James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Sort by: Relevance Date
Found 75 posts matching the search term "security".
BYOD Security

BYOD, Security, and You

Make Sure You Cover All Your Bases

by Rich Faille | 09.06.13

By now, you’re probably well aware of the growing trend of BYOD and how important it is to put a security plan in place for the employee-owned devices that will be accessing your organization’s network and data. Read on, and I’ll give you a rundown of five things to make sure you consider before you begin to implement BYOD at your organization. 

Tags:BYOD

Data Center Servers

Overcome Your Cloud Security Woes

Cisco and Intel Are Here to Help

by Justin Zuill | 10.24.13

There is no one-size-fits-all version of cloud technology when it comes to real-world applications. Cloud computing technologies are like raw materials that you can combine in multiple ways to achieve your desired business outcomes. Like many IT professionals, you’re probably considering cloud computing in your organization, but you’re also worried about keeping your data and assets secure.

Tags:Cloud ComputingSecurity

Better Safe than Sorry When it Comes to Security

The Old Adage is Still Relevant in the Digital Age

by Salvatore Sparace | 08.21.14

On July 9th The New York Times reported, “Chinese hackers in March were able to compromise the US Government’s network that houses the Office of Personnel Management Database. They appeared to be targeting files on tens of thousands of applicants for security clearances.” The report traveled quickly across the major news outlets with officials unable to comment on the extent of the act.

Tags:InfrastructureNetworkingSecurityServers

Infrared Security Image - Securing Your BYOD Environment

Security: The Biggest BYOD Challenge

You Can Keep Your Data Safe and Your Employees Happy

by Rich Faille | 04.11.14

Obviously, security is a very big concern for organizations as they begin to implement a bring your own device (BYOD) strategy. Many IT managers fear a loss of company or client data, unauthorized access to the network, and malware infections. They may also lack the resources needed to properly address these security concerns. We’re here to share some tips and strategies to ensure your data remains secure as you implement a BYOD policy.

Tags:BYODMobilitySecurity

How to Chisel Out a Rock-Solid Security Plan

New strategies to combat emerging and growing threats

by Stephen Nardone | 07.15.14

Thinking back years ago, managing IT security often meant locking your critical applications and services in a room, maybe a big room depending on what decade we are talking about. Much like an alligator moat around a castle, you could sleep easy knowing not much could infiltrate your protection.  Just as technology has evolved, so have the threats. The threat landscape changes daily.  In today’s highly collaborative, highly mobile business world, with an enterprise that no longer has a physical boundary, a locked room isn’t an option—and forget about the alligators.

Tags:IT StaffingMobilitySecurity