CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (318)
    • Data Center (335)
    • Digital Workspace (477)
    • Networking (267)
    • Security (326)
    • Software (337)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Improving Your Cybersecurity Strategy with Automated SecOps

Automation platforms such as ServiceNow streamline security operations in ways that drive visibility and efficiency.

By Dean Johnson
|
March 31, 2021
Security, Services

Automating security operations, or SecOps, is one of the most powerful strategies organizations can employ to protect themselves and their data. All too often, however, they don’t leverage it as well as they could.

Security automation pulls together data from disparate systems to make information more visible and actionable. For example, a solution may not only alert IT teams to a critical vulnerability on enterprise devices but also initiate remediation. It could spot a vulnerability that can be solved with a specific patch, so staff members can determine the best way to solve the problem.

Here are a few of the ways organizations are putting SecOps to work, delivering greater efficiencies and peace of mind to their IT teams.

Read More   

5 Tips for Uncovering and Remediating Malicious Activity

International experts have provided valuable guidance for responding to cyberattacks.

By Victor Marchetto
|
March 30, 2021
Security

Late last year, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued a new guidance document for cybersecurity incident response: Technical Approaches to Uncovering and Remediating Malicious Activity. This marked a major moment in cybersecurity guidance because it wasn’t just the work of CISA’s U.S. authors. It was a joint effort that represents the consensus guidance of cybersecurity experts from the governments of Australia, Canada, New Zealand, the United Kingdom and the United States.

As organizations struggle to combat the steadily increasing risk posed by ransomware, business email compromise and other threats, this international consensus provides important guidance on the best ways to prepare for, detect and respond to malicious cyberattacks, and how to avoid common pitfalls. Let’s take a look at five key takeaways from the guidance.

Read More   

Extend Your Cybersecurity Defenses with XDR

These solutions supplement endpoint security measures to better identify suspicious activity.

By Pavel Trinos
|
March 29, 2021
Security

Cybersecurity teams often find themselves faced with the unenviable challenge of trying to anticipate the next attack they’ll face. Rising to this challenge requires deep visibility into the activity of the many users and devices that operate on enterprise networks, which enables security teams to look for signs of unusual activity. Teams that react quicky with automated responses have the greatest chance to nip malicious activity in the bud, protecting their information and systems.

Endpoint protection has evolved in recent years to meet these increased demands. Cybersecurity teams shifted away from traditional anti-malware tools to next-generation endpoint detection and response solutions that provide deep insight into desktops, laptops and mobile devices. While EDR technology marked a significant advance, IT security professionals still have an overarching need: the ability to see the big picture.

Extended detection and response solutions, or XDR, promise to fill this gap, supplementing EDR’s device-centric capabilities with the ability to observe network traffic, peer into cloud services and comb through the activity logs generated by other security solutions. Acting on this knowledge, XDR platforms are able to alert administrators to suspicious activity and trigger situation-specific automated responses.

Read More   

5 Important Deployment Models for Zero-Trust Architecture

Guidance from NIST can help organizations better implement this bedrock approach to security.

By John Dzurick
|
March 22, 2021
Data Center, Security

Cybersecurity philosophies have changed significantly over time to adapt to the changing needs of the organizations they serve. In the early days of cybersecurity, we focused on building boundaries between the “inside” and the “outside.” Users and devices that we trusted were placed inside network perimeters and granted largely unfettered access to systems and data within that environment. Those on the outside were untrusted and blocked from accessing sensitive resources. While that approach served us well for decades, it fails to meet the needs of increasingly mobile and cloud-focused organizations as well as increasingly sophisticated and covert threats and malware. The evolution of the perimeter of the network has made it difficult to draw lines between “inside” and “outside” effectively.

Zero-trust architecture (ZTA) represents a philosophical shift in cybersecurity planning that seeks to address this limitation by making trust decisions based on the identity of a user or device, rather than the location.

Read More   

The 6 Core Components of a Zero-Trust Network Architecture

These factors can help organizations build a long-term plan for cybersecurity.

By Kent Johnson
|
March 11, 2021
Security, Networking

COVID-19 and the ensuing lockdowns altered the course of history. Children looked to their parents to provide advice on how to persevere in trying times. I told my children that something good can come from something bad. The same is true when it comes to security. The dramatic shift to a remote workforce was effectively leveraged by many organizations to enhance their security posture.

We recently received a call from the CISO of a large organization, who asked for CDW’s help. He explained that one of his organization’s competitors had experienced a significant security breach that shut down its operations for several days. An employee in an administrative office had clicked a link on a malicious email that opened the door for a devastating ransomware outbreak.

Read More   

4 Security Trends to Watch in a Post-Pandemic World

These technologies can help your organization protect data in a computing landscape that has shifted massively over the past year.

By Michael Lane
|
February 22, 2021
Security

The COVID-19 pandemic suddenly transformed the way that we all work. Businesses around the world found themselves rapidly shifting to a remote work environment that required agile reconfiguration of systems and shifts in security policy. Cybersecurity teams scrambled to protect the confidentiality, integrity and availability of the data entrusted to their care while accommodating unprecedented remote work requirements.

Now that organizations have settled into these new work routines, it’s time to take a look at how these changes will shape future trends in the way that we work and how security teams can build controls that both facilitate remote work and foster a defense-in-depth approach to cybersecurity.

Let’s look at four major cybersecurity trends that will endure beyond the pandemic.

Read More   
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • Next ›
  • Last »
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Security

Android™ Enterprise Essentials Simplifies Mobile Security for Small and Medium Businesses (SMBs)

Digital Workspace | Services

Why Adoption Services Are More Important Than Ever

Digital Workspace | Services

Need Webex Calling and Contact Center Support? Use CDW Managed Collaboration Anywhere Services

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved