Graceful shutdown of Gulf satcoms with Uplogix proceeds hurricane

By | August 25th, 2017|Blog|

Uplogix customers delivering satellite communications to oil platforms in the Gulf of Mexico are using out-of-band for a graceful shutdown of gear ahead of Hurricane Harvey. Ocean-based energy discovery and production is a tough business. Even if you take for granted the technical challenges of drilling in deep water through thousands of feet of rock, [...]

Bringing out-of-band into the data center

By | August 24th, 2017|Blog|

Data centers today come in all shapes and sizes, but deploying data center out-of-band solutions has some universal benefits whether your DC is just downstairs or buried underground -- lights-out or just locked up. A factoid that floats around from time to time is that 90% of the world's data was created in the last [...]

Out-of-band that actually works

By | August 24th, 2017|Blog|

  Out-of-band isn’t a new concept. As network requirements have become more extreme and critical to all aspects of the enterprise, out-of-band is more commonplace. But what we often hear at Uplogix is disappointment with other out-of-band systems. This post highlights some of the features of OOB that works — because like in extreme sports, [...]

Maritime networks concerned following breach

By | August 11th, 2017|Blog|

Maritime networks are getting even more serious about security following the high-profile cyber attack of shipping giant Maersk in June. The coordinated attack impacted business on a global scale as Maersk had to take IT systems offline to respond to the breach over the span of about a week. It's not the first time maritime [...]

Why you’ll still want out-of-band for NFV

By | May 25th, 2017|Blog|

As with traditional network architectures, NFV or Network Function Virtualization, still faces some of the same challenges when it comes to reliance on the network itself for monitoring and managing the network infrastructure, rapid identification and resolution of network issues and ensuring secure access to and logging for network components. The Uplogix out‐of‐band platform brings [...]

Cisco: 75% of IoT initiatives not successful

By | May 24th, 2017|Blog|

In a study out from Cisco this week, one of the key vendors in IoT, says that only 26 percent of companies in their survey feel that they have been successful with their IoT initiatives. The danger zone for most IoT initiatives is the proof of concept (POC) stage, where 60 percent stall. The complexity of moving from [...]

Luxury yacht network security might matter to you

By | May 18th, 2017|Blog|

Granted not all of us spend our time relaxing on one of the increasing number of luxury yachts charting the high seas and exclusive tropical island destinations, but they are becoming more common and more connected. Luxury yacht network security is growing in importance as some of the world's titans of business take their work [...]

Security reading for May the Fourth

By | May 4th, 2017|Blog|

If you haven't come across it yet, the HP Enterprise blog ran an article back in February that is worth reading today, May the Fourth, also known as Star Wars Day. While not as important as an opening day, 5/4 is a great day to geek out a bit and enjoy an article that shows [...]

2017 the year of acquisitions for MSPs?

By | April 19th, 2017|Blog|

MSPs, or Managed Service Providers, are seeing a convergence of business conditions that are both expanding market opportunity and making it more difficult not to be—or be partnered with—a major industry player. The growing need across all industries to be digitally connected, the arrival of cloud computing and the required expertise in cybersecurity are slamming [...]

Protecting against insider threats

By | April 17th, 2017|Blog|

When it comes to securing your network against insider threats, security researchers recommend a "mini-max" policy -- minimize access where possible and then maximize monitoring of that access for unusual patterns. The goal is to not provide employees with an open door to the entire network by making access a privilege and not a right. [...]