Is It Time to SD Your WAN?

By |2018-06-28T13:43:00+00:00March 19th, 2018|

We frequently get asked by clients, “Should I go MPLS or SD-WAN?” For cloud or hybrid cloud environments, our response to this question is nearly always, “Well, it depends.”  Without a doubt, we’re in the camp of SD WAN technology for most non-critical, non-real time applications—sharing files and email—for hybrid cloud environments. For these use cases, [...]

Why You Need Telecom Expense Management Services

By |2018-06-28T13:31:31+00:00March 16th, 2018|

The desire to track expenses, lower costs and optimize your budget is common across many organizations. But telecom usage and spend can be far more wieldy and complex than what companies are used to tracking. Telecom expense management services (TEM) takes more effort than simply tracking dollars; doing it right requires a company’s usage of voice, data [...]

Why Businesses Are Putting Their Call Centers in the Cloud (Contact Center as a Service)

By |2018-06-28T13:31:40+00:00February 21st, 2018|

Companies today must work harder than ever to keep their customers. Today’s customers have high expectations and a range of alternative choices. They want to communicate in a way that is comfortable and natural to them—whether it be email, chat or even SMS. And they expect a flawless experience every time. Should they feel dissatisfied, experience [...]

Is the Cloud Ready for Your Desktop? Desktop as a Service is here.

By |2018-06-28T13:31:56+00:00February 20th, 2018|

IT teams today are saddled with a lot of responsibility, from keeping things running to modernizing and innovating. Many of our clients tell us they’re continually looking at ways to reduce time and money spent on management and operational tasks and increase focus on more strategic initiatives. In the realm of desktop management, virtualization has opened [...]

The End of Servers. Hello Infrastructure as a Service!

By |2018-06-28T13:46:49+00:00February 8th, 2018|

By now, there’s a good chance you’ve grown comfortable with the idea of cloud computing, even if you still maintain an on-premise datacenter. The cloud has become ubiquitous, and headlines remind us every day about the mass adoption rates seen across many industries. You’re also probably warming up to the idea of Infrastructure as a Service [...]

Container Computing: A Primer

By |2018-06-28T13:44:54+00:00January 31st, 2018|

You’ve probably noticed that software runs differently in different computing environments and within different networks. It doesn’t matter if it’s the same software version; simply moving it around to various environments and platforms can cause a myriad of funky issues to arise. For example, you may be testing software on, say, Bob’s laptop. But when Bob [...]

Zero Trust Security – Part 2 – War on Two Fronts

By |2018-06-28T13:32:15+00:00January 26th, 2018|

This is the second part in a two-part series about taking a Zero Trust approach to security. Read the first part here. Organizations that want to avoid becoming the next Office of Personnel Management (or Yahoo, or Uber, or Equifax, or Sony) and prevent the exfiltration of their critical and sensitive data should address security as [...]

Zero Trust Security – Part 1 – Trust No One

By |2018-06-28T13:32:29+00:00January 23rd, 2018|

This is the first part in a two-part series on taking a Zero Trust security. Can you remember what you were doing ten years ago today? Thanks to one of my favorite Internet tools, tenyearsago.io, I know that 10 years ago ESPN was discussing a long-shot deal to get Alex Rodriguez on the Yankees. Pundits on [...]

Everything You Need to Know About Spectre & Meltdown

By |2018-06-28T13:32:42+00:00January 16th, 2018|

Last week, security researchers revealed two major software vulnerabilities that, in one way or another, affect just about anything with a processor. The flaws, called "Spectre" and "Meltdown," can potentially allow hackers to steal encrypted passwords as you type them in. If Spectre has you spooked, read on to learn more about these vulnerabilities and what’s being [...]

Cisco Acquired BroadSoft. Here’s What It Means for Your Cloud Telephony System

By |2018-06-28T13:45:46+00:00November 20th, 2017|

If you haven’t seen the news about Cisco acquiring BroadSoft, take note. The acquisition signals a strategic move on Cisco’s part to transition toward cloud telephony system offerings. Here’s how this may impact you as you evolve your organization’s communications strategy, and what this means for the market overall. First, some background: we all know Cisco. [...]

Load More Posts

Designed for Every Department

Fill out the form below to download the Designed for Every Department whitepaper from Apple.

Device Enrollment Program

Fill out the form below to download the Device Enrollment Program whitepaper from Apple.

Mac Deployment Overview

Fill out the form below to download the Mac Deployment Overview whitepaper from Apple.

macOS Security

Fill out the form below to download the macOS Security whitepaper from Apple.

Download Hybrid IT for Dummies Lead Form