Protecting Students with Safe Schools

Posted on October 20, 2020 by ConvergeOne

Campus Security

We ask our educators to do a lot. The threat of school violence on campus and from remote sources has district decision-makers needing answers. Risks need to be identified, with consideration given to protecting the student wherever they are. Security needs to be conducted in a way that doesn’t feel like a prison. What’s more, innovation with physical security provide new feature sets only possible on IP networks ⏤ meaning that IT teams now have partial or new responsibility for physical security. ConvergeOne coordinates a mix of digital applications to shield against/respond to threats and other hazards. Key areas of focus include:

Read More

Supporting a More Secure Remote Workforce with Amazon WorkSpaces

Posted on October 13, 2020 by Martin Townend

In today’s pandemic times, we are finding more and more customers and end users are working remotely from home. This requires users to access a number of devices, including laptops and tablets, while at home. Is this secure? Absolutely not.

Read More

What’s Required for Wi-Fi 6

Posted on October 6, 2020 by Jason Boyers

In my last blog post, I covered some of the benefits of Wi-Fi 6. Now, you might be saying to yourself, "How can I get these great benefits for my wireless network?" As always, when we talk about new wireless technologies, we are talking about an upgrade of at least the radio hardware. This is due to the changes in how the radio signal is modulated and other requirements. At this point, we have a way to provide for these changes in software.

Read More

What Does a One-Stop Shop Mean to You?

Posted on September 29, 2020 by Kathy Sobus

What does it mean to do business with a one-stop shop—does it mean working with only one vendor? Does it mean working mostly with one vendor and using a few other third-party applications? Does it mean being free from the restriction of any particular vendor?

Read More

Unstructured Data: Cloud to the Rescue… Right?

Posted on September 22, 2020 by Patrick Holden

One way to overcome a lot of the previously mentioned challenges and concerns with storing such large amounts of unstructured data is to move it to a public cloud provider. As for the previously discussed challenges of legacy NAS filers, most of those concerns would no longer be applicable. Essentially, you would be paying the cloud provider to worry about all the infrastructure concerns like capacity, performance, uptime, H/W support, and so on.

Read More

Solutions for Social Distancing and Contact Tracing in the Workplace

Posted on September 15, 2020 by Andrew Pennington

As businesses re-open their offices and employees are not restricted to work-from-home limitations, many are looking for ways to increase employee safety and actively respond to incidents of COVID-19 infections. Managing occupancy and density, monitoring adherence to social distancing guidelines, and performing contact tracing within the workplace are some of the challenges these businesses are facing. This blog post introduces solutions from ConvergeOne and its technology partners that address these challenges.

Read More

The Future of K-12 Education

Posted on September 8, 2020 by ConvergeOne

Parents and communities place the highest degree of trust in local educational agency (LEA) schools to not only educate their children, but also to keep their children safe. LEA instructional and technology leaders are innovative and tireless in managing this enormous responsibility—and at ConvergeOne, so are we. Inspired by the mission of educators, we develop solutions for academic equity, student access, ransomware readiness, and other matters of concern to school leaders, including:

Read More

Enable Remote + Virtual Workers with Microsoft Teams

Posted on September 3, 2020 by ConvergeOne

Has your organization realized the full potential of your Microsoft Office 365 subscription by adopting Microsoft Teams?

Read More

Eight Actions CISOs Should Take Right Now

Posted on September 1, 2020 by Joe Vigorito

In my previous blog post, I promised more guidance on the next steps to consider taking now, while the pandemic is still upon us. Here are eight actions CISOs should consider taking.

Read More

Cyber Recovery: Critical Rebuild Systems

Posted on August 26, 2020 by Tony Ocampo

Should the dreaded day that your organization suffers a ransomware attack arrive, the severity of the damage could vary from a simple file system encryption to a total lockout. Depending upon the misfortune your IT team is dealt with, the recovery process could possibly consist of a total wipe of the servers, storage, backups, especially critical systems, logical configurations, and property. The most difficult thing to swallow is when you thought you had everything covered in your disaster recovery or backup systems—only to find out the opposite is true.

Read More