If you’re using Active Directory and Group Policies to administer computers on customer networks, suggest they adopt Internet Explorer 8 to get more than 100 new Group Policies that you can use to maintain a stable configuration.
All hardware fails – and backup is seen as boring and unreliable. That combination is the perfect opportunity for you to provide a service that provides business continuity and ongoing revenue. But how do you design the right backup system?
There’s a lot of information floating around in a network, information that’s being written into log files every minute of every day. Those log files that contain everything you need to know about how the systems you’re managing are running, and how they’re responding to the demands of their users.
What to look for when choosing an SSL VPN appliance for small business customers
Secure sockets layer (SSL) virtual private network (VPN) software has been around for a long time, but it is only relatively recently that is has been delivered on dedicated hardware appliances that specialise in hosting remote access, with many of those devices aimed squarely at the SMB market.
IT Expert spoke to Andrew Mulholland, marketing manager at D-LINK, the networking equipment vendor, and asked this channel-focused company how it is winning business from the big names, and how it is boosting its channel programmes.
Good security requires good passwords. But good security is as much about ensuring access by authorised users as it is about preventing access by interlopers. Recovering, resetting, or removing passwords is sometimes a necessity. Here’s how.
Subscribe and get the magazine in the post before it's online
Subscribe and get access to all of the back issues
To read a sample eMagazine - March 2010