Newest

3 Major Benefits of Intelligence Led Security

intelligence_blogsize

Intelligence Led Security

The word intelligence has become a permanent part of any security related conversation these days. We hear it at every security trade show and conference, and from security vendors. Why is the industry so focused on intelligence and how does it differ from information? What is intelligence led security?

Comments (0)

Manage Better: Hybrid IT Takes Pressure Off Companies Trying To Do It All

Young man with black tie and white shirt closing eyes in relief and making a "whew" gesture - putting his hand to his forehead. Backgound is a white wall.

For operating efficiency and cost-effectiveness, many businesses are turning to hybrid IT, an approach comprising a mix of in-house resources, managed hosting, and public and private cloud-based services.

Comments (0)

Phishing for Trouble: Tackling the New IT Security Landscape

phishing_blogsize

IT threats are more complex than ever before. With cyber criminals reaching new levels of sophistication, CIOs must prepare to stay one step ahead of the most recent attack. Companies who fail to build strategic, proactive approaches to IT security now will feel the impact of attacks tomorrow.

Comments (0)

What MiFID II Means for the IT Department in 2016

MiFIDII

I wrote previously about what MiFID meant for the IT department and since then we have had the referendum and there are now new considerations to be made by businesses, so I have updated this blog. If you manage IT at an EU-based financial institution, you are likely staring down an onslaught of new rules from the Markets in Financial Instruments Directive II (MiFID II).  MiFID II picks up where MiFID I left off in 2007, mandating a new level of compliance for companies that deal in financial instruments such as derivatives. You may wonder what it will mean to you and your IT department.

Comments (0)

Join us: Cyber Security Summit, NYC

506x285_david_mahon_2

IT decision makers: If you’re located in or around New York City on September 21, 2016, you don’t want to miss the upcoming Cyber Security Summit at the Grand Hyatt New York in New York City.   

Comments (0)

How to Get Real Results from your SD-WAN

sd_wan_on_demand_blogimage

The Software-Defined Wide Area Network (SD-WAN) is catching on. According to Gartner, 30% of enterprises will have an SD-WAN by 2020. Drivers of SD-WAN interest include the growth of cloud computing, the Internet of Things (IoT) and a general increase in mobility. These three factors have put new levels of pressure on existing WANs.

Comments (0)

Get Your Game Face On: Customers Demand Hybrid IT

980_tennis_720

For those who follow tennis, you know just how exciting major tournaments can be. That was certainly the case recently as the game’s best descended on Billie Jean King National Tennis Center for the 2016 US Open Tennis Championship. The final match of Stan Wawrinka vs Novak Djokovic was full of excitement!  The event certainly did not disappoint, but that was just a piece of the action.

Comments (0)

Don’t Let your Legacy Phone System Keep you from Unified Communications

910x300_bridge_720

As the workforce becomes more mobile, more organizations are adopting unified communications and collaboration (UC&C) solutions to enable employees to work effectively from anywhere. These solutions include VoIP which runs your voice calls and UC services like video chat, web conferencing and instant messaging over the IP data network.  VoIP is the foundation for fully integrated unified communications solution. 

Comments (0)