Wednesday, June 30, 2021

Ask These 38 Questions When Evaluating Your Cloud Strategy

 

You should ask these 38 questions when evaluating your cloud strategy to ensure you're headed in the right direction....
Also, here’s a free resource dedicated to help you with all the necessary decisions in implementing a cloud migration strategy (public, private, hybrid, multi - including security)....taking all the potential stress out of the picture. For free help with sourcing and comparing potential cloud vendors....as well as with network design and security....simply ask at the below link. It’s as easy as 1, 2, 3.
Cloud Services

Labels: , , , ,

Monday, June 28, 2021

Cloud Migrations With Tina Gravel

 Tina Gravel is the Senior Vice President of Channels and Alliances at Cyxtera Technologies, where she helps businesses migrate their mission-critical applications to The Cloud. She is an award-winning executive with more than 25 years of experience in the IT outsourcing, cloud, security and SaaS industries.


INTERVIEW HIGHLIGHTS: [01:09] Cloud is becoming more prevalent in the Enterprise space, with companies migrating more of their mission-critical applications to The Cloud. One of the more recent buzzwords permeating today’s vernacular is Hybrid Cloud. What does Hybrid Cloud really mean? [02:47] What are the considerations businesses need to have when thinking about moving their mission-critical applications to The Cloud? [03:53] A critical requirement for mission-critical applications is uptime. After all, you can’t have a global bank just go offline during a stock trade! One of the inherent benefits of migrating to The Cloud is the Service Level Agreement for guaranteed uptime. Many providers use a term called five 9’s of reliability. IBM just launched the z15 mainframe platform which offers seven 9’s. What do all these 9’s mean, and why are they important to businesses? [05:24] The more 9’s you have, the more expensive it is! [05:24] With regards to Cloud migrations, you need to balance the service level you want, with what you can afford to pay for. [07:03] How does Cyxtera help businesses with their Cloud migrations? [10:44] It’s no question that Cloud is the way to go for Enterprises that are launching brand new mission-critical applications. However, in the real world, the playing field is not so cut and dry. Let’s say, for example, that one of your core business applications is a COBOL program, which resides on a server in a backroom closet and stores its data in a huge flat file. First of all, how do you even begin to “cloud-enable” this ancient application along with its archaic flat-file database? The second challenge is that for that last 50 years no one has had to worry about cybersecurity. The application is running on a server in a secure location, and no one has access to it. As soon as this crucial and sensitive application moves to the cloud, suddenly, you have a new problem to worry about! Is it even worth it? [13:33] What is Zero Trust? [15:57] When migrating to The Cloud, make sure to only provide access to people who absolutely need it. [17:49] How do people connect with you? [18:17] Do you have any parting words of wisdom to share with the audience?

Also, here’s a free resource dedicated to help you with all the necessary decisions in implementing a cloud migration strategy (public, private, multi, hybrid...INCLUDING SECURITY)....taking all the potential stress out of the picture. For free help with sourcing and comparing potential cloud vendors....as well as with network design....simply ask at the below link. It’s as easy as 1, 2, 3.

Labels: , , ,

Thursday, June 24, 2021

Multi-Cloud - A Cheat Sheet

This comprehensive guide covers the use of services from multiple cloud vendors, including the benefits businesses gain and the challenges IT teams face when using multicloud.

Also, here’s a free resource dedicated to help you with all the necessary decisions in implementing a cloud migration strategy (public, private, multi, hybrid...INCLUDING SECURITY)....taking all the potential stress out of the picture. For free help with sourcing and comparing potential cloud vendors....as well as with network design....simply ask at the below link. It’s as easy as 1, 2, 3.

Labels: , ,

Wednesday, June 23, 2021

The Different Types Of Cloud Computing And How They Differ

 

Cloud computing has become a common term over the last decade, but the service sometimes creates confusion. With all the new cloud options and the phrase “as a service” seemingly tacked onto everything imaginable, it’s helpful to take a step back and look at the differences between the main types of cloud deployment and the different types of cloud computing services.

Also, here’s a free resource dedicated to help you with all the necessary decisions in implementing a cloud migration strategy (public, private, multi, hybrid...INCLUDING SECURITY)....taking all the potential stress out of the picture. For free help with sourcing and comparing potential cloud vendors....as well as with network design....simply ask at the below link. It’s as easy as 1, 2, 3.

Labels: , ,

Tuesday, June 22, 2021

Cloud Computing And Why Your Company Needs It

 Kevin L. Jackson is a globally recognized cloud computing expert, who will discuss how network management in the cloud can help you leverage your business.

In this archived interview, Kevin simplifies cloud computing, what it means, and how it applies to individuals and companies. Simply, cloud computing has removed the barrier to business, where access to an Internet connection and data allows you to reach anyone from anywhere.
Here’s a free resource dedicated to help you with all the necessary decisions in implementing a cloud migration strategy (public, private, hybrid, multi - including security)....taking all the potential stress out of the picture. For free help with sourcing and comparing potential cloud vendors....as well as with network design and security....simply ask at the below link. It’s as easy as 1, 2, 3.
Cloud Services

Labels: , ,

Friday, June 18, 2021

What Is Cloud Security?

 Check out this lightboard video with Nataraj Nagaratnam from IBM Cloud as he maps out what cloud security is and explains how important it is for enterprises to incorporate it into their business operations.

Also, here’s a free resource dedicated to help you with all the necessary decisions in implementing a cloud migration strategy (public, private, hybrid, multi - including security)....taking all the potential stress out of the picture. For free help with sourcing and comparing potential cloud vendors....as well as with network design and security....simply ask at the below link. It’s as easy as 1, 2, 3.
Cloud Services

Labels: , ,

Wednesday, June 16, 2021

How YOUR Business Can Digitally Transform With Certainty

 Masergy understands that you need to compete in the digital age, driving transformation initiatives that increase collaboration, improve productivity, and reduce cost. Masergy UCaaS can help you achieve those digital ambitions and transform with certainty. As a concept, Masergy is a large strategic vision; they offer versatile hybrid solutions as it relates to voice along with SD-WAN strategies that bring security right to the customer’s edge. Over the last three years, Masergy has become much more agnostic as it relates to various forms of access.

Picture1-1

Masergy is well known for being a global company:

Picture1-2

MASERGY AND MICROSOFT TEAMS

With over seventy-five million daily users, Microsoft Teams enables employees to effectively communicate from any location via text chat, voice call, or video conference. While you can replace your company’s existing private branch exchange (PBX) telephone system, you cannot use Microsoft Teams without an additional PSTN service. This is where Masergy steps in, providing voice services in twenty-five countries with superior call quality, all while reducing management across disparate vendors. Below you can view a snapshot of what the Microsoft Teams landscape looks like:

Masergy has two options when it comes to Microsoft Teams Integration. The first option is MS Teams PBX plus Direct Route. This is their bring your carrier option, and they do not charge on a per-user basis for this direct route option.

Their second option is Masergy Hosted plus Integration. This is for those who want to keep their collaboration and telephony budget separate. The advantage of this option is that you get a consistent user experience.

Lastly, Masergy is also able to provide Hybrid Services Designs.

To learn more about Masergy, simply visit Masergy And More and ask.

Labels: , , , , ,

Monday, June 14, 2021

EQUINIX IS WHERE OPPORTUNITY CONNECTS

 A common question over the years has been, what does Equinix do? Equinix has been evolving rapidly in recent years, solving a wider set of challenges for their customer with an ever-growing suite of products and services. This has pushed them to develop a new company positioning message along with plenty of resources to help tell the Equinix story to their customers. Equinix is the world’s Digital Infrastructure company. Digital leaders harness their trusted platform to bring together and interconnect the foundational infrastructure that powers their success. Equinix has realized many of their customers utilize resources like Cloud Providers and SaaS applications, and this means they place data outside their own four falls. They have enhanced their offering to become a platform to interconnect the world and allow everyone to experience the benefit of interconnection. Equinix now has thousands of customers in their environment and has created an ecosystem for customers to connect directly to each other. This means their customers do not have to rely on public internet, VPNs, or cost-prohibitive MPLS services.

Picture1As of today, ninety-six percent of all internet traffic goes through their environment. So, how does that help your business? Interconnection helps organizations compete in a digital world. When companies connect directly with each other, they improve performance by reducing distance and reduce costs by eliminating networking expenses, this is the power of interconnection.

  • Physics of Proximity – Network traffic cost can be reduced by 60% when two parties connect directly versus connecting by internet or MPLS.
  • Economics of Aggregation – A 30% reduction in latency can be achieved when two parties connect directly instead of connecting over a distance using the internet or MPLS.
  • The Network Effect – The value of interconnection is increasing with the number of available counterparties, creating a network effect.

For example, think of a mid-sized business. They are most likely connecting to Office 365, a video conferencing solution like Zoom, and a UCaaS system like RingCentral.  They must travel to that service and back and then to the next service and back to communicate with each service or between services.

Picture2

By putting Equinix in the mix, they can travel to an Equinix facility and then connect to all the places, partners, and the possibilities they desire. This is done without having to touch the public internet again.

Picture3

HOW TO UNCOVER OPPORTUNITIES

Equinix is the center of the cloud world, and they can be part of what you are using today. All the suppliers listed below and so many more are part of Platform Equinix.

Picture4When talking to your technology leadership team, the following can be used as qualifying questions:

  • Is your company using or planning to use more than one cloud provider?
  • Would having a presence in a single facility that provides access to thousands of networks, cloud, and IT providers be of value to your company?

To learn more about what Equinix can do for your organization simply visit Equinix And More and ask.

Labels: , , , ,

Thursday, June 10, 2021

Insights On Third Party Risk Management

 

THE PROBLEM

Fifty-nine percent of respondents to a Ponemon & Opus study stated that they had experienced a data breach caused by a third party or vendor. Most major breaches covered by the media have third party roots; think Target, Home Depot, General Electric, and Instagram. Despite the commonality of third-party breaches in the news, only forty-four percent of businesses report on risk to their executives or boards regularly, and eighty-two percent manage vendor information, monitoring, and assessments using spreadsheets or manual processes. These statistics demonstrate the ease in which attackers can access information without penetrating individual businesses. On the supply chain side, there has been a seventy-eight percent increase in attacks, including living off the land attacks.

Picture1-dec

WHAT IS A THIRD PARTY?

 

So, what is Third-party Risk Management (TPRM)? It is the practice of identifying, assessing, and controlling risks presented throughout the lifecycle of your relationship with third parties. When we think of third parties, we commonly associate the term “vendor.” While a vendor is a third party, there are others to consider when we talk about the third-party risk landscape. Third parties can be any of the following:

Picture2-dec

This third-party ecosystem expands across the enterprise, providing critical functions and services within each department. Third parties have varying access to information. Third parties, like cleaning services, have access to secured areas and equipment. Others have access and process data on behalf of the business, and some, like contractors, may have access to intellectual property and trade secrets. This means that there is no third party that is risk-free. To provide a little context on the impact of third parties  organizations:

Picture3-dec

Managing third-party risk across an organization presents numerous challenges. Manual processes can be time-consuming, and in companies that don’t have dedicated personnel, the job is often assigned as a secondary role. In larger companies, the person or people responsible for managing risk spend dozens of hours using manual processes that don’t always identify gaps or have a verified monitoring method. Network complexity presents challenges related to the expanding third-party ecosystem. Issues like applications sprawl or Shadow IT can lead to unexpected risk and unexpected bills. Lack of governance, policies, and procedures that address third-party risk is another challenge because organizations without a compliance department lack the awareness necessary to build an effective program. Perhaps the biggest challenge in addressing third-party risk is prioritizing and classifying vendors and monitoring them in a way that is effective and useful. Leaders in the risk management and cybersecurity industry are aware of these challenges and are creating platforms that simplify the third-party risk process.

Picture4-dec

Cyber risk isn’t the only risk posed by a third party. There is also a regulatory risk, financial risk, IT and security risk, reputational risk, and strategic risk.

Picture5-dec

THE RSI APPROACH

 

RSI is here to provide help when it comes to Third-Party Risk Management, this is their approach:

Picture6-dec

Below we have listed a few qualifying questions you need to ask yourself when evaluating your  third party risk management needs.  

  • How are you managing third parties for security and compliance?
  • If you lost a particular vendor, would your business continue?
  • Do you monitor your critical vendors for data breaches?
  • Do you run credit reports on your vendors?
  • What is your contingency for vendors who experience an outage?

To learn more about all the options available to you for meeting your organization’s data protection, risk management, and network security requirements (including security posture and risk assessments) .... plus comparisons of best-in-class network security / management providers and what they have to offer ... simply ask us at the following link (FREE). It’s as easy as 1, 2, 3.

Cybersecurity Strategies And Resources

Labels: , , , , ,

Wednesday, June 09, 2021

FROM THE FRONT LINES OF CYBER WARFARE

 


Just another breach.  We’ve heard about a lot of breaches, more records lost, and we’re getting numb to it.  But in this post, we highlight why December 2020 is a watershed moment in Cybersecurity.  We’ve officially entered the 21st Century game of cyberwarfare. We’ve always talked about the importance of Cybersecurity, and now we’ve been hit in the face. Hard. It may take months to years to discover the depth of penetration, and all along – the Attackers will have already moved on, using different tools, techniques, and circumventing our defenses.

The implications of this moment are simple: we get serious about Cybersecurity, right now, or we wave the flag of surrender.  We do the former with focus and budget, the latter we simply let our systems, networks, data, and e-commerce be “owned.”  Cyber insurance isn’t going to come in on a white horse to save the day, or your business, or our country.  The only thing that will work is to accept the reality that this is warfare.  Adopt the posture of a warrior, focus your budget, amass your tools, and step up your game.

No, Cybersecurity isn’t easy, and dealing with the seriousness of this breach will significantly burden every enterprise and government agency.  But the threat model has changed, so should your behavior.

CRITICAL BREACHES HAVE CHANGED THE GAME: GAME ON.

Situation Report: FireEye, SolarWinds, and the Departments of Treasury, Commerce, and Homeland Security all announced critical breaches in December 2020. It’s early in the game, but by all reports, it appears to have been executed by a nation-state actor. Intellectual property stolen, footholds planted, depth-of-exposure, and penetration completely unknown. The Intelligence Community (IC) is calling this the largest, most significant cyber-attack in United States history. The Actors are bold, hostile, intentional, methodical, and now in command of more advanced, customized attack toolkits.

Observations: To put the new and alarming situation into more context, let’s examine each element with a bit of a sharper lens:

  • FireEye (FE): an industry-leading threat intelligence, forensics, network, and endpoint security company was breached. FireEye/Mandiant has been called to work on the highest-profile breaches in the world. This is what we know as of early December 2020:
    • FE says a 15-year collection of “Red Team Attack Toolkits” were stolen by the nation-state actor (will not provide attribution, but all indicators are Russia).
    • o This means techniques, custom evasion tools, and frameworks, and defensive capability information is now in the hands of this nation-state actor.
    • o FE has been forthcoming and helpful to the defender community, providing signatures, rules, a repository of information, and regular communication.
    • o FE customers are not in increased danger, and likely more enhanced with new detection updates FE is applying to their products.
  • SolarWinds (SW): an industry-leading IT management toolset, offering full control, monitoring, and remote administration capabilities of network and host infrastructure within customer’s environments.
    • The Supply Chain was compromised; a backdoor was planted into a download update for their “Orion” software on the official SolarWinds update site.
    • SW states 18,000 systems (i.e., customers) affected during March-June of 2020.
      • SW has 300,000 customers, so it’s fair to assume more exposure is TBA.
    • Due to severity, The Department of Homeland Security (DHS) issued an emergency notification to all Federal departments to disconnect SolarWinds from networks.

 

  • US Departments of Treasury, Commerce, and other critical Federal agencies
    • Multiple reports with confirmed sources announced these and other agencies, technology, consulting, and other industry firms had been breached.
    • SolarWinds was the entry point, confirmed by FireEye.
    • Attack behaviors strongly indicate Cozy Bear, a nickname for a Russian foreign intelligence service group that also attacked the State Department and White House systems during the Obama administration.
    • “Ongoing active exploitation.” The DHS warning included this language with SolarWinds as the foothold. Other systems and agencies are compromised for remote surveillance and potential sabotage.

Recommendations:

  • Perform a risk assessment. The threat landscape has changed significantly, and so should the threat model. Expect to increase your budget and take this threat seriously.
  • Implement and/or enhance an enterprise-wide Cybersecurity framework.
  • It doesn’t need to be complex; use consultants to make this practical.
  • Increase threat monitoring, management, response, and hunt capabilities.
  • Increase vigilance across all sectors, industries, and internet-attached systems.

Conclusion:

The Threat landscape has changed significantly. In all sectors, all enterprises are now on serious notice to increase their security posture, and accordingly, their budgets. This bold attack against the United States and commercial entities has yielded a significant advantage to our adversaries. FireEye, known for actively tracking, reporting, and combatting nation-state actors, investigating the top breaches, was a prized target. This clearly shows the increased hostile nature of cyberwarfare. This successful attack against a prestigious Cybersecurity firm led to the theft of vital intellectual property, a collection of the most advanced, customized cyber weaponry, coupled with defense-evasion information. This is a devastating loss in the game of cyberwarfare.

Game On. We will undoubtedly see many more enterprises compromised because of both the information from the FireEye breach, as it trickles out or becomes part of an active campaign in the future, and the footholds with “ongoing active exploitation” already established by the SolarWinds backdoor. It is proactively smart to assume any organization that owns Orion is compromised, and not just the SolarWinds platform, but the systems under SW management (entire networks, servers, workstations, etc.). Recognizably a non-trivial implication, disconnecting Orion from the Internet must be a top priority until the fog clears.  Seek guidance on patch vs. flatten.  If you don’t know, ask somebody.  The same goes for advanced Threat hunting.

Convene a senior leadership meeting to be smart, clear-eyed, and proactive in your approach. Update your threat models, prioritize your risks based upon criticality.  Contain and mitigate the SolarWinds threat, assume compromise, increase Threat hunting and management, refine your strategy with a framework. Finally, adopt a framework with a continuous improvement mindset; as it’s the only way to be adaptive, resilient, budget-smart, and able to withstand the realities of this 21st Century game.


To learn more about all the options available to you for meeting your organization’s data protection and network security requirements (including security posture and risk assessments) .... plus comparisons of best-in-class network security / management providers and what they have to offer ... simply ask us at the following link (FREE). It’s as easy as 1, 2, 3.


Labels: , , , , ,

Tuesday, June 08, 2021

THE WAY WE WORK HAS CHANGED FOREVER

 Working from home became a necessity this year, and companies across the world found themselves having to adapt to the need for remote work. Surprisingly only thirty percent of business leaders feel their organization is well prepared for remote work. Most companies saw challenges in the following three areas:

Screen Shot 2020-12-29 at 1.23.35 PM

RingCentral’s goal is to make it easier for companies to pivot towards a work from home environment, and they accomplish this through their Collaborative Communications platform. They also offer the following:

  • 240+ out-of-box integrations
  • 5,000+ customer integrations
  • 50,000+ developers

Screen Shot 2020-12-29 at 1.23.46 PM

When talking to your company leadership about where RingCentral succeeds, there are three things you should be discussing:

  • Global Telephony
    • 30% -50% usage savings
    • Highest quality voice
    • Quality AND Uptime SLAs
    • 29 Global data centers
    • Local telephony and Global admin
  • Company-wide Collaboration
    • Connected Contact Center
    • Expert access
    • Shared directory
    • Call transfer or conference
    • Pulse notifications
  • One Vendor Relationship
    • One support number
    • No finger-pointing
    • Simplified pricing
    • Single sign-on
    • Simplified admin
    • Global number procurement

Earlier this year RingCentral also announced their direct routing solution, RingCentral Cloud PBX for. Microsoft Teams. This means that RingCentral can now integrate with MS Teams.

Screen Shot 2020-12-29 at 1.23.53 PM

Whether you're a big enterprise business or a small shop, the way you interact with your customers is vital to your business success and customer loyalty. Finding the right contact center technology solution for your organizations specific needs can be an exercise in total frustration. But it doesn’t have to be. Simply tell us what you need accomplished at the link below (including WFH and cybersecurity requirements)....and we’ll help help you source and design a custom contact center solution just for you (whether that be RingCentral or another best-in-class provider). Plus.....our services are FREE.

Contact Center Technology Resources


Labels: , , , , , , , , ,

Friday, June 04, 2021

UCaaS vs PBX ... On The Road To Digital Transformation

 

UCaaS or unified communications as a service is a cloud-based technology that allows organizations to converge all the ways that its users communicate into a single platform. The single platform includes voice, video, chat, text, email, and screen sharing. UCaaS most commonly replaces an organization's on-premise PBX. It includes a mobile application or softphone to communicate without a desk phone and integrate with critical business applications such as email and CRMs.   

Besides network services, UCaaS is the most popular service organizations must incorporate into their digital transformation strategy.  The biggest reason being that a business’s ability to communicate with its users and customers 24/7 and 365 days a year has never been more critical. Hampering their digital transformation effort is the unfortunate fact that many businesses are still hanging on to traditional on-prem PBX’s that are in dire need of replacement. This is where UCaaS comes in as the critical step toward true digital transformation across any enterprise.

Furthermore, the importance of UCaaS in business settings has been elevated in light of the impact of COVID-19 and the heightened emphasis on remote work capabilities. All of which have become a more important aspect of current and future corporate Industry4.0 strategies.

To learn more about all the options available to you for meeting your organization’s Unified Communications needs ....plus comparison of dozens of best-in-class UCaaS providers....simply ask at the following link (FREE). It’s as easy as 1, 2, 3.


Labels: , , , , ,