Blog
How to transform your data security program with automation
Data security remains at the forefront of concerns for CEOs, as two of the biggest breaches in Canadian history took place in 2019, with one breach resulting in the theft of the personal information of 15 million people in Ontario and B.C. A 2019 CIRA Cybersecurity...
Combining SD-WAN & NaaS to safeguard collaboration technology now and in the future
The coronavirus pandemic has changed how we work, perhaps on a permanent basis. However, remote employees operating from home or at branch offices are still struggling with inadequate wireless networks and poor bandwidth. Executives establishing remote work situations...
Four pitfalls to avoid when transitioning to cloud communications
Whether your business is running on a legacy telephone system, PBX or an on-premises UC platform, migrating your communications to the cloud is a complex process with countless moving parts to consider. To maximize the benefits of a cloud-based solution like Unified...
How to achieve a successful UCaaS migration
Whether your current operations rely on a legacy public branch exchange (PBX) phone system or an on-premises unified communications platform, adopting Unified Communications as a Service (UCaaS) can transform your business by enabling cloud-based collaboration...
Create an agile digital foundation for your mobile workforce
A nimble, on-the-go workforce requires an equally agile digital foundation to stay competitive. Considering that an unparalleled customer experience is the ultimate goal, effective communications are key in helping your organization meet rising consumer expectations...
The key factors in choosing UCaaS over traditional PBX
For decades, Private Branch Exchange (PBX) has enabled office-based employees in Canada to connect with each other and the outside world clearly. However, PBX has become an outdated choice for modern businesses compared to Unified Communications as a Service (UCaaS),...
Revolutionize the way you protect your enterprise with Cloud Disaster Recovery solutions that are documented, tested, and proven to work
Investing in a data infrastructure that’s used for daily operations is expensive, but it’s an easy financial decision when you consider all of the benefits and alternatives. Spending money on a dedicated environment that is rarely activated in order to maintain...
What to look for in a cloud security partner
Keeping a business safe from intrusion is no longer a simple matter of locking the doors at night. Cybersecurity has grown to become a significant concern for small, midsize, and enterprise-level companies alike, especially in the tumultuous climate 2020 has brought...
OnX recognized as Technology Excellence Partner of the Year by Cisco
Leading technology provider OnX announces that it has been named Cisco Technology Excellence Partner of the Year: Cloud and Data Center across Canada. Paul Khawaja, President of OnX, accepted the award on behalf of OnX at Cisco's annual partner conference, held...
Blending Hosted UC with Cisco Webex to unlock unified collaboration
As workplace trends and communication technologies evolve, it can be challenging for companies to maintain seamless interaction across channels, locations, and devices. To succeed in this era of remote collaboration, businesses need flexible enterprise communication...
How to leverage Bocada for better cloud data protection practices
The enterprise world is catching on to the fact that embracing the cloud offers the potential for greater network speed, lower operating expenses, and a new tier of technology solutions. However, despite the brave new world that the cloud makes possible, cloud...
4 ways NaaS achieves better performance for government remote office connectivity
As organizations struggle to keep up with the relentless advance of digital technology, the challenges faced by government agencies are especially intimidating. For federal, provincial, and local governments alike, tight budgets, reduction in highly skilled technical...
Tips for building a comprehensive cloud security program
Cloud technology is on the rise and is becoming more widely adopted every day. With so many enterprises transitioning their network infrastructures to the cloud, keeping their new cloud environments secure is a growing concern. Unfortunately, efforts to pin down and...
Boost your IT modernization efforts with Red Hat Ansible Automation Platform
Creation and consumption of digital data is accelerating at a rapid pace. According to Statista, worldwide data traffic is expected to top 77 exabytes per month by 2022, nearly double the expected load for 2020 and more than six times that of 2017. This alone is a...
How to realize maximum benefits from migrating to the cloud
There is little doubt that the cloud has become critical to success in business these days. As the need for data resources grows in order to meet surging demand for new services with greater reliability and security, many organizations have found that the only way...
Why e-mail could be your top data security threat
It is the rare enterprise these days that has yet to encounter a security threat. The ease with which cyberattacks can be mounted and the payoff from even a small firm, or an individual, has turned digital crime into an equal opportunity endeavor. This is why many...
What does it mean to be a vendor of record for the Canadian Government?
Commercial enterprises are already struggling to keep up with the relentless advance of digital technology, but the challenges faced by government agencies at all levels are particularly daunting. Tight budgets, lack of institutional knowledge, and, in most cases,...
Empower home offices and branches for maximum connectivity with SD-WAN
The entire professional world, it seems, has reinvented itself to operate along social distancing guidelines. Home offices have become the new normal, but remote employees may still be struggling to work at their full capacity due to underpowered home networks,...
How to build an effective patch management program
Preventing every single possible risk to your organization’s data structure may be an unrealistic goal, but with a thorough vulnerability assessment and patch management program, you can severely reduce the number of threats your operations are open to. However,...
Penetration testing, Chicken Guns, and Mike Tyson
Here at OnX, we do quite a few pentests every year. I’ll note for my readers that the term is an abbreviation for penetration tests. It’s funny how many folks think the “pen” is an acronym and spell it as “PEN test,”. So let your friendly neighborhood pentester set...
Making sense of the U.S H1 visa suspension and what it means for IT staffing
The COVID-19 epidemic has touched nearly every aspect of public life since its spread earlier this year, including record-breaking levels of unemployment and chaos in several economic sectors. Additionally, a recent executive order announced in the United States may...
Embracing the next generation of application and infrastructure modernization
Large enterprise organizations have multiple business-critical applications, many built on outdated legacy networks. With IT teams often tied up in maintaining these outmoded systems, corporations must create a framework to determine how to modernize their application...
Why the Cloud is your key to application evolution
Like it or not, cloud computing is rapidly becoming the new normal. The automation and processing capabilities offered by cloud platforms is allowing modern enterprises to update and improve upon their proprietary applications and software at an unprecedented level of...
SD-WAN: Roadmap for Software-Defined Networking
The enterprise network landscape continues to be reshaped, businesses leveraging cloud-based IT, and the surge is moving clients toward software-defined networking – today more than ever before. In addition, the rising cost of traditional networking stifles...
When it comes to application evolution solutions, don’t be afraid to branch out
The right applications, used in the right way, can make all the difference for growing businesses and expanding enterprises. However, the pressures on your organization are constantly changing, and the applications you rely on should evolve accordingly. Adapting your...
Key Factors of Building a Remote Network with SD-WAN
Creating and enabling a versatile, remote workforce is a common goal for many modern organizations during the COVID-19 public health crisis. Others are seeking to modernize their networks, improve their digital employee experiences, and reshape their cloud strategies....
The cloud comes to the enterprise network’s rescue
There is nothing like a crisis, such as the one the world is experiencing now, to demonstrate the importance of safe, reliable communications. For the enterprise, cloud networking is proving to be invaluable at a time when traffic loads and the number of endpoints is...
Stepping up your UCaaS experience with SD-WAN
Simplifying the various communication tools available to their company is a challenge for which many business leaders are seeking answers. As a result, enterprise-level organizations around the globe and across a variety of industries are catching on to the benefits...
Expert panel discuss remote team collaboration best practices
CBTS and OnX recently hosted a panel discussion examining remote team collaboration best practices during this period of instability. Follow this link to view the full webcast. Companies across several industries have rushed to find ways to adapt to recent...
Boost efficiency, cut costs, and enhance security with managed database
Cloud deployments are increasing steadily as new cloud products become more available and standardized. By 2021, revenues from cloud-based database management system (DBMS) solutions are expected to account for 50% of the total DBMS market revenue. By 2023, 75% of all...
Choosing an SD-WAN solution for your business
The benefits of Software-Defined Wide Area Networks are becoming common knowledge among decision-makers in every industry, from hospitals to retailers. With its proven ability provide stronger network performance and control over application traffic when compared to...
Transform your application launch process with Red Hat OpenShift
Blue toned highrise buildings at Wall Street financial district in New York City from below. Staying ahead of the curve in the modern marketplace isn’t strictly a matter of operational efficiency. Agility is the key to beating your competition in terms of product...
Your Quick Guide to Conducting Secure Videoconferences
Back view of Asian business woman talking to her colleagues about plan in video conference. Multiethnic business team using computer for a online meeting in video call. Group of people smart working from home. Chances are you have just been thrust into the throes of...
Why Move your IBM iSeries to the Cloud?
The IBM iSeries platform is still used today by over 100,000 organizations despite it being 30-year-old technology. Industries like banking and manufacturing have depended on iSeries for their business-critical applications like advanced ERP systems. As a multiple...
How a VPN protects your privacy
Virtual Private Network (VPN) Transacting on an unsecured network means you could be exposing your private information. VPN services establish secure and encrypted connections to provide greater privacy than even a secured Wi-Fi hotspot. That’s why a virtual private...
Why Businesses Need Endpoint Protection
Endpoint protection platforms (EPP): Endpoint protection, or endpoint security, describes cybersecurity services for network endpoints, like laptops, desktops, smartphones, tablets, servers, and virtual environments. These services may include next-generation...
Our current state: A perspective from our CSO during the COVID-19 crisis
This crisis we are in is not over, and although we have been talking about pandemic response for as long as I have been around security and BCP teams, it is very hard to anticipate, plan for, and react to black swans. The responses to COVID-19 and the structural...
After the Smoke Clears – What can we learn about risk management
After the smoke clears and we’re all allowed to go to bars again, organizations will be trying to answer a few questions. How well did we deal with this crisis? What have we learned? What changes for us the next time we have a similar crisis? Did what we just...
In response to COVID-19 now is the time to build a Cyber Risk Program – Learn how
Digital Transformation is defined as the process of exploiting digital technologies and supporting capabilities to create a robust new business model which is led by executive management or at the board level. With the onset of the Covid-19 pandemic, we have an...
Now, more than ever, network infrastructures need Network Access Control
The basis for Network Access Control In the circumstances corporations now find themselves because of the COVID-19 pandemic, network segmentation deficiencies have been spotlighted as an alarmingly weak spot in modern network enterprises. A recent example was provided...
The Effects of the Coronavirus on Cybersecurity
While we're all struggling to deal with the new reality imposed on us by those mean little viral microbes, the world carries on around us. There are a few ways we at OnX have noticed the Coronavirus impact cybersecurity. Specifically: Attackers are capitalizing on our...
Considerations for remote work
Tips and technology to enhance working from home Today's enterprise leaders understand traditional face-to-face communication isn't always the most efficient way to conduct business, especially in times of crisis. With the COVID-19 pandemic upon us, and the number of...
Removing network barriers with SD-WAN to achieve your business goals
As your organization evolves in the digital era, the data and traffic employees generate will inevitably surpass the capabilities of the traditional network architecture you've built over the years. Although your existing WAN has served the enterprise well, with...
Top considerations for Coronavirus contingency planning
Contingency planning during the Coronavirus outbreak As concerns mount over the global spread of the Novel Coronavirus Disease of 2019 (COVID-19), it's crucial for enterprises to have plans in place to both protect employees and continue serving shareholders. From...
Choosing a strategic SD-WAN partner to help reach business goals
A majority of business leaders today understand the advantages of SD-WAN to manage network traffic and provide consistency for all users, no matter their location. The demand for high bandwidth and seamless access to cloud-based applications is a priority for every...
Improve network performance with UCaaS and SD-WAN
Success in business often depends on your network performance and ability to adapt quickly to changing circumstances. Collaboration between employees, partners, and customers is critical to achieving business objectives. As businesses migrate essential communications...
Five questions to ask when choosing an SD-WAN partner
As your company expands and deploys new technologies, your IT team may encounter siloed systems throughout your business. Fortunately, emerging cloud-based solutions can help technology staff address these issues. And as software-defined wide area network (SD-WAN),...
Six security trends to watch for in 2020
Happy 2020! As a practitioner and consultant I’m excited to see what the year brings in terms of new technology, research, and clever Twitter and blog posts from the security community. To get the ball rolling, here are six security trends to keep your eye on as we...
Six Common Goals of Cloud Based Networks
With so many employees in today’s workplace relying on cloud-based apps to perform their jobs, network administrators are looking for better ways to ensure access and provide the required bandwidth. Increasingly, IT professionals are discovering the improved network...
The evolution of modern computing: serverless solutions versus containers
Serverless solutions versus containers–that is the question at the center of new trends in modern enterprise computing that seeks the best way to develop, deploy, and manage applications and infrastructure in an era of new ideas, devices, and virtual experiences....
Load More