Insight Blog

Managed Security

23 Feb: SSE vs. SASE – What’s the difference?

Gartner recently released a new Magic Quadrant for SSE – Security Service Edge for 2022 in addition to the Critical Capabilities Guide for SSE. Yes, it’s SSE and it’s not a typo – we didn’t forget the “A”. So, what about SASE – and why the need for another IT acronym? While the differences in the two may seem subtle, the application of technologies that fall into this space are distinct with the COVID Pandemic serving as the backdrop and impetus for the need in re-classification.

IT Professionals in server room looking at tablet

31 Jan: Microsoft 365 Price Increases: You Have Options to Lessen the Blow

After a decade on the market, Microsoft has announced a significant price increase to Office 365. The changes only effect commercial licensing at this point, but I would expect other offerings to increase as well. Beyond the obvious argument that prices have remained the same for ten years, they are touting the continuous innovation over the past decade to justify this boost. You have to hand it to them; they have been creative recently with feature additions to the products to provide more value to the customer.

IT Professionals in server room looking at tablet

20 Jan: ThousandEyes Equals Opportunity for Cisco Partners

To put it simply, there is a tremendous opportunity for Cisco partners to make money leveraging ThousandEyes. It’s no secret that your customers’ success depends on the digital experiences they provide to their customers and employees. Delivering suboptimal application user experiences can damage the reputation of a business and reduce its top-line revenue. And if your customers are not using ThousandEyes, they may have Internet blind spots that put them at risk of delivering degraded digital experiences.

DL Cyber Blog FI

22 Dec: Dedicated State and Local Government Cyber Grants Are Coming

State and local governments will be receiving dedicated cyber grants for the first time in 2022, now that the new bipartisan legislation has passed. While previous federal programs offered the potential for grants for cybersecurity projects in state and local governments through the Cybersecurity and Infrastructure Agency (CISA), these grants were not previously dedicated (required) to improving cybersecurity.

Log4j Breach Blog

15 Dec: Investigating and Mitigating Log4j/Log4Shell Vulnerability

On Dec. 9, 2021, a remote code execution (RCE) vulnerability in the popular Java-based logging package Log4j was disclosed.  Submitting a specially crafted request to a vulnerable system allows an attacker to download and execute a malicious payload to perform additional functions such as data exfiltration, diverting funds, performing surveillance, or disrupting service.  What many experts fear now is that the bug could be used to encrypt data and due to the discovery of this exploit being so recent, there are still many servers, both on-premises and within cloud environments, that have yet to be patched.  Scanning activity for CVE-2021-44228 has actively begun on the internet with the intent of seeking out and exploiting unpatched systems.  Apache Log4j versions <= 2.15.0 rc1 are vulnerable. 

Rob Kim Secure Everything

08 Dec: 3 Essential Capabilities to Secure Everything

Innovation and top-line growth are consistently two of the top three key priorities for business executives. Security is always sandwiched right in between these goals, as the threat landscape and perimeter constantly evolves – and never for the better. The digital paradox holds that the same technologies that allow us to innovate and grow give sophisticated intruders the same tools to innovate their method of attack. Just like a chain is only as good as its weakest link, the same goes for our approach to security. It doesn’t matter where in your IT environment a breach occurs; in the end, everything gets affected.

Intel Optane 3 Blog Image

01 Dec: Base your server refresh strategy on 3rd Gen Intel® Xeon® Scalable CPUs and Intel® Optane™ PMem

It’s a common occurrence in many data centers: systems are running at peak capacity, workload demands are increasing, and it’s time to plan for the next server refresh cycle. But all too often, organizations take the path of least resistance and simply augment existing server resources with more of the same – a “go with what you know” approach.

Cyber Month Recap Blog Tile

29 Nov: Recap: Cybersecurity Awareness Month 2021

Presidio celebrates Cybersecurity Awareness 24x7x365, but we especially love Cybersecurity in October. Cybersecurity & Infrastructure Security Agency (CISA) just closed out its 18th year deeming October as the month to bring awareness to the importance of cybersecurity. 18 years ago, the internet was in its infancy. Now, it is a part of everyday life.