[Infographic] User-Based vs Device-Based Pricing Models

If your organization is considering user-based or traditional, device-based pricing models for your managed IT services, rest assured both offer benefits. Get the scoop on the pros and cons of both […]
Read More

The Way of the Future: Working From Home (Part 2)

Businesses that can safely stay open with remote workforces have largely transitioned to work-from-home scenarios because of the COVID-19 crisis, and in part one of our blog we focused on these […]
Read More

The Way of the Future: Working From Home (Part 1)

Now that businesses have largely transitioned to working remotely, we can all sit back, relax, and enjoy worry-free, comprehensive communication...right? Wrong!
Read More

Cybersecurity tips for working remotely

Remote work policies have become a necessity not just because of the current state of affairs, but also for the ways they improve a company’s bottom line and efficiency. Yet despite remote work’s […]
Read More

SD-WAN Security: Built-in is better than bolt-on

Securing enterprise data and business applications is undoubtedly at the forefront of every IT professional’s mind. However, efforts to secure data and applications competes with the priority to […]
Read More

7 questions about the firewall: A chat with Cisco featuring Gartner

The firewall remains the front line of cyber-defense for most organizations. The firewall protects an organization’s network, and that function isn’t going away anytime soon. Remember when people […]
Read More

Secondhand IoT Devices, Firsthand Threats to Security

From thermostats and voice assistants to fitness trackers and toys, smart and internet-connected gadgets are now found in nearly every room of most homes. It’s tempting to try and save money on […]
Read More

Security Multi-Tenancy Part 1: Defining the Problem

Pre-Virtual Virtual Firewalls
Read More

Windows Exploitation and AntiExploitation Evolution

Windows has been a target of hackers for a long time. The reason is simple: it is the OS with the largest deployment footprint around the world. Hackers discover vulnerabilities in Windows OS […]
Read More

GDPR Considerations for Companies Outside the European Union

On May 25th, 2018, the General Data Protection Regulation (GDPR) becomes enforceable under law in the European Union (EU). It fundamentally changes how businesses (and the public sector) must […]
Read More
1