BLOG

New Cisco Certifications: Everything You Need to Know

New Cisco Certifications: Everything You Need to Know

Published: Jul 3, 2019   |   Author:    |   Category: Blog   |   No Comments

Achieving and maintaining technical certifications is a great way to stay relevant and up to date. At iVision, Client Engagement Values are the core of everything we do. One of those values, “I engineer thoughtful solutions that promote long-term partnerships,” is the heart of keeping iVision engineers trained, ready and relevant in today’s ever-changing technology […]

More
Atlanta Community Food Bank: Volunteering Together

Atlanta Community Food Bank: Volunteering Together

Published: Jun 26, 2019   |   Author:    |   Category: Blog   |   One Comment

In 2018, iVision joined organizations around the world in taking the 1% Pledge to integrate philanthropy into our business culture and commit our time and resources. Since then, we’ve worked hard to create opportunities for iVision’s employees that are meaningful, purposeful and give back to our community. With the year halfway gone, we are proud to say […]

More
SIEM Capabilities: Monitoring and Detecting Potential Risks

SIEM Capabilities: Monitoring and Detecting Potential Risks

Published: Jun 19, 2019   |   Author:    |   Category: Blog   |   No Comments

If you’ve spent any time paying attention to security technology, you will undoubtedly have heard the term “SIEM,” or Security Information and Event Management. For a time, this term was used to refer to simple centralized log aggregation and monitoring, but SIEM products have matured alongside technology advances. SIEM now includes detailed log analysis and […]

More
Using Veeam and ReFS to Save Time and Space

Using Veeam and ReFS to Save Time and Space

Published: Jun 12, 2019   |   Author:    |   Category: Blog   |   No Comments

A key challenge for modern organizations is finding a way to both manage their data and ensure that it is readily available across a protected cloud environment. To address modern business challenges, you need a management strategy that takes a comprehensive approach to data – from backup and recovery, to protection and security, and all […]

More
Law Firm Security Programs and the Digital Lawyer in 2019

Law Firm Security Programs and the Digital Lawyer in 2019

Published: Jun 7, 2019   |   Author:    |   Category: Blog   |   No Comments

Companies are moving email, documents and client data to the cloud at an increasing rate, and law firms have to work harder than ever to mitigate cybersecurity threats.  A firm’s security program needs to meet a wide range of capabilities: a modern enterprise security perimeter, good data hygiene, cloud-first identity management capability, micro-segmentation, robust monitoring […]

More
Understanding Microsoft’s Enterprise Mobility + Security

Understanding Microsoft’s Enterprise Mobility + Security

Published: May 17, 2019   |   Author:    |   Category: Blog   |   No Comments

As cyberthreats grow more sophisticated, on-premise solutions cannot effectively protect sensitive data. Enterprise Mobility + Security (EMS) provides one control panel in the cloud for identity management, device management, information protection and secure access to apps and resources. You don’t have to trade mobile flexibility for enterprise security — a mentality of adoption, adaptation and […]

More
Understanding Office 365 Security & Compliance Permissions

Understanding Office 365 Security & Compliance Permissions

Published: May 10, 2019   |   Author:    |   Category: Blog   |   No Comments

The Security & Compliance Center (SCC) is the heart of alerting and reporting within your O365 organization. Understanding its functionality and the various roles integrated within the suite of features is necessary for maximum impact to your organization. New features and functions are added to the SCC regularly, so staying informed through various whitepapers and […]

More
3 Steps to Creating a Successful Workplace Wellness Program

3 Steps to Creating a Successful Workplace Wellness Program

Published: May 1, 2019   |   Author:    |   Category: Blog   |   One Comment

One of my passions is being able to create an environment for our employees that enriches their emotional, social, intellectual and physical wellness. According to Anthony Robbins, “The higher your energy level, the more efficient your body. The more efficient your body, the better you feel, and the more you will use your talent to produce […]

More
Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Published: May 1, 2019   |   Author:    |   Category: Blog   |   No Comments

There are four pillars of a successful SD-WAN deployment that need to be clearly understood at the beginning of a project: Business critical applications, their requirements and dependencies Security requirements Site connectivity and the relative priority of each location Circuit cost and availability To fully understand each of these, we’ll break them them down into […]

More
Keep Your IT Environment Safe: 7 Risks To Know

Keep Your IT Environment Safe: 7 Risks To Know

Published: Apr 19, 2019   |   Author:    |   Category: Blog   |   No Comments

When it comes to IT, is your bench deep enough to cover all your bases? Many businesses today don’t realize the capacity at which they are reliant on IT. As a result end up understaffing, underfunding and improperly managing their IT teams, which can create a significant risk. In other words, having a bench that […]

More
IoT and the Future of Cloud Connectivity

IoT and the Future of Cloud Connectivity

Published: Mar 20, 2019   |   Author:    |   Category: Blog   |   No Comments

The Internet of Things (IoT) has taken hold of the technology industry. In today’s world more and more companies are converting to IoT cloud offerings to deliver services while having vetted 99.99% SLA’s or higher. Taking physical devices out of the picture and converting existing infrastructure to code or cloud service offerings provides: Lower Total […]

More
Mergers and Acquisitions and Asset Management, Oh My!

Mergers and Acquisitions and Asset Management, Oh My!

Published: Mar 12, 2019   |   Author:    |   Category: Blog   |   No Comments

Mergers and acquisitions are a part of every business sector. As companies grow and change, ownership is bound to change hands and organizations will continue to find themselves struggling to integrate not only people and company values but also a litany of technologies and processes. From an IT perspective, mergers are, at best, a complex […]

More