About Ken Czekaj

I design network and application performance management solutions to address the unique business challenges of enterprise, healthcare and financial customers. Primarily focusing in the areas of Application Triage, VoIP, Video, Capacity Planning, Security, Latency, Multi-Tier applications, Virtualized applications and Electronic Trading deployments

Gallery

SiliconAngle “TheCube” Interview on IT Security in Healthcare
avatar

Problem to Solve: Hospitals combat rising denial-of-service attacks with network triage I had the privilege to be interviewed by SilconANGLE “theCUBE” regarding the many challenges in IT security in Healthcare. In a nutshell, the session highlights the challenges and safety … Continue reading

COVID-19: A lesson in being Grateful?
avatar

Problem to Solve: The COVID-19 virus has affected much of our lives. What can I do to help? While the very serious COVID-19 outbreak has seemingly been non-stop bad news and affecting lives everywhere, it has taught me something very … Continue reading

Old MacDonald had a Farm .. E-I-E-IoT
avatar

Problem to Solve: My company has invested in an IoT platform. For such a vast network of data collection, how can we assure service delivery and performance for the whole platform? So what does an old school nursery rhyme have … Continue reading

NCAA Basketball Tournament Deflating Your Network?
avatar

Problem to Solve:  With the popularity of the video streaming of the NCAA Basketball tournament, how can I be sure that our network does not collapse under the load? Under the definition of irony, would be a picture of me .. … Continue reading

System Burp in your ERP?
avatar

Problem to Solve – We have an ERP system that is critical to our business. Service degradations and outages are extremely visible to executive management and costly to our bottom line. What is the best approach to monitor this deployment? … Continue reading

SIEM Bat Time .. SIEM Bat Channel (Hacktivism #8)
avatar

Problem to Solve: How can we integrate our Cybersecurity SIEM with data from our Application and Network Performance Management solutions? For those of us with a little “gray in our hair” will remember the end of the ORIGINAL Batman series … Continue reading

Remote Remote .. It’s Work From Home We Go (Hacktivism #6)
avatar

Problem to Solve:  What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)
avatar

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading

Protect Critical Unified Communications (Hacktivism #4)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically for protecting our critical Unified Communication services? Have you ever had the joy of experiencing your company’s voice communications become unavailable? Well, if you think about it, … Continue reading

Protect the Critical Applications (Hacktivism #3)
avatar

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically in the area of protecting our Critical Application Services? Have your business critical application services ever become “unavailable”? We have all had this happen at one … Continue reading