BLOG

Responsive Service: 3 Tips for Addressing a Client’s Needs

Responsive Service: 3 Tips for Addressing a Client’s Needs

Published: Jul 17, 2019   |   Author: Tracy Barahona   |   Category: Blog   |   No Comments

iVision has a set of eight Client Engagement Values (CEVs). These are the core principles behind how we operate and how we service our clients. This blog series will highlight stories from our employees on how they interpret and embody these CEVs, whether in their career at iVision or in their personal lives. I am […]

More
Cybersecurity, NIST Framework Core and the C-Suite

Cybersecurity, NIST Framework Core and the C-Suite

Published: Jul 10, 2019   |   Author: Chris Foster   |   Category: Blog   |   No Comments

Cybersecurity and the C-Suite  Compared to other employees, C-Level executives are 12 times more likely—and executives six times more likely—to be the target of a social engineering phishing campaign, according to Verizon’s 2019 Data Breach Investigations Report (DBIR). This is especially concerning as executives have access to critical business systems and processes within the organization. If […]

More
New Cisco Certifications: Everything You Need to Know

New Cisco Certifications: Everything You Need to Know

Published: Jul 3, 2019   |   Author: Terry Grant   |   Category: Blog   |   No Comments

Achieving and maintaining technical certifications is a great way to stay relevant and up to date. At iVision, Client Engagement Values are the core of everything we do. One of those values, “I engineer thoughtful solutions that promote long-term partnerships,” is the heart of keeping iVision engineers trained, ready and relevant in today’s ever-changing technology […]

More
Atlanta Community Food Bank: Volunteering Together

Atlanta Community Food Bank: Volunteering Together

Published: Jun 26, 2019   |   Author: Channa West-Wilson   |   Category: Blog   |   One Comment

In 2018, iVision joined organizations around the world in taking the 1% Pledge to integrate philanthropy into our business culture and commit our time and resources. Since then, we’ve worked hard to create opportunities for iVision’s employees that are meaningful, purposeful and give back to our community. With the year halfway gone, we are proud to say […]

More
SIEM Capabilities: Monitoring and Detecting Potential Risks

SIEM Capabilities: Monitoring and Detecting Potential Risks

Published: Jun 19, 2019   |   Author: Thomas Jefferies   |   Category: Blog   |   No Comments

If you’ve spent any time paying attention to security technology, you will undoubtedly have heard the term “SIEM,” or Security Information and Event Management. For a time, this term was used to refer to simple centralized log aggregation and monitoring, but SIEM products have matured alongside technology advances. SIEM now includes detailed log analysis and […]

More
Using Veeam and ReFS to Save Time and Space

Using Veeam and ReFS to Save Time and Space

Published: Jun 12, 2019   |   Author: James Anthony   |   Category: Blog   |   No Comments

A key challenge for modern organizations is finding a way to both manage their data and ensure that it is readily available across a protected cloud environment. To address modern business challenges, you need a management strategy that takes a comprehensive approach to data – from backup and recovery, to protection and security, and all […]

More
Law Firm Security Programs and the Digital Lawyer in 2019

Law Firm Security Programs and the Digital Lawyer in 2019

Published: Jun 7, 2019   |   Author: Gabe Damiani   |   Category: Blog   |   No Comments

Companies are moving email, documents and client data to the cloud at an increasing rate, and law firms have to work harder than ever to mitigate cybersecurity threats.  A firm’s security program needs to meet a wide range of capabilities: a modern enterprise security perimeter, good data hygiene, cloud-first identity management capability, micro-segmentation, robust monitoring […]

More
Understanding Microsoft’s Enterprise Mobility + Security

Understanding Microsoft’s Enterprise Mobility + Security

Published: May 17, 2019   |   Author: Calen Bedford   |   Category: Blog   |   No Comments

As cyberthreats grow more sophisticated, on-premise solutions cannot effectively protect sensitive data. Enterprise Mobility + Security (EMS) provides one control panel in the cloud for identity management, device management, information protection and secure access to apps and resources. You don’t have to trade mobile flexibility for enterprise security — a mentality of adoption, adaptation and […]

More
Understanding Office 365 Security & Compliance Permissions

Understanding Office 365 Security & Compliance Permissions

Published: May 10, 2019   |   Author: iVision   |   Category: Blog   |   No Comments

The Security & Compliance Center (SCC) is the heart of alerting and reporting within your O365 organization. Understanding its functionality and the various roles integrated within the suite of features is necessary for maximum impact to your organization. New features and functions are added to the SCC regularly, so staying informed through various whitepapers and […]

More
3 Steps to Creating a Successful Workplace Wellness Program

3 Steps to Creating a Successful Workplace Wellness Program

Published: May 1, 2019   |   Author: Kaedy Martin   |   Category: Blog   |   One Comment

One of my passions is being able to create an environment for our employees that enriches their emotional, social, intellectual and physical wellness. According to Anthony Robbins, “The higher your energy level, the more efficient your body. The more efficient your body, the better you feel, and the more you will use your talent to produce […]

More
Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Requirements for a Successful SD-WAN Deployment Part 1: Business Critical Applications

Published: May 1, 2019   |   Author: Brett Boss   |   Category: Blog   |   No Comments

There are four pillars of a successful SD-WAN deployment that need to be clearly understood at the beginning of a project: Business critical applications, their requirements and dependencies Security requirements Site connectivity and the relative priority of each location Circuit cost and availability To fully understand each of these, we’ll break them them down into […]

More
Keep Your IT Environment Safe: 7 Risks To Know

Keep Your IT Environment Safe: 7 Risks To Know

Published: Apr 19, 2019   |   Author: Don Carangelo   |   Category: Blog   |   No Comments

When it comes to IT, is your bench deep enough to cover all your bases? Many businesses today don’t realize the capacity at which they are reliant on IT. As a result end up understaffing, underfunding and improperly managing their IT teams, which can create a significant risk. In other words, having a bench that […]

More