BLOG

The Feeling is Mutual: Elegant & Effective Authentication

The Feeling is Mutual: Elegant & Effective Authentication

Published: Sep 22, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

If your user base is primarily IoT devices and your organization doesn’t want to manage passwords for each device, then it seems like a series of unguessable passwords such as “d3v1ce [serial-number]” is the only solution. While that technically works, it isn’t the most user-friendly option. For a more elegant and effective solution, consider mutual […]

More
What Problem Does a Network Overlay Solve?

What Problem Does a Network Overlay Solve?

Published: Sep 13, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Software-defined networks have been around for several years. Often, people learn how the overlay works but may not know what problems they can solve. I will attempt to answer that question with a scenario. Let’s say we have in our data center 1,000 servers, each of which house 50-100 virtual servers. If we have 25 […]

More
How is IAM Divided Today?

How is IAM Divided Today?

Published: Sep 2, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Over time, identity & access management (IAM) has become, not only a complicated subject, but also the core to information security. When we think of InfoSec, we generally think of cybersecurity to detect or thwart distributed denial of service (DDoS) or brute force attacks. However, once a bad actor breaches the perimeter defense, what do they intend to […]

More
Preserving Company Culture from Home

Preserving Company Culture from Home

Published: Aug 24, 2021   |   Author:    |   Category: Blog   |   Tags:   |   One Comment

What a whirlwind of a year. The past 18 months have had so many ups and downs for so many! When the world shut down last March, HR had to put it into overdrive to make sure that our employees were safe. There were still so many unknowns. After checking in with employees to make […]

More
Problem Management’s Role in an MSP

Problem Management’s Role in an MSP

Published: Aug 10, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Problem Management Defined Problem management helps prevent the occurrence of incidents and their impact, while also working to prevent incidents that have already occurred from happening again in the future. This starts with identifying a problem and finding ways to mitigate or fix the underlying cause. A “problem” according to the ITIL definition is “the […]

More
What Can You Do to Avoid a Cyberattack?

What Can You Do to Avoid a Cyberattack?

Published: Aug 4, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

On July 2nd 2021, the threat group REvil launched a targeted attack against the users of the Kaseya VSA product, a remote monitoring and management (RMM) tool many organizations and MSPs leverage to support their infrastructure. The unprecedented-scale attack exploited a vulnerability in the product, allowing the threat actors to infiltrate more than 30 MSPs, […]

More
Automate Your Help Desk

Automate Your Help Desk

Published: Jul 21, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

Create an exceptional customer service experience and build stronger customer relationships by expanding services through automation. IT organizations often struggle to get customers engaged to self-help capabilities. However, once implemented, customers find that it meets their needs more quickly and provides a better overall experience. Expanding an organization’s tools to a Service Catalog and offering […]

More
The Evolution of Gender in Technology

The Evolution of Gender in Technology

Published: Jul 14, 2021   |   Author:    |   Category: Blog   |   Tags:   |   One Comment

In the early days of tech, there were no real conversations about the implications of creating code that relied on gender, but with 1.2 million U.S. adults identifying as nonbinary, it’s clearly a conversation worth having. Over the years, we’ve developed a much more comprehensive perception of gender and how we can refrain from viewing it as a […]

More
Hybrid Cloud Strategy…Just a Component of Modernization

Hybrid Cloud Strategy…Just a Component of Modernization

Published: Jul 8, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

We’ve all read or listened to different explanations and definitions of what a hybrid cloud is. Many contain a manufacturer’s bent, and others are just kind of – well – creative. Everybody’s Talking About It Consider Ann Burrell, the shark-finned white-haired culinary star – now an IBM spokeswoman for hybrid cloud…huh? Yup, she’s got a […]

More
Legal Industry CIO/CISO Forum – Return to the Office

Legal Industry CIO/CISO Forum – Return to the Office

Published: Jun 29, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

As the world reopens and we regain some semblance of normalcy, leadership teams face difficult decisions about how, when and if employees should return to the office. This pandemic has proven just how capable we are of operating remotely, but at what cost? Earlier this month, iVision held a Legal Industry CIO/CISO Forum with the leadership from several different law firms to discuss what their hybrid work approach will look like.   Stance  […]

More
Securing Your Cloud Applications – Development

Securing Your Cloud Applications – Development

Published: Jun 16, 2021   |   Author:    |   Category: Blog   |   Tags: ,   |   No Comments

Throughout this blog series, we will break down iVision’s prescriptive cloud security approach by covering each area individually: infrastructure, network, applications and data. In this blog, we’ll be sharing tips for securing your cloud applications, with a focus on secure coding practices for app development. As organizations either migrate their applications to the public cloud or develop greenfield in the public cloud, they experience the benefit of faster feature function build and release. Though this allows organizations to respond to user feedback and market opportunities faster, it also increases the […]

More
Is 2021 the Year to Virtualize Your Desktops?

Is 2021 the Year to Virtualize Your Desktops?

Published: Jun 8, 2021   |   Author:    |   Category: Blog   |   Tags:   |   No Comments

2020 was a once-in-a-generation event that forever changed the way we work, learn, shop, receive healthcare, keep in touch with loved ones and live. Telemedicine, delivery services and virtual meetings have been around for years, but the adoption rates and the experience just never seemed to live up to the expectations. We saw education, healthcare […]

More