Quick recap – What is #AaaS? – In its most basic form, #AaaS is a fixed price engagement targeting senior stakeholders in the business (often executives CIO, CTO, CISO, CDO)
If you have read my Architect as a Service (#AaaS) Blog and are back here to understand more about the deliverable roadmap provided at the end of an #AaaS engagement, welcome to part 2.
For many customers, no matter their size, lack of visibility and clarity in direction are two of the top reason’s decisions cannot be made and value derived…
Join Lee Foster (Insentra) and Greg Kieser (Ziften) for a chat about how Ziften and Insentra can help partners provide more value in the cybersecurity and information protection space.
For those not living their day to day in the world of Citrix, the title of this blog post may come as a surprise.
Does this sound familiar? Parts of your business started out creating solutions security to unquantified compliance and risk problems. Those teams worked in isolation, discussing the problem…
The past three years have flown by and I cannot believe where we are now when it comes to Data Loss Prevention (DLP).
First a bit of background – I am the Principal Consultant for security at Insentra where I have been working for six years out of ten years as a Symantec Consultant.
A significant number of NetBackup customers are currently looking to eliminate tape within their environments. For a long time people have been saying that tape is dead but until recently it was not cost effective as the amount of data you could store on an LTO tape and the performance of the drives made it […]
Upon completion of a Symantec Endpoint Protection (SEP) health check and/or SEP14 upgrade readiness assessment, the next step is to perform the upgrade to version 14. Ensuring the current SEP implementation has been designed, implemented and managed in line with best practice is one of the foundational pillars of a solid cyber security strategy. Download […]
There have been some very dramatic headlines over the past few months about malware infections that have been breaking out around the globe. Factories shut down, websites infected and a loss of confidence by consumers. WannaCry, Petya, NotPetya…The list goes on. Are they ransomware or were they created to destroy? Are the perpetrators cybercriminals or […]