Aaron Russo - Senior Manager for Tech Sales Data Center
Aaron Russo
Senior Manager for Tech Sales Data Center
Jeff Stork - Software Delivery Practice Manager
Jeff Stork
Senior Service Manager
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Tony Dancona - Vice President of VMware EUC
Tony Dancona
VP VMware EUC, Solutions and Services
»See All Authors

cyber threats

We have searched the depths of our blog to provide you with the latest IT articles on cyber threats. Get Connected Today!
482234-WhatsinaName_Medium

What's in a Name?

Enable Your New Secure and Productive Enterprise

by Patrick Renzi | 12.12.16

It's no secret that Microsoft owns the productivity workspace. They have shown time and time again that productivity is about more than just end-user applications. Without a stable, user-friendly interface, adoption of these apps would simply flounder. Never content to simply sit on their laurels, Microsoft began to notice the trends of the last decade. The shift to mobile users demanding the same experience across all devices led them to release per-user subscriptions of Office 365 and then Windows Enterprise. Both give users the same experience across all devices, and, as mobility continues to flourish, Microsoft is pushing to secure those users—leading to the release of the Enterprise Mobility Suite (EMS). This bundles the best of their of per-user, device-centric security and leaves no stone unturned. EMS protects the device, the user’s identity, the apps, and the files.

Tags:Connectioncyber threatsEnterprise Cloud Suite ECSEnterprise Mobility SuiteMicrosoftMobile usersOffice 365Secure Productive Enterprise SPESPE E3SPE E5Windows Enterprise

482180-Cyber-Security-Retail_Medium

Retailers' Increased Cyber Security Budgets

The New Cost of Doing Business

by Jennifer Ramstrom | 11.21.16

Like nearly every business today, retail and consumer companies are under siege from a near-constant barrage of phishing emails, SQL injections, insider attacks, and other nefarious cyber threats.

We’ve all read about the high-profile attacks—like a massive security failure in 2015 when cyber criminals accessed the personal data of up to 15 million individuals, including names, addresses, Social Security numbers, birthdates, and more.

Tags:BiometricsConnectioncyber threatsCyber-attacksITphishing emailsRetailSecuritySQL