Four Reasons to Consider a FlexPod Refresh

Reading Time: 3 minutesBy Brad Bailie, Senior Solutions Architect, Logicalis US Your CEO has probably already asked you how your compute systems can help the organization be more nimble, adapting to changes and market forces more quickly. And, as you continue your path toward digital transformation, user expectations for enterprise IT rival the performance requirements they have for their outside-of-work lives.  It’s a tall order – and thankfully, there are ways to meet it. The need to be nimble and agile, to provide increased performance at a decreased cost – these are all reasons IT experts were excited from...

Read More

The Importance of Multi-Factor Authentication

Reading Time: 2 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In this article, I want to talk about the importance of Multi-Factor Authentication (MFA) when it comes to providing a comprehensive enterprise security strategy. I’ll provide a brief overview of the technology, discuss why it’s so important and then identify some solutions in this space. First, the idea of authentication is one that most of us understand. Put simply it’s a method for validating that we are who we say we are. Almost all modern systems provide access based on an authenticated user identity, so getting...

Read More

Taking a Threat-Centric Approach to Security

Reading Time: 2 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In an earlier article, Back to Basics: Risk-Centric Security Strategy  we discussed a Risk-Centric approach to enterprise security. Briefly, a Risk-Centric Approach to Security is very process-oriented. We discussed the steps used in identifying assets to protect and the level of risk assigned to these assets. Today, I want to take a look at a Threat-Centric Approach to Security. The first thing to understand is that the two approaches are complementary and, in an ideal world, your organization might pursue both a Risk-Centric Approach (RCA) AND...

Read More

Back to Basics: Risk-Centric Security Strategy

Reading Time: 4 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In past articles, I’ve focused on specific enterprise security solutions, such as virtual private networks (VPN), next generation firewalls (NGFW), and Secure DNS, but I think it would be helpful to talk about a risk-centric or risk-based security strategy to provide some insight into how many companies are (or should be) looking at enterprise security and how they prioritize security projects. What we want to do for any enterprise security scenario is take a series of steps that form a risk-based security strategy. I’ll outline the...

Read More

How to Benchmark Your Enterprise Security Using the Critical Security Controls Framework

Reading Time: 3 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US In an earlier blog post, I discussed the importance of a Common Security Framework (CSF) to enterprise security . In this blog post, I want to dive a little deeper into one specific framework – the SANS 20 / CIS 20 Critical Security Controls (CSC) security framework. CIS stands for Center for Internet Security ( which is a non-profit that leverages the global IT community to safeguard private and public organizations against cyber threats. CIS has no corporate affiliations or ties that would create any conflicts...

Read More

What is a Common Security Framework (CSF)?

Reading Time: 4 minutesAn update to this post is available…read it out now! What is a Common Security Framework (CSF) and why is it important to your organization’s enterprise security? A CSF (sometimes referred to as an IT Security Framework or an Information Security Management System) is a set of documented policies and procedures that govern the implementation and ongoing management of an organization’s security. Think of it as a blueprint or operator’s guide for security. Many organizations are pursuing a Common Security Framework to improve their overall security posture and frequently to aid in meeting the requirements of...

Read More

The Importance of Endpoint Security

Reading Time: 4 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US Many enterprises do not focus on endpoint security solutions, preferring to focus on network and data center security instead. Unfortunately, endpoint security simply cannot be ignored due to the high volume of attacks that originate there. For clarity, when I speak about endpoint security I am discussing both end-user devices as well as servers – essentially anything that could run a traditional operating system and support multiple software applications. Network based security solutions are critical, but they don’t provide visibility into things like CPU processes, files...

Read More

Pain Reducer: Logicalis Domain Flip Over Helps CIOs Migrate Post-Merger Users with Ease

Reading Time: 3 minutesBy Wendy McQuiston, Director, Microsoft Professional Services, Logicalis US The moment your heart skips a beat? When your CEO mentions the words “merger,” “acquisition,” or “divestiture” and you know that creating a smooth transition for thousands of people from one computing environment to another will be entirely up to you. We feel your pain – and we did something about it.  We know that migrating users into one Active Directory or Exchange instance, for example, can pose significant challenges, particularly when there’s no time for downtime.  So we asked our solutions experts to develop a faster,...

Read More

Why Enterprise Security Architecture Matters

Reading Time: 3 minutesBy Ron Temske, Vice President of Security Solutions, Logicalis US Let’s talk about security architecture and why it matters for your enterprise. When I present on Enterprise Security, you’ll notice that I frequently discuss the topic of security architecture. While you can make a strong argument for an architected approach in many areas of IT, I think it’s particularly important in cybersecurity. Let me take a moment to explain what I mean by architecture and what alternatives exist. For many years, most purchasers of enterprise security solutions would pursue a best-of-breed approach. They would typically review...

Read More

Join Our Mailing List

Receive our latest thought leadership pieces, including our Logicalis Insights blog posts!

Pick a Topic


Want to learn more about Logicalis?

Click here to contact us.