Insight Blog

Pinewood Part 3 Blog Image

02 Sep: Effectiveness of Cybersecurity and Weights

Security is like weight; it can be more effective if you put it in the right places. In a Pinewood Derby you can set a weight anywhere on your car, but it will affect your speed depending on where put the weight.  In your technology organization, by having visibility into Shadow IT, cloud risk assessment, and a true footprint of your applications, you can identify and put the right amount of security in the right places to secure and accelerate your business. Visibility in real-time is key when it comes to cloud security. With so many apps, services and other endpoints moving to the cloud, it can be challenging to have a 360 view of everything that is going on. To respond to threats as they come up, you need to ensure you have a bird’s eye view of your entire cloud ecosystem.

Cisco ISM Blog Feature Image

31 Aug: Why Now’s a Good Time to Re-Evaluate Your IAM

If your user identity and access procedures aren’t orchestrated and automated, you’re fighting a losing battle. Today’s digital landscape is more connected than ever, with an unprecedented number of network endpoints in more places sharing data across public and private clouds. With all these devices all over the place, it’s no wonder IT feels like the network perimeter is disappearing. And the more extensive the network, the bigger the challenge. You’ve got to confidently identify all those people, places and things and give them only the access they need to get the job done—while keeping data secure and maintaining compliance.

Presidio Cisco EN Blog Featured Image

24 Aug: 3 Networking Technologies Enabling the New Way We Work

The work-from-anywhere trend has become the new normal, and new networking technologies and methodologies are needed to sustain it. After 16-plus months of dealing with the pandemic, more than half of Americans want to continue working remotely, and two-thirds of companies may render their work-from-home (WFH) policies permanent, according to research from IBM. Many customers and prospects also are looking to equip their workforces with technology solutions that enable more flexible work arrangements, such as hoteling, where workers dynamically schedule their use of office workspaces, computers and conferencing systems. As a result, the modern workplace is becoming a hybrid environment where work is no longer defined as a place one goes, but rather it’s about the activities one does.

Okta Pinewood Blog Image

20 Aug: Foundational Design of the Security Stack and the Pinewood Car Body

At the core of your Pinewood Derby car is obviously the wooden body. What might not be as obvious is what should be at the core of your Zero Trust Network Access (ZTNA). The answer? Identity, or Identity Access Management (IAM) as the foundation in which to build the rest of your ZTNA. IAM is the core of ZTNA because it is the first step in granting entry. Much like showing your ID to enter a bar or board a plane, you are presenting verification that you are allowed to enter. Furthermore, It answers the question “Who has access to your most valuable asset – your data?” Most cyber-attacks take advantage of misused credentials in some fashion.

Covid Meraki Blog

18 Aug: Presidio and Meraki Help a Clinical Lab Scale-Up Its COVID Testing

This S&P 500 company mobilized its testing and accommodated a mass upscale in COVID-19 PCR tests with Presidio’s expertise and Meraki’s technology. Last year when the pandemic struck, businesses were affected very differently. Some had to send workers home and shut down for weeks or months before getting back to work at a much lower capacity. At the other end of the spectrum, some businesses experienced unprecedented spikes in demand that created a whole different set of challenges. This article highlights one of our clients that found itself in this latter category.

Pinewood Blog 1 Featured Image

12 Aug: What the Pinewood Derby Can Teach You About Cybersecurity

Taking the spirit of a popular classic childhood event and transforming it into a day of competition and fun + relating this to cybersecurity? Challenge accepted. The Pinewood Derby, a rite of passage for kids in the Boy Scouts of America, is a wood car racing event. Traditionally, each Cub Scout receives a block of pinewood, plastic wheels and metal axles to create a crewless, unpowered miniature car. Although simple in concept, the art and skill come in crafting a car that reduces friction, has an aerodynamic design. The competition also takes into account all-around sportsmanship and collaboration. These concepts can also be applied in many ways including your cybersecurity posture.

Rob Kim Blog Part 4

30 Jul: Top 5 IT Themes for 2022 in a Post-COVID World: Part Four

A couple of years ago, our family moved to a new home. To no surprise, the simple act of having to pack up belongings and move them to the new house forced us to get rid of all the junk. Two years later, we have accumulated a lot more junk in our house, yet the annual process of purging has not yielded nearly as much clean-up as that single move. This is the essence of “Move to Improve” – the rationalization method that accelerated during COVID. For many organizations that were paralyzed and as an effect had not modernized their virtual environments, a simple move to the cloud via VMC allowed a quick way to get out of the technology debt that accumulated over the course of years. Without the lingering technical baggage, the move to modernize workloads to cloud-native became much easier. Moving and then improving helped accelerate digital initiatives like workload portability (deploying Kubernetes and container strategies) as well as OS and DB migrations to Linux and RDS, respectively.

Rob Kim Blog Part 3

29 Jul: Top 5 IT Themes for 2022 in a Post-COVID World: Part Three

It is generally agreed that workloads are what determine the resourcing options. Anytime we typically hear about the “repatriation of workloads” from the cloud back to on-premise deployments, it is typically a consequence of not properly rationalizing the best migration option for said workload. And as expected, the workloads that migrate first and remained in the cloud were those around re-factoring/re-engineering of applications, or re-purchasing through SaaS delivery options.

Rob Kim Blog 2022 Post Covid Part 2

27 Jul: Top 5 IT Themes for 2022 in a Post COVID World: Part Two

In part 1 of this blog, we focused on client survey research and industry analysis to explore the changing technology approaches to IT modernization. Traditional IT approaches are too complicated, require too much upfront information, take too long to design and deploy. They also lack intuitiveness, requiring a learning curve for the end-user to adopt and become proficient. Consumerism stresses traditional IT approaches.There is a reason why new technology approaches bear names like LEAN, Agile, Kanban, sprints, and the like – it’s about SPEED.

Rob Kim Blog Part 1 Tile

26 Jul: Top 5 IT Themes for 2022 in a Post COVID World

It’s been quite a year! Organizations need their IT leaders to step it up faster than ever despite restrictions from quarantine mandates and economic uncertainty. Security is center stage and digital transformation became a necessity. The biggest obstacle? Talent – how to find, recruit, invest, and retain the most valuable asset in modernizing IT.