Need to Reimagine Your Applications? See More to Solve More – Cisco Blogs

Need to Reimagine Your Applications? See More to Solve More – Cisco Blogs

You saw in our introductory blog Get Unique IT Insights That Help You Make The Right Decisions Fast – how the global pandemic slammed the brakes on many business activities, at least one trend went into warp speed: digital transformation. This put a heavy burden on IT for seamless digital delivery of the experience underscoring the need for visibility across the entire stack of IT/operations. In this blog we look at connected IT insights from Cisco platforms…

Read More

How to avoid the network-as-a-service shell game

How to avoid the network-as-a-service shell game

I can’t tell you how many times one of my clients or contacts has complained about the difficulties associated with getting network-budget approval. If I’d never met a CFO in person, the description these people gave me would have led me to expect something like a troll or a zombie, bent on eating projects and maybe people, too. Do we wear garlic when we visit the CFO, or maybe do a chant before the meeting,…

Read More

Preventing security breaches with human intelligence and software automation – Cisco Blogs

Preventing security breaches with human intelligence and software automation – Cisco Blogs

In today’s dynamic threat landscape, IT teams are inundated with security alerts, making security operations difficult to manage without the use of automation. After all, the amount of malware and ransomware being injected into enterprise infrastructure is exponentially higher than the threat detection and response measures most organizations have in place. At the same time, machines can struggle with gray areas and generate false positives. As such, organizations cannot rely solely on automation tools to…

Read More

Gartner Endpoint Protection Platforms (EPP) Magic Quadrant 2020: Our Key Takeaways

Gartner Endpoint Protection Platforms (EPP) Magic Quadrant 2020: Our Key Takeaways

Key Takeaways Going back to my days as one of the co-founders of Immunet Corporation more than a decade ago, the goal was always to deliver the most efficient and dynamic endpoint protection. Long before there was “EDR”, we were already going beyond traditional AV and well into delivering cloud-native detection and response capabilities to defend the endpoint. But we were quick to realize that for us to unleash the true power of endpoint security,…

Read More

Creating a pathway to opportunity through economic empowerment – Cisco Blogs

Creating a pathway to opportunity through economic empowerment – Cisco Blogs

The following is based on an excerpt from the 2020 CSR Impact Report, published on December 8, 2020.  An Inclusive Future is one in which everyone has a pathway to economic opportunity. To create this future, we must provide people with equitable access to the knowledge, skills, and resources needed to support themselves and their families. Empowered people and families can then fully participate in and contribute to local community growth and economic development. Digital…

Read More

Enabling Business Observability with AppDynamics – Cisco Blogs

Enabling Business Observability with AppDynamics – Cisco Blogs

The move to an all-online world has been expedited by the Covid-19 pandemic, and many companies have had to accelerate their timelines for digital transformation dramatically. The impact of the pandemic has been felt across every industry in a way that no-one could have predicted. For financial services, this meant unforeseen challenges and significant disruption. We suddenly shifted to an all-online world, and for many, this meant having to re-think how they do business.  To…

Read More

Threat Explainer: Supply Chain Attacks

Threat Explainer: Supply Chain Attacks

Let’s say that you’re confident in your security posture. You have endpoint protection in place, firewalls defending the perimeter, and phishing filters on incoming email. You’ve leveraged tools to check for anomalies in your network traffic, rolled out an SSO solution, and implemented processes to securely connect to the network remotely. These defenses make it harder for bad actors to compromise your organization. Strong security posture is more likely to push all bad actors to…

Read More

How does certificate-based authentication work?

How does certificate-based authentication work?

I find a few universal truths when mentioning certificates to people. Most people I speak with consider them to be a very secure concept almost without fail. However upon mentioning that I want to talk about certificates: that person’s face turns a slightly lighter shade, their eyes get a bit wider, and they have this immediate fight or flight instinct kick in. I can tell you, this is a subject that does not have to…

Read More

10 features of Windows Admin Center to streamline server administration

10 features of Windows Admin Center to streamline server administration

A lot of the value built into Windows Admin Center has to do with it being a remote-management tool that can have a lot of upside in a modern IT shop, including implementing best practices by not logging directly into servers, bringing flexibility to the management architecture, and performing admin tasks from high-DPI or touchscreen devices. Considered a complement to System Center, Admin Center is a free app, downloadable here, that runs in a browser…

Read More

Nvidia competitor Graphcore preps US initiative

Nvidia competitor Graphcore preps US initiative

A UK-based AI-chip startup is making its first moves into North American to take on Nvidia on its home turf in the enterprise with new channel and reseller partners. Founded in 2016, Graphcore makes what it calls Intelligence Processing Units (IPUs) and shipped its first product—the Colossus GC2 “massively parallel, mixed-precision floating point processor”—in 2018. In July 2020, it released its second-generation processor called GC200, but news of that was drowned out by all the…

Read More
1 1,527 1,528 1,529 1,530 1,531 1,657