FE
The lack of games taking advantage of the GeForce RTX 2080 Ti makes reviewing the card rather challenging
IDC: NZ IT services market will near $4B in 2023
As cloud adoption grows with every company seeking the competitive advantage it can provide, the opportunities in IT services are expanding in kind.