Most Recent

Revolutionize the way you protect your enterprise with Cloud Disaster Recovery solutions that are documented, tested, and proven to work

When considering disaster recovery (DR) in the cloud, companies must rethink the complex and costly approaches they’ve grown accustomed to. The digital landscape has transformed to favor streamlined, easily managed virtual infrastructure that is ready to activate at a moment’s notice. Because of this, there is no better solution than the public cloud for disaster […]

What to look for in a cloud security partner

Empowering advanced enterprises with cutting-edge data security solutions is a vital part of the OnX identity, and it has been the OnX mission for more than 30 years. Security best practices are ingrained into everything OnX does daily. It’s also part of the OnX mission to meet clients where they are in their journey to […]

OnX Canada recognized as Technology Excellence Partner of the Year by Cisco

Since the development of the COVID-19 public health crisis earlier this year, the business world at large saw an exponential increase in demand for effective and streamlined remote work strategies and collaboration technology. OnX Canada is one of many influential solution providers working to meet this challenge head-on by advancing remote communication capabilities and delivering […]

Blending Hosted UC with Cisco Webex to unlock unified collaboration

In response to these omni-channel demands, many companies are turning to hosted unified communications as a service (UCaaS) to unify disjointed tools onto one platform, creating a more versatile way for teams to interact remotely. By integrating the advanced collaboration capabilities of Cisco Webex onto OnX Canada’s Hosted UC platform powered by Cisco BroadWorks, companies […]

How to leverage Bocada for better cloud data protection practices

Legacy data protection issues faced in cloud architectures While there are a variety of data protection challenges facing organizations moving to cloud architectures, three common issues frequently arise: Complexity: The more software and third-party solutions, the more complexity you bring into your environment. This includes everything from new GUIs and scripts to cross-platform data incompatibility […]

4 ways NaaS achieves better performance for government remote office connectivity

What is NaaS? Network as a Service (NaaS) is a scalable, cloud-managed method of supporting, maintaining, expanding, and securing an organization’s network. With full cloud integration, NaaS delivers networking resources, services, and applications across locations as needed, including software-defined wide area network (SD-WAN) connectivity, data center connectivity, switching, Wi-Fi, and auto VPN.  NaaS allows organizations […]

Tips for building a comprehensive cloud security program

If your organization is planning to attempt a cloud network migration, it pays to research these misconceptions and equip yourself with all the knowledge necessary to build a modern and effective cloud security program. Quality over quantity You may hear from time to time that the more cloud security tools your enterprise can bring to […]

Boost your IT modernization efforts with Red Hat Ansible Automation Platform

Forward-leaning automation Clearly, automation will have to play a larger role in the data center and in the cloud if the enterprise stands any chance of fulfilling the demands of an increasingly connected user base. Red Hat has taken a leadership position in IT automation with its Red Hat Ansible Automation Platform, delivering new levels […]

How to realize maximum benefits from migrating to the cloud

Laying the groundwork Since migrating to—and then operating—a cloud environment is an intricate process, the key to a successful outcome lies in establishing a firm foundation. Once an enterprise knows what it is after, it can take all the necessary steps to complete each step in the process quickly, efficiently, and with minimal risk. To […]

Why e-mail could be your top data security threat

A growing problem Phishing remains the method of choice for the vast majority of cyberattacks. Using sophisticated social targeting, disguised links and attachments, cyber criminals can do in seconds what could take hours or days for an advanced piece of software to do: circumvent a security platform and gain access to sensitive data or critical […]