CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (302)
    • Data Center (322)
    • Digital Workspace (460)
    • Networking (259)
    • Security (307)
    • Software (320)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

4 Steps to Build a Unified Next-Generation Firewall Strategy

Effective deployment of next-generation firewall solutions enables organizations to better protect both on-premises and cloud assets.

By Frank Oskorep
|
November 11, 2020
Security, Cloud, Data Center, Networking

Next-generation firewalls (NGFWs) play a crucial role in protecting organizations against emerging threats. These advanced network security guardians can scour inbound and outbound traffic on the network edge and in the data center for signs of intrusions and malicious activity, blocking potentially dangerous data before it reaches its destination. Many organizations have deployed NGFW technology as an integral component in their cybersecurity programs.

At the same time, organizations are fine-tuning their cloud strategies. Whether they’re adopting an all-in, cloud-first strategy or selectively using cloud services as part of a hybrid offering, the reality is that sensitive business data now resides both in our own data centers and in those run by cloud partners. Cybersecurity and networking teams must be able to defend that information from attack everywhere that it resides, or attackers will seek out the weak points in an organization’s cybersecurity architecture.

Cybersecurity leaders should integrate their NGFW and cloud computing strategies to better protect organizational assets. The best way to do this is to consolidate on a single NGFW platform and use it across both cloud and on-premises network systems. NGFW vendors offer virtual appliances and software subscription models that allow for easy cloud deployment, anticipating this approach. Let’s take a look at four drivers for this consolidation.

Read More   

Protect Your Infrastructure with CDW’s Amplified Security Services

A customized security plan can help organizations deal with their most pressing needs.

By Daniel Ji
|
September 15, 2020
Security

The most exciting part of my job occurs when I have the opportunity to visit with a new client organization and help its leaders assess their security infrastructure and remediate any vulnerabilities. I enjoy being able to examine the current state of their cybersecurity programs and help them redesign elements to better address the modern threat environment.

Recently, I had the opportunity to engage in this type of work with one of CDW’s customers — the government of a midsized county. As we worked through the assessment, we identified two core issues that required immediate attention. First, the county’s network firewall platform was quite outdated, running technology that was over a decade old. The devices still functioned, but they were designed to protect against the threats of 10 years ago, not today’s advanced persistent threats. Our first core recommendation was that the county replace this aging firewall infrastructure with a modern next-generation firewall (NGFW) designed to stymie today’s attackers.

We also realized that the core of the county’s network lacked essential security controls. If someone gained physical access to the building and connected any device to the network, the attacker would have open access to all types of resources. There was no internal access control restricting the devices that could connect to the network and limiting the authorization of those devices based on the identity of the user. The county urgently needed a network access control (NAC) solution to address these risks and protect its network.

Read More   

5 Tips for Enhancing Election Security

Secure systems are essential to maintaining the integrity of our votes.

By Michael Lane
|
May 20, 2020
Security, Networking, Software

The election infrastructure in the U.S. depends on the coordinated, secure interaction of thousands of state and local election officials using very different technologies. These range from large cities with fully electronic voting systems to small municipalities that still rely on paper ballots. As I work with officials from these diverse election authorities, I’ve developed a set of best practices that will enhance security in any election environment. Let’s take a look at five key measures that every Board of Elections should put in place.

Read More   

How to Choose the Right SD-WAN Solution

Before making a decision, consider your organization’s business and technical requirements.

By Robert Herriage
|
April 23, 2020
Networking, Software

A common misconception about software-defined wide area networking (SD-WAN) is that all solutions are essentially the same. Choose your vendor, the thinking goes, and you’ll save countless dollars every year thanks to the efficiencies of centralized management. The truth is a little more complicated.

Read More   

4 Ways Cisco SD-Access Improves Network Management and Security

By simplifying network automation, Software-Defined Access delivers useful capabilities such as segmentation and intent-based policy implementation.

By CDW Expert  and Robert Herriage
|
November 25, 2019
Networking, Security, Services

Many organizations have embraced software-defined innovations such as the software-defined data center and the software-defined WAN, taking advantage of programmability and automation to simplify the management of their networks and other data center resources. What’s been missing, until recently, was a way to achieve the same benefits at the access layer of the network.

Read More   

3 Steps to Get Started with Network Segmentation

These best practices can simplify your efforts to protect critical information resources.

By Lynn Mackie
|
October 31, 2018
Networking, Security

From security conferences to post-breach remediation documents, network segmentation is the most highly mentioned security topic since next-generation anti-virus software. That’s for good reason. Many recent high-profile security breaches might have been prevented had the victim employed network segmentation to limit the reach of attackers once they established an initial foothold on the network. However, many organizations…

Read More   
  • 1 (current)
  • 2
  • 3
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace | Services | Software

How to Switch Collaboration Vendors

Cloud | Data Center | Digital Workspace

The Business Benefits of File Modernization

Data Center | Digital Workspace

Overcoming Data Lifecycle Management Hurdles

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved