Blog

Jun
26
2019
Atlanta Community Food Bank: Volunteering Together

Atlanta Community Food Bank: Volunteering Together

Author: Channa West-Wilson   |   Category: Blog   |   No Comments   |   Read more

In 2018, iVision joined organizations around the world in taking the 1% Pledge to integrate philanthropy into our business culture and commit our time and resources. Since then, we’ve worked hard to create opportunities for iVision’s employees that are meaningful, purposeful and give back to our community. With the year halfway gone, we are proud to say […]

Jun
19
2019
SIEM Capabilities: Monitoring and Detecting Potential Risks

SIEM Capabilities: Monitoring and Detecting Potential Risks

Author: Thomas Jefferies   |   Category: Blog   |   No Comments   |   Read more

If you’ve spent any time paying attention to security technology, you will undoubtedly have heard the term “SIEM,” or Security Information and Event Management. For a time, this term was used to refer to simple centralized log aggregation and monitoring, but SIEM products have matured alongside technology advances. SIEM now includes detailed log analysis and […]

Jun
12
2019
Using Veeam and ReFS to Save Time and Space

Using Veeam and ReFS to Save Time and Space

Author: James Anthony   |   Category: Blog   |   No Comments   |   Read more

A key challenge for modern organizations is finding a way to both manage their data and ensure that it is readily available across a protected cloud environment. To address modern business challenges, you need a management strategy that takes a comprehensive approach to data – from backup and recovery, to protection and security, and all […]

Jun
7
2019
Law Firm Security Programs and the Digital Lawyer in 2019

Law Firm Security Programs and the Digital Lawyer in 2019

Author: Gabe Damiani   |   Category: Blog   |   No Comments   |   Read more

Companies are moving email, documents and client data to the cloud at an increasing rate, and law firms have to work harder than ever to mitigate cybersecurity threats.  A firm’s security program needs to meet a wide range of capabilities: a modern enterprise security perimeter, good data hygiene, cloud-first identity management capability, micro-segmentation, robust monitoring […]

May
17
2019
Understanding Microsoft’s Enterprise Mobility + Security

Understanding Microsoft’s Enterprise Mobility + Security

Author: Calen Bedford   |   Category: Blog   |   No Comments   |   Read more

As cyberthreats grow more sophisticated, on-premise solutions cannot effectively protect sensitive data. Enterprise Mobility + Security (EMS) provides one control panel in the cloud for identity management, device management, information protection and secure access to apps and resources. You don’t have to trade mobile flexibility for enterprise security — a mentality of adoption, adaptation and […]

May
10
2019
Understanding Office 365 Security & Compliance Permissions

Understanding Office 365 Security & Compliance Permissions

Author: Alan Schmid   |   Category: Blog   |   No Comments   |   Read more

The Security & Compliance Center (SCC) is the heart of alerting and reporting within your O365 organization. Understanding its functionality and the various roles integrated within the suite of features is necessary for maximum impact to your organization. New features and functions are added to the SCC regularly, so staying informed through various whitepapers and […]

May
1
2019
3 Steps to Creating a Successful Workplace Wellness Program

3 Steps to Creating a Successful Workplace Wellness Program

Author: Kaedy Martin   |   Category: Blog   |   No Comments   |   Read more

One of my passions is being able to create an environment for our employees that enriches their emotional, social, intellectual and physical wellness. According to Anthony Robbins, “The higher your energy level, the more efficient your body. The more efficient your body, the better you feel, and the more you will use your talent to produce […]