Keep in touch with your favorite data center solutions
Computer Room Design Group
What's The New Buzz In The
Data Center Industry?
Out From The Expert Himself in Pete Sacco's Personal Blog
Data Center Design
Edison Energy Efficiency Summit 2011
PTS participated in this event on June 1st at the
Learn More or contact us to receive the Energy
Emerson Network Power 2011 Smart Solutions Tour on April
5th in Edison, NJ
were a number of excellent presentations on the Smart Solutions as
well as an opportunity to walk through a SmartMod structure.
Learn About Powerful
CFD Technology In the Data Center
nationally recognized data center design firm,
PTS Data Center Solutions specializes in:
If you are having a
problem in your data center talk to one of our experts today before
your situation goes from bad to critical.
Contact us at:
or visit us at:
please find our latest bi-monthly e-newsletter. This month we focus
on IT related topics and, in particular, Network Security.
addition to Network Security, other topics include:
- Solutions Showcase:
Fortinet's Unified Threat Management (UTM) solutions are
- Educational White Papers:
There are several new white papers (as well as case studies)
highlighted in our education section and available at the PTS Media
also present several new articles and upcoming events related to data
center design and management that may be of interest to you.
As always, please
think of us for your next data center project --- whether it is
infrastructure, facility, or IT related.
PTS Data Center
For Your Always Available Data Center
PTS Story: Network
Security Becoming More Complex with Web 2.0 Applications
used to be that network security was rather straightforward. When
network administrators configured a firewall they blocked potential
threats to their networks via port blocking (I.e. port-80 blocking
would block Web access and, therefore, hackers) and URL
However, the days of protecting a network via stateful firewalls only appears
to be over. Today, multiple applications, many of which are necessary
for employees to do their jobs, share the same port while some Web
2.0 applications use multiple ports. Malicious applications can use
non-standard ports and SSL encryption to avoid detection and control.
Even the definition of "application" has changed as some
applications run inside Web browsers as plug-ins while others run
within host applications.
visibility and control over application use within an enterprise has
become difficult and these Web 2.0 applications, some of which are
necessary and some of which are harmful, must be filtered, managed,
and verified as permissible within the network. Application control
is no longer simply managed by allowing or blocking the ability of
users to "run" an application. And, with the advent of
social network use within businesses, multiple layers of protection
network security, Web 2.0 applications accessed from inside the
enterprise (I.e. streaming video) can consume a excessive network
bandwidth. And, with the ability to easily share your desktop and
files, Web 2.0 applications use can lead to inadvertent sharing of
confidential information across the internet.
prevent data loss and network security threats, organizations must,
therefore, effectively control legacy applications as well as the new
breed of Web 2.0 internet-based applications. Detection, monitoring,
and applications control must be completed at network gateways as
well as endpoints throughout the network. In addition, it is
important to tie applications to users so correct access rights can
be assigned through an enterprise security policy.
forward, we suggest network administrations consider the following:
- Does you have a
comprehensive enterprise network security policy and plan?
- What means do you have
to monitor and block malicious Web 2.0 applications threats?
- Are end users able to
effectively perform their job functions without putting
corporate information at risk in terms of attacks and/or
- Would a way to
effectively control the use of internet-based applications
improve overall enterprise network security?
learn more contact PTS or
visit the the PTS website to
learn more about network security. Thanks to Fortinet for content
contributed to this article.
The PTS Data
Center Solutions Showcase: Fortinet
Unified Threat Management Solutions
provides a comprehensive portfolio of security gateways and
complementary products to protect against traditional network
security threats and the latest threats from Web 2.0 applications and
social media sites. However, the real magic provided by the Fortinet
product family is the integrate Unified Threat Management (UTM)
Unified Threat Management
(UTM) is a comprehensive solution that has recently emerged in the
network security industry as a comprehensive approach to network
The advantages of unified security lies in the fact that rather than
administering multiple systems that individually handle anti-virus,
content filtering, intrusion prevention and web filtering functions,
organizations now have the flexibility to deploy a single UTM
appliance that takes over all their functionality into a single rack
mountable network appliance.
In theory, it is the evolution of the traditional firewall into an
all-inclusive security product capable of performing multiple security
functions in one single appliance that is the key differentiator for
the Fortinet product line. The following diagram shows primary (blue)
and secondary (red) threat protection provided by UTM devices:
In essence, when you
purchase a Fortinet UTM device you a host of applications built into
one solution. This allows you to eliminate other devices,
concentrating applications such as firewall, anti-virus, spam
filtering, web filtering, and wireless access into one
enterprise-level device. In addition, the family can support small-,
mid-, and enterprise level developments.
To learn more about the
Fortinet family of products, visit here or
& White Papers
Check out the latest white papers added to our
website by signing in or
joining our new PTS Media Library!
We're sure there will be some interesting content for your reading
pleasure. For up-to-the-minute educational information don't forget
to check out the PTS Blog - Data
Center Design and consider joining the LinkedIn Computer
Room Design Group.
- The Value of a Purpose-Built Network Security Platform by Fortinet
Providing comprehensive protection for computing systems and
associated information assets is mandatory today. What constitutes
"comprehensive", however, has expanded significantly in
recent years. The white paper discusses the value of a purpose-built
network security platform. Download
Management for the Distributed Enterprise by Fortinet
All organizations face the
threat of vulnerabilities to critical systems. To mitigate those
threats, organizations deploy vulnerability management (VM)
technology to discover and scan systems. Large distributed
enterprises, however, face an additional challenge of deploying VM in
dozens or even thousands of remote locations. These organizations
need a VM solution that is low-cost, easy to install, scalable, yet
able to effectively provide policy compliance in large enterprises. Download
Energy Efficiency - Looking Beyond PUE by No Limits Software
The PUE metric has become
the de Facto standard for measuring data center energy efficiency.
PUE compares the total power going into a data center with the amount
of power used to power IT equipment. There is increasing pressure to
measure PUE but the proper usage is often misunderstood. This white paper
addresses this core issue for data center managers. Download
Practices Guide for Energy-Efficient Data Center Design by US
Department of Energy, Federal Energy Management Program
This guide provides an
overview of best practices for energy-efficient data center design
which spans to categories of IT systems and their environmental
conditions, data center air management, cooling and electrical
systems, on-site generation, and heat recovery. Download
Low Latency Cloud Networks by Arista
As data centers transition
to next generation virtualized & elastic cloud architectures,
high performance and resilient cloud networking has become a
requirement for delivering always-on, always-available applications.
This white paper reviews one switching architecture which allows
ultra-low latency across the cloud. Download
Energy Efficiency in Data Centers
April 28, 2011
With the high costs of power, energy efficiency has rapidly become a
critical consideration when evaluating data centers. It is, perhaps,
second only to performance when deciding upon data center facility
and information technology (IT) network design.
Read the Article, Please Click Here
Practices in Building a New Data Center
April 12, 2011
Peter Sacco, founder and CEO of PTS Data Center Solutions and partner
with nlyte Software, was recently interviewed by Barbara Morris,
Editor, of The DCIM Advisory,
nlyte's monthly online trade journal.
The article focuses on how to avoid the pitfalls many experience in
mission critical facilities and centers around Pete's experiences
visiting 50 to 60 data centers every year and having designed many
Read the Full Article, Please Click Here
Learn More About nlyte's DCIM Solutions, Please Click Here
6720 Wins "Most Important Enterprise IT Product for 2010"
Edge, CTO Edge
January 11, 2011
Read the Article, Please Click Here
Note: Visit Here for
All our Recent In the News activities
PTS Data Center Solutions
Founded in 1998, PTS Data Center Solutions is a premier
data center design firm and turnkey solutions provider, offering a
broad range of project experience, specializing in designing data
centers, computer rooms and technical spaces that integrate "best-of-breed",
critical infrastructure technologies and result in continuously
available, scalable, redundant, fault-tolerant, manageable, and
maintainable mission critical environments.