Sulagna Saha

Web site:

Twitter:

LinkedIn:

Sulagna Saha is a writer at Gestalt IT where she covers all the latest in enterprise IT. In profession for 6 years and counting, she has written widely on miscellaneous topics. On gestalt.com she writes about the hottest technologies in Cloud, AI, Security and sundry.

A writer by day and reader by night, Sulagna can be found busy with a book or browsing through a bookstore in her free time. She also likes cooking fancy things on leisurely weekends. Traveling and movies are other things high on her list of passions. Sulagna works out of the Gestalt IT office in Hudson, Ohio.






Links with Tag @WriterOfTech1

  1. Supporting Performance and Capacity Scaling of High-Level AI Use Cases With Intel Optane
  2. Unlimited Capacity in File Storage – Nasuni
  3. Multi-Network Management With a Single Dashboard With Aruba Central
  4. Getting the Network Ready for a Remote Workforce With Aruba EdgeConnect SD-WAN Fabric
  5. Zero Trust Data Protection With Rubrik
  6. Protecting Digital Assets Across Platforms With the Combined Capabilities of SIEM and XDR With Microsoft
  7. Securing Sensitive Infrastructure Credentials With Keeper Secrets Manager
  8. Proactive Threat Detection and Incident Response With Arista Networks
  9. Eliminating Integration Complexities From a Multi-Vendor Security Architecture With ZPE Systems
  10. Zero Trust Data Security With RackTop BrickStor SP
  11. Securing Applications From Within With Cisco Secure Application for AppDynamics
  12. Delivering Enhanced Network Experience With the Cisco Meraki Cloud Platform
  13. Achieving Network Visibility Goals With Cisco AI Enhanced RRM
  14. Minimizing Unplanned Downtime With SIOS Technology
  15. Security-First Storage With RackTop Systems
  16. Getting the Most Out of All-Flash Architecture With VAST Data’s Universal Storage
  17. Ceres – VAST Data’s AI Data Platform for Data Centers
  18. Secure Communication Between Cloud and the Arrays With Pure1 Edge Service
  19. Making Object Storage the Primary Storage With MinIO
  20. Cloudifying Data Centers With Fungible DPU
  21. Global Data Management Across Disjointed Storage With Hammerspace
  22. Minimizing Infrastructure Cost With Disaggregated Storage With Intel
  23. RackN Digital Rebar: Managing Infrastructures With a Single Control Plane
  24. Self-Healing Security in the Cloud With Fortinet Security Fabric
  25. Multi-Layered Proactive Security Against Ransomware With Metallic
  26. A Rapid Path to Production With VMware Tanzu Application Platform
  27. Migrating Seamlessly to AWS With Amazon FSx for NetApp ONTAP
  28. Implementing a Cloud Model Across Different Infrastructures With Pure Fusion
  29. Optimizing Resources in Kubernetes With StormForge Platform
  30. Building a Secure Network From Cloud to Edge With ZeroTier
  31. Juniper Networks’ Session Smart Router: Simplicity Meets Security
  32. Improved Network Security and Reliability With ZPE Systems
  33. Zero Trust Security in Campus Networks With Pica8
  34. Forward Networks: Automated Data Insights From Across the Network
  35. Network to Code: A Single Source of Truth for Network Data From Disparate Sources
  36. Network Automation From End to End With Itential
  37. Viewing and Analyzing Multi-Vendor Network in Minutes With IP Fabric Automated Network Assurance Platform
  38. Wide-Scale Automation in Hybrid Cloud With Red Hat Ansible Automation Platform
  39. Juniper Networks’ Mist Cloud Platform Just Got Better With Added Support for EVPN-WXLAN
  40. Achieving All-Round Data Protection at Minimal Cost With Veeam Software
  41. Managing Cloud Costs With Yotascale Multi-Cloud Cost Visibility
  42. The Promise and Limitations of Cloud Mobility
  43. Dissecting DNS Security and NetSecOps With EfficientIP
  44. Versa Networks Tightens Up Security in Hybrid Multi-Cloud With Versa SASE
  45. Multi-Cloud Doesn’t Have to Be an Erector Set Approach
  46. Arista Lines Up Merchant Silicon-Based Routing Products for Service Provider Networks
  47. Secure Zero-Touch Provisioning With Cisco’s New Implementation on IOS XR
  48. A Step Towards Ethical Facial Recognition With Oosto
  49. Security Effectiveness Reaches New Heights With Juniper Security Director Cloud