Business networks are changing rapidly every day - mobility, the cloud, and the Internet of Things (IoT) are creating this phenomenon that is causing companies to re-evaluate efficiencies and security. As a result of these network design requirements, SD-WAN (Software-Defined Wide Area Network) is a great fit as it provides a dynamic control of the WAN for the end user. In this blog article, I will go over an introduction to SD-WAN which is quickly becoming a game changer for businesses everywhere.
Every Veterans Day, I take a moment to reflect on the flag and the millions of veterans who have helped defend our principles. In peace time, they have trained and been ready for the worst, protecting us from potential threats and sending a message of our strength around the world. During a war, they have traveled to faraway places, been separated from their families, and put their lives on the line for our freedom.
On Thursday November 1, Cisco released vulnerability CVE-2018-15454 which impacts their Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) product lines.
For the fifth consecutive year, Systems Engineering (SE) will be participating in Movember, a month dedicated to raising money and awareness for men’s health. At SE, we believe in utilizing the power of our people and profitability to make the world a better place.
In this cloud-first, accessible-anywhere world of computing, there are many questions around how your organization's users access cloud data that was once secured within your on-premises network. In the traditional sense, in-house technologies have been used to deploy workstations, manage endpoints, and enforce required security policies. However, what do you do when neither your users nor your data reside within the office?
In this blog article, I will be discussing a newer Microsoft-created technology that is becoming today's 'Modern Desktop.' A bundle, if you wish, of email, collaboration tools, mobility, security, and more.
At Systems Engineering team, we are very conscious about practicing good IT security measures. As such, it's important to remember that protecting confidential data spans from desktops, to the cloud, to mobile devices, and more.
If you’ve been in or around information technology (IT), you are most likely familiar with Unified Communications (UC). If not, maybe you've heard of its subscription-based cloud-delivered model, unified communications-as-a-service (UCaaS). Gartner breaks UC into six broad communication functions:
Assuming you have your network security basics in place, there are a few cybersecurity solutions that are relatively inexpensive that many businesses have yet to include in their cybersecurity war chest. These tools help you stay ahead of the cyber criminals and provide additional protection to reduce your business' chance of a breach.
Preparing budgets for the upcoming year includes planning for any products that will be reaching end-of-life/support. According to Spiceworks, the need to upgrade outdated IT products will be a big focus for many businesses in 2019. For businesses up to 500 seats, replacing end-of-life products is the top driver of new hardware, software, services purchases, and cloud solutions.
At Systems Engineering (SE), employees are our number one resource. Our success depends on our dedicated and skilled staff who share our values and contribute to our vision. SE Spotlight gives a brief but revealing look at one of our valuable members.