InterVision's depth of expertise in remote workforce enablement made us a good fit for their project's objective. We worked closely with their IT team to provision a new VPN with Cisco's AnyConnect that not only connected employees to their IT systems remotely, but also emphasized the necessary security and compliance standards they needed.
Harnessing the Benefits of AWS
To ensure a successful and smooth transition to AWS, it's best to understand the full picture of your technology and business interdependencies, and the value that managed services can bring your IT staff.
What to Do When Your Windows Server Runs Out of Support
There is a plethora of reasons why an organization may still be running these older operating systems, but as any respectable security practitioner will say, applying patches is the first line of defense against network-based threats.
VMBLOG: Four Benefits of SD-WAN Outside of Costs
Traditionally, backhauling traffic through a datacenter allows an office to access the internet, external resources, data and apps. However, this model often creates hair pinning and pinch points as well as an overall complicated and expensive process. With the emergence of software-defined WAN (SD-WAN), this can all be avoided.
Backups vs. Disaster Recovery as a Service: The difference between driving away and heading back to the shop
A common misunderstanding is what Backup-as-a-Service (BaaS) is compared to Disaster Recovery-as-a-Service (DRaaS). The difference is more than just price and provider.
Why You Should Reconsider Hosting HIPAA Data Overseas
Choosing the right DRaaS provider for a secure business environment can be tricky, especially if you're an organization covered by HIPAA and HITECH regulations.
Four Levels of Security Controls
Security is of upmost importance in the financial industry, and it's not easy. While some tasks may fall to the bottom of your never-ending to-do list when time and resources are limited, security simply cannot.
3 Things to Know About SOC 2 Compliance and Cloud Providers
A SOC 2 report functions as a written form of assurance that the vendor is protecting their data. This is particularly useful to companies that are assessing potential cloud providers, since reading the report gives them transparency for what to expect of the provider.
Genetic Testing Firm Leverages Greater Security to Protect Patient Information
InterVision designed a cybersecurity tool that fit the client's authentication needs, deploying ClearPass using guest-sponsored methodology, which allowed company employees to approve or deny any guest on their network. Also, the solution enabled the network administrator to monitor guest users, to see suspicious activities in real-time. Not only did the solution meet the client's goals; they were so satisfied with the benefits their network experienced in security improvements, they have been engaging with InterVision for additional projects.
Developing a Unified Approach to Multi-Cloud Security for California State
The California Department of Technology (CDT), Office of Information Security (OIS) recognized the importance of preparing for State entities to migrate significant internal and customer applications into the cloud. To ensure that these efforts were realized with appropriate secure development processes, security architecture, configuration, and monitoring/management capabilities, CDT sought out InterVision, who developed DevOps/SecOps tools and processes to support both multi-cloud and hybrid cloud environments.