Linda Musthaler

Linda Musthaler is a principal analyst with Essential Solutions Corp., which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

SASE might be better than VPNs for quickly ramping up remote access

SD-WAN at KinderCare supports company growth, cost-savings

SD-WAN at KinderCare supports company growth, cost-savings

With more than 1,400 childcare centers, KinderCare is deploying SD-WAN and reaping a host of valuable lessons about bidding projects, verifying SLAs on WAN circuits and partnering with experienced providers.

Survey: Digital transformation can reveal network weaknesses

Survey: Digital transformation can reveal network weaknesses

When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity or access for mobile users.

A new spin on interconnects for colocation data centers

A new spin on interconnects for colocation data centers

Stateless, Inc. launches its Luxon platform that enables provisioning of network functions as microservices.

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs

Four major trends in enterprise mobility  

Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging

Encrypted data in the cloud? Be sure to control your own keys

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

Encrypted data in the cloud? Be sure to control your own keys

Data encryption in the cloud is an absolute requirement these days. When you talk to your service providers about encryption, be sure to specify that you want to control your own keys.

Hexadite's Automated Incident Response Solution narrows the gap between detection and response

Many organizations are in desperate need of a way to respond to at least some of their alerts in an automated way in order to free up their highly skilled people to address the most serious and complex incidents. This is a role that...

Ayehu extends IT automation into security automation

This reduces time-to-mitigation for numerous types of events.

Ayehu extends IT automation into security automation

Ayehu is pushing its customers into the realm of security automation through integration with security systems that generate alerts that can be automatically acted upon. This reduces time-to-mitigation for numerous types of events.

Load More