Category: For IT Pros

4 Network Cabling Service Mistakes To Avoid

Technician fixing cables

Wireless technology garners many of today’s IT-related headlines. However, there are few elements as crucial to a productive setting than reliable network cabling.  Recognizing that, ensuring your network cabling service providers deliver on the promise of an efficient and effective network is crucial. To help, here are four network cabling service mistakes to avoid. 1…. Read more

CTC’s August 2019 Threat Report

Cyber threat

Technology integrates so well into our daily lives that it’s easy to place perhaps too much trust in it.  That’s what happened to approximately 100 drivers in California. They trusted Google Maps to find their way out of a traffic jam but ended up stuck in a muddy field. That level of trust can create… Read more

CTC’s July 2019 Threat Report

Security is more important now than ever.

Along with rotary dial phones, cassette-playing Sony Walkman devices, and CRT televisions, add another victim to advancing technology: battle lines. Today, no one is afforded a clear demarcation point between potential conflict and peace. That includes, as we see below, your company. The U.S. Goes After Iran with Cyber Attacks; Iran Attacks Industries Following the… Read more

Wireless VoIP: Something in the Air

Wireless VoIP

With the Voice over Internet Protocol (VoIP) market projected to surpass $55 billion by 2025, it’s clear that enterprises remain bullish on the technology.  That may provide a good headwind for wireless VoIP, which looks to attract more business users in the coming years. What Is Wireless VoIP? Wireless VoIP takes a cue from its… Read more

5 Top Barcoding Systems For Manufacturing

Barcoding systems

Barcoding systems in manufacturing allow for an array of benefits, including materials and equipment inventorying, shipment processing, and equipment tracking. Those benefits and more translate to efficiencies that can directly boost a manufacturer’s bottom line. Holding inventory, for example, can cost an enterprise as much as 30% more than the inventory’s unit cost value. If… Read more

CTC’s June 2019 Threat Report

Vulnerable computer user

Trust, but verify. It’s advice popularized by President Ronald Reagan during his tenure. He used to help characterize his philosophy toward Soviet leaders on the subject of nuclear disarmament. The need for such due diligence permeates every layer of every enterprise’s IT landscape. News from the last month underscores how even the largest organizations are… Read more

Overcoming Wireless Challenges In a Manufacturing Environment

Manufacturing wireless connectivity

While wireless technology will never be problem-free, the margin of error for manufacturers grows smaller by the day, driven by global competition as well as increasing client and consumer demand for quality and reliability. For a time, manufacturers could hobble along with various wireless problems. That’s no longer the case, though. Add to the competition… Read more

Manufacturing on the Edge

Edge in manufacturing

By 2025, the industrial Internet of Things (IIoT) market will pass the $900 billion valuation mark worldwide. Among other changes, this ongoing wave of digitization promises to change how manufacturing plants look, operate, and produce goods. A chief component of this change is edge computing — locating data storage closest to the facility or facilities… Read more

5 Big Challenges Facing Manufacturing Today

Manufacturing challenges

Manufacturers today face challenges on multiple fronts. Globalization, new and developing facets of the fourth industrial revolution, cyber threats, and other matters present hurdles for any company looking to make its mark. A survey of the top issues concerning manufacturers today turns up several prominent ones, including the following. 1. Producing and Protecting Innovative Products… Read more

5 Top Indoor Location Services Providers for 2019

Indoor Location Services

Few technologies promise to revolutionize the user experience more than indoor location services in the next few years. Industries with multi-billion dollar markets all stand the benefit, including: Healthcare Transportation Education Manufacturing Selecting the right vendor to support initiatives in these and other industries might make all the difference between a successful effort and one… Read more

Head-To-Head: Fortinet and Palo Alto Firewall Solutions

Fortinet compared to Palo Alto

In our 5 Top Firewall Providers for 2019 post, we examined the prominent offerings and market conditions affecting key players in the firewall market. Now, we’re providing a closer look at two of the top finishers: Fortinet and Palo Alto. Our goal: to provide further assistance in determining which firewall solution to choose. What Users… Read more

Head-To-Head: Symantec and Digital Guardian Data Loss Prevention Solutions

Symantec comparison with Digital Guardian

In our 5 Top Digital Loss Prevention Providers for 2019 article, we examined how top data loss prevention providers’ performance and market conditions will influence the field in 2019. Now, we’re setting up a head-to-head comparison between two of those entries — Symantec and Digital Guardian — thanks to aggregated data from some of the… Read more

5 Top Firewall Providers for 2019

Firewalls are vital

Rogue AI chatbots, IoT breaches, widespread fraud: many expert predictions for 2019 are downright dire. Selecting the right firewall provider can go a long way to protecting your enterprise’s reputation, data, and bottom line. Let’s take a look at five top firewall providers for 2019. 1. Fortinet Maybe it’s the company’s independently certified and continuous… Read more

CTC’s January 2019 Threat Report

Crystal ball

Despite continual technological advances, development of a crystal ball that accurately predicts the future of cybersecurity eludes us. Thankfully, a couple of recent news items provide guideposts that may well come in handy for this new year. Experts Predict 2019 Cybersecurity Dangers Responding to a request from Forbes, a number of IT experts shared their… Read more

5 Top Data Loss Prevention Providers for 2019

Data loss prevention

In 2018, the number of breached records totaled more than 1.3 billion. The root cause of many of those breaches? Unintended disclosures. That is to say, user error rather than hacks. Hackers didn’t take the year off, though. As you can imagine, their efforts also comprised a significant number of breaches. For today’s enterprise, looming… Read more

5 Top Endpoint Security Providers for 2019

Find the right endpoint protection provider.

Endpoint security is the practice of protecting a network from malicious programs or activity originating from any one of that network’s numerous connection sites. Anything can happen after that. And whatever does happen could end up costing your company a lot of money. According to the Ponemon Institute, system downtime from an endpoint attack can… Read more

5 Top Data Recovery Providers for 2019

data recovery

Not sure how much urgency a single hour of downtime merits? One survey that tallied organizations’ downtime costs suggests that it merits a lot. In some case, as much as $5 million worth.   98% of respondents put the cost of one hour of downtime at $100,000 81% put it at more than $300,000 33%… Read more

CTC’s November 2018 Threat Report

Is this circuit board safe?

It’s one of the longest-held animal myths of all time: that ostriches bury their heads in the sand to avoid danger. They don’t; they’re preparing nests or caring for their eggs. (Anything that buried its head in the sand would have a difficult time breathing.) But as a metaphor for people avoiding difficult situations by… Read more

5 Top SD-WAN Vendors for 2019

Powerful IT cloud.

SD-WAN is a success story in the tech industry. Thanks to the efforts of many different SD-WAN vendors, it’s been able to deliver on the performance and cost-reduction promises upon which it initially launched. The result is a hotly competitive market expected to hit $8.05 billion in 2021. At the same time, moving to an… Read more

CTC’s October 2018 Threat Report

An airliner.

Cybersecurity issues brought to light over the past month or so remind us of a very important aspect of the internet: everything is connected. No website exists on an island that is perfectly fortified against attack. And sometimes, the attacks come from a seemingly friendly territory. The code that KO’d British Airways An attack on… Read more