All articles from Technologent

Intent-Based Segmentation Dynamically Isolates and Protects Critical Resources

Multifactor Authentication Improves Security, but It Requires a Strategic Approach

A Hybrid Model Provides the Benefits of Both On-Premises and Cloud Storage

How the Cloud Is Addressing Today’s Data Protection Challenges

Sophisticated Services Are Driving the Evolution of PaaS

Why It’s Time to Get Blockchain on Your Radar

Cryptojacking: The Silent Threat to Your IT Environment

A Layered Approach Can Boost the Security of VPN Access

More Attacks Are Originating on Endpoints and Antivirus Isn’t Enough

Technologent's Heather Gonzalez and Marivi Stuchinsky Honored as CRN’s 2019 Women of the Channel

How SD-WAN Analytics Help Minimize Downtime and Performance Problems

Set Your Sights on Improving Network Visibility

How Software-Defined Access Enables Digital Transformation

Key Components of the Zero-Trust Security Model

How Enterprise NFV Cuts Costs, Streamlines Management and Increases Agility

Control Cloud Sprawl with Governance Framework

Misconfigurations Pose Cloud Security Risks

UEM Solutions Take the Mystery Out of Endpoint Management

7 Good Reasons for Network Automation

Don’t Implement Network Automation for the Wrong Reasons

The Pros and Cons of Technical Debt

A Look at Use Cases for Edge Computing

How DevOps Can Enable More Effective DR Planning

How NVMe and Storage Class Memory Meet Today’s Application Demands

Understanding Shared Responsibility Is Key to Achieving Cloud Benefits

SDN Remains Relevant but Still Comes with Significant Challenges

Wi-Fi Grows Up: New Standards, Better Experiences and Simpler Names

New Wi-Fi Security Protocol Beefs Up IoT Data Protection

How Hybrid Cloud Enables the Agility You Need to Gain a Competitive Edge

Why Integrated Enterprise Monitoring Should Be a Top Priority