Images

Are Your Collaboration Tools Functioning at Their Best?

Reading Time: 3 minutesBy David Leech, Vice President, Cloud and Managed Services When I talk to CIOs about the functionality of their communication and collaboration toolsets, one of the most important things that comes up time and again in our conversations is the absolute importance of delivering the kind of experience their users expect and, frankly, demand from their business collaboration tools. Today, “work” happens in nearly every location imaginable – in the car, at home, in the coffee shop, at the dry cleaners, in the park and – for good or bad – even on vacation! And the...

Read More

When is a Hyperconverged Solution the Right Choice?

Reading Time: 5 minutesA Q&A with Paul Abram, Data Center and Enterprise Compute Practice Leader, and Brett Anderson, Senior Director, HPE Solutions, Logicalis US Just as “cloud” was the IT industry’s favorite buzz word a few short years ago, today’s tech talk is all about “hyperconverged” solutions – and with good reason. The flexibility and automation built into a hyperconverged infrastructure gives users a cloud-like experience inside their own data centers.  But, experts warn, hyperconverged isn’t right for every situation. Until recently, technology solutions consisted of separate servers, storage and networks configured and physically managed on-premise based on a custom design for every client. Then came converged technology which combined servers and storage according to a reference architecture to deliver a pre-built, pre-packaged solution. The next evolution of converged technology is hyperconverged technology – solutions that integrate servers, storage, networking, virtualization, and automation, orchestration and IT services into a single solution. A key distinction between converged and hyperconverged is the addition of built-in software-defined storage. The question is, which solution is best?  To learn more, hear what Logicalis experts Brett Anderson and Paul Abram have to say in this brief Q&A. Q: Which solution is best – a traditional architecture, a converged infrastructure or a hyperconverged solution? BA: They are all right for different scenarios.  It’s not one or the other – it all depends on what the client...

Read More

An Enterprise Security Look Back and Look Ahead

Reading Time: 3 minutesRon Temske, Vice President, Security Solutions, Logicalis US For one of our first Enterprise Security blog posts of 2017, I thought I would reflect on some of the most significant events of 2016. I’ll stay away from predictions for 2017 since there’s no reason to create a documented record of how wrong I was! Last year was a particularly interesting year for enterprise security. We witnessed a number of events that had been theorized for some time, but had never really taken hold; we saw unprecedented attacks both in frequency and magnitude. Among the security-related threats...

Read More

How to Transform Internet Security with Big Data

Reading Time: 2 minutesRon Temske, Vice President, Security Solutions, Logicalis US How do you reduce gaps in visibility and coverage while mitigating remediation costs and breach damage? The answer: Take an Umbrella Approach to Security. In my earlier blog posts, I described how a starting point for enterprise connectivity to anywhere is the Domain Name Services or DNS. Then I described the benefits and just a few of the ways this umbrella approach to DNS can protect your enterprise environment. Today I’d like to discuss what’s behind the Cisco Umbrella approach and why it’s an obvious choice for providing...

Read More

Security Tips for Home Office and Small Office

Reading Time: 3 minutesRon Temske, Vice President, Security Solutions, Logicalis US It’s the holiday season when many people have been online shopping and sharing pictures, eCards and correspondence from home (and office). Maybe you’ve just received or given new mobile or wired devices that will connect with your home or small office network. In that case, you may be considering security – perhaps advanced security, given recent news of breaches, hacks and Internet of Things (IoT) malware. Whether you just want to make your existing environment more secure, you’ve picked up a network accessible thermostat or home automation system,...

Read More

Can Government CIOs ‘Virtualize’ Social Work and Improve Outcomes?

Reading Time: 4 minutesBy Adam Petrovsky, GovEd Practice Leader, Logicalis US Nearly everyone has read or heard a tragic story that was the result of something slipping through the cracks because an overworked social worker had too large of a caseload. What if this could be changed simply by digitally enabling some of the time-consuming, behind-the-scenes documentation tasks that take up so much of a typical social worker’s day? The U.S. Bureau of Labor Statistics reports that the typical social worker has an average caseload of more than 12 cases, which means they’re dealing with as many as 70...

Read More

What Would an Umbrella Approach to Security Look Like for Your Enterprise?
Part 2: A Secure DNS

Reading Time: 2 minutesRon Temske, Vice President, Security Solutions, Logicalis US In Part 1 of my article, I discussed what seems like an insurmountable obstacle. While we require DNS to resolve IP addresses, this also allows it to be leveraged for a variety of malware and attacks. It’s estimated that 97 percent of all attacks involve DNS in some capacity, so the ability for DNS to play a role in security is extensive. Download and read the entire article: What Would an Umbrella Approach to Security Look Like for Your Enterprise? That’s the premise behind Cisco Umbrella, formerly OpenDNS,...

Read More

What Would an Umbrella Approach to Security Look Like for Your Enterprise?
Part 1: Potential DNS Vulnerabilities

Reading Time: 3 minutesRon Temske, Vice President, Security Solutions, Logicalis US The starting point for enterprise connectivity to anywhere is the Domain Name Services or DNS. Why not start there for cybersecurity? The purpose of DNS is to resolve names, which humans can remember, into IP addresses used by computers and other connected devices. Comparing DNS to a phone book (Ed. For those of you old enough to remember them!), or your contact lists in Outlook or your phone, is a good analogy. It’s difficult to remember phone numbers for all your family, friends, work colleagues, suppliers and customers,...

Read More

Advanced Threats Need a Next-Generation Approach to Cloud Security

Reading Time: < 1 minuteBy Jason Malacko Let’s face it. Traditional security methods just aren’t up to the task of protecting organizational infrastructures and data from theft and ransomware. That’s a huge problem, because as organizations increasingly embrace a number of cloud-first platforms for everything from customer relationship management (CRM) to marketing automation platforms (MAP) to enterprise resource planning (ERP) platforms and beyond, they are increasingly at risk from malware and cybercrime that is more advanced and harder to thwart. Enterprises need a next generation – or Advanced Threat – approach to cloud security. This requires a comprehensive methodology...

Read More

Join Our Mailing List

Receive our latest thought leadership pieces, including our Logicalis Insights blog posts!

Pick a Topic

CONTACT US

Want to learn more about Logicalis?

Click here to contact us.