Professional Services

Secure Cloud Collaboration with Cisco Spark
OneNeck IT Solutions  |  November 07, 2017
According to an IBM report, 72 percent of CEOs who made collaboration a top priority outperformed their competitors. And while collaboration in the cloud is showing signs of rapid growth, in the past, it has come with some inherent security concerns. Fortunately, Cisco Spark resolves many of the challenges with its next-generation, enterprise-grade cloud solution.
Threats to your users outside of your network got your terrified?
Amy Gregory  |  October 31, 2017
Today’s enterprise user is spending more time outside the safe haven of the network’s security and roaming on other networks in the big, terrifying world, keeping many an IT administrator awake at night wondering, “What can I do to protect our data when I don’t even know where they are?” EEK!
Simply Reliable IT With Hyperconvergence
OneNeck IT Solutions with HPE  |  October 17, 2017
As hyperconverged has become mainstream, more organizations are implementing it and enjoying improved uptime, expanded user flexibility and increased simplicity. But these benefits are more than just marketing buzzwords. Hear straight from HPE and OneNeck in this informative podcast exactly how hyperconverged delivers...
Challenges & Strategies when Upgrading Cisco ISE
Reanna Gutierrez  |  October 03, 2017
Cisco Identity Services Engine (ISE) helps IT professionals meet enterprise mobility challenges and secure the evolving network across the entire attack continuum. I recently sat down Josh Gross, a OneNeck security engineer, to discuss Cisco ISE and some of the challenges he’s seeing customers face when upgrading their ISE solution.
Is IT Modernization a Priority for Your Government Agency?
Amy Gregory  |  September 28, 2017
As a leader responsible for the IT security and infrastructure of a state and local government agency, you face the same daunting challenges as your private sector colleagues – rapid advances in technology, sophisticated security threats, compliance mandates and aging infrastructures, all with budget constraints growing citizen demands. Here’s the good news: You’re not alone.
When Milliseconds Matter – Supercharge Your Performance with Flash
OneNeck IT Solutions  |  September 19, 2017
Flash storage is critical for businesses that emphasize performance and move quickly. When milliseconds matter, flash just might be the solution to boost your I/O performance and stay ahead of the competition.
How to “AMP” Your Endpoint Protection
Amy Gregory  |  September 07, 2017
Malware is a broad term that encompasses any form of software designed to damage, steal or corrupt data. Ransomware, trojans, worms and rootkits are common malware examples, but the list is far more exhaustive, making fighting malware a normal part of operations for SMBs and corporations alike. But one cannot begin addressing the threat landscape without considering the risk endpoints bring into an organization.
Composable Infrastructure – The Next Big Thing in the Data Center?
Amy Gregory  |  August 22, 2017
The past several years has seen immense evolution in the data center, and yet again, we’re entering a new phase – composable infrastructure. Its self-service, flexible approach to application provisioning is enabling IT to operate much like a cloud provider by maximizing the speed, agility and efficiency of core infrastructure and operations. But how does it work?
Rethinking IT Security in an Age of Digital Disruption
Amy Gregory  |  August 17, 2017
While digital transformation is reshaping the way companies do business, it is also forcing companies to reshape the way they approach their security. Traditional approaches to security just aren’t good enough anymore. To counter the increasing stealth and persistence of modern cyber threats, organizations need to shift to a more holistic approach to cybersecurity that integrates technology with human behaviors and physical considerations.
4-Step Approach to Mitigating DDoS Attacks
Reanna Gutierrez  |  August 10, 2017
Distributed Denial of Service (DDoS) attacks aren’t like other types of cyber-attacks. They don’t spread malware into your network, and they don’t directly hijack sensitive data or steal from bank accounts. However, the financial and reputational damage caused by DDoS can be devastating to your business. They are also one of the most difficult types of cyber-attacks to defend against.
Why Should I Care About 802.11ac?
Amy Gregory  |  August 08, 2017
You might be noticing that the office WiFi has slowed down lately. There are many culprits: The increasing number of BYOD devices, more objects connected via the Internet of Things (IoT), heavier VoIP traffic and more business-critical apps eating up network bandwidth. So, what’s holding you back from upgrading your Wi-Fi to 802.11ac?
Casting a Wide Net for Hybrid Talent
Cindy Tomlinson, Associate Manager - Public Relations  |  August 03, 2017
Finding talent to support today’s hybrid cloud strategies can be tricky. Since the very nature of hybrid means a myriad of possibilities, even seasoned IT talent is challenged to keep up. In this article, hear what some industry experts are suggesting when looking for top-notch hybrid cloud talent.
Protect Your Business from Ransomware with this 8-Point Checklist
Amy Gregory  |  July 18, 2017
More than half of organizations experienced a ransomware incident last year, and the threat continues to be at the top of mind for IT. Are you sure you’re doing everything you can to protect your organization?
Happy Tech Dependence Day
Reanna Gutierrez  |  July 04, 2017
Today’s businesses are heavily dependent on IT. This increased reliance on 24/7 access to data and mission-critical applications to get business done makes high availability a top priority for IT, especially when leveraging outsourced support.
Smart City Technology — Making Smart Cities Smarter
Reanna Gutierrez  |  June 27, 2017
Smart cities are popping up all over the world as municipal planners marry urban living with Internet of Things (IoT) sensors and connected technologies.
Keeping Your Healthcare Data Secure – What You Need to Consider
Reanna Gutierrez  |  June 06, 2017
Electronic patient records, new healthcare applications, connected medical devices and regulatory/compliance changes are making it easier for doctors to share patient records, affect patient outcomes and increase the quality of care; but are also contributing to an explosion in healthcare data.
Breaking Down Micro-segmentation
Amy Gregory  |  May 25, 2017
Micro-segmentation is a growing trend in security that enables fine-grained security policies to be applied to data center applications and individual workloads through virtualization. This software-only approach allows you to protect your data and applications in the event that the hardware-based firewall is breached.
Secure Enterprise Mobility 101
Reanna Gutierrez  |  May 16, 2017
Secure Enterprise Mobility (SEM) is an umbrella term for the solutions designed to protect mobile devices from threats, encompassing Enterprise Mobility Management (EMM) and Mobile Device Management (MDM).
Q&A with a Security Executive, OneNeck’s Katie McCullough Vice President, Information Security & Business Applications
Amy Gregory  |  April 13, 2017
There’s no doubt about it, today’s security threats are top of mind for any modern executive. The impact of a security breach can be detrimental to any organization’s continued success, and as a result, a sound security strategy is paramount. Join us as we chat with OneNeck’s top security executive about today’s mounting threats.
Understanding the Digital Transformation of Government
OneNeck IT Solutions  |  April 06, 2017
Unlike past techno-government initiatives like eGovernment and Government 2.0, digital government isn’t just about adopting new web technologies or developing mobile apps.
Congratulations You’ve been Spear-Phished! Just kidding... April Fools!
OneNeck IT Solutions  |  March 31, 2017
April 1st is a day marked by good humored pranks, but the internet has changed that significantly; when you get pranked by a cybercriminal, your internet security is compromised, and that’s no joking manner.
Managing Shadow IT
Reanna Gutierrez  |  March 30, 2017
Employees want the flexibility to work with the applications and devices they are familiar with that will increase the efficiency and productivity of their teams. The problem is that those very same applications could be increasing your organization's risk if they are not sanctioned for use by IT.
Why ITIL Matters in an Unstructured World
Amy Gregory  |  March 21, 2017
Information Technology Infrastructure Library (ITIL) is a public framework of best practices guidance for IT service management designed to foster technology-business alignment and business success, and used by OneNeck to add structure to an increasingly unstructured IT environment.
Business Consultancy: Tearing Down the Speedbumps
Stacie Miszuk-OneNeck Business Analyst  |  March 07, 2017
All too often in business, even though we know what we’re trying to accomplish, we struggle to make any forward progress. So, what can we do to make getting things done a realistic outcome?
8 Reasons to Embrace a Hybrid IT Approach
OneNeck IT Solutions  |  January 19, 2017
A hybrid IT approach to building a flexible, scalable and efficient architecture allows organizations to maintain a centralized approach to IT governance while experimenting with cloud computing.
Healthcare Has an Identity Problem
Amy Gregory  |  January 17, 2017
Digital technology, mobility and the Internet of Things (IoT) in healthcare is fundamentally changing the way care and treatment are delivered.
Understanding Software-Defined WAN
Amy Gregory  |  January 10, 2017
SD-WAN is gaining traction as a suitable replacement for the traditional WAN, especially in a cloud-based environment.
Even Santa Has Gone Mobile
Amy Gregory  |  December 20, 2016
Holiday shopping is becoming synonymous with mobile shopping. People who have received gifts of or have gifted themselves with new smartphones, tablets and other mobile devices, are loading these tech gifts up with new apps and spending the holidays enjoying all they have to offer. But what about when those devices make an entry onto the corporate network?
Are You Keeping Pace in the Age of Digital Disruption?
Amy Gregory  |  December 19, 2016
Digital disruption is changing the way we do business, but many organizations fear change. It’s brought about by the perfect storm of low-cost communications (e.g., mobile networks, smart devices and sensors.) Organizations who embrace the digital age are rewarded with more efficient operations, an improved customer experience and the ability create better products and services to face future competition with ease.
The Cloud Journey in Today's State, Local Government and Education Organization
Reanna Gutierrez  |  December 13, 2016
Tight budgets and regulations mean the State and local agencies, as well as educational institutions, are looking to move to the cloud, but are often unsure of how best to proceed.
10 Considerations When Choosing Flash Storage
Amy Gregory  |  December 08, 2016
The top pain points IT managers face when it comes to storage are reducing storage-related costs, ensuring data compliance and protecting virtual machine data, all while increasing capacity and performance. When choosing a storage solution there are many factors to consider. Flash is now the new normal thanks to its affordability, agility, efficiency and speed – but how do you decide if it is best for your organization?
From Excess to Efficiency
Amy Gregory  |  November 22, 2016
What do Thanksgiving turkey and IT resources have in common?
The Challenge of a Digital Strategy for Today's Government Leaders
OneNeck IT Solutions  |  October 13, 2016
As government IT infrastructure ages, the need to embrace a digital strategy has become even more critical. State and local governments are continually called on to do more with less. Not only must they strive to satisfy an increasingly demanding constituency that expects services to be always-on and delivered at real time, but they must do so in the face of a reduced staff and budget. What’s needed is a digital strategy that enables government leaders to drive productivity, engagement, and innovation – without breaking the budget.
Addressing Compliance Challenges in a Non-Compliant World
Reanna Gutierrez  |  September 27, 2016
It can be difficult to keep up with the changes in compliance mandates. PCI-DSS and HIPAA were both updated in 2016 to keep up with the threat landscape. These ever-changing compliance mandates can create challenges in maintaining compliance. These include not evaluating your IT solution provider, neglecting physical security and not monitoring security and compliance processes. In order to ensure compliance, you must ask the right questions of your IT service provider to have reassurance that they are doing all they can to protect your organization and your customers.
The Risks of Free Wi-Fi
OneNeck IT Solutions  |  September 21, 2016
Free Wi-Fi is a danger to your company’s network security. When your employee connects to a public Wi-Fi at an airport, mall or coffee shop, they run the risk of exposing personal information AND sensitive company information. A hacker can easily set up a fake Wi-Fi hotspot and lure your employee to connect. Then, once they log in, hackers can perform a man-in-the-middle attack to steal data or, worse yet, gain access to your corporate network.
Think Big with a Career in Technology!
Amy Gregory  |  September 08, 2016
The technology sector has been growing faster than other segments of the economy, and many top technology companies have been dubbed as “best places to work” because of their drive to innovate and challenge the status quo.
Is technology or strategy dictating your IT decisions?
Amy Gregory  |  August 18, 2016
A recent study by MIT Sloan Management Review and Deloitte sheds light on what differentiates companies who utilize strategy-driven, not technology-driven innovation. Digitally mature enterprises use new technologies to transform business operations on a large scale. In contrast, less mature businesses use technology more like a Band-Aid. According to a survey of over 4,800 business executives, only 29% of businesses are in the maturing stage.
7 Reasons Hybrid IT is a Winning Strategy
Reanna Gutierrez  |  August 11, 2016
Hybrid clouds bring the best of both worlds and ensure IT infrastructure closely aligns with the needs of business. A recent State of the Cloud Survey finds that nearly three-quarters of today’s enterprises are using a hybrid infrastructure and adoption rates have increased from 58% in 2015 to 71% in 2016. As more organizations consider a hybrid IT strategy they should keep seven key factors in mind.
Is your biggest security threat from within?
Amy Gregory  |  August 04, 2016
Insider threats from employees and business partners represent one of the largest risk factors organizations face. IBM found that in 2015, 55% of breaches came from the inside. Even though almost half of these attacks were inadvertent rather than malicious, IT departments need to be prepared to prevent and mitigate internal security threats.
When teams work collaboratively from anywhere, SPARKS FLY!
OneNeck IT Solutions  |  June 23, 2016
Cisco Spark is changing the way organizations communicate to improve collaboration and teamwork, creating more agile organizations ready to meet the pace of modern business. Cisco Spark speeds up productivity by blending team messaging, meetings and phone calls in the cloud for vastly improved collaboration. Cisco has developed a simple platform that is easy to use, but also includes a robust developer environment with APIs to enable innovative apps that can be customized for your unique business practices.
WYOD? Are you ready?
OneNeck IT Solutions  |  May 10, 2016
WYOD, or wear-your-own-device, is a new trend that organizations need to start addressing. WYOD differs from BYOD in that there are no standards for user identity and authentication which will lead to a host of new security vulnerabilities. Organizations will need to start addressing WYOD as wearables in the workplace are predicted to steadily rise in the coming years, and those who don’t plan ahead will face problems down the line with workflow and security issues.
Transforming the Student Experience with Mobility
OneNeck IT Solutions  |  May 05, 2016
As connected learning and global research continues to define the next-generation of education, institutions are looking to integrate mobile technology across the entire campus to enhance the educational experience, but face the challenges of aging infrastructure and low bandwidth to meet the technical requirements of today’s connected classrooms.
Putting SDN to Work with an Application Centric Infrastructure
Amy Gregory  |  April 19, 2016
Learn from an industry expert how we are seeing firsthand with our customers how ACI delivers a new way of networking that’s faster, more simple and brings a new level of security to the data center. It’s really powerful and here to stay.
The Internet of Things is Here Now. Are you ready?
OneNeck IT Solutions  |  March 24, 2016
Smart products are connecting our world faster than ever before. IoT isn’t just some hyped-up futuristic vision of what could be coming. The present-day reality is that IoT is beginning to transform the way we do business.
Are you and your DR Plan feelin’ lucky?
OneNeck IT Solutions  |  March 17, 2016
Mid-March is the time we celebrate Saint Patrick’s Day, but IT professionals know better than to trust to the luck of the Irish when it comes to disaster recovery. As IT experts know, it’s never a matter of if a data center disaster will strike, but when. So top of mind for most IT managers is how they are going to protect business-critical data and what strategies they need to have in place to restore that data when disaster strikes.
Why Organizations Need a Mobile First Mentality
OneNeck IT Solutions  |  March 14, 2016
Processing power and the exponential growth of storage and bandwidth have turned our devices into small personal computers, and organizations of all sizes are embracing them. But having a mobile-first strategy is not as simple as giving employees mobile devices or implementing a BYOD policy. Both of those simply mean you allow the use of mobile devices, but neither addresses the true spirit of a mobile first mentality. So, what is a mobile-first strategy?
SDN sounds great, but now what?
OneNeck IT Solutions  |  March 01, 2016
Software-defined networking (SDN) is starting to make inroads and is projected to grow from $103 million in 2014 to $5.7 billion in 2019 with the adoption rate among enterprises expected to grow from 6% to 23%, according to research firm IHS. At the same time, IHS predicts service providers around the world will increase their spending on SDN software by 15 times from 2015 to 2019. No matter the route you choose, an SDN network solution requires the integration of multiple types of network technology and demands that network architects and administrators have a deep understanding of the technologies involved as well as the organization's needs. Is your organization up to the challenges SDN brings?
The Importance of Developing an IT Strategy
OneNeck IT Solutions  |  February 12, 2016
Understanding Cisco iWAN
OneNeck IT Solutions  |  February 04, 2016
Many businesses rely heavily on a WAN (wide area network) for processing transactions, providing visibility and enabling collaboration, especially when they operate in multiple locations or branches. Some of these organizations are finding that the load exceeds the capabilities of their existing infrastructure. Rather than replace existing networks or adding new bandwidth, savvy organizations are opting for installation of Cisco’s intelligent WAN, also known as iWAN.
Lifecycle Services is the portal to AX 7
Scott Morley  |  February 02, 2016
Lifecycle Services is the portal to AX 7. LCS helps drive your AX projects from inception through the maintenance cycle following go live...