<div style="display:inline;"> <img height="1" width="1" style="border-style:none;" alt="" src="//googleads.g.doubleclick.net/pagead/viewthroughconversion/953613680/?value=0&amp;guid=ON&amp;script=0">

Middle Market and Enterprise Technology Inbound Blog

How Smaller Data Centers Compete with "Big Box" Data Centers

Posted by Joshua Feinberg

May 26, 2016 7:30:00 AM

One of the biggest challenges faced by small data centers is perception – in particular, the perception by many prospects that bigger is better.

Read More

Topics: colocation data center

How Do Role Management Tools Fit In with Identity Management?

Posted by Don Pope

Apr 26, 2016 11:09:00 AM

How Do Role Management Tools Fit In with Identity Management? Role management refers to developing role models and maintaining user role definitions over time to help you determine user authorization to applications and resources. With roles, you have the flexibility to change permissions or add/remove users without having to make changes throughout your entire infrastructure. Let’s look at how role management tools can help simplify the identity management process to save you time and money.

Read More

Topics: identity management

Which Security Conferences Cater to Identity Management Pros?

Posted by Don Pope

Apr 14, 2016 3:52:00 PM

Which Security Conferences Cater to Identity Management Pros?Cybercrime costs the average U.S. business $15.4 million. To avoid being one of the statistics, stay current with trends and advances concerning security. One way: attend security conferences where leaders in the field present the latest ideas. There are many, so to help you choose which might be best for you, here are some security conferences that benefit identity management professionals.

Read More

Topics: identity management

What is a Data Center Crash Cart?

Posted by Hadley Jones

Apr 12, 2016 7:30:00 AM

Picture for a moment the emergency ward in a hospital. When it’s a matter of life or death, medics rush to patient’s bed, taking with them the crucial equipment for resuscitation on a cart with wheels. A data center crash cart serves a similar purpose, except that the “patient” is now a server or other IT resource that is barely alive and for which remote access is no longer possible.

Read More

Topics: colocation data center

Comparing Data Center Tiers from a CEO's Perspective

Posted by Mark Burdon

Apr 7, 2016 8:30:00 AM

Managing content and data for hundreds, or even possibly thousands of businesses is a big responsibility. Depending on your financial and/or technical resources, deciding which of the Uptime Institute’s Data Center tiers you want to build when you first roll out your data center environment will also determine:

Read More

Topics: colocation data center

What's SailPoint IdentityIQ's Future Role in Identity Management?

Posted by Don Pope

Mar 31, 2016 2:00:00 PM

SailPoint IdentityIQ provides a unified approach to compliance, governance, and identity and access management (IAM) for both internal and cloud applications. While designed for on-site deployment, by providing a way to roll out to the cloud, IdentityIQ future-proofs your IAM efforts.

Read More

Topics: identity management

Is Your Colocation Pricing Based on Differentiation or Desperation?

Posted by Hadley Jones

Mar 29, 2016 12:40:00 PM

When you see a competitor announcing colocation price reductions, what do you do? If your reflex is to turn to your calculator or spreadsheet to see if you can undercut with an even bigger discount, then take a moment to think. Even if the other provider’s colocation offering looks identical, a knee-jerk reaction to slash prices on your side could be a desperate move that does your business more harm than good:

Read More

Topics: colocation data center

5 Data Center Design Thought Leaders You Need to Follow

Posted by Mark Burdon

Mar 24, 2016 6:30:00 AM

In every industry there are four types of leaders:

Read More

Topics: colocation data center

Is the Cloud Security Alliance the Best Group for IDM Professionals?

Posted by Don Pope

Mar 17, 2016 3:53:00 PM

A nonprofit organization, the Cloud Security Alliance (CSA) promotes secure cloud computing best practices and how cloud technology provides security for non-cloud computing.

Read More

Topics: identity management

Will the Data Center Cost Model Get Disrupted by Cloud?

Posted by Hadley Jones

Mar 15, 2016 12:04:00 PM

It looks like enterprises are in love with the cloud today. They can get elastic computing resources when they want, where they want, and on a pay-as-you-go basis. This last aspect is a big factor for many cloud users, allowing them to turn their usage on or off, and account for their cloud consumption as operational expenses, rather than capital investment.

Read More

Topics: colocation data center

Download Your Free IT Channel Inbound Marketing Planning Guide, So You Can Get More New Clients and Grow Your Business
Lead Generation Best Practices for Colocation Data Centers
Free Inbound Marketing Assessment