WEBINAR: Finding the Top Users of Bandwidth on Your Network

If there is one question on the lips of network managers across the world, it is:

How do I find the top users of bandwidth on my network NetFort Webinar Technology4Business

How do they find the top users of bandwidth on their networks?

It is always recommend that finding the top users of bandwidth can be broken down into two steps. First, you need to gain visibility into what is happening on the network; then you need to associate this with usernames

We invite you to join us for a free webinar with Darragh Delaney and Aising Dillon or NetFort Technologies who will show you how to find the the top users of bandwidth on your network.

Webinar Agenda:

1) Sources of user data on computer networks
2) What you need to be logging in Active Directory
3) Associating packet and flow data with usernames
4) Finding out where user devices are plugged into your network

Duration:
Approximately 30 Minutes.

Presenters:
Darragh Delaney (Head of Technical Services)
Aising Dillon (Head of NetFort Support)

Use the following links to register:
Thursday 21 Feb. 14:00 (GMT):  https://www1.gotomeeting.com/register/366186257
Thursday 21 Feb. 17:00 (GMT):  https://www1.gotomeeting.com/register/708329745

For more information on NetFort and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Join TechXperts for a Red Hat Enterprise Linux Technical Workshop in London on February 15th

We have exciting news of an event for business users of Red Hat Enterprise Linux.  You are invited to join TechXperts for a FREE Technical Workshop on Friday 15th February, at Red Hat’s London office.

In this hands-on, technical session you will explore the new features within Red Hat Enterprise Linux 6.3, and discover how to leverage them to get more from your Linux infrastructure.

  • Learn how to use emerging features, such as High-Availability, clustering, and the new in-built virtualization and cloud support capabilities.
  • Play with the technology in a demo environment, with a Red Hat Solutions Architect on-hand to guide you through the process. Learn how to use Linux Containers and how to configure Cgroups.
  • Collaborate with other Red Hat users. Get their take on the new features, and find out how they plan to leverage them within their own organisations.
Red Hat TechXperts Technical Workshop

Red Hat TechXperts Technical Workshop

This is the third series of TechXperts workshops, designed to bring together Linux users to exchange ideas and interact with new Red Hat Technologies.

As always, places are limited and we expect attendance to be high, so learn more and register now by visiting: http://tinyurl.com/akt8wsc

For more information on Red Hat and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

WEBINAR: Rethinking Identity and Access Governance in a World of Change and Complexity

Organisations and the environments they operate in are more complex than ever and they are also experiencing unprecedented change. Budgets are shrinking, cloud computing and SaaS present compelling options, attacks are on the rise and regulations continue to impact operations.

It is more critical than ever to understand Identity and Access strategythe access your users have and what they are doing with the access they have been granted. Knowing who has access to what, why they have the access, when they got the access, etc. are all required, but this information resides in the business rather than IT.

Discover how empowering your users to manage and review their access can help you mitigate risk, ensure compliance and reduce overall costs.

KuppingerCole´s Principal Analyst Martin Kuppinger will give you an overview on the criteria to look after before deciding on your future Identity and Access strategy. As the second speaker in this webinar, Jörn Dierks from NetIQ will describe some Best Practices and how Identity and Access Governance solutions from NetIQ have been implemented.

Register today to join this webinar to learn more about this topic.

Date: 31st January 2013, 14:00 GMT

Speakers:
Martin Kuppinger (KuppingerCole)
Jörn Dierks (NetIQ)

For more information about the Identity and Access Governance solutions from NetIQ and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on our latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

CASE STUDY: SolarWinds IPAM saves time and safeguards quality for Open Line

Open Line, a mature managed service provider based at Maastricht-Airport in The Netherlands, has steadily increased the operational efficiency of its cloud solutions, project and consultancy business groups over the past seven years by using a range of SolarWinds solutions.

Download the Case Study to learn more

Download the Case Study

SolarWinds regularly enhances and updates its IT Management product portfolio which has allowed Open Line’s Managed Services business group to safeguard its service level quality. For instance, SolarWinds IP Address Manager (IPAM), has allowed the company to progress from using spreadsheets to monitor customers’ IP addresses, to relying on IPAM’s centralised IP management. IPAM has also simplified capacity management, saving up to 10 hours a month in IT staff time.

Download the full Case Study

Read more T4B posts on SolarWinds

For more information on SolarWinds and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on our latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

WEBINAR: Learn how to monitor BYOD on your network effectively

Forrester’s latest report on mobile adoption in the enterprise found that 66% of employees now use two or more devices every day, including desktops, laptops, smartphones and tablets. A smaller, but notable 12% percent said they now use tablets at work. That’s still far fewer than the 50% who report only using a desktop, or the 82% who use a desktop alone or alongside other devices.

66% of employees now use two or more devices every day

66% of employees now use two or more devices every day

"She won't take much more of this."

“She won’t take much more of this.”

Meanwhile, 55% of organizations stated that supporting a larger number of smartphones was a high or critical priority over the next 12 months, while 52% said the same of supporting tablets like Apple’s iPad.

We invite you to join a webinar presented by Darragh Delaney Head of technical Services at NetFort which will show you how to monitor BYOD activity on your network.

Getting this visibility into exactly what your network users are doing will help you ensure that you network does not suffer due to user actions.

Find out how BYOD is affecting your network on Friday, January 18, 2013 14:00 – 15:00 GMT

Register for this Webinar today: https://www1.gotomeeting.com/register/432130121

About NetFort LANGuardian

LANGuardian captures and analyses the traffic flowing through your network switch, stores it in a database, and displays the details in a web browser.

Read more T4B blog posts on Netfort here

For more information on NetFort LANGuardian and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on ourlatest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Kerio Gives Customers Access to a Scalable and Headache Free Email Experience with Kerio Connect 8

 

Kerio

Kerio Technologies have launched a new cloud service infrastructure for its partners and customers.

Although Kerio previously enabled its channel partners to host Kerio Connect on their own hardware using the SaaS model, this marks Kerio’s first major push into true, hosted infrastructure services. The first Kerio Cloud offering will be the company’s flagship product, Kerio Connect 8, a messaging (email) and calendaring server.

Unlike cloud email solutions such as Microsoft Office 365 or Google Apps, Kerio offers its customers a private cloud experience, which in turn allows them more control over their own data.

“Pundits have touted cloud services and predicted the demise Scott Schreiman CEO Kerio Technologiesof on-premise solutions for a few years now,” said Scott Schreiman, CEO, Kerio Technologies. “While customer data suggests that onsite servers are still very popular, we think Kerio Cloud is the most secure and flexible solution for the IT guy that is looking for an alternative, but is still evaluating the cloud. Our private cloud not only eliminates the need for partners to carry the hardware burden, it allows them to focus their energy on adding value instead of worrying about the availability of email services.”

The way it works: Kerio Cloud is a hosted infrastructure service that allows Kerio partners to resell Kerio “Software as a Service” to their end customers, eliminating the need to purchase and maintain their own server environments. Kerio will provide its partners with private virtual machines running Kerio Connect 8 in the cloud with some basic configuration. The Kerio partner will take it from thereWalter Huff Huff Technologies, acting as the primary administrator and support contact for their clients.

“We have long offered Kerio Connect as an alternative to Exchange and Google Apps,” said Walter Huff, president of Huff Technologies, a Kerio preferred partner in Jacksonville, Florida. “As email has moved to the cloud, I was anxious to participate in the Kerio Cloud beta program, and after testing with my clients, I can report that the reliability, security and ease of administration rivals any other email service on the market.”

Kerio Connect 8 features the new Kerio Connect client, which is a completely redesigned Webmail experience that has been rebuilt from the ground up to deliver the performance and experience users expect from a modern web application. Email, calendars, contacts, tasks and notes are fully functional in the Kerio Connect client.

In addition to this new cloud offering, Kerio Connect 8 continues to be available as an on-premise server solution and through our existing SaaS hosting partners.

About Kerio Technologies, Inc.
Innovating in Internet security since 1997, Kerio Technologies, Inc. provides unified collaboration, communications and security solutions for businesses and organisations worldwide that prefer a simple approach to IT.

For more information on Kerio and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

FRESH NEWS: Red Hat Enterprise Linux 6.4 Beta Released

Red HatRed Hat have announced exciting news about the next beta release for Red Hat Enterprise Linux 6 – Red Hat Enterprise Linux 6.4

The Red Hat Enterprise Linux 6.4 beta release includes a broad set of updates to the existing feature set and provides rich new functionality in the areas of identity management, file system, virtualization, and storage as well as productivity tools.

Through collaboration with partners, customers and the open source community, we are committed to delivering technology that is tested and stable – including in the beta phase of development. Red Hat Enterprise Linux 6.4 demonstrates this commitment and has been designed for optimized performance, stability and flexibility to cater to today’s diverse workloads running in physical, virtual and cloud environments.

Key new features and enhancement details include:

Identity Management

  • System Security Services Daemon (SSSD) enhancements improve the interoperability experience with [Microsoft Active Directory] by providing centralised identity access control for Linux/Unix clients in a heterogeneous environment.
red hat enterprise linux 6.4 performance improvements

Performance improvements with addition of Direct I/O

File system

  • pNFS (Parallel NFS) client (file layout only) remains in technology preview, however now delivers performance improvements with the addition of Direct I/O for faster data access. This drives particular performance benefits for I/O intensive use cases including database workloads.

Virtualization

  • Red Hat Enterprise Linux 6 now includes the Microsoft Hyper-V Linux drivers, which were recently accepted by the upstream Linux community, improving the overall performance of Red Hat Enterprise Linux 6 as a guest on Microsoft Hyper-V.
  • Installation support for VMware and Microsoft Hyper-V para-virtualization drivers. This new feature enhances the user deployment experience of Red Hat Enterprise Linux as a guest in either of these virtualization environments.
  • In this release, KVM virtualization virtio-scsi support, a new industry storage architecture, provides industry leading storage stack scalability.

Management

  • The use of swap functionality over NFS enables more efficient read/write tradeoffs between local system memory and remote disks. This capability increases performance in very large, disk-less server farms seen in ISP and Web hosting environments.
  • Enhancement in c-groups delivers the ability to migrate multi-threaded applications without errors.
  • Optimised perf tool for the latest Intel processors

Storage

  • New system log features identify mapping from block device name to physical device identifier – allowing an administrator to easily locate specific devices as needed.

    wacom_tablets red hat enterprise linux 6.4 beta support

    Now with support for newer Wacom tablets

Productivity Tools

  • Microsoft interoperability improvements with Microsoft Exchange and calendar support in Evolution. Productivity functions, such as calendar support with alarm notification and meeting scheduling is improved.
  • Customers such as animation studios and graphic design houses now have support for the newer Wacom tablets.

Through this next beta release of Red Hat Enterprise Linux 6, Red Hat is proud to deliver the highest quality open source enterprise platform. Red Hat looks to the community and their partners and customers for feedback to ensure Red Hat Enterprise Linux 6.4 follows this path.

Access to the beta release of Red Hat Enterprise Linux 6.4 is available here: https://rhn.redhat.com/rhn/software/channels/Beta.do.

Learn More about Red Hat Enterprise Linux at the Optimizing IT Virtual Event on Dec 5th and 6th

Join Red Hat for the virtual event on the 5th and 6th December 2012, covering virtualization, cloud computing, storage, and the Red Hat Enterprise Linux operating system. Hear updates on Red Hat Enterprise Virtualization, Red Hat Storage, Red Hat OpenShift, Red Hat Enterprise Linux, and Red Hat CloudForms from customers, partners, and the broader Red Hat ecosystem.

JOIN ONE OF TWO LIVE SESSIONS

To better serve the Red Hat global ecosystem of partners, customers, and contributors, the live event will be hosted twice.  Sign up for the date and time that best suits you. (All registrants can access both events.)

For more information on Red Hat and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

WEBINAR: Find out what users are doing on your Network

Users interact with the network in many different ways during an average day. They visit websites, send and receive email, download files from the Internet, upload photos and videos, perform online backups, and more. They can also — usually unwittingly — expose the network and themselves to intrusions, malware, viruses, phishing attacks, and other security risks.

Good visibility into user activity on your network can help you to troubleshoot problems when they arise; in many cases, it can help you to anticipate problems and prevent them from arising.

Join NetFort  on December 6th at 15:00 GMT for a webinar presented by Head of Technical Services at NetFort, Darragh Delaney that will give you valuable insight into exactly what users could be doing on your network.

During the webinar, NetFort will show you how to monitor different areas of the network including:

  • Sources of user data
  • Network traffic on the LAN and WAN
  • Internet activity
  • File shares
  • Mobile devices

Register today to reserve your seat.

About LANGuardian

LANGuardian captures and analyzes the traffic flowing through your network switch, stores it in a database, and displays the details in a web browser.

Offering a depth of insight into network activity that is unmatched by products costing ten times as much, LANGuardian helps network administrators troubleshoot bandwidth issues right across the network, perform network forensics on past events, investigate activity on Windows file shares, and keep track of user activity on the Internet.

The list of things you can do with LANGuardian is endless. Every customer finds unique ways to use it, solving problems they cannot solve with other tools.

You can deploy LANGuardian on any size of network, from a small office to a global enterprise.

LANGuardian deployment with multiple core switches

For more information on NetFort LANGuardian and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on Linkedin, Twitter and Facebook, where we’ll keep you up to date on ourlatest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

OPTIMIZING IT RED HAT VIRTUAL EVENT

The Optimizing IT virtual event will showcase Red Hat’s continued commitment to customer success and enterprise innovation. Join Red Hat for the virtual event covering virtualization, cloud computing, storage, and the Red Hat Enterprise Linux operating system. Hear updates on Red Hat Enterprise Virtualization, Red Hat Storage, Red Hat OpenShift, Red Hat Enterprise Linux, and Red Hat CloudForms from customers, partners, and the broader Red Hat ecosystem.

  • Red Hat Enterprise Linux,
  • Red Hat Enterprise Virtualization,
  • Red Hat Storage,
  • Red Hat OpenShift,
  • Red Hat CloudForms

TOP 5 REASONS TO ATTEND

  1. TALK TO THE PROS: Access Red Hat experts directly to collaborate and identify the best ways to optimize your IT during both live events.
  2. EASY ACCESS: Attend technology optimization sessions, product update presentations, and hear the latest enhancements from Red Hat partners—all in one place, on your time, from anywhere.
  3. COLLABORATE WITH PEERS: Collaborate and interact with other customers, partners, and accelerated IT professionals.
  4. HEAR IT HERE FIRST: Get ahead of the curve and learn all of the latest enhancements and added value available from your existing Red Hat subscriptions.
  5. BUILD YOUR PLAN: Decide which sessions are best for you and create a plan to optimize your IT.

JOIN ONE OF TWO LIVE SESSIONS

To better serve the Red Hat global ecosystem of partners, customers, and contributors, the live event will be hosted twice.  Sign up for the date and time that best suits you. (All registrants can access both events.)

TAKE THE POLL

For more information on Red Hat and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.

Bitdefender talk Security for Virtualized Environments at Citrix Synergy 2012

Bitdefender exhibited at Citrix Synergy 2012 in Barcelona, one of Europe’s largest gatherings of virtualisation and cloud professionals, to showcase it’s its enterprise solutions, in particular the Bitdefender Security for Virtualized Environments solution.  Take a look at the video below where Robert Krauss, Director Enterprise Sales & Alliances, North America, Bitdefender and Bo Skeel, Sales Director Europe, Bitdefender, describe Bitdefender’s Security for Virtualized Environments (SVE), which delivers comprehensive, virtualisation-centric security for complex datacenters.

As proud Citrix Ready security technology provider, Bitdefender Security for Virtualized Environments (SVE) not only extends the advantages and value of XenServer and XenDesktop, it helps strengthen it, giving Citrix resellers another reason to be excited about the opportunities with Bitdefender solutions for both their current and new customers.

Bitdefender provides centralised management of virtual appliances creating comprehensive coverage across platforms. Organisations can reduce the financial, logistical and performance costs associated with traditional security approaches. Enterprises and cloud service providers (CSPs) with large scale deployments no longer have to choose between improved consolidation ratios and security.

FREE Technical Workshop in London in November to get hands-on with Bitdefender Security for Virtualized Environments and Cloud Security for Endpoints

Join Building Zones and Bitdefender for a FREE workshop on Thursday 22nd November, at Dryland Business Members’ Club in Kensington, London.

In this hands-on, technical session you will explore the features within Bitdefender Security for Virtualized Environments and Cloud Security for Endpoints. Discover how to leverage these products to enable you to securely migrate to a new way of working that dramatically cuts IT investment and boosts productivity.

Places are limited and we expect attendance to be high, so we highly recommend those interested, register now.

You can also learn more about the event on the registration page.

For more information on Bitdefender and other technology solutions for business and public sector organisations, including where you can purchase from, contact us today

You can follow Technology4Business on LinkedinTwitter and Facebook, where we’ll keep you up to date on our  latest blog posts on Technology to help keep your IT Infrastructure and Network secure, safe and always connected.