About Ken Czekaj

I design network and application performance management solutions to address the unique business challenges of enterprise, healthcare and financial customers. Primarily focusing in the areas of Application Triage, VoIP, Video, Capacity Planning, Security, Latency, Multi-Tier applications, Virtualized applications and Electronic Trading deployments

INTERVIEW: Healthcare IT Today — Does IoT Increase Security Risks in Healthcare?

Problem to Solve: Does IoT Increase Security Risks in Healthcare?

I had the privilege to be interviewed by Colin Hung from Healthcare IT Today regarding the many challenges & risks associated with Internet of Things security in Healthcare. In a nutshell, the session highlights the benefits, threats & considerations related to IoT deployments.

Here is the link to the original article posted on the Healthcare IT Today website.

Does IoT Increase Security Risks in Healthcare?



INTERVIEW: SiliconAngle “TheCube” on IT Security in Healthcare

Problem to Solve: Hospitals combat rising denial-of-service attacks with network triage I had the privilege to be interviewed by SilconANGLE “theCUBE” regarding the many challenges in IT security in Healthcare. In a nutshell, the session highlights the challenges and safety … Continue reading

COVID-19: A lesson in being Grateful?

Problem to Solve: The COVID-19 virus has affected much of our lives. What can I do to help? While the very serious COVID-19 outbreak has seemingly been non-stop bad news and affecting lives everywhere, it has taught me something very … Continue reading

Old MacDonald had a Farm .. E-I-E-IoT

Problem to Solve: My company has invested in an IoT platform. For such a vast network of data collection, how can we assure service delivery and performance for the whole platform? So what does an old school nursery rhyme have … Continue reading

NCAA Basketball Tournament Deflating Your Network?

Problem to Solve:  With the popularity of the video streaming of the NCAA Basketball tournament, how can I be sure that our network does not collapse under the load? Under the definition of irony, would be a picture of me .. … Continue reading

System Burp in your ERP?

Problem to Solve – We have an ERP system that is critical to our business. Service degradations and outages are extremely visible to executive management and costly to our bottom line. What is the best approach to monitor this deployment? … Continue reading

SIEM Bat Time .. SIEM Bat Channel (Hacktivism #8)

Problem to Solve: How can we integrate our Cybersecurity SIEM with data from our Application and Network Performance Management solutions? For those of us with a little “gray in our hair” will remember the end of the ORIGINAL Batman series … Continue reading

Remote Remote .. It’s Work From Home We Go (Hacktivism #6)

Problem to Solve:  What can we do to protect VPN connections, remote employees working @ home, and B2B links from Cybersecurity / Hacktivism? Can you picture our happy dwarfs that work from home singing to themselves all day long “Remote .. Remote … It’s Work From Home We … Continue reading

Would Homer Simpson Protect Virtualized Servers? (Hacktivism #5)

Problem to Solve:   What can we do to protect our Virtualized Server Infrastructure and Application Services against Hacktivism?   OK, I don’t know exactly what Homer Simpson thinks about virtualized servers, but do have a guess on his reaction. 🙂   So the … Continue reading

Protect Critical Unified Communications (Hacktivism #4)

Problem to Solve: What can we do to protect our organization from Hacktivism, specifically for protecting our critical Unified Communication services? Have you ever had the joy of experiencing your company’s voice communications become unavailable? Well, if you think about it, … Continue reading