When they upgraded their Wi-Fi network, the National Hockey League's Minnesota Wild doubled the number of access points within their arena, the Xcel Energy Center, to more than 450.
Here are three pointers for placing APs in large event venues:
Consider unique locations for the APs: At Xcel Energy, the IT team placed several APs around the ice rink in the dasher boards. “We really had to think about the aesthetics and design of the APs, especially in the bowl,” says Jim Ibister, vice president of facility administration for the Wild and general manager of the Saint Paul RiverCentre complex that’s home to Xcel Energy.
Tuck antennae in the ceiling at the top of the bowl: It protects the devices and improves access. “They do a great job,” Ibister says. “The signal’s really strong at the top and the bottom.”
If you’re thinking about implementing SSO in your organization, here are features to consider.
1. Ease of Use. Check that the product is easy to use and comes with built-in reporting for security and compliance auditing. To avoid any drag on performance, test-drive prospective tools in your real-world environment.
2. Automated Self-Service. Make sure the product has a self-serve feature. Even with consolidation to single passwords, users will forget once in a while, and they will need to reset them for security purposes too. With a self-service app, the help desk dramatically reduces calls for both these needs.
3. Strong Authentication. Ask about authentication features. Consolidating to one password makes economic sense and it’s more efficient, but companies may want a product with two-factor authentication to further strengthen access controls.
As mobile deployments have become increasingly common — and increasingly complex — businesses have demanded simplified, all-in-one management tools.
In response, technology manufacturers have recently begun offering mobile workspace solutions that bundle virtualization, enterprise mobility management (EMM) and identity and access management (IAM) tools into single systems, explains IDC Research Analyst Bryan Bassett. These mobile workspace suites include:
For businesses looking to make sure their employees' mobile devcies are secure, they should follow these steps:
1. Implement identity access management. You want a solid foundation that will let you manage all your security policies within a single dashboard, says Norm Messenger, chief security officer at global consulting firm Inspirage.
2. Standardize on the latest operating systems. Inspirage migrated from Windows 7 to Windows 10 because the new operating system features BitLocker full-disk encryption and other security enhancements, including data loss prevention and Device Guard to keep malware away. Furthermore, phones with the latest iOS and Android OSs have better native security, including full-disk encryption, Messenger says.
Hewlett-Packard Enterprise acquired hyperconverged infrastructure specialist SimpliVity this week for $650 million. The deal is expected to close in the second quarter of HPE’s 2017 fiscal year, which ends on June 30.
Hyperconverged platforms combine computing, storage, networking and virtualization capabilities, all pre-integrated and controlled by a single management layer.
HPE said the hyperconverged market was estimated to be around $2.4 billion in 2016, and the company thinks it will grow at a compound annual growth rate of 25 percent, to nearly $6 billion, by 2020.
Global IT spending will increase this year but at a lower pace than previously expected, according to reports from leading research firms, as political uncertainty puts a damper on investment.
Worldwide IT spending is projected to total $3.5 trillion in 2017, which would be a 2.7 percent increase from 2016, according to Gartner. However, this growth rate is down from earlier projections of 3 percent.
Investment in the Internet of Things is set to jump signficiantly in the years ahead, according to a recent report from IDC, as more organizations connect devices wirelessly to the internet and use IoT for analytics to increase efficiency. Worldwide IoT spending reached $737 billion in 2016, the research firm found, as organizations invested in the hardware, software, services and connectivity that enable the IoT.
According to IDC, global IoT spending will experience a compound annual growth rate of 15.6 percent over the 2015-2020 forecast period, reaching $1.29 trillion in 2020.
Norton by Symantec unveiled a router designed to keep your network safe from the growing number of devices businesses and individuals are connecting to the internet. The Norton Core router, which Symantec unveiled at the CES 2017 conference in Las Vegas, was built to secure connected devices inside homes, but could be applied to small business environments with devices connected to the Internet of Things.
Yahoo said that more a billion user accounts had been hacked in an incident that occurred in August 2013, a disclosure that comes on the heels of Yahoo’s announcement in September that 500 million accounts were compromised in a separate incident in 2014. Together, they are the largest known breaches ever of a single company's user data.
Crucially, Yahoo says it has not been able to identify the hackers behind the 2013 theft. The breach highlights the need for strong encryption and user education about passwords and general cybersecurity protections. It also shows how important it is to develop and maintain a culture of cybersecurity, especially as organizations grow larger.