IT News - Operations

With fingers always being pointed at IT, Mean Time to Innocence (MTTI) is more important than ever.

Alec Pinkham writes in CIO, "Discover how to lower costs of operations and realize the true ROI of end-to-end network observability.

While networks are getting more complex, the infrastructure that IT supports tends to grow at a relatively steady rate. However, in the past few years the footprint IT is responsible for has grown exponentially. Because of this, IT is often the first to be blamed when apps are slow or network performance drops. The role of IT has transitioned to one of defense where guilty-until-proven-innocent is the norm. Unfortunately, this has brought rise of a new metric - Mean Time to Innocence (MTTI)..."


5 Steps To Detect And Control Shadow IT
Security Boulevard, July 20th, 2022
Employees at every company will naturally use the best tool available to get their job done.

For knowledge workers, this often means using an online SaaS application, which mayor may not be officially sanctioned by the central IT group. Many use the term shadow IT, or now more frequently referred to as business-ledIT, to describe the purchase of technology that is not officially sanctioned by IT.

As the number of SaaS applications have increased, workers have naturally adopted a slew of online tools, and most of the shadow IT today are SaaS applications. Despite the industry's best efforts, shadow IT has not gotten smaller but has increased and is close to becoming legitimized as a viable IT strategy that provides competitive benefits.


Defending The Edge Data Center
Security Boulevard, July 22nd, 2022
Edge data centers are challenging for traditional security practitioners, as they tend to turn most established security policies on their heads.

"For example," writes Hugh Taylor in Security Boulevard "instead of having to operate a single 'man trap' at a large facility, edge security managers need to track dozens, or possibly hundreds of man traps at self-contained sites. The physical attack surface area at the edge is exponentially larger than at the core. Innovative countermeasures and best practices are emerging, however, that enable a robust security posture at the edge..."

See all Archived IT News - Operations articles See all articles from this issue