BLOG

Partner or Vendor: Which Provides More Business Value?

Partner or Vendor: Which Provides More Business Value?

Published: Aug 8, 2019   |   Author: David Degitz   |   Category: Blog   |   No Comments

“A true partnership takes time to establish. It is well-balanced and it’s based on trust. The value is priceless.” – Jean Holley, Board Director, OneSpan In a rapidly transforming business world, it is vital for companies to differentiate themselves from their competitors. More often than not, the best way to do this is through nurturing […]

More
LogicMonitor Versatility: Monitoring, APIs and a Tesla Model 3

LogicMonitor Versatility: Monitoring, APIs and a Tesla Model 3

Published: Aug 1, 2019   |   Author: Keith Whitemore   |   Category: Blog   |   No Comments

One platform. Endless possibilities. LogicMonitor is known as a leading SaaS performance monitoring platform. This is in part driven by its nearly unlimited extensibility via LogicModules. This flexibility is then amplified by a community of users and staff who push the platform outside of its intended use with some fascinating results. Users can monitor the […]

More
Lifecycle Management and How to Leverage It For Your Business

Lifecycle Management and How to Leverage It For Your Business

Published: Jul 29, 2019   |   Author: Jennifer Benator   |   Category: Blog   |   No Comments

What is a product life cycle? Everything has a usable lifespan, including and especially IT technology. Knowing when a product no longer can serve its intended purpose is extremely valuable for any business. Hardware and software are similar to cars – their value depreciates immediately after driving them off the lot (or, deploying them). Just […]

More
Responsive Service: 3 Tips for Addressing a Client’s Needs

Responsive Service: 3 Tips for Addressing a Client’s Needs

Published: Jul 17, 2019   |   Author: Tracy Barahona   |   Category: Blog   |   No Comments

iVision has a set of eight Client Engagement Values (CEVs). These are the core principles behind how we operate and how we service our clients. This blog series will highlight stories from our employees on how they interpret and embody these CEVs, whether in their career at iVision or in their personal lives. I am […]

More
Cybersecurity, NIST Framework Core and the C-Suite

Cybersecurity, NIST Framework Core and the C-Suite

Published: Jul 10, 2019   |   Author: Chris Foster   |   Category: Blog   |   No Comments

Cybersecurity and the C-Suite  Compared to other employees, C-Level executives are 12 times more likely—and executives six times more likely—to be the target of a social engineering phishing campaign, according to Verizon’s 2019 Data Breach Investigations Report (DBIR). This is especially concerning as executives have access to critical business systems and processes within the organization. If […]

More
New Cisco Certifications: Everything You Need to Know

New Cisco Certifications: Everything You Need to Know

Published: Jul 3, 2019   |   Author: Terry Grant   |   Category: Blog   |   No Comments

Achieving and maintaining technical certifications is a great way to stay relevant and up to date. At iVision, Client Engagement Values are the core of everything we do. One of those values, “I engineer thoughtful solutions that promote long-term partnerships,” is the heart of keeping iVision engineers trained, ready and relevant in today’s ever-changing technology […]

More
Atlanta Community Food Bank: Volunteering Together

Atlanta Community Food Bank: Volunteering Together

Published: Jun 26, 2019   |   Author: Channa West-Wilson   |   Category: Blog   |   No Comments

In 2018, iVision joined organizations around the world in taking the 1% Pledge to integrate philanthropy into our business culture and commit our time and resources. Since then, we’ve worked hard to create opportunities for iVision’s employees that are meaningful, purposeful and give back to our community. With the year halfway gone, we are proud to say […]

More
SIEM Capabilities: Monitoring and Detecting Potential Risks

SIEM Capabilities: Monitoring and Detecting Potential Risks

Published: Jun 19, 2019   |   Author: Thomas Jefferies   |   Category: Blog   |   No Comments

If you’ve spent any time paying attention to security technology, you will undoubtedly have heard the term “SIEM,” or Security Information and Event Management. For a time, this term was used to refer to simple centralized log aggregation and monitoring, but SIEM products have matured alongside technology advances. SIEM now includes detailed log analysis and […]

More
Using Veeam and ReFS to Save Time and Space

Using Veeam and ReFS to Save Time and Space

Published: Jun 12, 2019   |   Author: James Anthony   |   Category: Blog   |   No Comments

A key challenge for modern organizations is finding a way to both manage their data and ensure that it is readily available across a protected cloud environment. To address modern business challenges, you need a management strategy that takes a comprehensive approach to data – from backup and recovery, to protection and security, and all […]

More
Law Firm Security Programs and the Digital Lawyer in 2019

Law Firm Security Programs and the Digital Lawyer in 2019

Published: Jun 7, 2019   |   Author: Gabe Damiani   |   Category: Blog   |   No Comments

Companies are moving email, documents and client data to the cloud at an increasing rate, and law firms have to work harder than ever to mitigate cybersecurity threats.  A firm’s security program needs to meet a wide range of capabilities: a modern enterprise security perimeter, good data hygiene, cloud-first identity management capability, micro-segmentation, robust monitoring […]

More
Understanding Microsoft’s Enterprise Mobility + Security

Understanding Microsoft’s Enterprise Mobility + Security

Published: May 17, 2019   |   Author: Calen Bedford   |   Category: Blog   |   No Comments

As cyberthreats grow more sophisticated, on-premise solutions cannot effectively protect sensitive data. Enterprise Mobility + Security (EMS) provides one control panel in the cloud for identity management, device management, information protection and secure access to apps and resources. You don’t have to trade mobile flexibility for enterprise security — a mentality of adoption, adaptation and […]

More
Understanding Office 365 Security & Compliance Permissions

Understanding Office 365 Security & Compliance Permissions

Published: May 10, 2019   |   Author: Alan Schmid   |   Category: Blog   |   No Comments

The Security & Compliance Center (SCC) is the heart of alerting and reporting within your O365 organization. Understanding its functionality and the various roles integrated within the suite of features is necessary for maximum impact to your organization. New features and functions are added to the SCC regularly, so staying informed through various whitepapers and […]

More