Blog

October 29, 2019
These Three Cloud Technologies Are the Future of Communications There is an overwhelming number of cloud-based communications solutions out there today. Choosing the right one can be difficult! As a decision-maker, you’re flooded with technology options, and all of them seem like they can help in different ways. But among all the collaboration solutions are three distinct ones to consider. Here we explain why Cisco Teams, Microsoft Teams, a[…]
October 24, 2019
Enterprise Visions Wins Central U.S. Award From Intelisys We're thrilled to announce that Enterprise Visions has received the 2019 Top Growth Partner for the Central Region from Intelisys. Announced at Channel Connect 2019 – the industry's premier networking event in Monterey, California in September – this award reinforces our commitment to our customers from Minnesota to Texas and beyond. Ron Beltz, Principal at Enterprise Visions s[…]
October 15, 2019
Enterprise Visions Has Achieved a New Milestone Enterprise Visions is thrilled to announce that we have achieved Platinum Partner status with our master agent, Intelisys. Platinum Partner status means we have joined Intelisys' $1 million club – generating $1 million a month in recurring revenue. We are the 20th technology advisor to achieve this status, and we are grateful to all our customers for their business which has he[…]
Filed Under: Company News
September 9, 2019
The incident response plan outlined at the bottom of this post is a snippet from a generic plan I found on Google. It is a plan created by Virginia Tech. In its entirety, it is 41 pages long. Try flipping through that when you are under attack! Can you guess how long each step below will take your IT group, without help? One can imagine that the times can vary widely depending […]
Filed Under: Uncategorized
September 9, 2019
It surprises me how many tools companies use for cyber security are just logging tools. Sure, logging should be one part of your security posture, but it is unwise to rely on logging for the total solution. So, if logging from tools like Splunk, LogRhythm and AlienVault were valuable from a forensic standpoint, why is the logging that is collected so often inadmissible in court[…]
Filed Under: Uncategorized
August 26, 2019
Layers 5-7 are where applications reside and where attacks on them take place. Interestingly, many vendors’ cybersecurity tools also reside here. Some vendors put the instructions on how to install their agents or virtual appliances on their web site. You will see that they are installed in the Program Files” folder - Layer 7. Virtual Appliances in the cloud reside on an instan[…]
Filed Under: Uncategorized
August 26, 2019
Your Network Optimization Plan Begins with SDN You may have heard of software-defined networking (SDN) and its ability to simplify some of the complexity associated with cloud environments. SDN separates the control plane and the forwarding plane of the network, so administrators have more control and more opportunities to improve application performance. SDN allows enterprises to bypass the public internet and connect to t[…]
August 12, 2019
The Common Enemies of Unified Communications When renewal time comes around on your communications technology, you’re likely to explore other options, and you may see that unified communications is a clear choice for advancing your productivity and collaboration. Aside from a wide variety of features, unified communications offers scalability and reduced costs. What begins as a launch of a disruptive technology that promi[…]
July 25, 2019
Vendors today all take a pride in notifying customers of breaches, helping track the spread of the breach, and offering advice on how to remediate the breach. That sounds nice but, it is not so nice. Especially for someone who doesn’t know security well, the instructions can be confusing. Adrenaline + Stress = Instructions that look like they are written in a language from anot[…]
Filed Under: Uncategorized
July 22, 2019
Building a Fully Integrated Branch With SD-WAN As enterprises become more invested in cloud resources and more reliant on real-time insights into business processes, branch locations require more than connectivity to the enterprise resource planning (ERP) system. Voice over internet protocol (VoIP), collaboration tools, and mobility are just a few of the factors contributing to a need for a more integrated approach to the e[…]
RECENT POSTS
ARCHIVES

CATEGORIES