by Neal Marksberry | Sep 21, 2023 | Communications, Digital Workplace, Security
Unified Communications as a Service (UCaaS) solutions merge collaboration platforms like Cisco Webex Calling or Microsoft Teams Voice with cloud telephony. Based on these trends, it’s a safe bet that, eventually, most companies will utilize the benefits of UCaaS...
by Suman Jillella | Sep 7, 2023 | Security
Application modernization is critical to surmounting the vulnerabilities of legacy applications and systems. But app modernization efforts introduce their own set of security obstacles. Application modernization is both a boon and a hurdle to network and information...
by John Bruggeman | Aug 24, 2023 | Security
What exactly is zero trust architecture (ZTA)? In a nutshell, zero trust is a security philosophy based on replacing the outdated “castle-and-moat” cybersecurity model. The “hard on the outside, soft on the inside” approach to classical...
by Jon Lloyd | Aug 3, 2023 | Security
Secure access service edge (SASE, pronounced “sassy”) merges cloud networking and security by combining software-defined wide area networks (SD-WAN) with secure service edge (SSE) protocols. This blend of technologies streamlines overall security posture,...
by Jon Lloyd | Apr 20, 2023 | Cloud, Security
Traditionally, it has been common security practice for a company to deploy a single firewall for each branch. Legacy networks were much less complicated, with most businesses having a single edge (where devices meet the Internet). However, the shift to remote work...
by John Bruggeman | Mar 30, 2023 | Security
Throughout this series, we have reviewed the steps to secure cyber insurance coverage. Part 1 is an overview of the critical concepts of cyber insurance and why your business needs it; part 2 outlines the insurance application questionnaire, and part 3 reviews...