Most Recent

Major shifts in retail technology signal the latest tech evolution

These systems are both diverse and essential for efficiently running the day-to-day retail operations—managing employees and stock-to-consumer marketing initiatives, monitoring security cameras, and tracking customers’ movement and time spent in the store. Retail technology has advanced as strides have been made to the underlying networks. But those improvements have come with an expanded attack surface. […]

Enhance retail customer analytics with geospatial intelligence marketing technology

What is geospatial intelligence? Geospatial, or location-based marketing technology, utilizes modern connectivity to collect and gather insights from customer location data. Internet of things (IoT) devices, GPS data, and geographic information systems (GIS) all contribute to a holistic picture of consumers’ movements through retail spaces. What can this data do for you? Marketers and retail […]

Does your business network need Juniper Mist NaaS with Marvis AI?

Enter Marvis, the virtual network assistant (VNA) from Juniper Mist and 2023 leader in Gartner’s Magic Quadrant™ for networking. With Marvis, IT teams can use artificial intelligence (AI) and machine learning (ML) to proactively alert the network admin of potential issues. Marvis is a 24×7 support “robot” that performs many tasks a Tier 1 customer […]

New threats demand a change in approach to cyber risk management

John Bruggeman, Consulting CISO at OnX connects with virtual CISO Tom Siu of Inversion6 in this episode of Inside the CISO’S Office. We tackled how CISOs can support cyber risk management initiatives within their organizations and the adjustments required to stay ahead of ever-evolving cyber threats. We also covered rubrics for recognizing and ranking cyber […]

The basics of SASE and zero trust

These obstacles call for new ways to approach security. Secure access service edge (SASE) and zero trust are two evolving security methodologies. SASE is made up of several technologies but is often packaged as a single platform. SASE typically includes SD-WAN, SSE, CASB, and secure VPN solutions. OnX Canada defines zero trust as a security […]

Transforming the digital workplace with AI

The emerging role of AI in the digital workplace Artificial intelligence (AI) is quickly becoming ubiquitous in the digital world. AI impacts every sector and department within a company—doubly so for organizations with hybrid work environments. AI is a locus of innovation within the digital workplace. AI improves productivity and generates improved user experience by […]

Three essential pillars of contact center security best practices

The contact center world has undergone significant changes due to the rise of hybrid working models. Now, administrators have to oversee agents across the globe, utilizing new methods of reaching customers through voice, chat, instant messaging, video, and SMS messaging. With this new way of working, administrators benefitting from increased efficiency must also contend with […]

Penetration testing vs vulnerability assessments: Exploring differences and use cases

The OnX Canada security team routinely gets these questions from our clients regarding cybersecurity testing tools: On the surface, these two services seem similar. Even cybersecurity professionals can be confused by the nuances between the two tests. Both tests serve to enhance the overall security fabric of an organization. This post will explore the differences […]

What is SD-WAN?

Adopting a software-defined wide area network (SD-WAN) has become critical to modern business operations. This architecture ensures network safety and security even in remote environments, allows IT managers to virtualize their network, simplifies the delivery of services, and far more. However, organizations still relying on legacy networks may be hesitant to switch to a newer […]

Quantum security in a post-quantum world

Quantum computing seems like a technology that is off in the distant future, but the reality is, significant progress is being made and it is becoming a pressing concern for government agencies and major corporations alike. To avoid being left behind, companies must look closely at the kinds of encryption they have deployed and begin […]