by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Barracuda Blog, August 30, 2018, by Asaf Cidon Microsoft Office 365 has become so ubiquitous—with more than 100 million monthly active subscribers—that it’s almost become part of our identities particularly inside the network with emails...
by Christine Thome | Sep 14, 2018 | Uncategorized
Originally published on the Quest blog, August 27, 2018, by Bennet Klein Many people think developing a disaster recovery plan is all about calamitous events such as fires and earthquakes, where physical property is damaged and people’s lives are at risk. But...
by Paul Comfort | Sep 14, 2018 | Uncategorized
By Paul Comfort. CISSP, Lead Engineer, Chi Corporation A little background before diving in. A SAN is a Storage Area Network. In x86 server environments, before there were SANs, servers themselves contained or controlled the storage that they used in an isolated...
by Christine Thome | Aug 17, 2018 | Networking, Uncategorized
Where a Second Lost on the Network has Insurmountable Consequences Originally published on Network World | JUNE 22, 2018 | by Norman Rice, Chief Marketing, Development, and Product Operations Officer of Extreme Networks The network edge is the new...
by Christine Thome | Jun 5, 2018 | Uncategorized
Although many industries have long offered product warranties to assure customers the products they purchase will function as advertised, this has not been true for cybersecurity. When a security product fails, customers have had little recourse — until now....
by Christine Thome | May 25, 2018 | Uncategorized
Most of Chi’s customers live in the United States and are not subject to GDPR. However, some of our customers operate multi-nationally so we felt a statement was prudent. 1. This is not a legal document. This is simply a statement of our commitment to our...