Tips
Tips
-
Best practices for physical environment tests before setting up virtualization
Performing physical environment tests in a thorough manner, determining what you should and shouldn’t virtualize, will smooth the process of setting up virtualization on customers’ servers. Continue Reading
-
Ensuring NAS access from Windows and Unix clients
In many large and complex computing environments, administrators need to supply access to a NAS device from both Windows and Unix clients. Find out how to configure your systems for this requirement. Continue Reading
-
Cashing in on Red Hat Enterprise Virtualization capabilities
Check out the benefits of Red Hat Enterprise Virtualization (RHEV) and why its features and capabilities may serve as a good value-add for your business. Continue Reading
-
Cloud storage solutions: Look to straight services as well as gateways, appliances
In this tip, find out how VARs can look not only to cloud storage providers, but also to other solutions such as cloud gateways and hybrid appliances. Continue Reading
-
For customers, Exchange 2010 storage changes are a good reason for SAN
Find out why Exchange 2010’s storage changes mean your customers would fare better with a SAN instead of DAS to support their Exchange environment. Continue Reading
-
Integrated IT stacks: What they mean for VARs
VARs competing against integrated IT stacks may find the best advantages in the areas of configuration choice, existing equipment and vendor lock-in. Continue Reading
-
How to get in the backup and disaster recovery service game
Backup and disaster recovery (BDR) services can be a great addition to a managed service provider’s portfolio, but it requires a deep level of trust from your customers. Learn about the risks and rewards of this solution for MSPs. Continue Reading
-
Seeking out Windows Azure and PaaS service opportunities
Solution providers who previously thought of PaaS and Windows Azure as menacing to their business can now take advantage of the business opportunities they provide such as Azure hosted backup service. Continue Reading
-
Book chapter: IT security risk assessment and program management
Read this excerpt from the book Security Risk Management by Evan Wheeler to learn how to build a solid risk management program for your clients. Continue Reading
-
Create a BlackBerry security policy based on BES or BES Express
Mobile security expert Lisa Phifer outlines the many ways security solution providers can secure their customers’ BlackBerry devices. Continue Reading
-
Selling your customers on a private cloud computing environment
The challenges of public clouds and the appeal of business continuity during Internet outages make the idea of private cloud computing compelling to your customers eyeing the cloud. Continue Reading
-
Tackle your client's security issues with cloud computing in 10 steps
So your client wants to move to the cloud? Your job just got harder. Kevin McDonald lists 10 steps to protect your client (and yourself). Continue Reading
-
For disaster readiness, DR monitoring and backup reporting tools give customers confidence
With customers poised to spend more money on disaster readiness this year, learn how DR monitoring and backup reporting tools can augment their disaster recovery plans. Continue Reading
-
Practicing defense-in-depth: Implementing a defense-in-depth strategy
Implementing a defense-in-depth strategy can protect your customers’ Web applications from attack. Take a layered approach with intrusion prevention, encryption and code review. Continue Reading
-
Why Windows Intune could be what your SMB customers need
Because SMB customers may not have the time to handle desktop support tasks, Windows Intune offers a solution for VAR customers, but it does have a downside as well. Continue Reading