Validating Performance and Resiliency with Nutanix X-Ray
Validating Performance and Resiliency with Nutanix X-Ray So you just unboxed, racked, and deployed a new Nutanix cluster, and your boss comes to you and asks how we know it’s ready to handle workloads. I mean, you can be confident in saying that it’s ready, but what if you can provide them with results that […]
What is the Microsoft Intune Suite? How Is It Different From Intune?
What is the Microsoft Intune Suite?How Is It Different From Intune? The Microsoft Intune Suite is a collection of five additional capabilities on top of what Microsoft Intune Plan 2 has to offer. In this post, I’ll detail what those capabilities are and what benefits they deliver compared to the current Intune capabilities. At the conclusion, […]
Microsoft Ignite 2024 Day Two News and Notes
Microsoft Ignite Day TwoNews and Notes Microsoft Ignite 2024 – Day One News Day 2 continued at the Microsoft Ignite Conference with deeper dives into topic areas around Azure, Microsoft 365, and Security solutions. I will be attending sessions that focus primarily on infrastructure, security, and productivity solutions across Azure and Microsoft 365. During the […]
Microsoft Ignite 2024 Opening Day – News and Notes
Microsoft Ignite Opening DayNews and Notes Microsoft Ignite 2024 – Day One News The Ignite Conference session catalog indicates that there will be numerous updates on how AI is integrating into various areas, including GenAI with Copilot, security, infrastructure, and development. I will be attending sessions that focus primarily on infrastructure, security, and productivity solutions […]
What Should I Do with These DLP Alerts, Anyway?
What Should I Do with These DLP Alerts, Anyway? Today I am going to address a common tactical and process challenge that comes up when working with clients implementing Data Loss Prevention policies: How are DLP alerts handled? Also, who performs triage, investigation, and resolution? DLP alerts are unique. They can be an indicator of […]
Zerto Virtual Replication Deployments: A Comparison
Zerto Virtual Replication Deployments:A Comparison With the first post in the Zerto series, I ran through the history of Zerto and some features that Zerto Virtual Replication provides. Continuing the series on Zerto with the second post, we’ll cover the typical Zerto Virtual Replication deployment requirements and compare a Windows-based deployment versus the newer Linux-based […]
November 2024 Newsletter
November 2024 Newsletter Table of Contents We’re Grateful for YOU This Thanksgiving Season As we celebrate this Thanksgiving season, we want to express our heartfelt gratitude to you! This year has been filled with growth, challenges, innovation, achievements, and accolades—and we know none of it would be possible without your trust and partnership. Your partnership […]
Accelerating Redaction and Enhancing Compliance: How AI is Transforming Document Management in Higher Education
Accelerating Redaction and Enhancing Compliance: How AI is Transforming Document Management in Higher Education Recently, the case study Harnessing Custom-Built AI to Accelerate Redaction and Drive Efficiency for the University of Pittsburgh articulated the successful use of AI to accelerate artifact redaction. The opportunity to implement a similar solution in various other support units within higher […]
Nonprofit Response to a Ransomware Incident: Tabletop Exercise Results
Nonprofit Response to a Ransomware Incident: Tabletop Exercise Results Interested in comparing your ability to respond to cyber incidents to other nonprofits? This blog provides details of the results from a crowdsourced tabletop exercise led by our Strategic Advisory team. We asked nonprofits from around the globe questions about how they’d handle a ransomware incident. […]
Enhance Your Security with the New Microsoft Entra Suite
Enhance Your Security with the New Microsoft Entra Suite Microsoft Entra has introduced a new tier of capabilities within its identity management and security tools. This new tier focuses on enhancing advanced access management, security, and identity to support Zero Trust principles, while also addressing integration gaps that pose risks for businesses. I speculate that […]