Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors

Security

We have searched the depths of our blog to provide you with the latest IT articles on Security. Get Connected Today!

Networking's Ugly Truth

You Can’t Get There (DX) From Here

by Tim Allen | 07.18.16

If digital transformation, what IDC calls DX, is in your future—and IT IS—then the ugly truth is that your network infrastructure will have to change radically. Most of today’s networks are based on technology that hasn’t changed much over the last 30 years. But that technology is woefully inadequate for addressing all the new and emerging requirements of big data, analytics, mobility, Internet of Things (IoT), social media, security, and cloud.

Tags:CloudConnectionDigital TransformationDXForrester ResearchIDCIoTMobilityNetworkSecurityTechnology

You've Got a Security Plan. What Now?

Security Is a 24/7, All-Encompassing Job that Doesn’t Rest

by Stephen Nardone | 07.11.16

Security is a 24/7 job. It’s all encompassing. It makes sense then that an all-encompassing approach gives you the best chance of protecting your data, applications, and infrastructure. Protection, visibility, and oversight are key. So you’ve got a plan, backed by a sound strategy. What now? We’ll explore from the customer POV how Connection’s Managed Security Services team can help you put that plan into action.

Tags:Cyber CrimeRisk Management StrategySecuritySecurity checklistSecurity infrastructureSecurity plan

Printer LCD Panel

Have You Overlooked Your Printers' Security?

It Could Be a Costly Mistake

by Jane Garrity | 06.23.16

You may think that your organization is secure. Your employees know best practices for creating passwords; your data is encrypted at every turn, and your network has the strongest firewalls known to man. But do you know who is using your printers?

Tags:Cyber-attacksDesktopsFirewallsHPMobile devicesPasswordsPrinterSecurityServers

More Security Isn’t Always Better

Find Out Why with Our Latest Survey Results

by Stephen Nardone | 06.17.16

Do you know how many security solutions your organization currently has deployed? According to a survey we recently conducted with IDG, 80% of organizations use one to six vendors to meet their security needs. That says a lot about the challenges that top IT decision makers face when it comes to protecting their data, infrastructure, and users. To combat modern security threats and address multiple concerns, organizations often need multiple solutions. A successful security program must have strong defenses at the perimeter of the network as well as inside—all while delivering the visibility and manageability that IT requires. That’s a tall order for a single security platform to fill.

Tags:CIOIDGITSecuritySurvey

The Right IT Recruiter Can Help Find Your Unicorn

How to Get The Talent You Need, When You Need It

by Tim Duffy | 06.14.16

In IT recruiting, a job description is just the tip of the iceberg.

Employers may say they want a data analyst, but what they really want is a data analyst with experience in healthcare—who is also an expert in security and compliance. Or maybe they want a mobile applications developer—one who really gets how interior designers think.

Tags:CIOCloudComplianceHealthcare ITIDGITRecruitingSecurityStrategic Hiring

Subscribe
Follow Us
RSS Feed
Featured Bloggers
Stephen Nardone - Director of Security Solutions and Services
Practice Director, Security and Mobility
Tim Allen - Networking Practice Manager
Networking Practice Manager
Sarah Senftle - HP Enterprise Group Product Manager
Sr. Product Manager
Tag Cloud
Loading Loading...