So we’re nearing the end of 2020, and luckily the shock and awe of the pandemic has largely worn off as employees have adjusted to the work from home life. On the enterprise side, patchwork, short-term solutions that were thrown together when shelter-in-place mandates were first instituted are being switched out for long-term options that will better accommodate the remote workforce, many of whom may choose to continue to work remotely even after the pandemic is over.
Posts by Josh Cronin
As software-as-a-service (SaaS) applications rise in popularity and enterprises continue to embrace digital transformation initiatives, it’s critical these applications are available at any time, from any location, and from any device. IT must also guarantee consistent network performance and superior experiences to employees and customers, while ensuring security over a rapidly expanding attack surface.
Keeping on top of the latest security trends, threats and solutions is an increasingly difficult task. To help security teams keep track, we’ve broken down Cisco’s 2020 Cybersecurity Report and pulled the top five highlights that all security professionals should know.
As storage volumes continue to grow and enterprises make use of secondary storage to manage corporate data, they also need to backup these storage solutions. However, incorporating secondary storage into an enterprise-wide backup and recovery strategy is not always simple.
Today, there are few industries where enterprises have yet to undergo some form of digital transformation. Over the last few decades, businesses have undergone digitization at unparalleled speeds. Networking solutions are at the heart of these changes and can be the key that allows enterprises to adjust and meet the changing needs of their business.
New realizations continue to be unveiled as a result of the global pandemic being played out. People are reevaluating how they shop, travel and work within their daily lives. Businesses are realizing that enterprise users don’t have to be in the office at an assigned desk to do their jobs well. In fact, in the new normalized era of wireless mobility, going to the office everyday from 9 to 5 is starting to sound a bit antiquated.
Although it may not seem like it, the pandemic crisis that is currently engulfing the world will one day pass. Its aftershocks however will be experienced for the coming decade. Governments, businesses, consumers and travelers are undergoing reassessments in order to determine a better way of doing things. Many things are going to change as a result. The process of determining the maximum capacity of a building has potential to change. The travel industry will undoubtedly perform density studies in how they transport people. Corporate executives are also examining the densification of their offices.
As companies grow and cloud models change and develop, whether you have AWS or Azure, most people aren't finding that they use one single cloud provider and stick with them. They use clouds from multiple providers, creating a hybrid cloud environment with multiple data centers. When you mix public clouds into this strategy, whether it be AWS, Azure, or Google, it is important to realize that every time a cloud connection is made there is usually connectivity back to your sites as well. You have that increased traffic flow and you have to consider how you're connecting, managing, and securing it.
In last week's post we discussed the Cisco Tetration Analytics Platform—what the platform is and how it integrates with the modern enterprise. We talked about how it supports a “Zero-Trust” security model and explained the story that ties in with its creation with an interesting use case involving Cisco and WEI.
How much visibility do you have into your organization’s network? How confident is your IT team in its ability to accurately map out the network, which is a necessary step in data center migrations. According to a white paper from IDC, a mere 18% increase in network visibility can improve security breach preventative measures by over 40%. Many organizations know there are devices on their network that are unaccounted for, but many do not have a way of even guessing how many devices that is, let alone strategizing how to secure them.