CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (308)
    • Data Center (329)
    • Digital Workspace (469)
    • Networking (262)
    • Security (317)
    • Software (327)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Overcoming the Cybersecurity Skills Gap with Automation

Employing solutions that rely on artificial intelligence to complete repetitive tasks can reduce the burden on IT and security staff.

By Joey Barrett  and Jeff Ridgeley
|
February 16, 2021
Security, Digital Workspace

Let‘s face it: Cybersecurity teams are overwhelmed with work. There simply is not enough time in the day to perform all the high-value tasks they are responsible for, such as consulting with project teams, conducting risk analyses and developing strategic security plans. To make matters worse, security teams often find themselves consumed with time-sensitive and repetitive operational work. Anything they can do to reduce this burden increases their ability to add value to the organization.

Automation has the potential to help with this heavy lifting. Any time security teams find themselves performing work that requires following a repetitive process, it is likely that automation can play an important role in reducing the operational burden. In our work with CDW customers, we have found a few common areas where automation can help increase the efficiency and effectiveness of cybersecurity teams. Let’s look at a few examples.

Read More   

CSPM Tools: A Must-Have for Ensuring Multicloud Security

Cloud security posture management makes it easy to find and fix misconfigurations that can lead to breaches.

By Diyana Mendoza-Price
|
January 22, 2021
Security, Cloud

When organizations first deploy a cloud security posture management tool, it’s often the first time IT staff members are seeing their cloud environment from a security perspective. When they learn that a certain port was unintentionally open, or that a misconfiguration has left data unprotected, one of the most common reactions I hear is, “I didn’t know that!”

That’s not a position anyone wants to be in with their cloud environments. Yet it happens frequently, especially as more organizations engage multiple cloud service providers. Luckily, CSPM tools provide the centralized visibility that IT staffers need to keep cloud environments secure. They can run automated audits to check configurations against security and compliance rule sets, identify critical vulnerabilities and even fix them, as directed, via auto-remediation.

The cloud is both powerful and potentially complex, so it’s difficult to perform a comprehensive, continuous check on a cloud environment manually. That’s where CSPM tools come in.

Read More   

3 Key Challenges for the Evolving Internet of Things

IoT is diverse, data-rich and full of potential. Here’s what to look for in the next phase of its maturation.

By Mike Krummrey
|
November 18, 2020
Services, Digital Workspace, Networking, Security

Use cases for the Internet of Things have diversified quickly, but most applications are designed to achieve one (or more) of the following objectives: obtaining data for data-driven business decisions; having the capability to remotely control and monitor assets, such as digital signage or city lighting; and automating operations, such as a manufacturing production line.

Traditionally, the network infrastructure that supports business is focused on indoor switches, routers and access points. With the IoT revolution, often that’s the initial plumbing required to connect sensors, physical machines and wireless devices to the network. In recent years, companies have begun to expand the enterprise infrastructure and reach outside of the four walls of the business, leveraging IoT technology to work in new spaces that were previously unconnected — for example, with switches and routers hardened for outdoor environments connecting mobile devices back to business applications. Whether it’s controlling, monitoring or automation that’s needed, we’re no longer limited by building boundaries.

Advancing IoT yet again brings up three major challenges, and that’s where we’ll see a new wave of technological evolution.

Read More   

Adapting Security and Privacy Compliance for Remote Operations

As organizations modify their data collection and analysis, data management solutions provide control and visibility.

By Joe Starofsky
|
November 9, 2020
Security, Digital Workspace

Education and government organizations are accustomed to strict regulations on data privacy and security. Organizations must stay compliant with regard to how and where they store data; who can access it, how and for what purposes; and how they preserve privacy in data analysis. But this year, leaders in all sectors are taking another look at their data — and, in some cases, deploying master data management solutions — to maintain compliance in remote operations.

One reason for the renewed attention to compliance is that many organizations are collecting new types of data. In schools and colleges, for example, videoconferencing platforms may capture video and audio, along with academic and personal information. Many organizations have managed remote work by expanding their use of cloud computing, which triggers encryption and security protocols for data at rest, in transit and in analysis.

Onsite, organizations are gathering data through technology solutions designed to facilitate safe interactions and maintain social distancing, such as thermal imaging for temperature screenings or video recordings and analytics for occupancy control and contact tracing. All this data must be properly managed and stored.

Read More   

Overcoming Nonprofit Challenges with Device as a Service

DaaS engagements can help nonprofits improve recruitment and retention, stretch their budgets and optimize IT staff.

By Mike Elrod
|
June 10, 2020
Services, Software

Device as a Service (DaaS) initiatives can streamline device environments for organizations in all sectors, but this emerging approach to device deployment and management is an especially good fit for helping nonprofits meet some of their most common challenges.

Here are three challenges that DaaS can help nonprofits to overcome.

Read More   

3 Things a Breach Can Teach You About Ransomware Security

A successful attack can show IT leaders how to improve their security posture.

By Ralph Rye
|
November 19, 2019
Security

Earlier this year, I arrived at the office on a Monday morning to a ringing telephone. One of my longtime customers was on the line, frantic about a security issue. When he arrived at work that morning, he discovered that the Microsoft Exchange server at his midsized company was offline and infected with ransomware. Further…

Read More   
  • 1 (current)
  • 2
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

How to Enable Remote Work for a Contact Center

Cloud | Digital Workspace

Avaya Cloud Office Serves Up Collaboration Solutions

Cloud | Digital Workspace

How Cisco Webex Interop Connects with Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved