CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (318)
    • Data Center (335)
    • Digital Workspace (477)
    • Networking (267)
    • Security (326)
    • Software (337)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Boost Your Workforce’s Productivity and Security with a UEM Solution

Rethinking your approach to remote access? Unified endpoint management is a win-win for employees and organizations.

By Remy Morgan
|
November 30, 2020
Security, Digital Workspace

The massive move to remote work due to the coronavirus pandemic has undoubtedly posed challenges, but it’s also created a valuable opportunity. Remote work shines a spotlight on the employee experience and on IT security, and many organizations have realized that simply moving employees to home offices doesn’t sufficiently address either concern.

Instead, organizations are rethinking the technologies they use to support their teams, which may be quite different when those teams aren’t onsite. Enter unified endpoint management (UEM), designed to address the situation in which so many of us now find ourselves: making it both seamless and secure to work on any device and any network.

Read More   

10 Steps to Securing Your Cloud Environment

Understanding the shared responsibility model is essential to protecting cloud data.

By Pavel Trinos
|
December 20, 2019
Security, Cloud

As a CDW field solution architect, I work with organizations across numerous industries as they grapple with the complexity of securing cloud computing environments. These environments range from full-scale public cloud deployments to internal private clouds, along with varying degrees of hybrid cloud. But whatever the technology, the security issues remain constant. We work with them to protect their data, applications and infrastructure against a wide range of threats.

Here are some key steps that you can take to secure your own cloud computing deployments.

Read More   

Exploring Key Features of Cisco ISE Release 2.6

The latest version of this cybersecurity tool offers unique device identification and an IoT protocol.

By Ben Mason
|
August 20, 2019
Security, Networking

In February 2019, Cisco released version 2.6 of Identity Search Engine (ISE). While this version can be a direct upgrade from ISE releases 2.1 to 2.4, organizations should ensure their ISE is on the latest patch level for its version number before upgrading. First, What Happened to ISE v.2.5? You might have noticed that Cisco…

Read More   

Mobile Security Is at the Heart of Modern Device Design

Smartphone vendors are producing devices with increasingly sophisticated defense features.

By Danny Fayne
|
June 5, 2019
Security, Digital Workspace

Today’s smartphones have security features that were practically science fiction just a few years ago. A user with a new device likely has a phone that encrypts data, continuously updates its operating system to ward off threats and allows users to authenticate their identity with biometric factors such as fingerprint and facial recognition.

This is great for users, and it can also be great for the enterprise. By taking advantage of these baked-in security measures, organizations can direct their own efforts toward other security steps and ensure that their growing mobile environments don’t put their networks and data in harm’s way.

Read More   

Why Voice Authentication May Be a No-Brainer for Banks

Financial institutions can increase productivity and improve security in their customer engagement centers while reducing customer frustration.

By Justin Hester
|
December 11, 2018
Security, Software

When I tell organizational leaders that they can cut the average call time in their customer engagement centers by 10 to 20 seconds, their eyes light up. I can see them doing the mental math, calculating their potential savings by multiplying those shaved seconds across all the calls that their customer service representatives handle every…

Read More   

What to Consider When Implementing a Cisco ISE Solution

These lessons, learned from years of deploying this security tool, can help organizations get the most from its capabilities.

By Paul Haferman
|
April 17, 2018
Security, Digital Workspace

Cisco’s Identity Services Engine (ISE) is a powerful tool for providing cybersecurity and networking teams with visibility into the identity of users accessing their networks. I’ve spent the past few years working with CDW customers deploying ISE in a wide variety of environments. During that time, I’ve learned a few lessons that can help organizations…

Read More   
  • 1 (current)
  • 2
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

Why Adoption Services Are More Important Than Ever

Digital Workspace | Security

Android™ Enterprise Essentials Simplifies Mobile Security for Small and Medium Businesses (SMBs)

Digital Workspace | Security

Overcoming the Cybersecurity Skills Gap with Automation

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved