Author: Logicalis Staff

Why the Fate of Driverless Vehicles is in the Hands of DOT CIOs

Reading Time: 3 minutesBy Adam Petrovsky, GovEd Practice Leader, Logicalis US Driverless cars are quickly becoming the buzz in “connected” transportation today. But before our roadways are ready for this kind of alternative transportation initiative, we need to take a hard look at the technology being used behind the scenes to make decisions about important changes to our roadways that will accommodate these inventions. When it comes to Department of Transportation (DOT) projects at either the state or local level, data drives the decision – and the adoption of innovations like driverless vehicles. As public organizations with the tremendous...

Read More

What is a Common Security Framework (CSF)?

Reading Time: 4 minutesAn update to this post is available…read it out now! What is a Common Security Framework (CSF) and why is it important to your organization’s enterprise security? A CSF (sometimes referred to as an IT Security Framework or an Information Security Management System) is a set of documented policies and procedures that govern the implementation and ongoing management of an organization’s security. Think of it as a blueprint or operator’s guide for security. Many organizations are pursuing a Common Security Framework to improve their overall security posture and frequently to aid in meeting the requirements of...

Read More

The Importance of Endpoint Security

Reading Time: 4 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US Many enterprises do not focus on endpoint security solutions, preferring to focus on network and data center security instead. Unfortunately, endpoint security simply cannot be ignored due to the high volume of attacks that originate there. For clarity, when I speak about endpoint security I am discussing both end-user devices as well as servers – essentially anything that could run a traditional operating system and support multiple software applications. Network based security solutions are critical, but they don’t provide visibility into things like CPU processes, files...

Read More

The Business Case for Composable Infrastructure

Reading Time: 4 minutesBy Brett Anderson, Senior Director, HPE Solutions, and Perry Szarka, Solution Architect, Logicalis US What is composable infrastructure, and is it the right choice for your IT environment? That’s the question on many CIOs’ minds today as they work to position their organizations as “digitally driven,” delivering better, deeper, faster user experiences and a more agile response to change in whatever vertical market you do business in today. Sometimes thought of as “software-defined in a box,” a composable infrastructure virtualizes the entire compute environment and manages its resources as if they were services. This makes a...

Read More

Pain Reducer: Logicalis Domain Flip Over Helps CIOs Migrate Post-Merger Users with Ease

Reading Time: 3 minutesBy Wendy McQuiston, Director, Microsoft Professional Services, Logicalis US The moment your heart skips a beat? When your CEO mentions the words “merger,” “acquisition,” or “divestiture” and you know that creating a smooth transition for thousands of people from one computing environment to another will be entirely up to you. We feel your pain – and we did something about it.  We know that migrating users into one Active Directory or Exchange instance, for example, can pose significant challenges, particularly when there’s no time for downtime.  So we asked our solutions experts to develop a faster,...

Read More

Why Enterprise Security Architecture Matters

Reading Time: 3 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US Let’s talk about security architecture and why it matters for your enterprise. When I present on Enterprise Security, you’ll notice that I frequently discuss the topic of security architecture. While you can make a strong argument for an architected approach in many areas of IT, I think it’s particularly important in cybersecurity. Let me take a moment to explain what I mean by architecture and what alternatives exist. For many years, most purchasers of enterprise security solutions would pursue a best-of-breed approach. They would typically review...

Read More

Sparking a New Way to Conduct Collaborative Meetings

Reading Time: 3 minutesBy Cory Rehfeldt, Director, Collaboration Practice, Logicalis US No matter how technically savvy you are, everyone’s been in that uncomfortable position when they’re trying to join a collaborative workgroup during a meeting or join a meeting remotely and … the technology doesn’t work.  There’s some problem with your equipment connecting to the meeting equipment and, all of a sudden, you realize you’ve missed half of what was said because you were completely consumed with the technology rather than the business you were there to conduct. That’s not collaborative – it’s stressful.  Which means, people who are...

Read More

Are Your Collaboration Tools Functioning at Their Best?

Reading Time: 3 minutesBy David Leech, Vice President, Cloud and Managed Services When I talk to CIOs about the functionality of their communication and collaboration toolsets, one of the most important things that comes up time and again in our conversations is the absolute importance of delivering the kind of experience their users expect and, frankly, demand from their business collaboration tools. Today, “work” happens in nearly every location imaginable – in the car, at home, in the coffee shop, at the dry cleaners, in the park and – for good or bad – even on vacation! And the...

Read More

Can Technology Reduce Crime on College Campuses?

Reading Time: 2 minutesBy Adam Petrovsky, GovEd Practice Leader, Logicalis US With thousands of violent crimes taking place on college campuses all across America every year, it’s crucial that university executives ask themselves if they’ve deployed the newest, most technologically sophisticated digital security solutions on the market to help protect their students and discourage criminal activity. Three of the most important safety solutions that every college campus should have in place include: Video surveillance systems that employ commercial tamper-proof, ruggedized cameras that run on an IP network. Access control solutions that turn cell phones into password-protected or biometric access...

Read More

Join Our Mailing List

Receive our latest thought leadership pieces, including our Logicalis Insights blog posts!

Pick a Topic

CONTACT US

Want to learn more about Logicalis?

Click here to contact us.