<img height="1" width="1" style="display:none;" alt="" src="https://dc.ads.linkedin.com/collect/?pid=446209&amp;fmt=gif">

Michael Thweatt

Mike Thweatt, Sales Executive at WEI, helps our customers transform IT from a cost center to a new profit center by aligning solutions that will provide our customers with their desired business outcomes. Mike’s specialties include transforming technology features into quantifiable business value, strategic market planning, and cultivating collaborative relationships. Mike holds VMware, HPE, and Fortinet certifications.
Find me on :

Posts by Michael Thweatt

Five ways SD-WAN can boost the bottom line

By Michael Thweatt |   Aug 13, 2019

Digital transformation is becoming an increasingly popular course of action for enterprises trying to keep pace with emerging market trends, fluctuating customer demands, and increased competition. But traditional network architectures weren’t built to handle the types of workloads, and complexities, that arise as a result. Even worse, in an attempt to take on the work these architectures – post-digital transformation – can actually compromise business-critical services and network performance.

Does Your Next-Generation Firewall Deliver Performance and Speed?

By Michael Thweatt |   Jul 09, 2019

Networks continue to grow in both size and complexity. Enterprises need modern security solutions that better protect their network traffic. Many organizations are retiring their traditional firewalls to implement next-generation firewalls (NGFWs). NGFWs are able to inspect traffic at a much deeper and more detailed level than their predecessors. They can also detect hidden threats in encrypted traffic. This capability is especially important as encryption technologies continue to evolve and more and more traffic is encrypted. An NGFW is a vital component of your security arsenal, but not all NGFWs are created equal. An effective firewall provides robust security through a simple management platform while meeting the speed and performance needs of your enterprise.

5 Key Requirements For Distributed Enterprise Firewall Security

By Michael Thweatt |   Mar 19, 2019

As enterprises modernize their IT infrastructure to meet evolving business demands the conversation of security is always top of mind. More and more companies are now managing a distributed enterprise, with remote offices and branches that are forcing them to move away from a highly centralized IT model to one that extends to the edge. How will your security strategy have to evolve to meet these new security demands as you’re now securing more than just the perimeter? As one of the emerging leaders in SD-WAN technology, we looked at some tips from Fortinet on this topic. Check out these key requirements for distributed enterprise firewall security.

Why Your Enterprise Needs Disaster Recovery as a Service

By Michael Thweatt |   Jun 26, 2018

If a disaster were to hit your enterprise, would your data be protected? This information is the backbone of your organization so hopefully the answer to the questions is yes. However, if your disaster recovery plan is not what you would like it to be, or if it’s missing all together, it’s not too late to protect your data in the event of disaster. 

What’s the Difference Between Hybrid IT and Hybrid Cloud?

By Michael Thweatt |   Apr 10, 2018

When discussing hybrid solutions and digital transformation, there is often some confusion between Hybrid IT and Hybrid Cloud. While there are certain striking similarities, it is critical to understand that there are also very important differences between the two and how enterprises use them within their organization.

Concerned about Password Security? Amp up data security.

By Michael Thweatt |   May 05, 2016

At least once a year, you can find a report on the web about what the most common passwords are based upon leaked data. Think of these lists as the worst passwords you can ever use. Typically, 123456 and password top the list. Coming up the path of popularity are passwords 123456 and 123456789, as people are required to enter in longer passwords. Need a mix of letters and numbers? You might want to avoid abc123 and trustno1, among many others. Nowadays, a password security alone isn’t sufficient to lock anything down. How best can you secure your system to keep the bad guys out?

Data protection: The gap between accessibility and security

By Michael Thweatt |   Jan 07, 2016

An enormous challenge for technical and security departments within any organization is creating secure networks, apps, and servers without making access so difficult that legitimate production is impacted. This is true whether you are working with in-house employee-based systems or customer-facing solutions such as web portals or online account management. The consequences for not securing information are huge, ranging from federal or state sanctions to loss of customers or customer trust. At the same time, results of the wrong type of security or unnecessary security might include loss of productivity, inability to make deadlines or complete work, poor employee morale, and loss of revenues. Data protection is key, but how can you ensure you have the right solutions in place?

About WEI

WEI is an innovative, full service, customer-centric IT solutions provider. We're passionate about solving your technology challenges and we develop custom technology solutions that drive real business outcomes.

Subscribe to WEI's Tech Exchange Blog


Categories

see all
Contact Us