Articles Tagged: Security

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

Avoid The IT Resiliency Fallacy and Monitor Your IT Environment

I’m a big fan of the major coffeehouse chain featuring a well-known mermaid on each cup. I know… I’m a millennial, so I should drink only freshly roasted, organic, fair… Read more »

Leave a comment

Edge Data Centers have Arrived. But How Resilient are They?

The massive migration of critical applications from traditional data centers to the cloud has garnered much attention from analysts, industry observers, and data center stakeholders.  However, as the great cloud… Read more »

2 Comments

Integrating IT, OT and Security: Convergence to Collaboration

Security systems are needed to protect facilities. IT is needed to run security systems. Apply a bit of basic math theory to these statements, and it is easy to conclude… Read more »

Leave a comment

Security; The Key to Successful IIoT Deployments

The Industrial Internet of Things (IIoT) has been a hot topic of late.  One key consideration that will impact its acceptance rate and ultimate success is security.   A successful attack… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

QTS Profiles the Changing Face of the Colocation Buyer

In the second of our “8 Megatrends” series, we sat down with Jim Reinhart, COO, QTS, to find out how the profile of the colocation buyer has changed as the… Read more »

Leave a comment

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Are micro data centers the engine to power the IoT (Internet of Things)?

I have not heard this much buzz in the IT industry since the early 1990’s – well, since the original internet was introduced. Now the Internet of Things (IoT) is… Read more »

1 Comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

WEBCAST: Eliminating Human Error: Documentation a Foundation for Success

VIEW WEBCAST HERE (It’s FREE and No Registration is Required) Most all critical facility operations have some form of documentation and training programs in place, but one key question you… Read more »

Leave a comment

Physical Data Center Security Goes Beyond Video Cameras

When companies think about providing physical security for their data centers, they most likely envision video surveillance cameras and identity card readers attached to entry doors. In other words, they… Read more »

Leave a comment

Top 3 components of a solid healthcare security program

Healthcare leaders have long been challenged with creating and maintaining a welcoming, safe, and secure environment in their facilities. Looking back to 1968, at the first International Association for Healthcare… Read more »

3 Comments

Integrating IT, OT and Security: Convergence to Collaboration

Security systems are needed to protect facilities. IT is needed to run security systems. Apply a bit of basic math theory to these statements, and it is easy to conclude… Read more »

Leave a comment

The problem with Software-defined Data Center (SDDC) definitions

According to Wikipedia, the “Software-defined data center (SDDC) is an architectural approach to IT infrastructure that extends virtualization concepts such as abstraction, pooling, and automation to all of the data center’s resources and services… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

Top 3 components of a solid healthcare security program

Healthcare leaders have long been challenged with creating and maintaining a welcoming, safe, and secure environment in their facilities. Looking back to 1968, at the first International Association for Healthcare… Read more »

3 Comments

Edge Data Centers have Arrived. But How Resilient are They?

The massive migration of critical applications from traditional data centers to the cloud has garnered much attention from analysts, industry observers, and data center stakeholders.  However, as the great cloud… Read more »

2 Comments

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Are micro data centers the engine to power the IoT (Internet of Things)?

I have not heard this much buzz in the IT industry since the early 1990’s – well, since the original internet was introduced. Now the Internet of Things (IoT) is… Read more »

1 Comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

Show Some Respect for Your Remote Equipment Closets: Monitor Them

To paraphrase the late Rodney Dangerfield, equipment closets in branch offices get no respect. Companies with lots of branches, including retail stores and restaurant chains, too often tuck servers in… Read more »

Leave a comment

Security; The Key to Successful IIoT Deployments

The Industrial Internet of Things (IIoT) has been a hot topic of late.  One key consideration that will impact its acceptance rate and ultimate success is security.   A successful attack… Read more »

Leave a comment