Blog
September 20, 2017
Download our Black Hat Briefings Guide 2017

Randy Bohrer Senior Security Architect This past July, I joined thousands of my fellow security resources for six days in Las Vegas. The goal was to learn about new security technologies and cyber attacker techniques. While in Vegas, I also attended Def Con, or what is called “Hacker Summer Camp”. Def Con provides insights into…

Read More

September 11, 2017
Top 6 Higher Education Security Risks and Issues

Sometimes it seems like the security challenges facing American colleges and universities are never-ending. Students and others share user information. Campus visitors pop USB sticks into networked machines. Hackers find their way into an internal network through carelessly discarded information from an open screen or from an infected workstation. Here are six of the things…

Read More

September 1, 2017
2 Reasons why we like the Juniper Networks Cyphort Acquisition

Announced late yesterday, Juniper Networks has agreed to acquire Cyphort. This acquisition has the makings of a positive move in Juniper’s security solution and here’s why: Enhances SkyATP:  I think this was the main driver for this acquisition since SkyATP does provide malware detection & analysis, its adoption has not met industry expectations. The combination…

Read More

July 26, 2017
How to Choose the Right Cloud Mix in 6 Steps

Cloud services are bringing productivity and profit to many companies, but others are getting left behind. Many of the businesses that have not yet adopted the cloud have not done so because a lack of knowledge about how to get there. That’s not surprising. Cloud adoption goes beyond just choosing private, public or hybrid cloud…

Read More

July 20, 2017
Understanding the 23 NYCRR 500 DFS Cyber Security Regulation

What you will learn in this 30 minute Webinar: Banks, financial service orgs, and insurance companies licensed in New York must have a cyber security plan in place based on the NYS Department of Financial Services cyber security regulation.   Understand the work needed to be compliant with 23 NYCRR 500 Components of a risk…

Read More

July 7, 2017
The 4 Compelling Things We Learned at Palo Alto Networks 2017 Ignite Conference

1.  3rd Party Application Framework – This announcement provides a comprehensive set of APIs that can be leveraged by 3rd party application developers to enhance the capabilities of the Palo platform. Similar to an “app store” for the Palo platform, customers will be able to develop, download or purchase extensions that leverage their existing infrastructure…

Read More

June 30, 2017
4 Best Practices for Iot Security

Lots of people are talking about the Internet of Things or IoT. But while so many people are excited about what IoT could help accomplish, many others in the security world fear the repercussions that could come along with this new wave of innovation. Imagine billions of connected appliances, from refrigerators to home surveillance cameras.…

Read More

June 22, 2017
Steering Through Threat Intelligence Hype

Threat intelligence is a relatively new area of information security, but as with any emerging technology, the hype occasionally overtakes reality. Actual Benefits of Threat Intelligence Recent research from an SC Media survey of information security professionals provides some insight here, with 43 percent of respondents expecting threat intelligence to offer an “early warning of…

Read More

May 19, 2017
How to Fast Track your Microsoft Email Migration

Integration Partners can help FastTrack customers looking to perform Microsoft Email Migrations.  We have services and project managers along with resources, tools, and experts to migrate your Exchange to Exchange online.   A successful rollout focuses on driving adoption and helping everyone understand the benefits of working in a new way.  Below is a quick overview of…

Read More

SKYPE FOR BUSINESS
April 3, 2017
11 Tips for Avoiding Skype for Business Deployment Mistakes

Microsoft’s Skype for Business is all the rage in today’s ever-connected enterprise world. But taking this unified communications tool at face value will only reduce your potential return on investment. Just like the on premises PBX that you installed years ago, Skype for Business requires a blueprint for deployment and usage to fully reap the…

Read More

1 2 3 6