End User Experience

Privileged Access Workstations: Securing Administrative Tasks

Privileged Access Workstations

Many companies are trying to better secure their administrative tools and sensitive data. Leveraging Privileged Access Workstations (PAW) is a good way to reduce the threat vector on these sensitive tasks and systems. PAW are separate client computing environments that can take advantage of added security measures like multifactor authentication (see our post on Six Design …

Privileged Access Workstations: Securing Administrative Tasks Read More »

EUC Delivery: Master Image Optimization

Optimizing application delivery to your end users.

With the likes of Google and Twitter announcing long-term plans for a distributed workforce, the models used to serve our end users increasingly take on a higher priority. As this transition further develops, we move from planning, or early implementation, to optimization within our technology delivery platforms. Earlier, we explored your options for delivering services …

EUC Delivery: Master Image Optimization Read More »

Exploring a NAC Maturity Model

Network Access Control

As our current technical service models stabilize during this work from home transition, we’ll take a minute to visit strategies for improving our user experience for the future return of employees to the office. Today, we explore a Network Access Control (NAC) maturity model and the maturation of the deployment within our ecosystems. NAC Maturity …

Exploring a NAC Maturity Model Read More »

Horizon Desktop: Physical Desktop Management

quick fix to support your work from home transition

The increased need to allow employees to work from home may be putting stress on your Horizon Desktop infrastructure. One quick fix for quickly scaling up the resources available to employees is managing your physical desktops with VMware Horizon. In the past physical desktop management in Horizon has been a time-consuming task. Installing the agent, adding the desktop …

Horizon Desktop: Physical Desktop Management Read More »

Exploring Your Technical Options after a “Work From Home” Mandate

Creating a strategy your work from home user base.

It’s finally happened…your company’s leadership came to you and asked what it will take to enable your entire workforce to work from home for the foreseeable future due to the Novel Coronavirus (COVID-19).  How are you going to provide a computing environment for all these remote workers, and fast?  Let’s talk through the benefits associated …

Exploring Your Technical Options after a “Work From Home” Mandate Read More »

Leveraging Microsoft’s Identity Management Platform to Secure Your Business

Avoid a tangled web of chaos by being intentional with your Identity Management

Over the past few weeks, we’ve covered a broad range of security-focused basics that you can implement to strengthen your security posture. Today, we’ll dive deeper into strengthening your security posture via the Microsoft’s Identity Management platform. As the Microsoft toolset used to manage Identity has evolved over the past few years, the ease of …

Leveraging Microsoft’s Identity Management Platform to Secure Your Business Read More »

Considerations When Deploying Network Access Control

Who has the keys to access your network?

Network Access Control Overview Today we look at deploying Network Access Control (NAC) and five considerations to explore before implementation. Network Access Control is a solution that applies and enforces network access policies. In its most basic implementation, NAC is the decision maker of what devices are allowed on the network. NAC is implemented in …

Considerations When Deploying Network Access Control Read More »

Aligning Your Technical Design and Execution to Improve Your Security Posture

Improving your security posture

We continue our journey today on aligning technical design and execution in order to improve your security posture. This week, as I sat at dinner with a long-time IT friend, his phone rang. It was his sister. She works at a financial services organization and had not been to work all week. “We have been …

Aligning Your Technical Design and Execution to Improve Your Security Posture Read More »

Six Tips When Navigating O365 Tenant Consolidation and Migrations

Having the right team around you is crucial for migration success

With O365 and its supporting office applications now mainstream, new integrations and migrations are becoming more common place. One we are seeing more of is the consolidation and migration of multiple O365 tenant environments into a single environment. For instance, COMPANY A acquires COMPANY B, and now has to figure out how to consolidate their …

Six Tips When Navigating O365 Tenant Consolidation and Migrations Read More »

Demystifying WiFi 6 – Five Technical Improvements to Consider with the Changing Landscape in Wireless

The changing landscape of wireless connectivity.

A Quick History Lesson Regarding the Changing Landscape in Wireless Over the course of time industry groups, such as the Institute of Electrical and Electronics Engineers (IEEE) and the Wi-Fi Alliance, have driven innovation and improvements for arguably one of the most used connectivity mediums in the world: the 802.11 framework, also known by the …

Demystifying WiFi 6 – Five Technical Improvements to Consider with the Changing Landscape in Wireless Read More »