2017 predictions for IT networking & security

By | December 12th, 2016|Blog|

Mid-way through the last month of the year means it's time for everyone to release their predictions for IT in the coming year. This year is no different, and given recent headlines about Russian hacking and ransomware designed to let you opt to infect others you know rather than pay up, we're going to talk [...]

Five ways to make your Cisco bulletproof

By | December 9th, 2016|Blog|

Uplogix has always had a great story for managing Cisco equipment. As a Cisco Solution Partner we've shared this story at CiscoLive as well as through demos, webinars and white papers. But who has that kind of time anymore? So we cut it down to an eBook with the top five examples of how Uplogix [...]

IT modernization a shrinking slice of agency budgets

By | November 11th, 2016|Blog|

Federal IT is like running on a treadmill without an on/off switch. Stopping to get a drink will result in a wipe out. Or in this analogy, divert significant spending from operations and maintenance to IT modernization and programs and people are adversely impacted. The result is systems get older and more expensive to maintain and eat [...]

User access a challenge to lock down

By | September 20th, 2016|Blog|

User access remains a pain for most companies according to a recent survey, with few IT managers reporting that they are satisfied with managing privileged-user access. The study by the Ponemon Institute with Forcepoint, showed that privileged users (defined as database admins, network engineers, IT security pros and cloud custodians) unsurprisingly have the most useful [...]

The next software-defined frontier: Satellites

By | August 18th, 2016|Blog|

Working hard on your software defined networking strategy? That's like, so early 2016. The next thing is software defined satellites. This isn't just putting routers in space, which has been done, or just orbiting data centers. It's putting up general purpose satellites that can be configured for a variety of tasks. Think Satellites as a [...]

Network management critical to getting IT right

By | July 11th, 2016|Blog|

Getting core components of corporate IT right, like network management, is critical to corporate success with multiple studies showing the correlation between effective IT and the bottom line. A State of the WAN study showed that when the performance of business critical applications is performing badly, the company loses revenues and customers. Dr Richard Foster of Yale [...]

Vessel downtime is like network downtime

By | July 7th, 2016|Blog|

Uplogix does a lot of business with satellite service providers for the maritime market, especially those in oil & gas where downtime is an especially dirty word. These vessels are often highly specialized and expensive to operate, so like with their data networks, downtime is a serious concern. GE's Marine Solutions group announced that they [...]

Self-driving cars parallel Uplogix network automation

By | May 11th, 2016|Blog|

The answer a lead engineer in Ford's autonomous vehicle program gave when asked a question shows one of the parallels between self-driving cars and the network automation capabilities of the Uplogix out-of-band platform. Question: "Do the cars always have to be connected to the network to drive?" Answer: "You can't depend on it [the infrastructure] being there, so [...]

Granular authorization combats privilege hogs

By | April 28th, 2016|Blog|

When it comes to barriers to innovation in federal IT or even in the enterprise, individual ego and personal empires built on unnecessary network privileges can be a significant problem. The good news is functionality like the granular authorization capabilities of the Uplogix out-of-band platform make it easier to rein in so called "privilege hogs." Federal [...]

Cyber security responsibilities: who owns it?

By | October 23rd, 2015|Blog|

The Stop. Think. Connect. campaign is five years old this year, and while it has achieved several of the goals it began with, much of the public's increased awareness of cyber security has been based on the increasingly alarming data breaches of large corporations and the government. Statistics from the campaign say that "Nearly two-thirds of the [...]