By Jonathon Wiggins, Structured Sr. Systems Engineer -- My job has always been to give end-users access to their data through published applications or desktops. Before the cloud, when all applications and data were in an on-premises data center, things operated smoothly without much complexity. Today, it’s no secret that more companies – like Microsoft and Citrix – have shifted their service delivery focus from on-prem to the cloud. This shift has significant consequences for IT personnel managing these virtual environments. Despite the cloud’s enormous benefits regarding containment, scalability, and redundancy, one key factor that is easy to miss when moving workstations to the cloud is data location. One of the tenets of virtual desktop infrastructure (VDI) and published applications for me has always been: Virtual workstations and applications need to be close to wherever the data is. It's all about (data) location, location, location! Virtual workstations and applications must be as close as possible to the data for optimal performance and efficiency. Think for a minute about this: When workstations reside in the cloud while the data is on-premises or in a separate data center, the complexities of end-users accessing data from their virtual desktop only increase. In this…

Meeting Cyber Insurance Mandates: Help for CISOs


Cyber Insurer

A Structured Blog -- Today’s CISOs must surely feel as if EVERYONE is looking over their shoulder -- adversaries and allies alike -- probing for risk and vulnerabilities. And they would be right to feel that way. Ransomware’s insidious rise, combined with enhanced civil and criminal penalties for negligent corporate boards and C-suite executives, placed…

Read More

MGM Hack: What Happened and How to Prevent Future Attacks


MGM Hack Don't Gamble with Ransomware

By Structured Director of Cloud Security Collin Miller and Structured Director of Governance, Risk & Compliance Rob Wayt -- On September 11, 2023, MGM Resorts International, the owner and operator of some of the most popular casinos and hotels in Las Vegas, announced that it had experienced a cyberattack. The attack caused significant disruption to…

Read More

Network Security Engineer’s Ultimate Guide to SD-Branch to support your journey to Zero-Trust Architecture


Welcome, fellow network security engineers, to this comprehensive guide on fortifying your organization's Software-Defined Branch (SD-Branch) configuration against potential threats. In today's fast-paced digital world, businesses are increasingly adopting Software-Defined Wide Area Networking (SD-WAN) solutions to enhance network agility, improve user experience, and reduce operational costs. As these modern SD-Branch infrastructures continue to gain traction,…

Read More

SD-Branch and SD-WAN: Understanding the Differences


Technology buyers at multi-site organizations have a wealth of choices when it comes to network and security vendors, programs and support. One popular option that many teams are currently evaluating is “software-defined” network management technology known as SD-Branch and SD-WAN. It should come as no surprise that there are advantages and benefits to both, best…

Read More

How Distributed Organizations Benefit from SD-Branch


Information technology

Technology is almost universally judged by how it performs. And what determines successful performance? Industry experts? The IT team? No. Positive business outcomes are the yardstick by which success is measured. Many tech buyers typically default to hard dollar decisions as their primary criteria, i.e. how much the purchase will cost or save. But the…

Read More

Incorporate Resilience Planning for Stronger Cybersecurity


Artistic rendering of cyber resilience in nature

By Structured Staff -- Does resilience planning factor into your cybersecurity strategy? If not, it should. And here’s why: While prevention is a great objective, it is increasingly difficult to defend a complex attack surface from all threats – especially the sophisticated and advanced threats we encounter today. Instead, organizations are bolstering prevention efforts with…

Read More

So Vulnerable: Common Findings from Penetration Testing


Ethical Penetration Testing

By Chris Green, Structured Security Engineer, CISSP-ISC2, CISA ISACA, QSA PCI SSC, PCIP PCI SSC Amid rising global tensions and numerous warnings from the Department of Homeland Security’s Cybersecurity & Infrastructure Security Agency (CISA), organizations across the globe can expect to see an increase in cyber attacks from nation-states, criminal gangs, and copycats riding the…

Read More

Know the Three “Cs” of Cloud Connectivity


Cloud Connectivity Image

By Robert Karcsay, Structured Connectivity Specialist, SD-WAN & Cloud, CCNT #662000 If you have decided to move your systems and data to the cloud, you are among a growing number of businesses looking to stay competitive and remain nimble. But to achieve your business goals without blowing up your budget or your people, there are…

Read More

Identify, Connect & Protect at the Edge


Aruba ESP Edge Computing

By the Structured Enterprise Networking Team In modern network architectures, more and more data is being generated, analyzed and stored at the “edge” -- not in a traditional data center. That edge better serves users of ubiquitous mobile devices like laptops, phones, and tablets because it puts them closer to their applications and data. But…

Read More

View More Pages