Linda Musthaler

Linda Musthaler is a principal analyst with Essential Solutions Corp., which researches the practical value of information technology and how it can make individual workers and entire organizations more productive. Essential Solutions offers consulting services to computer industry and corporate clients to help define and fulfill the potential of IT.

SASE might be better than VPNs for quickly ramping up remote access

SD-WAN at KinderCare supports company growth, cost-savings

SD-WAN at KinderCare supports company growth, cost-savings

With more than 1,400 childcare centers, KinderCare is deploying SD-WAN and reaping a host of valuable lessons about bidding projects, verifying SLAs on WAN circuits and partnering with experienced providers.

Survey: Digital transformation can reveal network weaknesses

Survey: Digital transformation can reveal network weaknesses

When enterprises embraced digital transformation, some found their existing networks had a limited ability to address cloud connectivity or access for mobile users.

A new spin on interconnects for colocation data centers

A new spin on interconnects for colocation data centers

Stateless, Inc. launches its Luxon platform that enables provisioning of network functions as microservices.

Forget signatures for malware detection. SparkCognition says AI is 99% effective  

The volume of malicious software in the wild has exceeded researchers’ ability to write signatures for all of it. The most effective way to detect malware today is through the use of artificial intelligence

Small businesses are prime targets for cyber attacks: SIEM-as-a-service can help

Netsurion’s SIEM-at-the-Edge puts enterprise-level detection and response capabilities in the hands of SMBs

Four major trends in enterprise mobility  

Security models are evolving, cloud is changing the game, the desktop and mobile worlds are converging, and new regulations are emerging

Encrypted data in the cloud? Be sure to control your own keys

This column is available in a weekly newsletter called IT Best Practices. Click here to subscribe.

Hexadite's Automated Incident Response Solution narrows the gap between detection and response

Many organizations are in desperate need of a way to respond to at least some of their alerts in an automated way in order to free up their highly skilled people to address the most serious and complex incidents. This is a role that...

Ayehu extends IT automation into security automation

This reduces time-to-mitigation for numerous types of events.

Get the application performance insight you've never had before

How often have you heard the adage, "IT must align itself to the business needs"? It's one of those buzz phrases that sounds really obvious but, in reality, might be harder to achieve than one would think. Here is some insight on a...

Improving network access security for unmanaged devices

"Lions, and tigers and bears! Oh, my!" Anyone who has ever seen The Wizard of Oz knows that's the sum of the fears of Dorothy, Scarecrow and Tin Woodsman as they head into the woods on their way to Oz. For the network security...

Load More