CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (302)
    • Data Center (322)
    • Digital Workspace (460)
    • Networking (259)
    • Security (307)
    • Software (320)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Security

As any thorough security assessment can tell you, every infrastructure is vulnerable to cyberthreats. In the face of growing phishing and ransomware attacks, IT leaders must look to advanced anti-malware protection and cloud security measures to guard sensitive corporate data. Next-generation firewalls — many of which feature built-in intrusion prevention system (IPS) technology — allow organizations to analyze network traffic and detect and block vulnerability exploits. Identity and access management (IAM) products and single sign-on (SSO) technology can then go beyond traditional password security to centralize authentication and authorization. Hear from CDW cybersecurity experts as they discuss these protections and others, and explore the benefits of a holistic security approach.

Learn More   


How the Internet of Things Is Like Monopoly

To keep smart technology initiatives moving, governments and organizations must focus on security.

By Kathryn Averyheart
|
October 21, 2020
Security

Players use a variety of strategies in Monopoly. If you are familiar with the game, you know you must achieve a monopoly before you can build, and you need four houses before you can add a hotel. My preferred strategy is to establish an infrastructure before I start building houses. I try to buy railroads and utilities, as well as the less expensive properties on the board.

In this way, Monopoly mirrors the Internet of Things. As localities try to implement IoT technologies for smart cities initiatives, they need an infrastructure that includes networking, storage and processing to handle the data that will be collected, stored, transmitted and analyzed. And starting with smaller, less expensive projects can help them establish a record of success before they move on to bigger things.

Everyone has a preferred method when playing Monopoly. Some people save up and get Park Place and Boardwalk — others prefer to acquire the railroads and utilities. Whatever your way to play, the reality is that it can all go to pot if you land on the wrong space.

Read More   

How to Drive M&A Value Using Tech Tools

Don’t let IT integration become a sticking point in your mergers and acquisitions ― these tools will help.

By Rocky Standifer  and John Whitenack
|
October 19, 2020
Software, Cloud, Data Center, Security

Technology is more important than ever to the merger and acquisition (M&A) process. For many firms, IT is a top driver of deals, but it can also be a sticking point.

In its “Corporate M&A Report 2020,” Bain warns of the challenges posed by IT integration: “In a tech-enabled world, deal scrutiny is expanding to include issues such as data ownership and access to critical technology, often prompted by national interests, as well as the impact on future competition. The time, complexity and the resources to get deals over the regulatory hurdle are rising — it will take longer than you think and cost more than you expect.”

It’s essential for organizations to prepare for the integration process and enter it with their eyes open. These four types of technology tools can help to streamline IT integration.

Read More   

Improving Business Operations Through Impact Assessments

Prioritizing risks helps organizations address their most important concerns first.

By Abigail Edgell
|
October 16, 2020
Security, Services

A large organization I work with recently experienced a serious cybersecurity incident. Ransomware had struck the business, crippling its technology systems and causing an outage that lasted more than 300 hours. This type of outage would have a devastating impact for any organization, but this company felt the pain acutely because it is a Software as a Service provider. The ransomware took down its SaaS offerings which, in turn, affected the critical business operations of hundreds of its customers.

After the dust settled, the company’s CISO contacted CDW to ask how we could help him better mitigate and respond to disasters in the future. He knew that deficiencies existed in the company’s technology architecture. He also understood that correcting the deficient technologies would not be enough. They needed assistance identifying gaps in their program in addition to understanding the impact of losing their SaaS offerings. The firm was determined to avoid the financial and reputational damage of another serious outage.

Read More   

Moving to Modern Device Management

For many organizations operating in today’s highly distributed business world, cloud-based device management is now a must.

By Mehboob Ahmad
|
October 14, 2020
Cloud, Security, Services

Savvy IT shops have long understood the need for effective device management, first through mobile device management (MDM) solutions and then via unified endpoint management (UEM) platforms.

Today, more organizations are opting for “modern device management,” a Microsoft-coined term that describes device and application management delivered via cloud-enabled services. Here’s why organizations are making the move and why this model is likely to stick around.

Read More   

3 Ways to Support Public Health with Enhanced Video Surveillance

Organizations can modify existing solutions to enable safe back-to-work and back-to-school activities.

By Matt Tourney
|
October 12, 2020
Security, Software

Enhanced video surveillance (EVS) has been a game changer for physical security. Now, as businesses and organizations strive to resume operations while supporting public health, many are deploying these systems for new purposes: thermal screening, occupancy management and social distance monitoring.

The heart of EVS is video analytics, either built into cameras or integrated into the back-end video management system. Video analytics run continuously in the background to interpret video content and provide real-time alerts. This is a much more efficient way to make use of video capabilities than by assigning employees to constantly monitor a live video feed or conduct after-the-fact forensics in the wake of an incident. Real-time situational awareness lets organizations respond to threats faster and more effectively.

Now, EVS is proving its worth in response to the COVID-19 pandemic. Healthcare facilities, educational institutions, manufacturing and distribution centers, transportation providers and retailers are among those deploying these tools so they can continue to provide essential services. Here are three ways organizations can utilize EVS to operate more safely.

Read More   

How Penetration Tests Discover Your Hidden Vulnerabilities

Having our experts conduct attacks on your defenses can uncover gaps that have been overlooked.

By Will Frye
|
October 2, 2020
Security, Services

Recently, I had the opportunity to help a CDW client in the legal industry assess the current state of its cybersecurity program. The firm had a good grasp on cybersecurity issues and, in fact, had many effective cybersecurity controls in place. I’d definitely consider the firm far along the cybersecurity maturity model.

Like many organizations with mature cybersecurity programs, the firm wanted to get an outside assessment of its controls to uncover any gaps its security personnel might have overlooked internally. We spent a few days conducting a penetration test to provide the firm with an attacker’s view of its network.

Read More   
  • ‹ Previous
  • 1
  • 2
  • 3
  • 4 (current)
  • 5
  • 6
  • 7
  • 8
  • Next ›
  • Last »
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved