Masergy Blog

Debunking SD-WAN Myths
February 12, 2019

Many people believe it’s only SD-WAN if your network uses public internet links, but that’s false. Here’s why SD-WAN should be access agnostic.

Read more

Managed Security Services vs. Managed Detection and Response: What’s the Difference?
February 12, 2019

Detection and response services take traditional security services a step further. Here’s how it’s different and how to know if you need it.

Read more

IoT Necessities: Getting Your Network and Security Ready
February 5, 2019

Are you ready for IoT? Five necessities prepare the IT environment to successfully manage and secure a plethora of connected devices.

Read more

Threat Minute: What is Credential Stuffing and How Do You Protect Against It?
February 5, 2019

Masergy’s Director of Cybersecurity Solutions explores what credential stuffing is and how to protect yourself against it.

Read more

Networking, Security, and Visibility: How the Next Evolution of Technology will Serve the CIO
January 29, 2019

Self-adjusting networks are just around the corner. How will future networks better serve CIOs and what’s needed to get there? The answers are here.

Read more

Network Design and WAN Connectivity: A Three-Step Process to Balance Price, Performance, Risk
January 22, 2019

Translate business goals into an ideal network design that blends both private and public access. Get a design framework, tips, and common missteps.

Read more