BLOG

Understanding Microsoft’s Enterprise Mobility + Security

Understanding Microsoft’s Enterprise Mobility + Security

Published: May 17, 2019   |   Author: Calen Bedford   |   Category: Blog   |   No Comments

As cyberthreats grow more sophisticated, on-premise solutions cannot effectively protect sensitive data. Enterprise Mobility + Security (EMS) provides one control panel in the cloud for identity management, device management, information protection and secure access to apps and resources. You don’t have to trade mobile flexibility for enterprise security — a mentality of adoption, adaptation and […]

More
Understanding Office 365 Security & Compliance Permissions

Understanding Office 365 Security & Compliance Permissions

Published: May 10, 2019   |   Author: Alan Schmid   |   Category: Blog   |   No Comments

The Security & Compliance Center (SCC) is the heart of alerting and reporting within your O365 organization. Understanding its functionality and the various roles integrated within the suite of features is necessary for maximum impact to your organization. New features and functions are added to the SCC regularly, so staying informed through various whitepapers and […]

More
3 Steps to Creating a Successful Workplace Wellness Program

3 Steps to Creating a Successful Workplace Wellness Program

Published: May 1, 2019   |   Author: Kaedy Martin   |   Category: Blog   |   No Comments

One of my passions is being able to create an environment for our employees that enriches their emotional, social, intellectual and physical wellness. According to Anthony Robbins, “The higher your energy level, the more efficient your body. The more efficient your body, the better you feel, and the more you will use your talent to produce […]

More
Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Published: May 1, 2019   |   Author: Brett Boss   |   Category: Blog   |   No Comments

There are four pillars of a successful SD-WAN deployment that need to be clearly understood at the beginning of a project: Business critical applications, their requirements and dependencies Security requirements Site connectivity and the relative priority of each location Circuit cost and availability To fully understand each of these, we’ll break them them down into […]

More
Keep Your IT Environment Safe: 7 Risks To Know

Keep Your IT Environment Safe: 7 Risks To Know

Published: Apr 19, 2019   |   Author: Don Carangelo   |   Category: Blog   |   No Comments

When it comes to IT, is your bench deep enough to cover all your bases? Many businesses today don’t realize the capacity at which they are reliant on IT. As a result end up understaffing, underfunding and improperly managing their IT teams, which can create a significant risk. In other words, having a bench that […]

More
IoT and the Future of Cloud Connectivity

IoT and the Future of Cloud Connectivity

Published: Mar 20, 2019   |   Author: iVision   |   Category: Blog   |   No Comments

The Internet of Things (IoT) has taken hold of the technology industry. In today’s world more and more companies are converting to IoT cloud offerings to deliver services while having vetted 99.99% SLA’s or higher. Taking physical devices out of the picture and converting existing infrastructure to code or cloud service offerings provides: Lower Total […]

More
Mergers and Acquisitions and Asset Management, Oh My!

Mergers and Acquisitions and Asset Management, Oh My!

Published: Mar 12, 2019   |   Author: Dan Newton   |   Category: Blog   |   No Comments

Mergers and acquisitions are a part of every business sector. As companies grow and change, ownership is bound to change hands and organizations will continue to find themselves struggling to integrate not only people and company values but also a litany of technologies and processes. From an IT perspective, mergers are, at best, a complex […]

More
2019 Spotlight: Women in Tech

2019 Spotlight: Women in Tech

Published: Mar 1, 2019   |   Author: Zoe Blutstein   |   Category: Blog   |   No Comments

At iVision, we’re passionate about helping future generations of engineers find their passion. One of the cornerstones of our hiring practices is to find the right person, with the experience, passion, and drive, for each position. Over the years, we’ve seen huge growth in the number of women entering technical professions. This March, to celebrate […]

More
iVision’s 2019 IT Predictions

iVision’s 2019 IT Predictions

Published: Feb 27, 2019   |   Author: Eric Aslaksen   |   Category: Blog   |   No Comments

One of our top priorities at iVision is staying ahead of IT trends to improve the services and solutions we offer our clients. As we reach the end of the first fiscal quarter of 2019, a few trends have already started emerging. For iVision’s 2019 IT Predictions, we’ve grouped these trends into three main categories: […]

More
Phishing and Spear-Phishing – If it didn’t work, they wouldn’t keep doing it …

Phishing and Spear-Phishing – If it didn’t work, they wouldn’t keep doing it …

Published: Feb 26, 2019   |   Author: Thomas Jefferies   |   Category: Blog   |   No Comments

Phishing isn’t really a new threat – it’s something that has existed in many forms since the very beginnings of commercial availability of e-mail. By all rights, it’s truly just an extension of social engineering – pretending to be someone or something that you’re not in order to gain unauthorized access to information or credentials […]

More
Zerto 7 and the promise of the Elastic Journal

Zerto 7 and the promise of the Elastic Journal

Published: Feb 22, 2019   |   Author: Shane Sheppard   |   Category: Blog   |   No Comments

iVision is a Zerto 7 Early Adopter iVision is excited to announce our participation in the Zerto 7 Early Adopter Program. As a part of this program, our team will get the chance to thoroughly test the new features of Zerto 7 and get a head start on identifying how these features can impact our […]

More
Comprehensive Security Context with Cisco ISE

Comprehensive Security Context with Cisco ISE

Published: Feb 12, 2019   |   Author: Jordan Burnett   |   Category: Blog   |   Tags: ,   |   No Comments

In my last article, I talked about how Cisco ISE can answer the Five W’s of Network Access Control. Those being: Who is accessing my network? What devices are being used on my network? Where are these devices and users logging in? When are these devices or users accessing my network? How are users and […]

More