Blog

Nov
20
2018
Client Engagement Value Spotlight: Paige Earhart

Client Engagement Value Spotlight: Paige Earhart

Author: Paige Earhart   |   Category: Blog   |   No Comments   |   Read more

iVision has a set of eight Client Engagement Values (CEVs). These are the core principles behind how we operate and how we service our clients. This blog series will highlight stories from our employees on how they interpret and embody these CEVs, whether in their career at iVision or in their personal lives. I am […]

Nov
13
2018
Meet PortSmash, everyone’s favorite new side-channel execution attack.

Meet PortSmash, everyone’s favorite new side-channel execution attack.

Author: Thomas Jefferies   |   Category: Blog, Security   |   No Comments   |   Read more

In February 2017, a security researcher and white-hat hacker published information about a set of side-channel/speculative execution attacks that impacted approximately 20 years of Intel and AMD CPUs (among others), allowing for protected memory restrictions to be bypassed by a targeted malicious attack. These vulnerabilities were labeled SPECTRE and MELTDOWN and received a large amount […]

Nov
8
2018
Client Engagement Value Spotlight: Fred Najafi

Client Engagement Value Spotlight: Fred Najafi

Author: Fred Najafi   |   Category: Blog   |   No Comments   |   Read more

iVision has a set of eight Client Engagement Values (CEVs). These are the core principles behind how we operate and how we service our clients. This blog series will highlight stories from our employees on how they interpret and embody these CEVs, whether in their career at iVision or in their personal lives. I seek […]

Oct
17
2018
How Cisco ISE Answers the Five Ws of Network Access Control

How Cisco ISE Answers the Five Ws of Network Access Control

Author: Jordan Burnett   |   Category: Blog   |   No Comments   |   Read more

Gone are the days where a crook needs to put their life or limb on the line to get access to your valuables. Locks and physical access controls are nothing new; they’ve been around forever. People have become intimately familiar with identifying why a person needs access to a particular room, safe, or vault (hint—it […]

Oct
10
2018
IT Resiliency – Disaster Recovery for the Modern Era

IT Resiliency – Disaster Recovery for the Modern Era

Author: Shane Sheppard   |   Category: Blog   |   No Comments   |   Read more

Resilience is defined as the capacity to recover quickly from difficulties. Expanding this definition into the IT Ecosystem, IT resiliency is the ability of an IT organization to maintain service levels regardless of the difficulties faced. These difficulties come from a variety of angles, including security threats, network, and infrastructure outages, and just basic human […]

Sep
28
2018
3 things EVERYONE can do to enhance security without ruining productivity

3 things EVERYONE can do to enhance security without ruining productivity

Author: Thomas Jefferies   |   Category: Blog   |   No Comments   |   Read more

Building a secure environment is a constant balance between usability and protection – additional security controls often add steps to the day-to-day of the very people that the controls are intended to support and protect. That’s why it’s important to recognize and elevate the security controls which provide major benefits at a minimal impact to […]

Sep
21
2018
Is your data center ready for hybrid cloud?

Is your data center ready for hybrid cloud?

Author: Brandon Harper   |   Category: Blog   |   No Comments   |   Read more

How many cloud service providers are you currently using? Where are the services and data located in relationship to each other? How will users be impacted when an on-prem application moves to the cloud? As companies embark on their journey to the cloud, these are the questions IT organizations must understand to guarantee the performance […]