Home

Network

Network
Looking for Wireless upgrade recommendations in 2020. 

Top Answer:

220 views
0 comments
Related Tags
If you had a magic wand - what's the #1 daily business challenge you'd eliminate?

Top Answer: Without a doubt - Technical Debt! It's a ball and chain that creates an ever increasing drag on any organization, stifles innovation, and prevents transformation.

What's your approach to network segmentation? Share your best practices/tips/tool recommendations.

Top Answer: Its a must for a better security. Beside the traditional VLANs lately I have been deploying SDNs to do micro segmentation on VM level

16 views
1 comments
0 upvotes
Related Tags
If you are a current SAP customer, when do you plan to migrate to SAP S/4HANA?

Top Answer: No plan to migrate soon.

6012 views
20 comments
100 upvotes
Related Tags
People & Leadership
Strategy & Architecture
Cloud
End-User Services & Collaboration
Applications & Platforms
Engineering
Governance, Risk & Compliance
Data & Analytics
Business Intelligence
Disruptive & Emerging Technologies
Team & Organizational Design
Security Strategy & Roadmap
IT Strategy & Roadmap
Outsourcing & Managed Services
Network
Compute
Storage
Backup & Disaster Recovery
Public Cloud
Hybrid Cloud
Contact Center & Telecom
Data Center
Device Management
End-User Devices
Mobile
Productivity Tools
Collaboration Solutions
Document Management
Finance
Business Applications
Legal
Human Resources (HRIS)
Technical Product Management
Software Development
DevOps
Quality Assurance
Continuous Integration/Continuous Deployment (CI/CD)
Enterprise & IT Service Management (ITSM)
Availability & Capacity Management
KPIs, Metrics & Reporting
Financial Management
Vendor Management
Service Desk
Management Tools
Risk Management
Data Privacy
Artificial Intelligence & Machine Learning (AI/ML)
Data Warehouse
Integrations
Security & GRC
Identity & Access Management (IAM)
Blockchain
IoT
Innovation
5G
Peer Insights
Feedback
Vendor/Product Recommendation
Business Continuity & Disaster Recovery
Crisis Management
Customer Engagement
Customer Relationship Management (CRM)
Enterprise Resource Planning (ERP)
Business Relationships
Talent Management & Performance
Portfolio, Program & Project Management
Data Management
Big Data
Vendor/Product Assessment
Process Management
Asset & Configuration Management
Infrastructure
Performance
Operations Management
Mobile Development
Testing
What are your current concerns about the state of cybersecurity?

Top Answer: What scares me is that only 88% of us do manual scanning. That means that even if you had access to all the necessary information, or that cybersecurity knowledge base, you're still making a bad call. Why is that? That's where my curiosity is today. Something is missing that’s causing a lack of alignment. For some reason, even though the community knows that there's a problem, we haven’t experienced that iconoclastic event to make us rethink what we’re doing. 

How do you define SASE?

Top Answer: While there is no set industry standard for SASE yet (the term was coined by Gartner in 2019), in general terms SASE (Secure access service edge) it’s a cloud-based security model for your network. It’s a network architecture that combines WAN capabilities and cloud-native security functions and heavily relies on software defined networking. SASE is provided as a service by the SASE vendors. As a customer, your network equipment is connected to a centralized cloud-based service. SASE can merge your existing network architecture with network security like SaaS or Zero Trust. The network traffic control is done on the cloud edge rather then in the data center/on prem.

SIEM Perceptions and AdoptionSIEM Perceptions and Adoption

Are tech leaders turning to SIEM (security information event management) as a tool in the modern cybersecurity threat landscape?

What is the best way a new cybersecurity vendor can establish trust with you/your company?

Top Answer: Love this question and thanks for asking. I am fed up of sales people asking to connect on Linkedin.  It often starts something like "We move in the same circles", or "You popped up on my feed".  I know they are using Linkedin's marketing tools, particularly as they use my Linkedin name and not just my first name.  The very next thing,  they say is "my companies does this, would it interest you".   I have so many emails, at least a few hundred a day.  I can not deal with them all or I would get no work done.  These cold contacts are deleted or blocked without being read.  I'm answering honestly here so you have an idea of the first hurdle, getting my attention.   This starts with a thoughtful approach.  Research who I am and my current role(S).  Look at the company and what they are doing.  Think about what my pain points are and how your product addresses them.   Consider that I will already have incumbent suppliers, particularly if a mature company.   For example, we have phishing training, awareness, a learning management system, SIEM, SOC, SDLC with scanning of sourcecode and container security.  What can you bring that these existing suppliers can't match? Then start building a relationship.  A lot of successful introductions have been the results of networking.  Having round-tables and discussion forums on the latest trends and real world impact.  I expect at somepoint during these to have sales discussions.  The events have to be paid for somewhere but everyone is getting value from them.  Some have gone down the track of creating online events with a guest expert in an interesting field.  Waldo the wingman, a wine or whisky tasting session, cocktail mixing.  If you consider the cost of an in-person event, these can be quite economical.  I do see the in-person events picking up again.  These can work well if people can get time away from the office or are local. The reason it's best to work on relationship building is also to understand the buying lifecycle.  Companies often buy within an annual budget but can also extend these to 2 or 3 years to obtain better terms.  By understanding where a prospect is in this cycle, you will know when best to engage further. For new products, the puppy-dog-close is often a good way to get the product in.  Allow it to demonstrate value and the client is less likely to want to take it out.  This can be difficult for startups as it involved locked up costs for you during the trial period so make sure you manage this well.  If you are seen as unable to support a trial or POC, a large organisation may be concerned over the support-ability and viability of the company. > Do your homework > Build the relationship > Time you selling.

SD-WANSD-WAN

What's the business case for SD-WAN? What do digital leaders want to see from vendors?

0 views
0 comments
0 upvotes
Related Tags
How do you keep your cloud infrastructure, applications and data secure in a continuous manner?

Top Answer: Depending on the cloud vendor you use... We use Azure Security Center, Microsoft Defender for Cloud, Azure Sentinel, enhanced with Azure Monitor and Azure Automation so you don't have to do everything manually

If these companies were affected then the foundation of computing could be at risk. If you could manipulate at the hardware layer via the firmware, BIOS, ect then a threat actor could weaponize well below the operating system which brings in to question the integrity of the entire computing stack and everything above it.  The firmware and bios are like the rebar and concrete for a building. If that foundation is weak then the entire structure and anything dependent on it is at risk. We cannot underestimate the potential or the severity of these companies being potentially affected by the SolarWinds hack and what that means for the foundational computing hardware they provide to the world.  What do others think ?  How could this impact your organization ?   Big tech companies including Intel, Nvidia, and Cisco were all infected during the SolarWinds hack - The Verge

Top Answer: The message here is: one is never out of the woods ever, so pay attention! Just because today's news eclipses yesterday's doesn't mean companies get to shove the bad under the rug and stay silent. Remember, vulnerabilities discovered 10-15 years back are still at the top of the list of the most exploited.

Where do you think your organization needs the most help in the Cloud related technologies / solutions?

Top Answer: These votes are interesting. While initially "Cloud native development" was leading in comparison with "Cloud migration", currently it looks like (at 88 votes), "Cloud migration" is leading and the Cloud native development has lagged.   Does that mean Organizations are yet to migrate many of their workloads to Cloud yet (at the end of 2021), and Cloud native development takes a backseat in the priorities overall?