<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=2019184968353592&amp;ev=PageView&amp;noscript=1">

IT Solutions Blog

CRN Triple Crown Winner 2023

Posted by Solutions II

CRN, a brand of The Channel Company, has again named Solutions II a Triple Crown Award winner in back-to-back years. The Triple Crown Award is reserved for companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its tenth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to unparalleled technical expertise, company growth, and significant revenues within the IT channel.

Read More

Most companies have hidden assets that are vulnerable to attack. We solved this.

Posted by Jason Norred

What is ASM Illuminate? Why you need it and how it works.

 

Read More

A Billion-Dollar Opportunity to Boost Your Cybersecurity Program

Posted by Jason Norred

The convergence of new funding sources, along with heightened cybersecurity compliance requirements at the federal level, is challenging state, local, and territorial (SLT) agencies to examine their cybersecurity landscape with a heightened level of scrutiny. For SLT agencies, there's never been a better—or more necessary—time to review current cybersecurity capabilities and identify gaps to address quickly and securely. Why? 

Read More

Don’t Let a “BOOM!” Take You by Surprise in 2023

Posted by Jason Norred

The “boom” is the breach, the attack, the thing data security nightmares are made of. Recently, the context for security breaches—or booms—has expanded to include those events that take place before and after an attack. In other words, breaches include the set of events that take place before an attacker penetrates your IT environment (or left of boom) and the response and recovery efforts that happen after an attack ensues (or right of boom.)

Read More

Five Takeaways from the Gartner IO Conference

Posted by John Wondolowski

After spending last week in Las Vegas at the Gartner Infrastructure Operations and Cloud Strategy Conference – here are our five takeaways for IT Leaders.

Read More

The Value of a Security Assessment Now

Posted by Jason Norred
A comprehensive security assessment considers the organization's business objectives and identifies security vulnerabilities that put those objectives at risk.

Read More

Solutions II Named a CRN Triple Crown Winner

Posted by Solutions II

CRN, a brand of The Channel Company, has named Solutions II a 2022 Triple Crown Award winner. The Triple Crown Award is reserved for those select few companies that earn a spot on all three of CRN’s prestigious solution provider award lists in the same calendar year. Now in its ninth year, the CRN Triple Crown Award spotlights top North American solution providers for displaying a tireless commitment to achieving high revenue, company growth, and unparalleled technical expertise within the IT channel.

Read More

Security in Everything

Posted by Solutions II

Security is a state of being. A mindset. A way of operating, working and managing relationships across your business ecosystem in meaningful and measurable ways. It’s an approach that keeps your employees safe, engaged, and productive— and your business operational. This is what we call Security in Everything.

Click here to download our new "Security in Everything" eBook!

Read More

The Top 3 Workforce Multipliers for Boosting Cyber-Resiliency

Posted by John Wondolowski
Workforce multipliers can help pave the way to cyber-resiliency. They are adaptive capabilities that evolve with your business requirements and help you do more with less. These three workforce multipliers are particularly helpful in making businesses more resilient:

Read More

Attack Surface Management: Designing a Robust Program in Seven Steps

Posted by Jacob Haynes

Our goal as cyber-defenders is to look at our organizations from the cyber-attacker’s viewpoint, reduce the attack surface, and reduce the impact of a cyber-attack. Here are seven important steps to include in your Attack Surface Management program:


Read More