White Paper: 4 Factors To Consider With Colocation

Register to receive the ISG white paper



Colo WP ThumbnailThe global colocation market will see a compound annual growth rate of 12.4 percent through 2020, so if you are doing your research on colocation providers, you’re in good company. For a growing number of businesses, colocation provides a lot of benefits:

  • Easy upgrade from an on-site “server room” into a professional data center
  • Reduced initial and ongoing expense to build, power, cool and backup an on-site data center
  • Support from professionals in managing maintenance and upgrades
  • Backup of critical data for disaster recovery efforts

Learn how to make a business case for colocation. Get info on how to select a colocation provider, including questions to ask for businesses subject to compliance regulations. ISG is SSAE 16 Type 2 SOC 2 audited for security, availability, privacy, processing and performance.

White Paper: Cybersecurity Best Practices

Register to receive the ISG white paper



cybersecurityIn the ever-changing security landscape, it’s hard to fully understand security threats and even more difficult to create lasting, effective solutions. Read the ISG executive report to learn:

  • How to identify potential threats
  • Best practices to protect your business

White Paper: Tech For Community Banks

Register to receive the ISG white paper



community-banksIn the face of regulatory changes and cybersecurity threats, IT plays a more critical role than ever for community banks. This free report will teach you how to not just survive, but how to thrive, with technology as a main driver. Topics covered include:

  • Key trends in regulation and market forces driving change
  • How video conferencing can improve the client experience
  • The latest developments in cybersecurity and what you need to prepare
  • Disaster Recovery and Business Continuity: are you ready?

Implementing an Effective Hybrid Cloud

Register to receive the ISG white paper



Getting a hybrid cloud right starts in the data center. It also means knowing potential headaches related to multi-vendor management.

This free report answers your questions related to hybrid cloud, including:

  • What are the advantages of hybrid cloud over pure public cloud?
  • 3 common hybrid cloud use cases
  • 4 roadblocks to identify and overcome
  • Going beyond “checkbox” comparisons of vendors
  • The importance of bandwidth and network connectivity to the hybrid cloud

hybrid-cloud-whitepaper

Registration required to view – Implementing an Effective Hybrid Cloud

Video: Bringing IT All Together

Click this fun animation to see how ISG supports IT teams with managed services and infrastructure solutions. Our experts help you manage innovation projects such as shared storage, virtualization, disaster recovery, security, mobility and UC collaboration projects.





Join the ISG Technology Team




The True Value of Cisco Communications Solutions

Industry: Healthcare

Formed in 1989, Kansas Medical Mutual Insurance Company (KaMMCO) is the state’s largest liability insurer, serving physicians, hospitals, and other health care professionals. Headquartered in Topeka, Kansas, the member-directed company has three branch offices throughout the state and approximately 80 employees.

Challenge

Formed by Kansas physicians, KaMMCO is a trusted insurance provider for approximately 3,700 health care professionals and facilities throughout Kansas and in the greater Kansas City area. However, its aging Nortel communication platform fell short of the company’s reputation, needs, and goals. Employees had to dial 800 numbers to connect with coworkers in any of the company’s four locations and they couldn’t transfer calls, which threatened to impact internal and client satisfaction.

In October 2006, as KaMMCO planned for a major addition to its headquarters, the company decided to upgrade its existing Nortel system to a more advanced Nortel VoIP solution that would allow direct interoffice calling. So when a company executive suggested to Andy Grittman, KaMMCO CIO and vice president of MIS, he meet with Salina, Kansas-headquartered ISG Technology, Inc., to explore a Cisco solution — he was hesitant.

In December 2006, Grittman somewhat reluctantly met with the 143-employee Cisco Premier Certified Partner with eight additional locations in Kansas, Missouri, and Oklahoma. “As a happy Nortel client, I was less than thrilled with the prospect of a Cisco telephone system,” explains Grittman. “But in the course of a two-hour meeting with ISG, I opened my mind to the possibility. And over the next several weeks, ISG demonstrated that Cisco was far more than just a telephone system. It’s a foundation that KaMMCO could build on to meet future needs. We signed the contract January 31, 2007.”

Solution

ISG began the five-month implementation in March 2007, installing a robust Cisco network infrastructure including Cisco Catalyst switches and Cisco Integrated Services Routers.

ISG also installed Cisco Unified Communications, a single system that provides powerful new ways to collaborate. To that, ISG added Cisco Unified Communications Manager, an IP telephony call processing system; Cisco Unity, a voice and unified messaging platform; and Cisco Unified MeetingPlace Express, an integrated voice-, video-, and Web-conferencing solution.

To enhance internal and client communication, ISG implemented a Cisco Digital Media System. The comprehensive suite of digital signage, enterprise TV, and desktop video applications allows KaMMCO to quickly and easily connect and collaborate.

ISG secured the infrastructure with Cisco Adaptive Security Appliances (ASAs) that stop attacks before they impact business continuity.

Results

“The Cisco solution has made us a stronger organization across the board.”

Andy Grittman, KaMMCO CIO and vice president of MIS

“The Cisco solution has made us a stronger organization across the board,” says Grittman. “With four-digit dialing and video conferencing, we communicate instantly and more effectively between branches, which has increased productivity by about 20 percent and cut travel by as much as 90 percent.

“We’re also now able to deliver more services to our insureds without raising premiums, which better positions us nationally and globally as a vested partner in health-services delivery versus just another insurance company.

“One of my prerequisites for a new phone system was to be heavily involved in the implementation. While other technology providers might cringe at this, ISG embraced my desire for knowledge and made me an active participant during configuration and installation.

“We now have a reliable, scalable communication foundation to which we can cost-effectively add new technologies as we grow, and we’ll continue to partner with ISG and Cisco along that road.”

Tips to improve your facility’s physical security

A lot of companies tend to focus on digital data breaches when prepping their defenses. The quasi-magical nature of accessing information through a few lines of code and an investigation into a network’s security infrastructure can make cybercriminals seem like modern-day wizards. Despite their malicious intentions, it’s hard not to be impressed by the skills of hackers these days.

That said, the public’s fascination with digital hacking has allowed many administrators to shift their focus away from physical security. Cyber security is flashy and exciting, and as such many officials forget that improperly protecting the facility itself can lead to data breaches. Criminals don’t care how they get private information as long as they can make a profit from it, and they sometimes break into offices to steal what they need.

Although the notion of some outside criminal burglarizing your company is an unsettling thought, there are a few things administrators can do to ensure the physical security of their facilities.

“Administrators should look to authenticate employee identities as often as possible.”

The more levels of authentication, the better

Verification of a person’s identity and security credentials is absolutely vital to ensure the physical security of any office. The more barriers there are between the outside world and secure areas, the more chances a criminal has of slipping up and getting caught. Administrators should look to authenticate employee identities as often as possible. We’ve already discussed the three ‘What’s’ of physical security in length, but their importance bears a quick recap:

  • What you have: These are the physical items that you use to gain access to an area, such as an ID card.
  • What you know: This has to do with phrases or codes you memorize to pass a security checkpoint, like a password.
  • What you are: Your physical attributes, such as your fingerprints or DNA, are extremely hard to forge. As such, they are great ways to authenticate your identity.

Ideally, every single part of a facility should have all three of these security measures. However, this simply isn’t feasible for more client-friendly areas. Regardless, administrators should install at least one method of authentication for even the least secure areas of the office. Areas that require higher levels of security should have as many authentication barriers as possible, with the optimal setup using a combination of all three.

Employee education is key

Once you’ve set up the physical infrastructure of your authentication systems, it’s time to train employees on the importance of proper security. Even the best biometric scanner in the world can’t prevent a worker from holding the door open for a nefarious stranger. It’s vital that staff members understand their role in all of this.

The first step in this is to train workers to see the difference between compassion and gullibility. Buzzing in an employee that forgot his or her ID badge is fine if this person has been working at the company for 10 years, but doing the same for an unknown “repair man” that left his credentials at home opens the office up to a breach.

What’s more, it’s important to stress that staff members are the last line of defense against theft. Security experts at Social-Engineer stated that they have a perfect record when it comes to physical break-ins at companies they test, with a portion of their success being attributed to impersonating employees. Workers need to know who has access to specific parts of the building, and they should be able to recognize an unfamiliar face if they’re in an area containing sensitive information or expensive equipment.

You’ll need security cameras, too

Finally, administrators intent on ensuring the physical security of their facilities need to invest in top-notch security cameras. In a perfect world, every company would have several employees with the sole job of watching security camera footage to ensure nefarious individuals don’t make their way into the office. Sadly, this isn’t possible for a majority of organizations, which is why surveillance equipment is generally used after a crime has taken place to identify the burglar.

Security camera footage can help track down robbers. Without security camera footage, burglars are just shadows in the night.

While this is still an incredibly useful function, it does pose the problem of video data storage. Cameras should be placed at all entrances and exits as well as in high-security areas. For larger facilities, this is going to result in hundreds of hours of footage every week.

All of this data is going to need to be put somewhere for a certain period of time, as break-ins aren’t always immediately apparent. Considering the fact that TechVision has estimated that companies generally double their data storage needs every 12 to 18 months, adding even more to the pile can add unneeded strain to a company’s IT department.

This is why company officials looking to decrease the chances of a burglary in their office should look to partner with ISG Technology’s physical security experts. Not only can we help set up authentication and surveillance systems, we can also store and manage the data created by cameras to ensure the recordings are quickly and easily accessible if a break-in were to occur.

Tips to improve your facility's physical security

A lot of companies tend to focus on digital data breaches when prepping their defenses. The quasi-magical nature of accessing information through a few lines of code and an investigation into a network’s security infrastructure can make cybercriminals seem like modern-day wizards. Despite their malicious intentions, it’s hard not to be impressed by the skills of hackers these days.

That said, the public’s fascination with digital hacking has allowed many administrators to shift their focus away from physical security. Cyber security is flashy and exciting, and as such many officials forget that improperly protecting the facility itself can lead to data breaches. Criminals don’t care how they get private information as long as they can make a profit from it, and they sometimes break into offices to steal what they need.

Although the notion of some outside criminal burglarizing your company is an unsettling thought, there are a few things administrators can do to ensure the physical security of their facilities.

“Administrators should look to authenticate employee identities as often as possible.”

The more levels of authentication, the better

Verification of a person’s identity and security credentials is absolutely vital to ensure the physical security of any office. The more barriers there are between the outside world and secure areas, the more chances a criminal has of slipping up and getting caught. Administrators should look to authenticate employee identities as often as possible. We’ve already discussed the three ‘What’s’ of physical security in length, but their importance bears a quick recap:

  • What you have: These are the physical items that you use to gain access to an area, such as an ID card.
  • What you know: This has to do with phrases or codes you memorize to pass a security checkpoint, like a password.
  • What you are: Your physical attributes, such as your fingerprints or DNA, are extremely hard to forge. As such, they are great ways to authenticate your identity.

Ideally, every single part of a facility should have all three of these security measures. However, this simply isn’t feasible for more client-friendly areas. Regardless, administrators should install at least one method of authentication for even the least secure areas of the office. Areas that require higher levels of security should have as many authentication barriers as possible, with the optimal setup using a combination of all three.

Employee education is key

Once you’ve set up the physical infrastructure of your authentication systems, it’s time to train employees on the importance of proper security. Even the best biometric scanner in the world can’t prevent a worker from holding the door open for a nefarious stranger. It’s vital that staff members understand their role in all of this.

The first step in this is to train workers to see the difference between compassion and gullibility. Buzzing in an employee that forgot his or her ID badge is fine if this person has been working at the company for 10 years, but doing the same for an unknown “repair man” that left his credentials at home opens the office up to a breach.

What’s more, it’s important to stress that staff members are the last line of defense against theft. Security experts at Social-Engineer stated that they have a perfect record when it comes to physical break-ins at companies they test, with a portion of their success being attributed to impersonating employees. Workers need to know who has access to specific parts of the building, and they should be able to recognize an unfamiliar face if they’re in an area containing sensitive information or expensive equipment.

You’ll need security cameras, too

Finally, administrators intent on ensuring the physical security of their facilities need to invest in top-notch security cameras. In a perfect world, every company would have several employees with the sole job of watching security camera footage to ensure nefarious individuals don’t make their way into the office. Sadly, this isn’t possible for a majority of organizations, which is why surveillance equipment is generally used after a crime has taken place to identify the burglar.

Security camera footage can help track down robbers. Without security camera footage, burglars are just shadows in the night.

While this is still an incredibly useful function, it does pose the problem of video data storage. Cameras should be placed at all entrances and exits as well as in high-security areas. For larger facilities, this is going to result in hundreds of hours of footage every week.

All of this data is going to need to be put somewhere for a certain period of time, as break-ins aren’t always immediately apparent. Considering the fact that TechVision has estimated that companies generally double their data storage needs every 12 to 18 months, adding even more to the pile can add unneeded strain to a company’s IT department.

This is why company officials looking to decrease the chances of a burglary in their office should look to partner with ISG Technology’s physical security experts. Not only can we help set up authentication and surveillance systems, we can also store and manage the data created by cameras to ensure the recordings are quickly and easily accessible if a break-in were to occur.