IT Blog & Customer Resources - Perspectives

02/05/14 at 01:41 pm
A couple of months ago members of our team in the North West Region decided that we wanted to ‘give back’ to our communities during the holidays to emphasize our culture of community involvement.  Many members of the NWR volunteer for various organizations in their personal life throughout the year. The holidays is a good time to create awareness, but volunteerism is an ongoing part of our work culture.
Josh Miller, Director
02/05/14 at 01:26 pm
The par is Collaboration Edge.  Candidly - this capability is required to be on an even playing field with Microsoft Lync.  This capability allows an employee to take their client from the office to their house, to anywhere in-between - and have it just work.  Cisco’s previous position was to require users to use a VPN client - whether theirs or someone else’s, to connect to the on premise equipment including Unified Communications Manager, Unity Connection, and more.  I’m thrilled and relieved that Cisco has finally relented on that view to allow employees to have a client that just works
Dan Stephens and Tim Telkamp
02/05/14 at 01:22 pm
The Risk Based Management framework is well defined by NIST to address securing data within your organization.  It creates a way to quantify intangibles and create a simple checklist for securing your information.  For those unfamiliar with the process it is as follows:  Categorize, Select, Implement, Assess, Authorize and Monitor.  It occurred to me that a similar process should be applied not only to information being communicated, but also to how we communicate information.
by George Chongris, Manager, Collaboration Infrastructure
01/31/14 at 01:34 pm
There’s been much talk lately in regards to collaboration, but what is it really?  Is it a system?  Is it a service?  Is it phones? E-mail? Instant Messaging?  Video?   Simply put – yes – to all of the above — but there’s much more to it than that.  These are exciting times, and now more than ever is the time to bridge the gaps between your disparate systems and take your investments and really create compelling inter-personal experiences.
Jill Atcheson, Director, Digital Marketing
01/21/14 at 01:49 pm
Earlier this year, dozens of industry publications and information-centric contributors predicted the top trends and topics for 2013.  Pitched as the crystal ball into the future, or a sneak-peek into what would top of mind in the 12 months that followed, these predictions were often specific to particular industries, functional roles, B2B/B2C and really just about anything. So what were the top Digital Marketing trends of 2013 and did we in fact live up to the hype this year?  
Mike French, Chief Marketing Officer
01/15/14 at 01:05 pm
Organic growth & Large Acquisitions in the IT Solutions Sector I am often asked what the Presidio evolution story is. How did Presidio grow to be a multibillion dollar Solutions Provider so quickly? The answer is that some of the growth has been organic, but the real story is one of successful acquisitions, which is difficult to do on this scale in any industry.
by Dan Stephens and Keith Ridgway
01/10/14 at 03:29 am
Collaboration is about results, the business value generated from being able to communicate efficiently and effectively with co-workers, business partners and customers.  Collaboration tools should enable and simplify that communication without cultural disruption.  Cloud enabled application deployments are happening faster than anticipated, BYOD is driving more than phone choices; user experience is of paramount importance.    Cisco Jabber and Microsoft Lync are two such tools that I refer to as Collaboration Control Panels because they are helping to coordinate communication methods effec
By Matt Rehm, Director Collaboration-Strategic Technology Group, Presidio
12/09/13 at 08:29 am
If your company finds it challenging to get mobile employee and customers to give your corporate apps a chance, you’re not alone. The consumer experience that leading device manufacturers deliver on smartphones and tablets has raised the bar for what end users now expect. They want easy access to their apps, and they want an experience similar to what they see on desktop computers wired into corporate networks.
Steve Hanney, Sequoia
12/06/13 at 09:00 am
Optimizing Hybrid IT environments OK now that we’ve covered the positioning of Services, Applications and Workloads, it is now time for us to talk through the critical next step in the journey to optimizing your Hybrid IT environment – application and workload characterization. The characterization process, sometimes known as workload placement, is a necessary step in the journey to Hybrid IT and is necessary to ensure that the right service, application and/or workload is placed in the best delivery model.
Steve Hanney
11/20/13 at 12:25 pm
With the introduction of Virtualization and Cloud Computing over the past 5-10 years CIOs have a growing number of options for how they provide IT services to their users. Each of these options are viable for specific situations and use cases. With this in mind, progressive CIO’s are actively taking advantage of these options to develop a Hybrid IT model encompassing on premise dedicated, shared and private Cloud services combined with colocation/hosting and Public Cloud services.
Sean Walls, Senior Consulting Practice Manager
09/26/13 at 08:08 am
The world's largest corporations and small Internet stores have one thing in common and that is keeping their customer’s payment card data secure.  The industry standard for security standards and compliance has been set by PCI Data Security Standard (PCI DSS). This is a key business driver for all merchants who accept credit cards, online or offline. The number of transactions processed annually determines the specific compliance requirements that are required; however, compliance enforcement is managed by the individual payment brands.
Sean Walls, Senior Consulting Practice Manager
09/26/13 at 08:08 am
The world's largest corporations and small Internet stores have one thing in common and that is keeping their customer’s payment card data secure.  The industry standard for security standards and compliance has been set by PCI Data Security Standard (PCI DSS). This is a key business driver for all merchants who accept credit cards, online or offline. The number of transactions processed annually determines the specific compliance requirements that are required; however, compliance enforcement is managed by the individual payment brands.
09/11/13 at 04:48 pm
Business Challenge Since its opening with 50 beds in 1954, the story of Chilton Hospital in northwestern New Jersey has been punctuated by a few significant growth spurts. The addition of a second facility in 1971 was followed by a consolidation and further expansion of its two buildings in 1984. The most recent leap forward - a $24 million renovation and modernization project - got underway in 2012.
09/11/13 at 04:48 pm
Business Challenge Since its opening with 50 beds in 1954, the story of Chilton Hospital in northwestern New Jersey has been punctuated by a few significant growth spurts. The addition of a second facility in 1971 was followed by a consolidation and further expansion of its two buildings in 1984. The most recent leap forward - a $24 million renovation and modernization project - got underway in 2012.
Joe Leonard , VP of Cyber Security Solutions, Presidio
08/16/13 at 06:35 am
Security breaches and cyber attacks cost businesses billions in lost revenue and recovery costs every year.  It’s not surprising to see Cisco making the latest move to enhance their own security group with the recent acquisition of Sourcefire.  Sourcefire provides best of breed NGIPS, Advanced Malware Protection and endpoint protection and is highly recognized a leader in cyber security initiatives.    
Joe Leonard , VP of Cyber Security Solutions, Presidio
08/16/13 at 06:35 am
Security breaches and cyber attacks cost businesses billions in lost revenue and recovery costs every year.  It’s not surprising to see Cisco making the latest move to enhance their own security group with the recent acquisition of Sourcefire.  Sourcefire provides best of breed NGIPS, Advanced Malware Protection and endpoint protection and is highly recognized a leader in cyber security initiatives.    
Dan Stephens, Director, Collaboration, Presidio South
08/06/13 at 05:41 am
“UC on UCS” is used to describe the placement of virtualized Cisco Unified Communications or Collaboration applications onto a Cisco Unified Compute System. Recently, a few clients have asked about the benefits of implementing UC on UCS, especially now that UC virtualization is also supported on other major Blade systems. The answer is simple: control, support and vendor commitment.
Dan Stephens, Director, Collaboration, Presidio South
08/06/13 at 05:41 am
“UC on UCS” is used to describe the placement of virtualized Cisco Unified Communications or Collaboration applications onto a Cisco Unified Compute System. Recently, a few clients have asked about the benefits of implementing UC on UCS, especially now that UC virtualization is also supported on other major Blade systems. The answer is simple: control, support and vendor commitment.
Dan Stephens, Director, Collaboration, Presidio South
08/06/13 at 05:41 am
“UC on UCS” is used to describe the placement of virtualized Cisco Unified Communications or Collaboration applications onto a Cisco Unified Compute System. Recently, a few clients have asked about the benefits of implementing UC on UCS, especially now that UC virtualization is also supported on other major Blade systems. The answer is simple: control, support and vendor commitment.
Ernest Dunn - Director, Secure Networks
07/22/13 at 09:35 am
While the term BYOD may be becoming a bit overused, we are really just starting to feel the impact of this movement.  Cisco just released a case study on the financial impact of BYOD which stated that 89 percent of companies are enabling their employees to use their own devices — specifically, mobile devices such as laptops, smartphones, and tablets — for work purposes.