Masergy BlogTransforming Enterprise IT

Security decision makers are moving away from threat prevention to a mindset focused on advanced detection, rapid response and breach mediation. That's a smart approach for today's fast-changing security landscape. An estimated 90 percent of cyber...
December 9, 2016
Mike Stute
On November 29, 2016 a critical Firefox zero day exploit was disclosed on a Tor mailing list. The exploit targets a use-after-free vulnerability in Firefox’s SVG parser. The Javascript-based exploit can be triggered by a user visiting a malicious...
December 1, 2016
Craig D’Abreo
A growing number of organizations are beginning to look beyond technical criteria when selecting a WAN solution, emphasizing additional attributes that will ensure that their WAN is designed to be outcome driven and is as agile as the business. To...
November 30, 2016
Paul Ruelas
There is a cyber arms race going on and the bad guys appear to have the lead. Cyber criminals recently hacked the U.S. Democratic National Committee, exploiting flaws in both Windows and Adobe Flash. Hackers took down Twitter, Spotify and Reddit in...
November 23, 2016
David Venable
Moving business communications to the cloud can dramatically reduce an organization’s risk and deliver substantial value by assuring organizations that their systems will remain operational in the event of various problems. More specifically, Cloud-...
November 7, 2016
Dean Manzoori
In the cyber security arms race, many traditional defenses — including firewalls, antivirus software and intrusion detection — are being outpaced by the most advanced threats. The proof? Consider these notable organizations whose cyberattacks have...
October 27, 2016
David Venable
SD-WAN is well-suited for cloud-centric and hybrid WAN environments. The SD-WAN approach to deploying and managing branch office connectivity is software-enabled and flexible. In an age when much of an organization’s traffic flows from branch...
October 18, 2016
Paul Ruelas
Software Defined Networking and Software-defined WAN have been the object of considerable buzz and confusion of late. Where does one begin and the other end? The two are related elements of an emerging way to dynamically design and manage networks...
October 11, 2016
Paul Ruelas
A vast number of organizations are migrating from legacy PBXs to modern Cloud Communications systems that bring added applications and business productivity benefits. The Unified Communications as a Service (UCaaS) market grew at 6% in 2015,...
October 4, 2016
Maurie Munro
Every privileged account on your network is like a large chef's knife in the kitchen—necessary, but potentially dangerous. Privileged accounts are typically given only to systems administrators and others who need elevated, unfettered access to a...
September 27, 2016
David Venable

REQUEST A FREE CONSULTATION

 

Free Consultation