CDW Solutions Blog
Solutions Blog Insights From Experts Who Get IT
  • Topics
    • Cloud (317)
    • Data Center (335)
    • Digital Workspace (475)
    • Networking (267)
    • Security (326)
    • Software (336)
  • Explore CDW.com
Explore CDW.com

Topics

  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software

Subscribe to Newsletter

Improving Your Cybersecurity Strategy with Automated SecOps

Automation platforms such as ServiceNow streamline security operations in ways that drive visibility and efficiency.

By Dean Johnson
|
March 31, 2021
Security, Services

Automating security operations, or SecOps, is one of the most powerful strategies organizations can employ to protect themselves and their data. All too often, however, they don’t leverage it as well as they could.

Security automation pulls together data from disparate systems to make information more visible and actionable. For example, a solution may not only alert IT teams to a critical vulnerability on enterprise devices but also initiate remediation. It could spot a vulnerability that can be solved with a specific patch, so staff members can determine the best way to solve the problem.

Here are a few of the ways organizations are putting SecOps to work, delivering greater efficiencies and peace of mind to their IT teams.

Read More   

How to Secure Your Remote Work Infrastructure

The rapid shift from in-office to at-home operations has given way to new IT challenges. Here’s how to eliminate security vulnerabilities in a remote work environment.

By Jeff Falcon
|
November 2, 2020
Security, Digital Workspace

At this stage of the pandemic, remote work is nothing new for most of us. But thriving in this environment is still very much a work in progress. As we all acclimate to our home lives and work lives combining, organizations must continue to hone their IT strategies to address new security needs. How can they do this? It’s a question my CDW colleagues and I explored in a virtual roundtable we held called “Securing the New Remote Workforce.”

Let’s dive into a few key security takeaways this panel touched on.

Read More   

Tackling the Microsoft Windows Zerologon Vulnerability

Knowing how to patch this security threat will help keep your Microsoft domain secure.

By Ben Mason
|
October 27, 2020
Security

Zerologon is the name given to a security vulnerability found in Microsoft Windows domain controllers by Secura. It is an unauthenticated privilege escalation vulnerability in the Netlogon Remote Protocol (MS-NRPC). An attacker can leverage this flaw to gain administrative access to a Windows domain.

This vulnerability was assigned CVE number CVE-2020-1472 and rated critical. A Zerologon vulnerability that was patched by Microsoft in August has been making the news lately as proof of concept exploits have started to appear in the wild. In this post, I will discuss in more detail what this vulnerability is and how you can defend against it.

Read More   

How the Internet of Things Is Like Monopoly

To keep smart technology initiatives moving, governments and organizations must focus on security.

By Kathryn Averyheart
|
October 21, 2020
Security

Players use a variety of strategies in Monopoly. If you are familiar with the game, you know you must achieve a monopoly before you can build, and you need four houses before you can add a hotel. My preferred strategy is to establish an infrastructure before I start building houses. I try to buy railroads and utilities, as well as the less expensive properties on the board.

In this way, Monopoly mirrors the Internet of Things. As localities try to implement IoT technologies for smart cities initiatives, they need an infrastructure that includes networking, storage and processing to handle the data that will be collected, stored, transmitted and analyzed. And starting with smaller, less expensive projects can help them establish a record of success before they move on to bigger things.

Everyone has a preferred method when playing Monopoly. Some people save up and get Park Place and Boardwalk — others prefer to acquire the railroads and utilities. Whatever your way to play, the reality is that it can all go to pot if you land on the wrong space.

Read More   

How to Drive M&A Value Using Tech Tools

Don’t let IT integration become a sticking point in your mergers and acquisitions ― these tools will help.

By Rocky Standifer  and John Whitenack
|
October 19, 2020
Software, Cloud, Data Center, Security

Technology is more important than ever to the merger and acquisition (M&A) process. For many firms, IT is a top driver of deals, but it can also be a sticking point.

In its “Corporate M&A Report 2020,” Bain warns of the challenges posed by IT integration: “In a tech-enabled world, deal scrutiny is expanding to include issues such as data ownership and access to critical technology, often prompted by national interests, as well as the impact on future competition. The time, complexity and the resources to get deals over the regulatory hurdle are rising — it will take longer than you think and cost more than you expect.”

It’s essential for organizations to prepare for the integration process and enter it with their eyes open. These four types of technology tools can help to streamline IT integration.

Read More   

Protect Your Infrastructure with CDW’s Amplified Security Services

A customized security plan can help organizations deal with their most pressing needs.

By Daniel Ji
|
September 15, 2020
Security

The most exciting part of my job occurs when I have the opportunity to visit with a new client organization and help its leaders assess their security infrastructure and remediate any vulnerabilities. I enjoy being able to examine the current state of their cybersecurity programs and help them redesign elements to better address the modern threat environment.

Recently, I had the opportunity to engage in this type of work with one of CDW’s customers — the government of a midsized county. As we worked through the assessment, we identified two core issues that required immediate attention. First, the county’s network firewall platform was quite outdated, running technology that was over a decade old. The devices still functioned, but they were designed to protect against the threats of 10 years ago, not today’s advanced persistent threats. Our first core recommendation was that the county replace this aging firewall infrastructure with a modern next-generation firewall (NGFW) designed to stymie today’s attackers.

We also realized that the core of the county’s network lacked essential security controls. If someone gained physical access to the building and connected any device to the network, the attacker would have open access to all types of resources. There was no internal access control restricting the devices that could connect to the network and limiting the authorization of those devices based on the identity of the user. The county urgently needed a network access control (NAC) solution to address these risks and protect its network.

Read More   
  • 1 (current)
  • 2
  • 3
  • 4
  • 5
  • 6
Most Popular
Digital Workspace | Security

Prioritize These Security Considerations as Users Work from Home More Frequently

Digital Workspace

8 Things to Consider Prior to Deploying Microsoft Teams

Digital Workspace | Services

Why Adoption Services Are More Important Than Ever

Digital Workspace | Networking

5G Is the Future of the Internet of Things

Digital Workspace | Security

Overcoming the Cybersecurity Skills Gap with Automation

Recommended for You
Topics
  • Cloud
  • Data Center
  • Digital Workspace
  • Networking
  • Security
  • Software
Connect With CDW
  • Explore
    • Our Experts
    • CDW.com
    • BizTech
    • EdTech
    • FedTech
    • HealthTech
    • StateTech
  • CDW Solutions
    • Solutions Center
    • Cloud
    • Data Center
    • Digital Workspace
    • Security
  • Connect With CDW

Copyright 2007-2021 CDW. All Rights Reserved