<img height="1" width="1" src="https://www.facebook.com/tr?id=109783749644748&amp;ev=PageView &amp;noscript=1">

Huawei Coming On Strong

Donna Mills

Donna Mills About The Author

Jun 14

The engineering team at Datalink Networks pride themselves on their ability to work with products from a variety of major name partners, including Microsoft, HPE, Cisco, and Aruba. 

And this year, we've added a new vendor to our line card: Huawei.

This is a company that many of our clients are unfamiliar with, but we think that's going to change rather quickly, and for good reason. For one thing, Huawei is already one of the world's leading providers of global information and communications technology solutions.,

And their latest networking products have caught the eye of the analysts at Gartner, who had singled them out in their 2015 wireless Magic Quadrant

 

2016-6-Huawei-Gartner-quote-blog.jpg

More from Gartner: 

"Huawei's eSight management and network applications support non-Huawei devices, including from HP and Cisco, which simplifies orchestration within multivendor environments. Huawei has a strong foundation in switching, which provides a broad range of fixed form and modular switches, as well as a wireless offering. Huawei expanded its network application support beyond guest access and onboarding, and now provides location-aware capabilities and analytics."

Huawei's wireless products compare favorably to those offered by more established American vendors, and are priced aggressively, so they're a great opportunity for organizations that need to squeeze more value out of their networking budget. And this month, Datalink networks is offering a sweet wireless networking security deal that includes 3 Huawei APs and a controller, installed free - for under $3000. 

Read More

2018-8-Security-Scan-CTA

Network Security Assessments

Do you know what's lurking in your network? Datalink Networks LAN vulnerability scans are the key to rooting out threats and developing a security plan to keep them out. Our assessment includes:

  • Scans in front and behind the network firewall
  • Active Directory Vulnerability Scan
  • Network Design/Topology Review
Learn More