Network Security Challenge: Put Your Security Visibility to the Test
The security landscape changes at such a rapid pace that it’s nearly impossible for security, IT or business leaders to stay on top, let alone ahead, of the latest threats and how they can best...
The Five Levels of Cloud “Maturity”: Answer 15 Questions and Find Out Where Your Organization Ranks
Cloud is recognized by just about every CIO in the world as a key enabler of digital transformation (and, consequently, better business outcomes, like increased revenue and more strategic allocation...
Where Managed Services Works … and Where It Doesn’t
Commonly attributed to Benjamin Franklin, the quote "...nothing in this world can be said to be certain but death and taxes..." seems more true everyday, and—just having gone through federal tax...
The Evolution (or Extinction) of the “Traditional” VAR
In biology, evolution is described as the “change in the heritable characteristics of biological populations over successive generations. Evolutionary processes give rise to biodiversity at every...
The Service Provider Value Exchange: Why I Fired My “LaaS”
In order for any “As A Service” offering to be successful, the provider of the service must be able to demonstrate that they are adding value for the recurring fees they charge. It is a matter of a...
Pinnacle Poised for Growth in Managed Security Services
Worldwide Spending on Security Solutions Forecast to Reach $91 Billion in 2018, According to a New IDC Spending Guide Managed security services (single-tenant solutions operated by third-party...
More Users. More Apps. More Devices. Can Your WAN Keep Up?
Welcome to the digital era. Businesses are built on cloud-based applications. Mobility is the norm. And everything connects to the network. All of these demands are impacting existing wide area...
How to Extend the Value of a SIEM–InfoSec Southwest Austin
If you are in the Austin area, please join Pinnacle Technology Partners at InfoSec Southwest in Austin from 4/11 - 4/13. I'll be presenting and demonstrating how to extend the value of a Security...
The Olympics are Going for the Cloud Gold
It’s remarkable the changes in both equipment and performance in the Winter Olympics over the last 20-30 years. The skis, the sleds, the improvement in skating difficultly, and the numerous new...
Containing the Cost of the Cloud
We’ve got clients in all stages of cloud adoption, from the nascent migrators to the “we’re all ins.” Each stage of the journey has its own challenges, and our job is to engineer solutions for each...
Test-driving the Fluency Platform
Technology, much like a new car, needs to be test-driven and vetted before you commit. So, we took Fluency for a spin and did the comps. And it came out a winner in our book. A large number of our...
Cisco Adaptive Security Appliance Remote Code Execution and Denial of Service Vulnerability
A vulnerability in the Secure Sockets Layer (SSL) VPN functionality of the Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to cause a reload of the...