Upcoming Events

A Network Computing Webcast:
SSDs and New Storage Options in the Data Center

March 13, 2013
11:00 AM PT / 2:00 PM ET

Solid state is showing up at every level of the storage stack -- as a memory cache, an auxiliary storage tier for hot data that's automatically shuttled between flash and mechanical disk, even as dedicated primary storage, so-called Tier 0. But if funds are limited, where should you use solid state to get the best bang for the buck? In this Network Computing webcast, we'll discuss various deployment options.

Register Now!


Interop Las Vegas 2013
May 6-10, 2013
Mandalay Bay Conference Center
Las Vegas

Attend Interop Las Vegas 2013 and get access to 125+ workshops and conference classes, 350+ exhibiting companies and the latest tech.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

HP Announces New Services to Help SMBs Corral Data From Mobile Devices

With more than 1.1 billion mobile appliances in use worldwide, organizations of all sizes are challenged by the need to access, manage and secure mobile devices and the data generated by them. Hewlett-Packard today announced a suite of services aimed at helping small- and midsize enterprises (SMEs) prepare their technology infrastructures for a growing mobile workforce.

The new offerings fall under the umbrella of HP Converged Infrastructure to provide a platform for secure continuous access to data and applications combined with partner solutions from Citrix, Microsoft and VMware, explains Lisa Wolfe, worldwide small and midsize business leader, enterprise Business at HP.

More Insights

Webcasts

More >>

White Papers

More >>

Reports

More >>

The need to access mobile data isn't "going away anytime soon," Wolfe adds. "And SMEs are dealing with these challenges in an ad hoc sort of way."

More mobile devices in use means more unstructured data, Wolfe says. That data is generally handled by IT staff members who spend most of their time handling end user issues and tend to be generalists.

Included in the offerings are new networking products based on HP FlexNetwork architecture:

  • The HP 1910 8G Switch Series, an energy-saving product that delivers network access for rich-media applications such as voice and video; and
  • The expanded HP Multi-Service Router series, which reduces network complexity and total cost of ownership by integrating several mission-critical network services, such as security and wired and wireless networking features, into one device.

Meanwhile, HP is improving security with HP Client Virtualization, a virtual desktop product that stores user profiles and data on a centralized server. It then enables small and midsize businesses to provide secure access to applications from thin clients, laptops, tablets and smartphones. Information remains protected on the server even if a device is lost.

Wolfe said HP's goal is to provide an end-to-end roadmap to address challenges posed by bring-your-own-device (BYOD) policies, so the company is also offering HP Client Virtualization Analysis and Modeling, a prepackaged service that analyzes existing IT environments to simplify and speed deployment of virtualization, and the HP Transformation Experience Workshop for Mobility, a service that aligns business and IT stakeholders to ensure employees have access to data while upholding security requirements.

"A lot of businesses don't know their data is sitting on personal devices," Wolfe says. "These devices are easily lost or stolen."

Ideally, she adds, users should be able to access corporate data via smartphones and tablets, but the data should never remain on the device. Once the session is done, the data is gone.

Deepinder Sahni, VP of New York-based AMI Partners, said small and midsize businesses are grappling with the BYOD challenge. Some companies are establishing guidelines with a list of preferred devices, while others are letting employees decide. "As more applications are used on mobile devices, we expect more control to be exerted among SMEs over time," he says, "so having some form of policy and control framework, however rudimentary or sophisticated depending on the type of SME, will become essential."

Sahni says mobile devices are critical to small and midsize businesses, if only because of calendaring and email, but these organizations are adding other business applications that are being executed on mobile devices. "Addressing BOYD requires robust networking and security within the internal IT infrastructure, as well as offering desktop virtualization as a means to address BYOD," he says.

According to Gartner research, by 2016, at least 50% of business email users will rely primarily on a tablet or mobile client instead of a traditional desktop. The trend to use devices to access email and other business data requires SMEs to prepare their infrastructures to support increased mobility.


Related Reading


Network Computing encourages readers to engage in spirited, healthy debate, including taking us to task. However, Network Computing moderates all comments posted to our site, and reserves the right to modify or remove any content that it determines to be derogatory, offensive, inflammatory, vulgar, irrelevant/off-topic, racist or obvious marketing/SPAM. Network Computing further reserves the right to disable the profile of any commenter participating in said activities.

 
Disqus Tips To upload an avatar photo, first complete your Disqus profile. | Please read our commenting policy.
 
IaaS Providers
Cloud Computing Comparison
With 17 top vendors and features matrixes covering more than 60 decision points, this is your one-stop shop for an IaaS shortlist.
IaaS Providers

Research and Reports

The Virtual Network
February 2013

Network Computing: February 2013

Upcoming Events



TechWeb Careers