Blog

May
1
2019
Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Author: Brett Boss   |   Category: Blog   |   No Comments   |   Read more

There are four pillars of a successful SD-WAN deployment that need to be clearly understood at the beginning of a project: Business critical applications, their requirements and dependencies Security requirements Site connectivity and the relative priority of each location Circuit cost and availability To fully understand each of these, we’ll break them them down into […]

Apr
19
2019
Keep Your IT Environment Safe: 7 Risks To Know

Keep Your IT Environment Safe: 7 Risks To Know

Author: Don Carangelo   |   Category: Blog   |   No Comments   |   Read more

When it comes to IT, is your bench deep enough to cover all your bases? Many businesses today don’t realize the capacity at which they are reliant on IT. As a result end up understaffing, underfunding and improperly managing their IT teams, which can create a significant risk. In other words, having a bench that […]

Mar
20
2019
IoT and the Future of Cloud Connectivity

IoT and the Future of Cloud Connectivity

Author: iVision   |   Category: Blog   |   No Comments   |   Read more

The Internet of Things (IoT) has taken hold of the technology industry. In today’s world more and more companies are converting to IoT cloud offerings to deliver services while having vetted 99.99% SLA’s or higher. Taking physical devices out of the picture and converting existing infrastructure to code or cloud service offerings provides: Lower Total […]

Mar
12
2019
Mergers and Acquisitions and Asset Management, Oh My!

Mergers and Acquisitions and Asset Management, Oh My!

Author: Dan Newton   |   Category: Blog   |   No Comments   |   Read more

Mergers and acquisitions are a part of every business sector. As companies grow and change, ownership is bound to change hands and organizations will continue to find themselves struggling to integrate not only people and company values but also a litany of technologies and processes. From an IT perspective, mergers are, at best, a complex […]

Mar
1
2019
2019 Spotlight: Women in Tech

2019 Spotlight: Women in Tech

Author: Zoe Blutstein   |   Category: Blog   |   No Comments   |   Read more

At iVision, we’re passionate about helping future generations of engineers find their passion. One of the cornerstones of our hiring practices is to find the right person, with the experience, passion, and drive, for each position. Over the years, we’ve seen huge growth in the number of women entering technical professions. This March, to celebrate […]

Feb
27
2019
iVision’s 2019 IT Predictions

iVision’s 2019 IT Predictions

Author: Eric Aslaksen   |   Category: Blog   |   No Comments   |   Read more

One of our top priorities at iVision is staying ahead of IT trends to improve the services and solutions we offer our clients. As we reach the end of the first fiscal quarter of 2019, a few trends have already started emerging. For iVision’s 2019 IT Predictions, we’ve grouped these trends into three main categories: […]

Feb
26
2019
Phishing and Spear-Phishing – If it didn’t work, they wouldn’t keep doing it …

Phishing and Spear-Phishing – If it didn’t work, they wouldn’t keep doing it …

Author: Thomas Jefferies   |   Category: Blog   |   No Comments   |   Read more

Phishing isn’t really a new threat – it’s something that has existed in many forms since the very beginnings of commercial availability of e-mail. By all rights, it’s truly just an extension of social engineering – pretending to be someone or something that you’re not in order to gain unauthorized access to information or credentials […]