Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Napa County Bottles Up BYOD Phenomenon

In fall 2010, Napa County in California decided to address its data management concerns. The county's 1,600 employees had used BlackBerrys to access data, with every transaction routed through a central server. Then, the Bring-Your-Own Device trend hit and employees began bypassing the server with their own smartphones.

"We were becoming quite concerned about security and being able to meet our compliance regulations," explains Gary Coverdale, chief information security officer and assistant CIO for Napa County. So a new solution was found--one that not only restored order but also reduced the department’s support requirements.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

The county, which is home to 130,000 residents, ranks as one of the world’s pre-eminent wine-producing areas. The county government consists of 26 agencies--including education, healthcare and law enforcement--that deliver various services to the locals. The IT group maintains central control of all computing resources, which includes Dell servers running Microsoft Windows, Cisco routers and 40 TB storage (soon to be expanded to 80 TB).

Central control of data is paramount to the county. Napa County has to comply with various local, state and federal regulations, such as the Health Insurance Portability and Accountability Act and the state of California’s data breach disclosure law. If it fails to do so, the county is potentially subject to costly fines.

The Research In Motion BlackBerry system had been in use for several years, largely because it provided much-needed data control. But its influence started to wane as employees brought their own smartphones to work. "With the RIM solution, we could not support or manage Apple iPhones because we had little to no visibility into them," says Coverdale.

Problems could arise if one of the mobile devices was lost or stolen. The IT department could wipe misplaced BlackBerrys clean, basically locking all information, so it was not open to intrusion. That wasn't an option with the Apple iPhones, so outsiders could gain access to sensitive county data.

Facing potential fines, as well as bad publicity, the county began to search for a mobile management solution. "Quite honestly, few tools were available," says Coverdale.


Page:  1 | 2  | Next Page »


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

Network Computing: April 2013



TechWeb Careers