Intelligent Datacenters: EMC & VMware provide DR & high availability

Posted Date: 
Posted By: 
Ernes Taljic, Principal Storage Architect, Presidio

The Challenge

Most datacenters are designed in an active/passive configuration. The passive datacenter is used in “what-if” situations and are strictly deployed for disaster recovery scenarios. A lot of resources are consumed for datacenters to be used only for the “what-if” scenarios. The Presidio solution described herein offers an intelligent datacenter solution that brings a true active/active structure to utilize two or more datacenters equally.

Intelligent datacenters not only provide disaster recovery (DR) but also provide high availability across datacenters for missions-critical applications.

The main challenges that the intelligent datacenter solution solves are:

  • Eliminates single points of failures across datacenters
  • Minimizes Recovery Point Objectives (RPOs) and Recovery Time Objectives (RTOs)
  • Maximizes resource utilization by simultaneously using all datacenters
  • Better utilization of infrastructure costs


FireEye could have stopped the Target breach

Posted Date: 
Posted By: 
Ernest Dunn, Director, Secure Networks, Presidio

Over 95% of enterprises and government agencies are compromised and don't know it.

Security breaches have become daily headlines. Today, risks and threats to sensitive information and IT infrastructure come from every angle, including inside and outside of organizations. The cyber threat landscape is rapidly evolving and attackers have transitioned beyond the virus and worm attacks of the past decade that you may be familiar with. Malware is now the main vector of attack and the attacks are sophisticated, targeted and persistent. Many of these attacks are being conducted by well-funded Nation-states and highly motivated adversaries.

This new generation of advanced attacker is focused on acquiring sensitive personal information such as social security numbers, credit card information, healthcare information, intellectual property and insider information. These targeted attacks occur across all industries and many are stealthy and persistent enough to go undetected by traditional security technologies, such as firewalls, IDS/IPS, anti-virus, and email or web gateways. To combat these advanced attacks and persistent adversaries, organizations need to reimagine security and adopt a process of continuous threat protection. Adopting this philosophy and process means having the ability to detect threats in real time as well as reduce the time to contain and resolve the threat.

Three-Year Journey to the Pinnacle of Certifications: Cisco Collaboration

Posted Date: 
Posted By: 
By Cristobal Priego, Presidio Senior Consulting Engineer

I spent almost three years preparing to accomplish a huge milestone in my career—becoming CCIE (Cisco Certified Internetwork Expert) in Collaboration certified—but it was well worth the effort! Keeping up-to-date with what’s new in collaboration is difficult because the technology changes very fast and continues to grow at a fast pace. It parellels my job because that’s exactly what we strive to do here at Presidio. We strive to meet the needs of mobile workers with high-def video, gadgets and new technologies that integrate with their mobile devices and increase their productivity.

That’s what also drove me to obtain my CCIE in Collaboration. According to Cisco, only one percent of all IT engineers worldwide earn CCIE status. The percentage is even lower for those achieving certification in Collaboration—perhaps the most difficult of all IT-industry certifications. Based on the other Cisco certifications I have obtained, I can certainly vouch that the test is by far the most challenging. It took me three times before passing!

The test requires you to work through an eight-hour lab that includes configuring the solution to work at the Layer 7 application level. This creates many potential complex variables to study ahead of time to have a chance at passing. There are probably enough variables that you could spend two full weeks in a lab testing them all.

Part II: Collaboration Systems Release (CSR) 10 is not just another release

Posted Date: 
Posted By: 
by George Chongris, Manager, Collaboration Infrastructure

CSR 10 changed it all in many ways.  My e-mail signature now looks like this.  To anyone that interacts with me, it’s one click to a rich experience with me on whichever medium they deem is the correct one at the time.

Reach me now: Video | Browser | Phone | Instant Message | E-Mail

George Chongris | Manager, Collaboration Infrastructure
Presidio |
1955 Lakeway Drive Suite 220, Lewisville, TX 75057
D: 469.549.9888 | F: 469.549.9886 |

As you can see, traditional enterprise communication barriers are now broken:

Part I: Collaboration That Fires On All Cylinders

Posted Date: 
Posted By: 
by George Chongris, Manager, Collaboration Infrastructure

There’s been much talk lately in regards to collaboration, but what is it really?  Is it a system?  Is it a service?  Is it phones? E-mail? Instant Messaging?  Video?   Simply put – yes – to all of the above — but there’s much more to it than that.  These are exciting times, and now more than ever is the time to bridge the gaps between your disparate systems and take your investments and really create compelling inter-personal experiences.

Take your average enterprise environment today – there’s likely a telephone system of sorts with voicemail, an instant messaging platform, a web meeting platform, and some will even have a video conferencing platform of sorts.  Almost all of these run on IP networks and as such, as a user you can access these services from almost anywhere.  Rowan Trollope of Cisco made a great point in a recent speech of his, and the crux of what he said is that once upon a time you’d go home to tools that, communication-wise, would be generations behind what one would have available to them at the office.  Great point – but we all know that is not the case today.  

Giving back is a year round effort

Posted Date: 

A couple of months ago members of our team in the North West Region decided that we wanted to ‘give back’ to our communities during the holidays to emphasize our culture of community involvement.  Many members of the NWR volunteer for various organizations in their personal life throughout the year. The holidays is a good time to create awareness, but volunteerism is an ongoing part of our work culture.

We realize that we have a lot to be thankful for and there are many in our communities who have much less than we do. In lieu of any recent office holiday parties we chose to participate in volunteer events in Portland, OR; Seattle, WA; and Boise, ID where we have offices.  Members of our families who wanted to participate were included in these events. Much of this volunteer work was done after business hours to ensure that family members who wanted to participate were available. 

In Portland we bagged dry pasta for the Oregon Food Bank. We processed 11,036 pounds of pasta which equals 9,196 meals. This amounted to  106 meals per volunteer processed that evening. In Seattle the team sorted, inspected, and packaged squash for the Food Lifeline. Thirty-four volunteers handled over 10,000 pounds of squash during a 2 hour shift. This amounted to 7,692 meals total or 226 meals per volunteer.

In Boise we worked with the Salvation Army toy drive and helped parents select toys for their children.

With Collab Release 10, Cisco has hit a par, birdie, and one ball is still in the air

Posted Date: 
Posted By: 
Josh Miller, Director

The par is Collaboration Edge.  Candidly - this capability is required to be on an even playing field with Microsoft Lync.  This capability allows an employee to take their client from the office to their house, to anywhere in-between - and have it just work.  Cisco’s previous position was to require users to use a VPN client - whether theirs or someone else’s, to connect to the on premise equipment including Unified Communications Manager, Unity Connection, and more.  I’m thrilled and relieved that Cisco has finally relented on that view to allow employees to have a client that just works regardless of where they are.  Matt Rehm did a fantastic write-up about that here.

Collaboration: A Risk-based Approach

Posted Date: 
Posted By: 
Dan Stephens and Tim Telkamp

The Risk Based Management framework is well defined by NIST to address securing data within your organization.  It creates a way to quantify intangibles and create a simple checklist for securing your information.  For those unfamiliar with the process it is as follows:  Categorize, Select, Implement, Assess, Authorize and Monitor.  It occurred to me that a similar process should be applied not only to information being communicated, but also to how we communicate information.  If you stop and think about it, the information that you use this approach to protect is only as good as the way in which we use that information to achieve a result.  It is the communication of that information with one another that is the action to achieve the result.  My exploration of the subject follows below.


Presidio’s Story: INX & BlueWater Acquisitions

Posted Date: 
Posted By: 
Mike French, Chief Marketing Officer

Organic growth & Large Acquisitions in the IT Solutions Sector

I am often asked what the Presidio evolution story is. How did Presidio grow to be a multibillion dollar Solutions Provider so quickly? The answer is that some of the growth has been organic, but the real story is one of successful acquisitions, which is difficult to do on this scale in any industry.

So here is the modern history of Presidio:

Presidio has acquired a number of great companies over the last eight years, but the largest and most recent were Coleman Technologies in 2009, INX in December 2011 and The BlueWater  Inc. in March of 2012. Along with the latest acquisition, we welcomed industry veteran, Bob Cagnazzi, CEO of BlueWater, as the new Chief Executive Officer of Presidio, Inc.  Bob was tasked with the difficult job of merging these organizations together and developing one company that would stretch from coast to coast and capitalize on all of the best practices from each organization.

Top Three Keys to Digital Marketing Success

Posted Date: 
Posted By: 
Jill Atcheson, Director, Digital Marketing

Earlier this year, dozens of industry publications and information-centric contributors predicted the top trends and topics for 2013.  Pitched as the crystal ball into the future, or a sneak-peek into what would top of mind in the 12 months that followed, these predictions were often specific to particular industries, functional roles, B2B/B2C and really just about anything.

So what were the top Digital Marketing trends of 2013 and did we in fact live up to the hype this year?


Trend #1: Digital Merges with Traditional Marketing

Consumer demand often dictates business demand. That was definitely the case in 2013, as consumers continued to embrace online, social, and mobile communication channels, forcing companies to improve their online presence, and prioritize initiatives such as search engine optimization, web design, content creation and strategy, social media, and mobile marketing.

Verdict:  FACT


Trend #2: Content Fuels Inbound Marketing