CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (327)
    • Data Center (338)
    • Digital Workspace (481)
    • Networking (271)
    • Security (335)
    • Software (342)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

The 6 Core Components of a Zero-Trust Network Architecture

These factors can help organizations build a long-term plan for cybersecurity.

By Kent Johnson
|
March 11, 2021
Security, Networking

COVID-19 and the ensuing lockdowns altered the course of history. Children looked to their parents to provide advice on how to persevere in trying times. I told my children that something good can come from something bad. The same is true when it comes to security. The dramatic shift to a remote workforce was effectively leveraged by many organizations to enhance their security posture.

We recently received a call from the CISO of a large organization, who asked for CDW’s help. He explained that one of his organization’s competitors had experienced a significant security breach that shut down its operations for several days. An employee in an administrative office had clicked a link on a malicious email that opened the door for a devastating ransomware outbreak.

Read More   

Choosing Your Next Data Center Fabric: Cisco’s ACI or EVPN, Part 3

Key differentiators between Cisco’s fabric options, Application Centric Infrastructure and Ethernet VPN.

By Craig Weinhold
|
March 2, 2021
Data Center, Digital Workspace, Networking, Security

Cisco customers have a choice between Application Centric Infrastructure (ACI) and Ethernet VPN (EVPN) for building their data center network fabrics. Since these technologies are thought to be interchangeable, the choice often falls to cultural, political or other “Layer 8” decision-making. But the fabric technologies are, in fact, different in ways both subtle and significant, and one’s choice has a profound impact on fabric orchestration, operations, and staffing.

I hope you’ll join me all the way through this three-part blog series as I compare and contrast these technologies and provide a foundation for deciding on the best choice for your organization’s needs.

Read More   

A Security Plan for Multicloud Environments

Getting started with managing policies and practices of multiple cloud providers.

By Sarah Kent
|
February 25, 2021
Security, Cloud

It can be frustrating when you ask if an IT system is safe, and your expert resource responds, “It depends,” followed by a quip that the only secure system is one that’s powered off. Not so helpful.

Most IT teams are proficient in working with one cloud service provider (CSP) or on one facet of cloud computing, but increasingly, they are being asked to manage multiple cloud environments. The shift is substantial, especially because when it comes to security, the devil is in the details.

We know that risks are involved with multicloud Infrastructure as a Service implementations. It’s critical to know what they are and how to manage them. Let’s start by examining how we got here, and why there’s no turning back now.

Read More   

The Business Benefits of File Modernization

By moving away from on-premises data file servers and into the cloud, companies can support remote workers, cut costs and boost security.

By Britt Cluff  and Brandon Pierce
|
December 28, 2020
Cloud, Data Center, Digital Workspace

Moving away from legacy file servers is on the agenda for many organizations right now. It’s understandable that many companies are still using these on-premises systems. File servers are old standbys, and most organizations have never had a pressing reason to modernize the way they store and manage their files.

However, the remote work boom stemming from the global pandemic has quickly changed this calculus. Companies’ VPN connections have been overloaded with employees trying to access huge amounts of data from home, and many business and IT leaders are searching for a new solution.

At CDW, we’ve begun offering file modernization workshops to help with this process. We’re able to assist companies with assessments of their existing data environments, helping them to define their goals and develop a plan to transfer files to cloud-based tools such as Microsoft SharePoint, OneDrive, Teams and Azure.

Here are four key benefits of file modernization.

Read More   

3 Key Challenges for the Evolving Internet of Things

IoT is diverse, data-rich and full of potential. Here’s what to look for in the next phase of its maturation.

By Mike Krummrey
|
November 18, 2020
Services, Digital Workspace, Networking, Security

Use cases for the Internet of Things have diversified quickly, but most applications are designed to achieve one (or more) of the following objectives: obtaining data for data-driven business decisions; having the capability to remotely control and monitor assets, such as digital signage or city lighting; and automating operations, such as a manufacturing production line.

Traditionally, the network infrastructure that supports business is focused on indoor switches, routers and access points. With the IoT revolution, often that’s the initial plumbing required to connect sensors, physical machines and wireless devices to the network. In recent years, companies have begun to expand the enterprise infrastructure and reach outside of the four walls of the business, leveraging IoT technology to work in new spaces that were previously unconnected — for example, with switches and routers hardened for outdoor environments connecting mobile devices back to business applications. Whether it’s controlling, monitoring or automation that’s needed, we’re no longer limited by building boundaries.

Advancing IoT yet again brings up three major challenges, and that’s where we’ll see a new wave of technological evolution.

Read More   

Where Blockchain Meets the Internet of Things

Secure digital ledgers provide a layer of protection for IoT devices and the data they generate.

By Chris Pride
|
August 14, 2020
Security

The Internet of Things holds incredible promise, from the cost savings afforded by facilities management sensors to the data-rich insights organizations can glean from connected devices. Even better, we’ve barely scratched the surface of what a mature, sophisticated IoT landscape will eventually look like.

But these advances often come with a risk — for now, anyway. Security has been a significant challenge for IoT devices, and we’ve already seen plenty of unfortunate cases where hackers have used connected devices to gain unauthorized network access.

Consider a food manufacturing environment, where a connected thermometer monitors temperatures in pipes or storage containers and communicates with the Wi-Fi network so it can send that data to a database. If the device is not properly secured, a hacker could interrogate the thermometer to discover credentials that enable access to the network, or even to upload instructions that would leverage the thermometer to deliver a virus.

Organizations could use blockchain to close these vulnerabilities, adding a layer of security to make IoT devices less susceptible to exploitation.

Read More   
  • 1 (current)
  • 2
  • 3
  • 4
Most Popular
Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Networking

Cisco Webex Edge Audio for the Cisco Unified Border Element

Digital Workspace | Services

Need Webex Calling and Contact Center Support? Use CDW Managed Collaboration Anywhere Services

Digital Workspace | Software

3 Benefits of Synthetic Testing for Collaboration Technologies

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved