CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (308)
    • Data Center (330)
    • Digital Workspace (470)
    • Networking (263)
    • Security (318)
    • Software (327)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

4 Security Trends to Watch in a Post-Pandemic World

These technologies can help your organization protect data in a computing landscape that has shifted massively over the past year.

By Michael Lane
|
February 22, 2021
Security

The COVID-19 pandemic suddenly transformed the way that we all work. Businesses around the world found themselves rapidly shifting to a remote work environment that required agile reconfiguration of systems and shifts in security policy. Cybersecurity teams scrambled to protect the confidentiality, integrity and availability of the data entrusted to their care while accommodating unprecedented remote work requirements.

Now that organizations have settled into these new work routines, it’s time to take a look at how these changes will shape future trends in the way that we work and how security teams can build controls that both facilitate remote work and foster a defense-in-depth approach to cybersecurity.

Let’s look at four major cybersecurity trends that will endure beyond the pandemic.

Read More   

3 Reasons to Consider Next-Generation Endpoint Protection

NGEP solutions help organizations defend against malware and other cyberthreats.

By Michael Sorokin
|
December 2, 2020
Security

Even before the coronavirus pandemic, mobile devices and cloud computing were changing the landscape of IT. In the “new normal,” with widespread remote work and distributed IT environments, CISOs and other technology leaders are more interested than ever in next-generation endpoint protection solutions. IT leaders who haven’t already deployed NGEP technology are hearing about it from their peers and are eager to put solutions in place. Those who have already made investments in NGEP platforms want to make sure that they’re getting the most value out of their investments.

These are reasonable concerns, because the threats facing endpoints continue to grow. Many organizations first deploy NGEP solutions only after experiencing a serious security incident that originates on an endpoint, while others want to do everything they can to avoid that fate. CDW recently published a white paper that delves deeply into this technology. Let’s take a look at the main themes from that white paper: three reasons that organizations are considering the use of this technology.

Read More   

6 Essential Security Considerations for the ‘New Normal’

As remote work becomes the norm, these practices can help organizations overcome new challenges.

By Mikela Lea
|
June 30, 2020
Security, Services

Recent events turned our working lives upside down. With very little notice, millions of people around the world were sent home from their offices to suddenly adopt a remote work lifestyle. Four months into this adventure, most knowledge workers have adapted to working styles that replace conference rooms with video meetings and coffee chats with virtual happy hours.

I believe that we’ve arrived at a new normal where remote work will become a standard arrangement for knowledge workers. Both companies and employees will benefit from this approach. While employees can better balance their lives, companies will be able to reduce overhead expenses by consolidating and eliminating expensive physical offices. This work style comes with new cybersecurity considerations, and I urge organizations to adopt six key practices to adapt to our new working patterns.

Read More   

Safety First: Remote Work Security Solutions

The shift to remote work raised the bar for organizations when it comes to maintaining information security.

By Ziyad Roumaya
|
June 23, 2020
Security, Cloud, Digital Workspace, Networking

As organizations across the country have moved to remote work models, many have reported an increase in cyberattacks. Cybercriminals, it seems, are taking advantage of the public health crisis to exploit security vulnerabilities in home-based computer systems. What can organizations do to minimize the chances that their shift to remote work results in an expensive breach? We recommend a multipronged approach that combines the use of security tools and end-user education.

Read More   

Remote Security Solutions for Small Organizations

With many staff now working from home, it is a good time to reconsider how to best protect your organization’s users and data.

By Drew Shumate
|
June 16, 2020
Security, Cloud, Services, Software

The global pandemic and social distancing measures have redefined the office for many people. Industries that never would have considered allowing their office employees to work from home were forced to rethink decades of business as usual.

This change has also brought new technology needs. Since these businesses had built technology infrastructures that relied on traditional network and application architecture, a shift had to occur. Suddenly, IT departments were dealing with overloaded VPNs or having to deploy a VPN that they never had to maintain before. Compound that with the fact that users are now accessing company resources from networks or assets that corporate IT has no control over, that most home routers are still vulnerable to exploitation and that, in many cases, the network gates were flung open in the name of productivity ― it’s enough to give any CISO an ulcer.

So how can companies mitigate these risks? Now that everyone is settling into a routine and we’re adjusting to this “new normal,” it’s an ideal time to reach out to your users and talk about security.

Read More   

Improve Your Security Capabilities with Microsoft

Learn about Microsoft’s security features and resources.

By Ben Moore
|
June 2, 2020
Security, Services, Software

Is Microsoft a security company? The idea has been on my mind for a while. I think back to the days of my early Microsoft experiences. For me, that would be Windows 3.1 and DOS 5.0 up to DOS 6.22. It was the base of my conquest for co-sysop on a few dial-up BBSs (bulletin boards), getting really good download ratios, and finding all the sweet “warez”. I was also digging through every inch of my computer. Today, in my role as a Microsoft 365 pre-sales architect, I give even more thought to the security aspects of Microsoft’s environment.

Read More   
  • 1 (current)
  • 2
  • 3
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

How to Enable Remote Work for a Contact Center

Cloud | Digital Workspace

Avaya Cloud Office Serves Up Collaboration Solutions

Cloud | Digital Workspace

How Cisco Webex Interop Connects with Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved