CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (303)
    • Data Center (322)
    • Digital Workspace (461)
    • Networking (261)
    • Security (309)
    • Software (320)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Security

As any thorough security assessment can tell you, every infrastructure is vulnerable to cyberthreats. In the face of growing phishing and ransomware attacks, IT leaders must look to advanced anti-malware protection and cloud security measures to guard sensitive corporate data. Next-generation firewalls — many of which feature built-in intrusion prevention system (IPS) technology — allow organizations to analyze network traffic and detect and block vulnerability exploits. Identity and access management (IAM) products and single sign-on (SSO) technology can then go beyond traditional password security to centralize authentication and authorization. Hear from CDW cybersecurity experts as they discuss these protections and others, and explore the benefits of a holistic security approach.

Learn More   


Build Resilience into Your Cybersecurity Program

These steps will help organizations prepare for just about anything.

By Jeff Jensen
|
December 4, 2020
Security, Data Center, Services

The CIO of a large financial services firm recently approached me for assistance in building out her company’s cyber-resilience strategy. Specifically, she knew that the firm was going to need to add an additional data center over the next year to meet growing demand, and she wanted to use that expansion as an opportunity to enhance the firm’s business continuity program. CDW provided the company with some practical advice to help draw this additional benefit from its investment.

While we were helping a very large organization expand an existing global footprint, the advice we shared is relevant across firms of all sizes. Let’s take a look at a few ways that all organizations can enhance cyber resilience.

Read More   

3 Reasons to Consider Next-Generation Endpoint Protection

NGEP solutions help organizations defend against malware and other cyberthreats.

By Michael Sorokin
|
December 2, 2020
Security

Even before the coronavirus pandemic, mobile devices and cloud computing were changing the landscape of IT. In the “new normal,” with widespread remote work and distributed IT environments, CISOs and other technology leaders are more interested than ever in next-generation endpoint protection solutions. IT leaders who haven’t already deployed NGEP technology are hearing about it from their peers and are eager to put solutions in place. Those who have already made investments in NGEP platforms want to make sure that they’re getting the most value out of their investments.

These are reasonable concerns, because the threats facing endpoints continue to grow. Many organizations first deploy NGEP solutions only after experiencing a serious security incident that originates on an endpoint, while others want to do everything they can to avoid that fate. CDW recently published a white paper that delves deeply into this technology. Let’s take a look at the main themes from that white paper: three reasons that organizations are considering the use of this technology.

Read More   

Boost Your Workforce’s Productivity and Security with a UEM Solution

Rethinking your approach to remote access? Unified endpoint management is a win-win for employees and organizations.

By Remy Morgan
|
November 30, 2020
Security, Digital Workspace

The massive move to remote work due to the coronavirus pandemic has undoubtedly posed challenges, but it’s also created a valuable opportunity. Remote work shines a spotlight on the employee experience and on IT security, and many organizations have realized that simply moving employees to home offices doesn’t sufficiently address either concern.

Instead, organizations are rethinking the technologies they use to support their teams, which may be quite different when those teams aren’t onsite. Enter unified endpoint management (UEM), designed to address the situation in which so many of us now find ourselves: making it both seamless and secure to work on any device and any network.

Read More   

Common Threats Uncovered During CDW Security Assessments

Mitigating these risks can help you significantly improve your organization’s cybersecurity posture.

By Mikela Lea
|
November 19, 2020
Security, Services

As part of CDW’s cybersecurity team, I often have the opportunity to visit with our customers and help them identify gaps in their security programs. CDW offers a variety of security assessments that help organizations shore up their cybersecurity weaknesses.

I’ve performed dozens of these assessments, which provides me with a unique vantage point on the state of cybersecurity across different industries and organizations of various sizes. With that perspective, I’ve seen four common threats that continue to pose significant risk to cybersecurity programs.

Read More   

3 Key Challenges for the Evolving Internet of Things

IoT is diverse, data-rich and full of potential. Here’s what to look for in the next phase of its maturation.

By Mike Krummrey
|
November 18, 2020
Services, Digital Workspace, Networking, Security

Use cases for the Internet of Things have diversified quickly, but most applications are designed to achieve one (or more) of the following objectives: obtaining data for data-driven business decisions; having the capability to remotely control and monitor assets, such as digital signage or city lighting; and automating operations, such as a manufacturing production line.

Traditionally, the network infrastructure that supports business is focused on indoor switches, routers and access points. With the IoT revolution, often that’s the initial plumbing required to connect sensors, physical machines and wireless devices to the network. In recent years, companies have begun to expand the enterprise infrastructure and reach outside of the four walls of the business, leveraging IoT technology to work in new spaces that were previously unconnected — for example, with switches and routers hardened for outdoor environments connecting mobile devices back to business applications. Whether it’s controlling, monitoring or automation that’s needed, we’re no longer limited by building boundaries.

Advancing IoT yet again brings up three major challenges, and that’s where we’ll see a new wave of technological evolution.

Read More   

Bringing AWS Into Your Disaster Recovery Planning

Partnering the cloud vendor with CloudEndure might be the right fit for your DR needs.

By Gary Gauthier  and Costa Thomas
|
November 17, 2020
Services, Cloud, Security

Almost every customer that we talk to wants a disaster recovery (DR) strategy. Many organizations will push their backup and recovery solutions to the brink but never really achieve the ability to run applications in production in the event of a disaster. This is likely because of cost and complexity.

Traditional colocation facilities or secondary data center locations in an active-active setup tend to have high costs by way of traditional data center expenses. Why build two data centers when you only need one?

Using traditional independent software vendor (ISV) solutions coupled with a handful of native cloud tools can keep costs low. But this arrangement requires cloud skillsets that most customers do not have in-house. For many customers, this means their Recovery Time Objective (RTO) is at risk.

Read More   
  • ‹ Previous
  • 1
  • 2 (current)
  • 3
  • 4
  • 5
  • 6
  • Next ›
  • Last »
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved