Articles Tagged: Security

6 Requirements for Cloud-Based Security Management – Part 3 of “Moving to the Cloud”

This is the third blog in a series of three on why and how companies are moving their building security management to the cloud. In my previous blog, I discussed… Read more »

Leave a comment

4 Undeniable Benefits of the Cloud – Part 2 of “Moving to the Cloud”

This is the second blog in a series of three on why and how companies are moving their building security management to the cloud. In my last blog, I discussed… Read more »

Leave a comment

Partnering with Specialists to help Protect the World’s Critical Infrastructure from Cyber Attacks

Today in Schneider Electric’s News Release it was  announced that we are partnering with Claroty, an innovator in Operational Technology (OT) network protection, to help to address cybersecurity challenges for the… Read more »

Leave a comment

The Endless Debate: Is the Cloud Secure? – Part 1 of “Moving to the Cloud”

This is the first blog in a series of three on why and how companies are moving their building security management to the cloud. I can’t tell you how many… Read more »

Leave a comment

Why This New Gartner Data Center Modernization Report Caught Me by Surprise

As a data center solutions guy, I attend many industry conferences and forums. So, I’m always curious about new ideas and how customers are using technology to solve new business… Read more »

Leave a comment

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

Avoid The IT Resiliency Fallacy and Monitor Your IT Environment

I’m a big fan of the major coffeehouse chain featuring a well-known mermaid on each cup. I know… I’m a millennial, so I should drink only freshly roasted, organic, fair… Read more »

Leave a comment

Edge Data Centers have Arrived. But How Resilient are They?

The massive migration of critical applications from traditional data centers to the cloud has garnered much attention from analysts, industry observers, and data center stakeholders.  However, as the great cloud… Read more »

3 Comments

Integrating IT, OT and Security: Convergence to Collaboration

Security systems are needed to protect facilities. IT is needed to run security systems. Apply a bit of basic math theory to these statements, and it is easy to conclude… Read more »

Leave a comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Are micro data centers the engine to power the IoT (Internet of Things)?

I have not heard this much buzz in the IT industry since the early 1990’s – well, since the original internet was introduced. Now the Internet of Things (IoT) is… Read more »

1 Comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

WEBCAST: Eliminating Human Error: Documentation a Foundation for Success

VIEW WEBCAST HERE (It’s FREE and No Registration is Required) Most all critical facility operations have some form of documentation and training programs in place, but one key question you… Read more »

Leave a comment

Top 3 components of a solid healthcare security program

Healthcare leaders have long been challenged with creating and maintaining a welcoming, safe, and secure environment in their facilities. Looking back to 1968, at the first International Association for Healthcare… Read more »

3 Comments

Integrating IT, OT and Security: Convergence to Collaboration

Security systems are needed to protect facilities. IT is needed to run security systems. Apply a bit of basic math theory to these statements, and it is easy to conclude… Read more »

Leave a comment

Edge Data Centers have Arrived. But How Resilient are They?

The massive migration of critical applications from traditional data centers to the cloud has garnered much attention from analysts, industry observers, and data center stakeholders.  However, as the great cloud… Read more »

3 Comments

Physical Data Center Security Goes Beyond Video Cameras

When companies think about providing physical security for their data centers, they most likely envision video surveillance cameras and identity card readers attached to entry doors. In other words, they… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

Edge Data Centers have Arrived. But How Resilient are They?

The massive migration of critical applications from traditional data centers to the cloud has garnered much attention from analysts, industry observers, and data center stakeholders.  However, as the great cloud… Read more »

3 Comments

Top 3 components of a solid healthcare security program

Healthcare leaders have long been challenged with creating and maintaining a welcoming, safe, and secure environment in their facilities. Looking back to 1968, at the first International Association for Healthcare… Read more »

3 Comments

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

What is the answer for Healthcare security today, with crime on the rise?

The rise of crime and violence is hospitals is staggering. 91% of all reported crimes in US Hospitals in 2010 had doubled since the last survey in 2004 by the… Read more »

1 Comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Are micro data centers the engine to power the IoT (Internet of Things)?

I have not heard this much buzz in the IT industry since the early 1990’s – well, since the original internet was introduced. Now the Internet of Things (IoT) is… Read more »

1 Comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

WEBCAST: Eliminating Human Error: Documentation a Foundation for Success

VIEW WEBCAST HERE (It’s FREE and No Registration is Required) Most all critical facility operations have some form of documentation and training programs in place, but one key question you… Read more »

Leave a comment