Welcome!

Microservices Expo Authors: Zakia Bouachraoui, Pat Romanski, Elizabeth White, Liz McMillan, Yeshim Deniz

News Feed Item

Dimension Data Launches New Technology Lifecycle Management Assessment

Holistic View of Technology Assets Enables Cost Containment, Improved Planning and Tighter Security

NEW YORK, Sept. 24 /PRNewswire/ -- Dimension Data, a global IT solutions and services provider, today announced the release of its next-generation technology lifecycle assessment service. The company's new Technology Lifecycle Management Assessment (TLM Assessment) enables organizations to contain costs, tighten security, and achieve greater automation and accuracy in network asset planning.

Dimension Data's TLM Assessment provides organizations with a high level of visibility into their networks. With a growing number of applications being deployed on today's corporate networks, there's an increasingly wide array of technology to be monitored and maintained. By automating asset identification and the evaluation of asset status, organizations can accurately identify basic security, configuration and end-of-life network device issues so they can be proactively addressed. This holistic view gives companies the time, knowledge and insight to plan for upgrades, make informed decisions on prolonging the use of certain assets, and budget for those that need upgrades or spares.

In addition to cost savings, Dimension Data's TLM Assessment can also help companies reap the "green" benefits associated with improved network asset planning. With a holistic view of technology assets, organizations can determine which equipment to replace, or which technologies, processes and practices to rationalize in order to improve their environmental impact. An accurate inventory of devices empowers organizations to reduce their carbon footprint without incurring the cost of new hardware or software.

As reported in Dimension Data's 2009 Network Barometer Report, most organizations currently have multiple network vulnerabilities putting them at risk:

  • 73% of networking devices are running with known security vulnerabilities. This exposes a business to both external and internal security attacks and breaches, and could seriously jeopardize an organization's ability to meet regulatory compliance.

  • There is an average of 30 configuration issues per network device, despite the fact that there are widely published and recommended standards to safeguard against these problems. The financial services sector, with an average of 36, has the highest average number of configuration errors per device.

  • Almost half of all network devices have entered the obsolescence cycle, putting organizations at risk for extended downtime and unplanned, forced expenditure to regain business continuity. Some industry analysts calculate that system downtime can cost as much as $42,000 per month in direct IT expenses and up to 3% of an organization's annual revenue.

"The great irony here is that every one of these problems is avoidable through thoughtful lifecycle management," said Rich Schofield, global business development manager, Network Integration at Dimension Data. "The growth of Web 2.0, Software as a Service (SaaS), video, voice and mobility applications will put even more pressure on corporate networks. To minimize risk, organizations need to conduct regular assessments via an automated service that constantly evolves and matures along with the technologies themselves. Organizations that don't get the help they need now could find they're being held hostage by their networks in the future."

Dimension Data's new TLM Assessment comprises three steps:

  • Discover: Dimension Data creates a list of network assets based on business and technical reviews with key stakeholders as well as onsite electronic discovery, ensuring that relevant information is collected and that lifecycle, security and configuration issues are identified.

  • Assess: Using automated tools, the asset list is analyzed against security, configuration and end-of-life databases. Based on this analysis, Dimension Data creates a technology roadmap, prioritizing and outlining configuration remediations, as well as security and maintenance recommendations.

  • Recommend: Dimension Data specialists and key stakeholders discuss the findings and determine how to act based on risk, cost and strategic factors. An action plan is developed.

About Dimension Data

Dimension Data (LSE: DDT), a specialist IT services and solutions provider, helps clients plan, build, support and manage their network and IT infrastructures. Dimension Data applies its expertise in networking, security, operating environments, storage and contact center technologies and its unique skills in consulting, integration and managed services to create customized client services. For more information: Call 866-DIDATA-US or visit www.dimensiondata.com/na.

    Media Contacts:
    Lisa Grimes                           Laura Sexton
    Dimension Data                        Davies Murphy Group
    (703) 217-2692                        (781) 418-2417
    [email protected]             [email protected]

SOURCE Dimension Data

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Microservices Articles
When building large, cloud-based applications that operate at a high scale, it’s important to maintain a high availability and resilience to failures. In order to do that, you must be tolerant of failures, even in light of failures in other areas of your application. “Fly two mistakes high” is an old adage in the radio control airplane hobby. It means, fly high enough so that if you make a mistake, you can continue flying with room to still make mistakes. In his session at 18th Cloud Expo, Lee A...
Lori MacVittie is a subject matter expert on emerging technology responsible for outbound evangelism across F5's entire product suite. MacVittie has extensive development and technical architecture experience in both high-tech and enterprise organizations, in addition to network and systems administration expertise. Prior to joining F5, MacVittie was an award-winning technology editor at Network Computing Magazine where she evaluated and tested application-focused technologies including app secu...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Containers and Kubernetes allow for code portability across on-premise VMs, bare metal, or multiple cloud provider environments. Yet, despite this portability promise, developers may include configuration and application definitions that constrain or even eliminate application portability. In this session we'll describe best practices for "configuration as code" in a Kubernetes environment. We will demonstrate how a properly constructed containerized app can be deployed to both Amazon and Azure ...
Modern software design has fundamentally changed how we manage applications, causing many to turn to containers as the new virtual machine for resource management. As container adoption grows beyond stateless applications to stateful workloads, the need for persistent storage is foundational - something customers routinely cite as a top pain point. In his session at @DevOpsSummit at 21st Cloud Expo, Bill Borsari, Head of Systems Engineering at Datera, explored how organizations can reap the bene...
Using new techniques of information modeling, indexing, and processing, new cloud-based systems can support cloud-based workloads previously not possible for high-throughput insurance, banking, and case-based applications. In his session at 18th Cloud Expo, John Newton, CTO, Founder and Chairman of Alfresco, described how to scale cloud-based content management repositories to store, manage, and retrieve billions of documents and related information with fast and linear scalability. He addresse...
The now mainstream platform changes stemming from the first Internet boom brought many changes but didn’t really change the basic relationship between servers and the applications running on them. In fact, that was sort of the point. In his session at 18th Cloud Expo, Gordon Haff, senior cloud strategy marketing and evangelism manager at Red Hat, will discuss how today’s workloads require a new model and a new platform for development and execution. The platform must handle a wide range of rec...
SYS-CON Events announced today that DatacenterDynamics has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY. DatacenterDynamics is a brand of DCD Group, a global B2B media and publishing company that develops products to help senior professionals in the world's most ICT dependent organizations make risk-based infrastructure and capacity decisions.
Discussions of cloud computing have evolved in recent years from a focus on specific types of cloud, to a world of hybrid cloud, and to a world dominated by the APIs that make today's multi-cloud environments and hybrid clouds possible. In this Power Panel at 17th Cloud Expo, moderated by Conference Chair Roger Strukhoff, panelists addressed the importance of customers being able to use the specific technologies they need, through environments and ecosystems that expose their APIs to make true ...
In his keynote at 19th Cloud Expo, Sheng Liang, co-founder and CEO of Rancher Labs, discussed the technological advances and new business opportunities created by the rapid adoption of containers. With the success of Amazon Web Services (AWS) and various open source technologies used to build private clouds, cloud computing has become an essential component of IT strategy. However, users continue to face challenges in implementing clouds, as older technologies evolve and newer ones like Docker c...