How Data Stewardship and Data Governance Fit Together

Author: Amit Bhatnagar | Senior Solutions Architect Companies are getting serious about managing the availability, usability, integrity, and security of the data in their enterprise systems, including improving data quality, understanding the meaning of the data, and leveraging the data for competitive advantage. Managing data requires accountability. The formal need for business units to take […]

When Scanning Just Isn’t Enough: Why All Businesses Need a Full-Scope Pen Test

Author: Evan Branstner | Security Engineer Many companies confuse the important but separate roles that vulnerability scanning and penetration testing play in their security posture. Some companies, especially in the PCI compliance world, rely too heavily on automated scanning. However, vuln scanning is still a requirement for anyone as even the best pen test will […]

Making Your Communications Safe, Smart and Secure

Author: Joe Spoon | Senior Network Engineer, Todd Sanchez | Senior Systems & Security Engineer , Evan Branstner | Security Engineer Technology as a whole is constantly evolving. It’s hard to keep up with all the new offerings to determine what is what. But that’s no excuse to just assume your company’s communications security is doing […]

What is E-Rate? Is it Right for My School?

Author: Andy Clutter | Solutions Engineer So, you may be wondering what exactly is E-Rate and how to benefit from it? E-Rate was created to level the playing field of education, specifically online education, and bring internet services to schools and libraries. It is a federal government program ran under the FCC (Federal Communications Commission) and is administered by the USAC (Universal Service Administrative Company) offering discounts for approved telecommunications access […]

Communications Security – Keeping Your Information Safe & Secure

Author: Joe Spoon | Senior Network Engineer, Todd Sanchez | Senior Systems & Security Engineer , Evan Branstner | Security Engineer Like many other things, security technology is evolving. This is due, in part, to threats becoming more complex. What used to be simple attacks on one device have evolved to target every device on […]

How to Secure Microsoft Office 365

Author: Robert Moore | Systems Engineer  Microsoft Office 365 does an amazing job with out-of-the-box deployment for their entire stack. Everything from Email to SharePoint to Teams. However, out-of-the-box still requires care to ensure deployments are successful and safe. While click to deploy is great, and for most companies makes choosing Microsoft a no-brainer, security is something that should be considered.   The ability to use a single logon for Email, […]

IoT + Communications Services = Benefits

Author: Clayton Banka | Product Engineer In today’s world, it seems that everything is connected – well, almost everything. But with the continued growth of the internet of things (IoT) – a network of internet-connected objects able to collect and exchange data – soon, everything will be able to connect. In fact, according to Business […]

One check to write. It’s that simple.

Author: Garth Rouble | Director Of Billing Business Development Telecom expense professionals managing multiple locations, across different states, among different vendors and carriers, are always looking for ways to streamline the management of their communications invoices. Maintaining internal account payable staff to manage the variety of service providers a typical enterprise utilizes is expensive and […]