Citrix and Cisco DUO security

| January 29, 2020

article image
Tune into this fun video of host SeanDo catching up with Ginger Leishman of Cisco DUO Security. Ginger runs us through all the ins and out of multi-factor authentication and device awareness for user appropriate access. Ginger explains that it takes an understanding of the device the employee is using to set context aware policies. And with Zero trust, you can protect your workforce, workloads and workplace.

Spotlight

BPI Information Systems

BPI Information Systems was established in 1976 and has served as a cornerstone for the IT Industry in Northeast Ohio. Privately owned, BPI specializes in the design, installation, support, and emergency repair of network solutions for business, government and education.

OTHER ARTICLES

Is Your On-Premises Existence Under Scrutiny? VMware Cloud on Dell EMC Offers a Solution

Article | February 26, 2020

For many IT teams and organizations, maintaining an on-premises infrastructure has become an increasing challenge. The introduction of the public cloud, along with the wholesale perception that running workloads in the public cloud is less expensive and provides an equivalent environment for previously on-premises workloads have captured significant attention. While the popularity of the public cloud is an undeniable force, without considering the disadvantages of relocating applications from on-premises data centers to the public cloud organizations are unable to make a balanced business decision. From the finance perspective, the traditional process of accounting for expensive capital-funded on-premises infrastructure updates creates extra work accounting for the infrastructure assets across the life span of the equipment. For accounting teams – the main allure of moving to the public cloud is that it eliminates the significant capital spend necessary to refresh the infrastructure every few years, replacing that cost with a more manageable monthly bill from the public cloud provider.

Read More

Will VMware's New License Fees Trigger Rush to the Cloud?

Article | February 20, 2020

With chip makers packing more processing power into CPUs, a leading maker of virtualization software is overhauling its prices significantly to reflect the development. Will VMware’s new fees push enterprise users into the cloud? It’s a reckoning that IT executives will be forced to consider come April. That’s when the company’s new fee structure kicks in for hypervisor products that run multiple operating systems on a single piece of silicon. Some multinationals could face significant price increases under the new structure. The Dell EMC subsidiary changed license fees for its Vsphere hypervisor kit. Instead of charging per CPU socket for motherboard connections, it will now base its fee on the number of cores in the CPU.

Read More

Essential things to know about container networking

Article | March 8, 2020

Containers have emerged over the past several years to provide an efficient method of storing and delivering applications reliably across different computing environments. By containerizing an application platform and its dependencies, differences in OS distributions and underlying infrastructures are abstracted away. Networking has emerged as a critical element within the container ecosystem, providing connectivity between containers running on the same host as well as on different hosts, says Michael Letourneau, an IT architect at Liberty Mutual Insurance. "Putting an application into a container automatically drives the need for network connectivity for that container," says Letourneau, whose primary focus is on building and operating Liberty Mutual's container platform.

Read More

Why America Must win the Race to 5G

Article | March 15, 2020

The United States has entered another technology duel on par with the space race—the race for the 5G network. It will revolutionize digital interconnectivity through enhanced data processing and storage capacity. The Chinese technology giant Huawei is capturing the 5G telecommunications equipment industry worldwide. Huawei promotes contracts covering every aspect of the 5G network from financing to installation. The United States is concerned that the company’s growth amplifies China’s political sway and brings security vulnerabilities. Huawei is subservient to the communist government under Chinese law. Multiple governments have indicted Huawei for espionage, theft, bribery, and corruption. The United States has added to these charges obstruction of justice, fraud, and illicit sales to the rogue regimes of Iran and North Korea. As the West and China haggle over the 5G market, several nations face a telling choice. To meet the 5G challenge, the United States should negotiate trade agreements on end-to-end 5G services, create supply chains for upcoming virtualized 5G networks, support alternate suppliers, and invest in domestic research to dampen Huawei’s expansion.

Read More

Spotlight

BPI Information Systems

BPI Information Systems was established in 1976 and has served as a cornerstone for the IT Industry in Northeast Ohio. Privately owned, BPI specializes in the design, installation, support, and emergency repair of network solutions for business, government and education.

Events