nDash.co is a content creation platform that provides brands and agencies with access to the world's top freelance writers.

nDash Writer Profile for Lea Rabinowitz

Lea Rabinowitz

Headline

Content Strategist Specializing in B2B Tech

About Me

As an award-winning digital marketing consultant with eight years of experience, I’ve worked with companies of all sizes from start-ups to established enterprises, in a diverse range of industries. My main focus is in B2B tech, including telecommunications, cyber security, enterprise software, cloud computing, and IoT.

With a unique perspective and an eye for detail, I’ve crafted thought leadership content marketing and lead generation campaigns that increased funnel velocity, drove website traffic, improved search engine rankings, created brand awareness, and proved worth when reviewing the bottom line.

As Founder of &content marketing, I enjoy working with various clients including those with established voices and ones that might need some helping getting there. It’s my philosophy that whether you’re blogging or writing long- form content, there’s always room for a little fun and suspense. That’s what keeps your audience coming back for more!

My favorite way to work is as an extension of your team. Please reach out to me at lea@andcontentmarketing.com so we can take a strategic approach to your content.

Industries I Write About

Telecommunications

Find writers and ideas in this industry

Computer & Network Security

Find writers and ideas in this industry

Wireless

Find writers and ideas in this industry

Computer Hardware

Find writers and ideas in this industry

Computer Software

Find writers and ideas in this industry

Computer Networking

Find writers and ideas in this industry

Renewables & Environment

Find writers and ideas in this industry

Information Technology & Services

Find writers and ideas in this industry

Internet

Find writers and ideas in this industry

Legal Services

Find writers and ideas in this industry

My Writing Samples

Portfolio

View samples of my work here!

https://learabinowitz.journoportfolio.com/

White Paper: Using Network Edge Orhcestration to Increase Profits

Network Edge Orchestration is a cost controlling, hybrid cloud and edge technology solution for service providers and VARs. This white paper discusses how operators are able to increase profit margins through efficiency and innovation opportunities.

http://bit.ly/2h6oFoi

Solution Brief: Simplify Hybrid IT With a Hyper Converged Infrastructure

This solution brief overviews how to optimize with hyper converged infrastructures.

http://bit.ly/2h6lAEP

Blog: New Nation-State Threat Actor Revealed as Targeting Specific Individuals

Example of a threat report blog.

https://sentinelone.com/2016/09/02/new-nation-state-threat-actor-revealed-targeting-specific-individ

Blog: Telecom Service Providers Need to Position Themselves as SMB Partners

Blog that uncovers through an analogy how telecom service providers should act to be more successful in the SMB space.

http://bit.ly/2eQHgnC

Experience

Founder

I partner with clients to grow their pipeline and brand presence through strategic content marketing. While B2B technology companies (telecom, security, computing, etc.) are the majority of my client base, I have also worked within the federal space, providing content services to one of NASA's leading contractors.

Company: &content marketing

I worked there from 2/2015 until now

Freelance Writer

When nDash was still an agency I had the pleasure of ghostwriting for their top technology and marketing clients. Since then, and beyond the metamorphosis to nDash.co, I've completed short-form and long-form blog posts, email campaigns, white papers, checklists, and solution briefs. Through the years, I've sustained my brand relationships because of my unwavering ability to meet deadlines and deliver consistent, high-quality work. My former editor said he wished all his freelancers were like me.

Company: nDash Marketing

I worked there from 9/2015 until now

Marketing Manager

Gained deep telecom experience through working for a leading Tier 1 provider. Responsibilities included managing the marketing program with the largest amount of warm lead submissions, email campaign creation, website development, and collateral production.

Company: XO Communications

I worked there from 4/2011 until 2/2015

Content I Write

Ideas and Pitches I Wrote

You'll Remember to Take Your Vitamins With These Tips

We all know taking our vitamins each day is vital to our health, but remembering can be a little tricky. This blog post will outline tips and tricks to defeating forgetfulness and help make the process a little more fun!

Content type: Blog Post

Keywords: Health, Vitamins, Fun

Links:

Service Providers Should Act Now to Secure the IoT World

IoT is transforming enterprises into digital businesses creating efficiency, uncovering new streams of revenue, and overhauling business plans. But without the right technology on the network side, companies are at risk for serious security attacks. This blog post will highlight the weaknesses of IoT and discuss how ISPs can use SBCs to protect their customers.

Content type: Blog Post

Keywords: SBCs, IoT, Telecom

Links:

Olymics Are a Test of Strength for Networks

The 2012 Olympic games stunned the IT world as we watched a massive amount of data move around like never before. Now with the 2016 games in progress, we're seeing a strain again that is amplified by BYOD. The question is, are networks prepared? We provide a valuable lesson on whipping your network into the best competitor it can be.

Content type: Blog Post

Keywords: BYOD, Bandwidth, NEO, Security

Links:

5 Considerations for SD-WAN Adoption

SD-WAN seems to be the answer to all networking problems, but is that really the case? While still in its infancy, this technology might not be as good of a choice compared to NEO. Here are 5 considerations to take into account for CSPs thinking about adopting SD-WAN.

Content type: Blog Post

Keywords: SD-WAN, Network Edge Orchestration

Links:

Turning Old Mobile Phones into a Lifeline

From victims of domestic abuse to our very own soldiers, used mobile phones are connecting them to the people they need most. No longer destined for the landfill or junk drawer, consumers and wireless companies have a way to turn trash into life-changing treasure.

Content type: Blog Post

Keywords: Mobile Phones, Recycling, Charity

Links:

New Details on OPM Breach Reveal Lack of Basic Security Controls

There's a clear divide down the aisle again, this time in regards to the OPM's 2014 and 2015 breaches. In a new report from the Republican majority on the House Oversight and Gov. Reform Committee, blame is placed on OPM leadership. At the same time Dems are calling foul on OPM contractors. One thing we know for sure is that it could have all been avoided with basic cyber hygiene. In this post we'll uncover the newly released information on one of the worst-ever cyber attacks in US history.

Content type: Blog Post

Keywords: security, breach

Links:

Allo and Duo Push Google Hangouts into the Enterprise Space

With all that Google does well, they've struggled with finding their place in the UC world. Skype for Businesses has reigned supreme, but Google was obviously not ready to give up yet. This blog post will review the latest shifts from introducing Allo and Duo for consumer use and what it means for Hangouts in the enterprise world.

Content type: Blog Post

Keywords: Unified Communications, Google Hangouts

Links:

How MSPs Can Capitalize on IoT

A report released by AVG revealed that 58 percent of MSPs identified the need to partner with cutting-edge vendors in order to provide IoT-related services. While customer demand is growing, many MSPs are staying back from this disruptive technology. This blog will reveal new revenue streams and actionable to dos for entering the IoT world.

Content type: Blog Post

Keywords: IoT, Revenue, MSPs

Links:

The Secrets to Success for Videoconferencing

Videoconferencing is taking off as diverse workforces grow. With a flurry of different protocols, devices, and traffic types, it can be difficult to commit to a QoS standard. Using the secrets to success in this blog, IT will be able to deliver secure and and interoperable UC solutions.

Content type: Blog Post

Keywords: SBCs, Unified Communications, Videoconferencing

Links:

B2B Sales Teams Can Achieve Quota Success Using This Technology

Skype for Business and other Unified Communications (UC) platforms are becoming a standard for today's B2B world. So why are sales reps still wasting their time making phone calls? By leveraging web conferencing and other UC tools, B2B reps are able to provide an interactive experience, all while obtaining key information that can only be ascertained from body language. This blog post will cover how top selling professionals are using UC technology to make the most out of each workday.

Content type: Blog Post

Links:

GDPR is Coming. Are You Prepared?

If your company handles personal data of European Union residents there's a new set of privacy requirements headed your way. This blog post will cover what you need to know about the changes and how to prepare for EU General Data Protection Regulation (GDPR) compliance.

Content type: Blog Post

Keywords: Regulations, Compliance, Endpoint Security

Links:

Will the Office Thermostat be the Security Achilles?

As networks become diversified with technologies including the IoT, it becomes increasingly challenging to secure. With DNS attacks lurking around every corner, vigilance will be imperative when introducing new devices and sensor. This blog post will cover safety guidelines for IoT adoption and how endpoint security fits into the plan.

Content type: Blog Post

Keywords: DNS Attacks, Endpoint Security, IoT, API

Links:

Happy National Cyber Security Awareness Month!

October marks National Cyber Security Awareness Month so it's time to STOP. THINK. CONNECT. This blog post will cover exciting events and ways to get involved and show your commitment to being #CyberAware.

Content type: Blog Post

Keywords: Cybersecurity

Links:

SIPVicious or SIPAlicious?

Weak telephone passwords can lead to fraud and lost revenue. SIPVicious, the SIP platform vulnerability tester, can be helpful in this situation, but can also be used for evil. That's why it's so important to protect networks with SBCs. Here are the benefits that will help your network go from SIPVicious to SIPAlicious.

Content type: Blog Post

Keywords: SIP, Security, EdgeProtect, SBC

Links:

One Pager - 888/Yealink Mid Market Bundle

From brain dump

Content type: Whitepaper

Links:

Press Release - 888/Yealink Bundle

From brain dump

Content type: Blog Post

Links:

When Buying a Condo: Pre-Sale or Re-Sale?

Wait, you mean I have to make another decision?! The home buying process is full of decisions -- How many bedrooms do I need? Should I buy in this school district, or that? And how about, pre-sale or re-sale? This post will cover considerations for choosing between the two so that buyers feel more secure in their decision making process.

Content type: Blog Post

Keywords: Condo, Real Estate

Links:

Quiz: How Well Do You Know SDN?

This blog post will be in the form of a quiz on SDN. It will reveal answers by using the "Mostly A's, Mostly B's..." method. At the end it will offer the white paper "It’s All in the Cloud Now: How SDN and NFV are Changing the Telecom Industry" to fill in any knowledge gaps.

Content type: Blog Post

Keywords: SDN, Telecom

Links:

A New Update is Ready to Install: 2017 Technology Trends

Peter Sondergaard, senior vice president of Gartner Research, greeted attendees of the 2016 Symposium/ITxpo show with "Safety is at stake. The digital world around us is in a permanent state of upgrade," During his talk he provided the five domains that digital businesses will be built on for 2017. This blog post will cover each, with special emphasis on customer experience, IoT, and ecosystem foundation. Through the post, EWN's technology will define how to survive the upgraded digital world.

Content type: Blog Post

Keywords: Security, IoT, Digital

Links:

Google Fiber Taking a Pause: What's the Deal?

Trouble is brewing at Google as they take a pause on fiber, remove the fiber CEO, and slash their workforce by 9%. This blog post will cover what's happening on the apparent sinking ship and reveal Google's possible shift to a wireless focus.

Content type: Blog Post

Keywords: Google, Fiber, Telecom, Wireless

Links:

Using Core-to-Edge Analytics to Improve Customer Experience

With terabytes of raw data, there are seemingly endless ways to monitor and improve the customer experience. Well, only if there is a way to harness it all through a single pane of glass. This blog post will review the benefits of analytics, key features to look for, and real world examples. To wrap up, there will be a short overview on the recent partnership with Empirix.

Content type: Blog Post

Links:

You're Still Using that OS?: Major Security Threats in Healthcare

Windows XP is ready for its quinceañera, yet the healthcare industry is still flush with insecure XP boxes. Approximately 700 vulnerabilities have been identified, so it's no wonder malicious actors are zeroing in on this easy lift with ransomware. To engage the reader, the blog post will review the current state of vulnerabilities, recent attack data, and steps to secure this HIPAA regulated environment.

Content type: Blog Post

Links:

Is Adobe Flash Leaving You Feeling Vulnerable?

Based on an analysis of over 100 exploit kits (EKs) and known vulnerabilities, Adobe Flash is the unfortunate winner of the most frequently exploited product. Companies are joking that maybe it's time to give Flash the old heave ho' to retirement, but in reality, security isn't something you should joke about. We'll overview the current vulnerabilities of using Flash and what you can do in the meantime to protect yourself.

Content type: Blog Post

Keywords: Exploit Kits, Vulnerabilities, Security

Links:

Cybercriminals Need Shopping Money for the Holidays, Too!

Oh the ransomware outside is frightful, and the amounts are not delightful...We're deep into the swing of holiday shopping and that means distracted employees on their personal devices looking for the next great gift. Attackers are watching their every move and using popular social media channels to find their in. Here's what you should expect for the 2016 holiday season, plus a look ahead.

Content type: Blog Post

Links:

Communication Revolution: Running a Compnay With No Email

Matt Mullenweg, the creator of WordPress and CEO of Automattic, runs his billion-dollar company with no offices or email. We're seeing more of this unconventional approach to communications and that has had an impact on the technologies we choose to develop. Hosted PBX is a feature-rich solution that lets calls follow workers wherever they go. Learn about how this works for small to enterprise-sized businesses on the go or in the office.

Content type: Blog Post

Keywords: Hosted PBX, Call Routing

Links:

Evolving WordPress Pingback Attacks

WordPress Pingback attacks, part of the amplification class, began in 2014. Since then we've noticed an evolution, which has made the attack more sophisticated through the use of encryption. This post will cover what IT needs to know about the latest DDoS attacks and why this is such a problem for so many websites.

Content type: Blog Post

Keywords: Amplification, Encryption, WordPress

Links:

Mayday, Mayday! SIP is Under Attack

A new report from IBM's Security Intelligence group has revealed that cyber attacks on SIP have accounted for over 51% of security events in the past 12 months. Misconceptions that SBCs are either too costly or complicated have led to even the most sophisticated IT departments shying away from very necessary security measures. This blog will outline the current landscape of attacks and the steps to ensure your protocols are protected.

Content type: Blog Post

Keywords: SIP, Security, SBC

Links:

RaaS: Making Hacking Easy

2016 was the year of ransomware. We've seen it all over the place, leaving no one immune. Ransomware as a Service is now just a booming extension of that, lending its skill to the layman hacker. This blog post goes over what RaaS is, why it's such a threat, and how to protect against it in 2017. Here's to hoping for a more secure year ahead!

Content type: Blog Post

Keywords: Ransomware, RaaS

Links:

Andriod Things for Safer IoT?

Google has announced its first developer preview of Android Things, their new IoT platform. With promises that developers will be able to push out images and OTA updates as necessary, this could mean better security than what we have seen from other IoT players. Let's take a deeper look at Google's new venture and what that means for IoT security down the road.

Content type: Blog Post

Keywords: IoT, Security, Android Things

Links:

The Word of the Day You Need to Know

Doxware is a new vicious form of ransomware that threatens to broadcast stolen information. While this new form of malicious attacks is in its infancy, it's important that service providers learn this word now. Predictions note that we will begin to see its impact on a larger scale. That means the possibility of eavesdropping and capturing conversations for extortion purposes. Network Edge Orchestration is integral so you can monitor the network, all while providing high-quality UC.

Content type: Blog Post

Keywords: Doxware, Malware, Security,

Links:

Meet the Worst Candidate for the Job--Petya

Petya is making a return in Germany as GoldenEye. This sneaky candidate is sending out its resume and picture, only to have unsuspecting HR personnel open it for a nasty surprise. GoldenEye is an eyeopener for all of us trying to understand the minds of evildoers. This blog will highlight not just the ransomware, but will also help readers comprehend that end-users are falling for criminals that sugarcoat their entry.

Content type: Blog Post

Keywords: Ransomware, Petya, Mischa, Goldeneye

Links:

The Path to $96bn for Unified Communications: Predictions on 2017

Growth of Unified Communications isn't stalling any time soon. A recent report from Global Market Insights predicts that by 2023, the UC market will reach $96 billion. But the story here isn't the destination, it's the journey. Let's take a closer look a predictions for 2017 including AI, growing adoption of SaaS apps, and social messaging apps that will require robust technologies to manage quality of communications.

Content type: Blog Post

Keywords: Unified Communications, Predictions, Research Report, AI, SaaS

Links:

The 4 Best Cyber Security Tips for New Businesses

Startups or any company that considers itself to be a new business, has a lot to consider. Cyber security should be at the top of the to-do list. In this blog we'll go over the four most important things to keep in mind when forming your security practices: know the latest threats (use our new roundup), create a plan, employee education and training (especially with passwords), and how to safeguard every precious penny.

Content type: Blog Post

Keywords: Endpoint security, ransomware, startups, threats

Links:

Understand to Protect: The Trifecta of DDoS

We've seen a 125 percent increase in DDoS attacks year-over-year and a 35 percent jump in the average attack duration. Yikes, those aren't pretty numbers. The first step to protection is always education. In this post we'll go over the trifecta of DDoS types and the danger posed if any of the three are combined into a multi-terabit attack. And yes, there is more to worry about than just IoT.

Content type: Blog Post

Links:

Cyber Safety During Tax Season

On January 28th we celebrated Data Privacy Day and it served as a good reminder that our cyber safety is always in jeopardy. Tax season is one such threat that we are currently experiencing. At a time when sensitive and personally identifiable information is constantly passed around it's essential to be cautious. This blog will include cyber safety guidelines that will help you through tax season year after year.

Content type: Blog Post

Keywords: cyber safety, data privacy

Links:

Second Wave of Cloud Threatens Data Security

Securing data is tough business and we've seen the proof in an unprecedented volume of attacks. With the second wave of cloud adoption rolling in, it leaves us with some concerns about keeping pace. As more companies begin to move to virtualized environments, they need to keep in mind that just like their physical environments they must have a security plan. Without proper protections there will be a massive amount of data in danger.

Content type: Blog Post

Links:

Influencing NFV Deployment Through Open Source

Open source NFV projects are on the rise with big names like VMware getting involved. In this blog post we'll cover what's happening in the open source arena and how it may impact adoption of NFV. While small businesses might think that this doesn't involve them, that's not entirely the case. It's true they may not have the technical abilities to get heavily involved, but the overall focus on open source is likely to drive competition in the telecom market to create a bigger, better NFV.

Content type: Blog Post

Keywords: NFV. open source

Links:

SQL Slammer Wriggles Back in 14 Years Later

Back in 2003, Slammer wreaked havoc through unpatched SQL Servers. Microsoft responded with a patch, quieting the worm for a long time. But now, 14 years later, we're seeing a resurgence of the popular attack. Is this an anomaly or the start of something bigger? Either way, we'll refresh readers' mind on the DDoS threat and warn of a possible comeback.

Content type: Blog Post

Links:

Hacking Web-Connected Devices Gets Easier Thanks to Google

Google is king when it comes to interoperability and extending the functionality of the web. Recently they've developed and supported two new HTML APIs that while work towards their goals, also have the ability to make the web less safe. This blog will cover the Web Bluetooth API, which has already been enabled in the latest version of Chrome, and the upcoming WebUSB API, and what this means for future security of people and their connected devices.

Content type: Blog Post

Keywords: IoT, Security, Chrome, API, Bluetooth

Links:

Better Late than Never: Amazon Enters the UC Arena

Amazon Web Services (AWS) might be late to the UC party, but better late than never, right? Well, we'll hold out our judgement on their version of enterprise unified communications--Amazon Chime UC. This blog will review the offering and point out subtle differences in the product that businesses might enjoy. We'll also drive home that no matter the UC product, it will only bring true ROI if paired with Network Edge Orchestration.

Content type: Blog Post

Keywords: Amazon Chime, Unified Communications, SBC

Links:

How to Choose a UC Solution: Comparing Microsoft Skype for Business to Amazon Chime

Amazon is late to the UC party, but that doesn't mean they aren't making a splash. This blog will take the reader through a closer look at the details behind both Amazon Chime and Skype for Business. With price, service differences, and more, there are certain product characteristics that will sway potential customers to one side or the other. The blog will end with a CTA to have Integration Partners help in the decision making and integration processes.

Content type: Blog Post

Keywords: Amazon Chime, Unified Communications, Skype for Business

Links:

I'm Getting Hacked Where?

Jeremiah Grossman, Chief of Security and Strategy at SentinelOne, would like to give you a piece of advice. That is, know what you're protecting. He says, “When a company gets hacked, it’s largely because there’s a computer, a box, a website that they didn’t know they owned,” In this blog we will cover tips on performing an IT audit so you can reduce blind spots that could lead to hacking, data breaches, and more.

Content type: Blog Post

Keywords: IT audit,hacking,security

Links:

The 7 Stages of Ransomware Grief

Getting over becoming a victim of ransomware can be hard. Luckily, SentinelOne is here to walk you through the 7 stages, so that you can have acceptance and hope again. As the ransomware trend grows, there's a chance you'll fall victim to an attack, or maybe you've already been targeted. Work through your anger and guilt with our cyber security tips to keep you protected!

Content type: Blog Post

Keywords: cybersecurity tips,ransomware

Links:

4 Takeaways from the 2017 RSA Conference

Did anyone at Integration Partners go to RSA? If so, I could interview them for takeaways and do a write up highlighting key security areas to focus on in the year ahead.

Content type: Blog Post

Links:

With SaaS, No Small Site is Left Behind

The global software as a service (SaaS) market was valued at US$ 31.57 Bn in 2015 and is estimated to reach US$ 172.20 Bn by 2025. There's a reason that SaaS is continuing to grow in popularity, think accessibility, flexibility, TCO, etc. In this post we'll go over topics that make the SaaS delivery model so appealing to the SMB market and how it ensures that even the smallest sites for SPs can be managed by Cloud2Edge.

Content type: Blog Post

Links:

Pay-as-You-Go and -Grow for SMBs

It's never been a better time for SMBs to be short on CapEx and resources. SaaS models have brought enterprise-quality solutions in reach by breaking down cost-barriers and transitioning to pay-as-you-go models. Now the SMB market can enjoy the benefits of formally on-prem solutions through the cloud, and pay for exactly the amount they need. The cost reductions from the consumption model will free up IT spending and can even help businesses use those resources to grow.

Content type: Blog Post

Links:

Cloud SLAs Won't Feel Overwhelming with These Tips

Service Level Agreements are the cornerstone to your cloud success. If you are planning on trusting your most sensitive data to a cloud provider, you’re going to want to make sure they have your back in the case of outages and more. This blog post will cover what to look for in an SLA and identify important details like performance guarantees, backups, industry regulations, downtime, etc.

Content type: Blog Post

Links:

Practice These Cyber Hygiene Tips for Risk Mitigation

With a shortage of cyber security professionals it can feel out of reach to fully protect your company from today's threats. While cyber hygiene isn't considered iron-clad protection, it's important to follow these X steps for baseline security. After all, security isn't the responsibility of one, but of every person that is connected to your company's endpoints.

Content type: Blog Post

Keywords: cyber hygiene

Links:

Make Money with Network Edge Orchestration

Based on recording from Rosa.

Content type: Whitepaper

Links:

One Pager - Polycom

From brain dump

Content type: Whitepaper

Links:

Press Release: Broadsoft Connections

From brain dump

Content type: Blog Post

Links:

Captain Kirk, Is Monero the New Bitcoin?

A new Star Trek-themed ransomware is asking for payment in Monero instead of the typical Bitcoin currency. While there are no reported victims yet, this ransomware could be a interesting shift for the currency exchange on the darknet. Along with Monero, it seems that AlphaBay may begin accepting Ethereum transactions by May 1, 2017. This blog post aims to educate readers on the Kirk Ransomware and how it plays into the changing crypto currency.

Content type: Blog Post

Links:

Your Guide on How to Make Money with Network Edge Orchestration

Network Edge Orchestration gives traditional service providers an opportunity to close the gap in terms of service and reliability, without the burden of ripping and replacing legacy infrastructure. Alone, this is a moneymaking opportunity. Combine it with a predictable monthly charge for the services, and providers and resellers have found themselves additional revenue. This blog post will review the new white paper that guides readers through exactly how to make money with C2E and NEO.

Content type: Blog Post

Links:

What Marketing 101 Teaches You About Telecom Success

In Marketing 101 you learn that the customer wants to be sold the solution, not the product. With telecom no longer perceived as a commodity, rather a solution, it's imperative to position your services as such. Bundling a monitoring system, hardware, professional services, and technical support into one offering makes it easier for CSPs and value added resellers to sell the answer to the customers' problems. This post will go over the benefits of bundling and how C2E makes the process easier.

Content type: Blog Post

Links:

Poor Customer Experience Remains Achilles' of Digital Transformation

According to Forrester, poor customer experiences remain the achilles' of telcos' digital transformation efforts. Meeting customers' expectations of rapid response and seamless experiences, remain impossible for traditional providers operating behind the rate of transformation. This blog will go over how SBCs and service control centers can help customer satisfaction and how C2E extends the capabilities to all customers.

Content type: Blog Post

Links:

In the Know: Present and Future of Artificial Intelligence in Security

A survey of security researchers revealed that eighty-seven percent believed it will be more than three years before they really feel comfortable trusting AI to carry out any significant cybersecurity decisions. With current unpredictable threats that evade traditional security methods and a shortage of security professionals, intelligent security becomes a necessity, even if trust hasn't fully been established. This blog will go over the current state of AI and why it will have a future in sec.

Content type: Blog Post

Links:

Prevent Attacks Through a Lesson in Ransomware Anatomy

Doctors wouldn't just prescribe medicine without first understanding the anatomy and infliction causing distress. So why should you work to secure your business against ransomware without learning it first? This blog post will cover the anatomy of ransomware and its attack vectors to help readers protect themselves from becoming victims.

Content type: Blog Post

Links:

Preventing Ransomware Attacks Becomes Vital in Healthcare

There may not be an industry more susceptible to ransomware than Healthcare. At least it seems that way with the latest headlines. This blog will take a closer look at why protecting endpoints is key in preventing ransomware attacks and other measures the healthcare industry can take.

Content type: Blog Post

Links:

Types of AI: A Closer Look at Machine Learning

Artificial Intelligence can sound like a far away technology, but in reality AI types like machine learning are being used today in our security controls. This post will define what machine learning is and overview topics like adoption, uses, and advances.

Content type: Blog Post

Links:

Empirix/EWN WP Announcement Blog

This blog will introduce the new white paper covering the Empirix/EWN venture. I'll wait until I receive feedback from Rosa on the WP to write this so it's accurate.

Content type: Blog Post

Links:

Empirix/EWN WP

TBD

Content type: Whitepaper

Links:

POC Guide Intro

10 line intro

Content type: Whitepaper

Links:

Do This One Thing Today for Better Security

As security professionals we are constantly preaching to "change your passwords often." So why is it that a new study found that it's not only the everyday social media user that isn't changing their passwords, but also security pros? Oversharing, careless clicking, creating controversy, and failure to claim official accounts are all dangers that come into play when using social media. So take a minute out of your day and go change your password...it's the least you can do for SM security!

Content type: Blog Post

Links:

High Availablity is Not a Substitue for Disaster Recovery

Businesses looking to cloudify often look to SLAs that promise high availability as the gold standard for business continuity. In reality, uptime is only good for day-to-day activities. For companies that are really serious about maintaining business continuity long term, a disaster recovery plan must be considered. Be it a security breach, weather event, human error, or bug, a fault is bound to happen, putting data and resilience at risk. So the question is, will you be ready?

Content type: Blog Post

Keywords: disaster recovery,ransomware

Links:

Russian Matryoshka Doll-Style Delivery of Ransomware Appears

If it wasn't enough to teach users that certain files often disguise ransomware, now we need to warn them that there might be files within files that contain ransomware. A new spam campaign was found to use a Word document nestled within a PDF to run a variant of Locky. This blog will cover the new threat and why it will be so important this year to keep an eye on evolving techniques as the ransomware threat grows.

Content type: Blog Post

Links:

Business Continuity: What's Needed to Survive in the Cloud

As businesses of all sizes move to the cloud for hosted telephony and UC, we would be remiss not to mention the issues that come along with hosted communications. The top problems are security and consistency in quality, which are detrimental to profits if not handled properly. This blog will go over setting up business continuity measures and adding in survivability so that providers don't risk losing customers over poor service that costs them revenue.

Content type: Blog Post

Links:

Add These Money Making Components to Your Communications Solutions

When it comes to communications solutions, many providers end up seeming all the same with UC, SIP, SD-WAN, and more. But what if you could add small components that would make customers more likely to say and buy, but would also mean larger profits for your business? Adding BC with survivability, intelligent edges, service control center, and C2E (I won't introduce the name until the end) are all ways to introduce new revenue streams by providing a differentiated service offering.

Content type: Blog Post

Links:

Being a Leading Edge Provider in the UCaaS Market Rests on Survivability

Unified Communications provides the benefits of scalability, collaboration, and less capital outlay to name a few. So it's no wonder providers are jumping in the game to offer UC services to customers that are ready to buy. But not all providers are doing what is necessary to stay ahead in the competition. One main factor is providing business continuity through survivability. This blog will discuss the key drivers to cloud-based UC and what factors makes a provider "leading edge."

Content type: Blog Post

Links:

Empirix WP Edits

Edit WP based on second outline

Content type: Whitepaper

Links:

X WAN Problems that VARs Can Fix

Managing and securing today's WAN is a major pain point for companies. Whether it's a lack of IT staff, budget, or an overwhelming amount of devices, the issues facing network professionals need to be addressed. This blog will go over X WAN problems and the opportunities for VARs to use their expertise to mitigate issues, even at branch locations.

Content type: Blog Post

Links:

MSP Blog Series: Enhance Services and Increase Profitability

As organizations face IT staff shortages in parallel with growing technology complexities, many are turning to MSPs for guidance and overall management. At the same time, the market growth for managed services is driving competition in the space. Here at Edgewater Networks we understand the challenges facing today’s MSPs and their customers. That’s why we’ve created a blog series that defines the opportunities for service enhancements that will in turn increase profitability...

Content type: Blog Post

Links:

MSPs Wanting to Increase Revenue Need This Now

In the second blog of the series, we will focus on more specific pain points like customers’ concerns over trust, scaling and predictability, and keeping costs low. After setting the stage, the blog will introduce the concept of monitoring and the benefits that it brings....

Content type: Blog Post

Links:

Removing Blind Spots for MSPs with End-to-End Visibility

The third blog will look closer at reporting and end-to-end visibility. To start the blog, we will draw attention to the fact that today’s infrastructure is changing. With virtualization and cloud becoming the norm, MSPs will need a monitoring system designed for the fast-moving evolution of IT. Using a 360-degree view-monitoring tool that is vendor agnostic will allow MSPs to remove all blind spots and increase customer satisfaction. If the Emprix/EWN WP is ready, this could be a nice CTA.

Content type: Blog Post

Links:

MSPs Should Follow These 6 Steps for SLA Success

For MSPs to achieve long-term success, they need to have a solid end-to-end guarantee that they can comply with. This blog will focus on designing competitive SLAs and how using monitoring (EdgeView) will ensure that MSPs can promise more than their competitors and actually mean it....

Content type: Blog Post

Links:

Service Providers Have a Big Opportunity with SD-WAN for SMB

SD-WAN threatens many service providers' MPLS business. When SD-WAN vendors go straight to the enterprise, SP fear a loss or downgrade of current services. But for the SMB market, vendors are looking to partner with providers to act as a bridge to smaller businesses that they don't have the resources to engage and serve. Plus, SMBs typically require managed offerings, which SP can offer by combining SD-WAN and NEO.

Content type: Blog Post

Links:

Danger is Lurking Behind Pure IP-Based Unified Communications

Security incidents with unified communications are one of the leading threats in today's landscape. As more and more companies move to pure IP-based UC, we're likely to witness a surge in security events if service providers do not act to secure their offerings. This blog post will cover how the security landscape is changing and describe why SBCs must be used before it's too late.

Content type: Blog Post

Links:

X OpenStack Service Metrics You Should Be Monitoring

From hypervisor metrics to nova server metrics, there's a ton that you can monitor and report on with OpenStack. But if you want to create an ecosystem that reduces MTTR and increases happiness of IT Ops, you have to go beyond the default metrics. This blog will cover reporting on OpenStack and provide a list of specially designed service-related metrics that all OpenStack users should implement.

Content type: Blog Post

Links:

New to OpenStack? Here's What You Need to Know

This blog post will cover the current fundamentals of OpenStack. Since you do not have general information on the blog, this post will help with SEO efforts by using keywords that are related to OpenStack. It will include the 6 components and end with a pitch that to properly manage OpenStack, you need to adopt Loom Systems.

Content type: Blog Post

Links:

1 OpenStack Component That Could Break Your SLA

This post will cover the problem of relying on Ceilometer to monitor issues on OpenStack. We will cover what Ceilometer reports on and why it's essential to adopt an additional monitoring tool to reduce MTTR so that SLAs are met. In the end, the post will link to the white paper "Gain Visibility Into Your OpenStack Logs With AI."

Content type: Blog Post

Links:

3 ICS Threats You Need to Know About

In a recent study done by SANS Institute, it was identified that ransomware, unprotected devices, and unpatched systems are threatening industrial control systems. While changes in ICS/SCADA environments tend to be slow, it is imperative that security practitioners have the right tools to detect threats before critical infrastructure is taken down. This blog will review the data collected and suggest adoption of a comprehensive visibility solution to ensure OT systems are reliable and available.

Content type: Blog Post

Links:

Managed Service Providers Viewed as Weakness in Network Security

APT10, a cyberespionage group, began targeting MSPs earlier this year as an easy way to get into enterprise networks. As telecommunications continues to move into the cloud, MSPs need to understand the danger of mishandling their clients' information or risk an attack that could bring down essential communications systems and capture sensitive data. This blog will cover the current attacks, what should be done to protect, and link back to other EWN security blogs.

Content type: Blog Post

Links:

One Solution to Solve 3 Hosted PBX Challenges

Whether you're an MSP, MSO, or CSP, there are a host of challenges that come along with delivering high-quality HPBX services. This blog will present each of the individual challenges and guide readers through solutions including SD-WAN Standard, NEO, and intelligent edges.

Content type: Blog Post

Links:

Why SD-WAN Isn't the Right Fit for Small and Medium Enterprises

SD-WAN doesn't make sense in every situation. While popular, it comes with extraneous features like WAN management that SMEs just doesn't need. This blog post will review why intelligent edges are a better fit, while diving deeper into the drivers like SaaS that would motivate SMEs to use Edgewater Networks' products.

Content type: Blog Post

Links:

Is Network as a Service the Simplification Enterprises Need?

A NaaS offering in its purest form would simplify the procurement and management of network equipment. In a survey of Cisco Live 2017 attendees, it was discovered that more than a third identified cloud computing as the greatest contributor to network complexity from IoT, SDN, and NFV. At the same time, they are unready to begin adopting AI to help with network management. This blog post will discuss the flexibility of NaaS and offer Cloud2Edge as a likely pairing.

Content type: Blog Post

Keywords: Network as a Service

Links:

Why mmWave Technology Will Shape a Better World

If you asked Maslow what he thought were basic human needs, the response would be self-actualization, esteem, love/belonging, safety, and physiological. But in today's world we'd argue that Internet connection should be part of the hierarchy of needs. The digital divide that we are facing is placing undo hurdles for the under served, meaning without Internet, they will never have a chance to get ahead. This blog post will cover how mmWave technology impacts our world by delivering Internet.

Content type: Blog Post

Links:

X Reasons Your Business Needs 5G Wireless Broadband

This blog post will answer the concerns of in what cases is 5G Wireless Broadband an smart business decision. It will cover topics including preparation for advanced technologies that require more bandwidth, providing gigabit services profitably, and outperforming larger carriers in a fraction of the time. It will have examples like delivering to the home woven in so that the reader can easily relate.

Content type: Blog Post

Links:

How to Take Your SD-WAN From Good to Great

SD-WAN is the technology of the moment. So when CSPs are trying to get in the game, it might be hard to craft a unique offering. In this blog we will discuss how using Intelligent Edges is an integral part of securing SD-WAN, so that customers of all sizes will stay and buy instead of jumping to another provider.

Content type: Blog Post

Links:

Big Changes Are Coming to Data Protection Regulations -- Are You Ready?

In May 2018 the European Union's new General Data Protection Regulation will replace the current laws on data handling. In this blog we will discuss what the regulation covers, the biggest differences between the versions, and where UCaaS can play a big part in compliance. At the end we will cover how Intelligent Edges can play a role in protection personal information while conducting VoIP calls.

Content type: Blog Post

Keywords: GDPR,UCaaS,VoIP,Regulations

Links:

Expect These Realities When Moving RTC to the Cloud

Service providers that are moving their real-time communications networking to the cloud have a large task at hand. To make them feel more secure, we'll overview what to expect and cover commonly perpetuated myths and discuss how having Intelligent Edges can mitigate any bumps in the move.

Content type: Blog Post

Links:

3 Public Cloud Blunders Novice Implementers Make

Regardless of your IT expertise, if you're journeying into the public cloud for the first time you might feel a little unprepared. To make matters worse, there is no specific road map. But, for everyone ready to embrace the cloud with little experience, there are three blanket mistakes that should definitely be avoided. This blog post will review three blunders including: permissions, mishandling of API keys, and compute sprawl.

Content type: Blog Post

Keywords: compute sprawl,public cloud,API,permissions

Links:

You Definitely Need Data Loss Prevention and This Is Why

Data volumes are growing exponentially and in parallel are the attacks on privacy and security. We're seeing changes like the EU GDPR setting strict regulations on data, but it really comes down to what organizations can do to protect themselves. This blog post will cover reasons why everyone needs data loss prevention including inadvertent disclosures, bad publicity, employee mobility, and cloud. The goal will be to leave readers wanting help with their security and DLP.

Content type: Blog Post

Keywords: data loss prevention

Links:

4 Pillars of a Successful Business Continuity and Disaster Recovery Program

Natural disasters and malicious actors are bringing down data centers and businesses are responding with BC/DR plans. But what about the overarching BC/DR program? We're talking about the structure for the management and governance of the plan and the path for sustainability as things shift. In this post we'll discuss about the four pillars that support any good BC/DR plan: management buy-in, accountability, prioritization based on business impact, and continuity.

Content type: Blog Post

Keywords: business continuity,disaster recovery

Links:

The Channel Has the Power to Change the QoS Narrative

Adding Intelligent Edges to any telecom offering is a wise choice for VARs and MSPs looking to provide a secure and reliable solution. But they are probably still receiving push back because customers aren't informed and don't want to pay for the service. This blog will cover the common reasons businesses don't want an intelligent edge solution (cost and lack of awareness) and how to overcome those to make more money and deliver a greater QoS. Product featured: Cloud2Edge Complete

Content type: Blog Post

Links:

It's Time to Bridge Gaps as NFV Takes Off

NFV is enabling network agility, but as service providers move forward, the channel may be unprepared for the virtualized future. This blog will go over the benefits of NFV, but also serve as a cautionary tale that there are still gaps that need to be filled by innovative services. Issues addressed will relate to large portfolios and heterogeneous systems that can cause troubleshooting and billing problems.

Content type: Blog Post

Links:

Unstacking OpenStack for Telecommunications

Would EWN be interested in doing a blog around OpenStack? I wrote an open source blog before, so we could expand on that. I'd just need to know some more technical specifics on how they want me to position NEO.

Content type: Blog Post

Links:

4 Tactics to Cross the Road in Telecom Frogger

Watch out! You have to be agile to make it across the street in this game of Telecom Frogger. For the VARs and MSPs trying to survive and thrive in the digital transformation, that means adopting NFV and SDN technologies. This blog will cover SD-WAN, distributed NFV, IoT and 5G, and open networking (linking back to the opensource blog). At the end it will discuss how a flexible solution like C2E can be chained on to virtualized services for better management and visibility.

Content type: Blog Post

Links:

For Customers, Service Quality During This Time Period Matters Most

The first 30 days set the tone for the relationship between provider and customer. So how are providers still taking days to get installation right, shipping out way too many packages of components, and not communicating properly? Starting from the first day of installation providers should follow these tips through to the contract renewal date to escape that dreadful customer churn.

Content type: Blog Post

Links:

What You Need to Know as Europes Hosted IP Heats Up

As European providers discontinue ISDN, Hosted PBX and UCaaS are heating up. While the technology might be changing, the problems that enterprises are looking to solve are largely staying the same. In this blog post we will cover the competition of US providers entering Europe, the challenges that enterprises are looking to solve, and how NEO can help CSPs on both sides remain competitive.

Content type: Blog Post

Links:

Security Best Practices for CSPs in a Boarderless World

Relying on a single purpose-built security device doesn't make much sense in today's dynamic, hyperconnected, and boarderless world. While we're witnessing many companies adopt the latest and greatest communication technologies, have they considered the security implications? In this blog post we'll go over the best practices that CSPs can follow to ensure that the communications they are providing to their customers is secure.

Content type: Blog Post

Links:

UC Analytics is Key Differentiator in Growing UCaaS Market

For providers answering RFPs, UC analytic capabilities must be included. Customers don't just want to see it on your roadmap, they want it today to optimize their UCaaS. In this blog post we'll cover the current market for both UCaaS and its analytics counterpart, and review what insight features providers should be able to offer.

Content type: Blog Post

Links:

What's Available for CSPs: UC Monitoring, Analytics, and the Edge

When trying to manage a UCaaS solution, providers need to be able to monitor, report, and troubleshoot in real time. The problem is, there are so many options out there labeled UC Monitoring, UC Analytics, and Edge that it can get confusing. We'll break down where each stands in today's market so that providers can find the best choice for their customers.

Content type: Blog Post

Links:

3 Infrastructure Elements to Consider When Skype for Business is Used as a PBX

This blog post will use the SfB MRD to detail the growing rate of SfB in UC. It will go on to discuss Enterprise Session Border Controllers, Survivable Branch Appliances, and PSTN Gateways. In the end readers should come away with a solid understanding of what infrastructure is needed when SfB is used as a PBX.

Content type: Blog Post

Links:

Skype for Business Deployment Models: Cloud vs. Premises-Based

Skype for Business premises-based deployments can be extremely complex so it's no surprise it's not the future. To help CSPs understand where SfB deployments are headed, the blog will give an overview of each deployment method and discuss what happens with voice.

Content type: Blog Post

Links:

Zero Touch Provisioning Enables Mass Adoption of Managed Services

Zero Touch Provisioning isn't just a glossy marketing term, it provides real, cost-saving and revenue growing benefits. In this blog post we will review what it really means to have ZTP and how CSPs can use it to grow their managed service adoption rapidly.

Content type: Blog Post

Keywords: zero touch provisioning

Links:

Breaking Into the SMB Market with Zero Touch Provisioning

Lack of IT support is plaguing the SMB market and creating a roadblock in the digital transformation. CSPs can help rectify the situation by using zero touch provisioning to get services turned up at the customer site, easily, quickly, and without error. This blog post in the ZTP series will relay the key benefits that will in turn help CSPs penetrate the SMB market.

Content type: Blog Post

Links:

4 Ways Zero Touch Provisioning Can Help

This post would follow the other two ZTP posts and link to them for more detailed reading. In this post we would expand on the four areas of growth for CSPs using ZTP as outlined in the MRD.

Content type: Blog Post

Links:

Case Study - C2E/IP Phone

Based on brain dump

Content type: Whitepaper

Links:

Press Release - Polycom

From brain dump

Content type: Blog Post

Links:

DevOps Could Be Hurting Your Health and Here's What to Do About It

Digital Transformation is a journey, not a destination. The fact is, we have to be in this for the long haul. That's why it's critical to take measures to ensure your IT staff isn't getting burnt out. Part of that is using the right tools that combat the effects of mounting bugs and systemic issues. This blog will cover how enterprise adoption of DevOps is rising, but could be a fatal mistake if teams don't have the resources they need to succeed (or sleep through the night without alerts).

Content type: Blog Post

Keywords: DevOps,digital transformation

Links:

3 Data Sources You Should Never Go Without

Downtime is bound to happen, it's a fact of life. But there are steps that can be taken to lessen the impact of outages and reduce MTTR. This blog post will outline the necessity of having constant monitoring and management of AWS/cloud infrastructure, storage, and server logs. The reader will be given examples of incidents to convey the message in real world terms.

Content type: Blog Post

Links:

Gearing Up for BroadSoft Connections 2017

Blog post to outline event and interop mprovements

Content type: Blog Post

Links:

Stand-Alone SD-WAN Won't Last

SD-WAN vendors that are selling a stand-alone appliance may be doomed for failure. Turns out that companies want more than just an appliance that will last a few years and do one thing. Instead, companies prefer SD-WAN to be a feature within WAN edge appliances. This blog will discuss getting into the mind of SD-WAN buyers.

Content type: Blog Post

Links:

Aligning SD-WAN With Key Vertical Markets

Enterprises and SMEs alike are seeking services that improve business processes and reduce operation costs. Service providers feel squeezed by the demand, but now there is one service that can deliver this across the board -- SD-WAN. This blog post will review how the technology aligns with the demands of verticals like banking, retail, and more.

Content type: Blog Post

Links:

FAQs: The Intelligent Edge

We often talk about the intelligent edge instead of ESBC, so let's make it a clearer for readers what we're talking about. To make this blog shine, it would be helpful to get feedback from EWN on what questions they receive most frequently on the intelligent edge.

Content type: Blog Post

Links:

Lync, Skype for Business, and Now...Teams

Skype for Business is dominating the UC&C scene, but apparently Microsoft already has its sights set on the eventual replacement with Teams. With the recent announcement at Microsoft Ignite, there's a lot of buzz about how this will impact the ecosystem that is already heavily invested in SfB. This blog post will give an overview of the current situation and look closer at some concerns related to voice.

Content type: Blog Post

Links:

Best Practices for a Fail-Proof IGA Strategy

In a recent study, only one in four respondents were “very confident” that user rights and permissions in their organizations were correct for the individuals’ roles. So that shows that you can be "very confident" in your IGA. In fact, the remaining 3/4 of those surveyed probably just need the right tools to do the job. This blog post will highlight the best practices so that all enterprises can achieve an IGA strategy that ensures the proper controls are always in place.

Content type: Blog Post

Keywords: IGA

Links:

Q3 2017 Mobile Device Trade-In Data -- iPhones Continue to Hold Value

A quarterly post for HYLA mobile regarding the quarterly device trade in data they get from their analytics software

Content type: Blog Post

Links:

X Details to Pay Attention to in Your Cloud SLA

Service Level Agreements are essential when you're trusting a cloud provider to handle your most sensitive data. But contracts can often be overwhelming and confusing, especially if you don't know what to look for. This blog post will help readers navigate cloud SLAs and point out important details like performance guarantees, backups, industry regulations, downtime, and more.

Content type: Blog Post

Keywords: Cloud, Service Level Agreements

Links:

Getting Partners Out of 2010 and Into the Cloud

Operational and skills barriers have been keeping partners from actualizing the full benefits of the cloud. While 99% of the channel realizes cloud's potential, there has only been a 4% increase since 2010 in cloud service offerings. In this blog, we will cover tips on how vendors and distributors can support partners in their journey to subscription-based cloud offering adoption.

Content type: Blog Post

Keywords: channel,partner,cloud,subscription based

Links:

Broadsoft Connections 2017 -- Rethinking Innovation

Recap of takeaways from Connections

Content type: Blog Post

Links:

Must Have Unified Communications Security Strategy

Apparently headlines aren't enough to scare businesses into putting the security of their UC solutions on the radar. Security teams certainly aren't prioritizing the threat, even though taking down key communications can cause staggering damage. This blog reviews the current risks and considerations for security strategies including an intelligent edge, BYOD, and synergy.

Content type: Blog Post

Links:

Here's Why Security Can't Be an NFR in Development

Security is often an afterthought when developing software since it's categorized as a non-functional requirement. While it's true that it isn't a functional area of the system, without it a nefarious actor could bring everything to a halt. This blog will aim to encourage readers to work with a developer that has security at top of mind. The position will be cemented by offering actionable tips on how security should be integrated and why it's important in today's security landscape.

Content type: Blog Post

Keywords: development,agile,secure

Links:

Are Security Certifications Worth It?

There's a big gap in the demand for security professionals and the IT professionals qualified for the jobs. The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. With such a huge opportunity, IT workers now have the chance to pivot and grow their cyber security skills. But where should they start? We'll help clarify today's worthwhile security certifications.

Content type: Blog Post

Keywords: certification,hiring,professional development

Links:

MSP vs. MSSP: Breaking Down True Security as a Service

It's a common misconception that MSPs can offer the same level of service the MSSPs provide. While they often list security as a featured service, MSPs are broader experts focused on keeping IT systems operational. The problem is that the security industry is in constant flux, meaning it needs a high level of detail to guarantee a strong security posture. This white paper will detail the differences and prove that MSSPs provide more valuable for system safety and offer details on verticals.

Content type: Whitepaper

Keywords: MSSP,MSP,security posture,IT security,compliance frameworks

Links:

Will 2018's UI Trends Utilize the 8-Second Attention Span?

It's that time of year again when we're looking at what's to come. For 2018, brands are going to be heavily focused on delivering attention-getting content that strays from what has been popular. We're talking long-form content on websites with more vibrant colors and animations. In this blog post we'll explore the upcoming trends and discuss if they fit with the natural human 8-second attention span.

Content type: Blog Post

Keywords: user interface,design

Links:

Don't Make this Rookie Startup Mistake with Your Website

Custom web design or template? Many startups think a template is good enough to get them started, but don't realize that it will end up costing them -- and big time. This blog post will walk readers through the decision of choosing between custom or template and then instruct them on how ROI can be calculated to measure the final outcome.

Content type: Blog Post

Keywords: return on investment,template,custom web design

Links:

B2BUA Collateral

based on brain dump

Content type: Whitepaper

Links:

Transparent Proxy

Collateral to ship with EdgeMarcs

Content type: Whitepaper

Links:

How Analytics Helps Amid the iPhone Scandal

There are a lot of ebbs and flows in the secondary device market. But the recent Apple "scandal" may have a new and unpredictable impact. iPhone owners through 2018 will be able to take their old phones and replace the battery for only $29, making formally outdated phones more valuable. Most certainly owners will hold on to their devices for longer, but will formally traded in devices have more value? Analytics can help you decide.

Content type: Blog Post

Keywords: secondary mobile device market,iPhone,Apple,SaaS,Analytics

Links:

Proving Innocence in Multi-Vendor Environments

Providing a high degree of customer satisfaction is critical in avoiding churn. But when providers are operating in multi-vendor environments, it's not always an issue with their services that causes end user dissatisfaction. This blog post will kick off an educational series on MTTI by laying ground work on the term.

Content type: Blog Post

Links:

How MTTI Supports Networking of the Future

The role of the network is going to change in 2018. We're talking about fueling digital transformation, spending less time fixing problems and more time on other tasks, and hiring the right people to do it all. It doesn't just happen overnight though--this blog post will explore how OTT is taking off and how multi-vendor environments require MTTI to ensure the network transformation of 2018.

Content type: Blog Post

Links:

Deployment Methods Make or Break Data Driven Networking

Data driven networking is a term we're going to hear more of. Why? Because as networks become more complex. it will be harder to manage QoS and QoE without some serious help. This blog post will introduce the three deployment methods available and discuss how the Intelligent Edge is the best way to achieve a data driven network.

Content type: Blog Post

Keywords: data driven networking

Links:

NEO Demo Script

based on brain dump

Content type: Whitepaper

Links:

Introduction to New 2900e PoE

Overview post announcing the launch of the new intelligent edge device. To include: All-in-one design (SBC + PoE) is perfect for small office implementations Single box solution makes installation easier and reduces the number of SKUs Single user interface for configuration Fully managed PoE design allows for VLANs and advanced management Type 1 PoE device providing a full 15.4 watts per port Dual 1Gb/s ethernet and optical fiber connections supports today’s bandwidth speeds

Content type: Blog Post

Keywords: PoE,Ethernet,SBC

Links:

Managed versus Unmanaged POE switches

Post to promote the new 2900e PoE intelligent edge device -- showing why managed is a better choice for PoE switches.

Content type: Blog Post

Links:

4 Features of a Great SD-WAN Solution

Using the SD-WAN FAQs, I'll outline the four features (application specific routing, multi-link performance, stateful SIP transfer, and survivability) that are the cornerstone of a great SD-WAN solution. The reader will come away with a better understanding of each of the core components.

Content type: Blog Post

Links:

Dear Channel, Are You Ready for the SD-WAN Revolution?

While other companies are focusing on bringing SD-WAN to the enterprise, the smaller guys are being left behind. This blog will detail the importance of SD-WAN in the digital transformation and open the eyes of channel readers on how they play an integral role this year. Plus, how they can win big by tapping into the SMB market.

Content type: Blog Post

Links:

How SD-WAN Helps VoIP Providers

Blog post that covers why SD-WAN is important for quality of VoIP services.

Content type: Blog Post

Links:

SD-WAN Gets Easier for SMBs With Turnkey Solutions

53.4% of mid-sized companies plan to deploy SD-WAN by August 2018. It's great to witness companies outside of the enterprise seeing value in SD-WAN. In this post we will discuss how the simplification of SD-WAN through the development of turnkey solutions is driving the SMB to enjoy the same agility and cost savings benefits that more complex solutions deliver.

Content type: Blog Post

Links:

SD-WAN: Guiding You From 101 to Deployment

SD-WAN can be a largely do-it yourself process. So for businesses with limited IT staff, it can be overwhelming or even impossible to complete without the right information. This article will take readers on a journey from the basics (plus trends), to deployment of SD-WAN and introduce the steps along the way, including types of SD-WAN (OTT, edge, vendor, carrier), consolidation of providers in 2018, a break down of benefits, discussion of 2.0, and more.

Content type: Blog Post

Keywords: SD-WAN,OTT,carrier,command line interface,tech trends,managed services

Links:

Winning or Losing in the Digital Economy -- Enhancing Performance With Translytical Data Platforms

The digital transformation is an abundant opportunity for companies to change the course of their success. But not every company will be considered a winner. Organizations that form their strategies now, shift resources to new digital initiatives, and redesign their organization and culture will have a distinct advantage. This blog will review trends of the transformation including real-time apps, IoT, machine learning, and real-time business data and tie in benefits of translytical data.

Content type: Blog Post

Keywords: Translytical Data Platforms,fast data,data silos,enterprise data strategy,in-memory data

Links:

Tracing Problem Origins in Content Delivery Networks

CDN has benefits for today's UC providers. We're talking the three S's: Speed, Security, and Scale. But what happens when something goes wrong? How do you locate the problem origin with multiple CDN locations? This blog will explore those questions and suggest using Network Edge Orchestration.

Content type: Blog Post

Keywords: cdn

Links:

Is SD-WAN the Next Big Security Target?

SD-WAN's popularity is monumental, so it's not crazy to think it could be the next big target for exploitation. This blog post will discuss the need for SD-WAN security to continually be optimized with a focus on layers, encryption, and DDoS protection. The content will also be tied into the latest posts on the requirement of SBCs even with firewalls.

Content type: Blog Post

Keywords: DDoS,encryption,SBC,security,virtual firewalls,network architecture

Links:

Mobile Phones are Like Stroke Patients: Healthcare Wireless Networks Can't Afford to Wait

Mobile and other connected devices are becoming the lifeblood of effective, digitized healthcare environments. But not all devices can be treated the same, especially if the network is going to function properly. Mobile devices are more like stroke patients that must be triaged quickly as events can transpire fast. This blog post will cover how to ensure wireless networks are reliable and secure, all with a positive end-user experience.

Content type: Blog Post

Keywords: wireless,mobile devices,healthcare,enterprise mobility

Links:

America's Ghost Malls Desperately Needed Cloud Computing

Crumbling capitalist cathedrals are becoming somewhat of an epidemic sweeping the nation. What's the problem here? Retailers aren't doing enough to engage buyers. While happy to submit funds to advertising, retailers tend to shy away from devoting revenue to IT investments. In 2018, that's only going to lead to disaster as the digital transformation acts as a vice to use technology to support a seamless user experience. This blog will convince readers and have them committed to the cloud!

Content type: Blog Post

Keywords: cloud computing,ecommerce,retail,point of service

Links:

Edge Computing: Past, Present, and Future

Back in the day when Edgewater Networks first dreamed up Network Edge Orchestration, it made practical sense to us to process data at the edge. Now that same approach is being hailed as a groundbreaking method to analyze data in real time. This blog will review the fundamentals of edge computing, discuss how it could one day overthrow the cloud, open source initiatives, and discuss importance beyond IoT use cases.

Content type: Blog Post

Links:

Is the Theoretical Edge the New White Fluffy Cloud?

Where is the edge exactly when we talk about edge computing? The answer is that depending on the environment, the edge could be a lot of places. Hopefully we're not following the same path as cloud, where the visual is wholly inaccurate. In this blog we will talk about the benefits of edge computing, frame it in a discussion of VoIP and QoS, and offer information on how EWN has been using intelligence at the edge.

Content type: Blog Post

Links:

CDN: Good for DDoS, Bad for Malware?

Service providers have to weigh the pros and cons of moving to CDN. So we're helping them do that by talking about how content delivery networks can be good and bad when it comes to security. The blog will cover how CDNs help avoid DDoS outages, while also covering how the technology is increasingly being used for malware. Readers will come away understanding that EWN has weaved in security to all of the edge solutions.

Content type: Blog Post

Links:

SD-WAN 3.0: The Next Generation

In this blog post, we will walk readers through the evolution of SD-WAN and arrive at the current generation -- 3.0. Networking thought leaders are suggesting that we've finally reached the stage where smaller companies are looking for "SD-WAN lite" versions that meet the budget and feature requirements that are specific to the SME. To make things a little more fun, the content will be tied to Star Trek (hence "The Next Generation"). In the end, we'll highlight how EWN SD-WAN is 3.0 ready.

Content type: Blog Post

Links:

NFV Drama We Weren't Expecting

It's like an episode of reality TV -- cursing, finger pointing, and hurt feelings. What are we talking about? NFV...of course? This blog post will reveal the recent drama surrounding comments made by the CTO of Telus about NFV failing to meet the hype that we've been hearing for the past few years. Points to discuss will be the high maintenance costs, licensing fees, and increasing operations demands. To tie up the post, we will discuss C2E and how it helps avoid the pitfalls.

Content type: Blog Post

Links:

Building Revenue in the Hosted PBX 1-9 Users Market

The Eastern Management Group released a new multi-year study that has described the Hosted PBX 1-9 users as the "world's largest underserved market." That couldn't be more perfect for the EWN audience that tends to have a SME focus. The blog will review the research and discuss the prime revenue stream for delivering quality voice services with NEO.

Content type: Blog Post

Links:

5 Content Lessons B2B Tech Companies Can Learn From Their Solutions

"We need our algorithms to be better!" "Analytics will help set our product apart!" When you're working with B2B tech companies it's all about creating a unique solution -- the catch -- it's probably not all that dissimilar. I've seen it time and time again, and I chuckle because they don't use their own product development advice for their content. This post will review lessons like: quit using boring content, pay attention to analytics, enough with the buzzword stuffing...

Content type: Blog Post

Links:

Why Your Blog is Failing, and It's Not for the Reasons You Think

MY BLOG ISN'T GENERATING LEADS!! Please, stop freaking out. When B2B businesses embark on blogging, it's usually to generate leads, a.k.a. make money. So guess what -- when it doesn't work as planned, everyone wants to jump ship. But, are companies really addressing what is keeping their blogs from being great? This post will review page load times, annoying "subscribe" pop ups, guest posting on other blogs to drive traffic, wrong KPIs, poor structure/navigation, and forgetting to email content.

Content type: Blog Post

Links:

The Jury's Out on SD-WAN Security

Coming across a Light Reading survey about the how secure SD-WAN services are was too tempting. I clicked the button and revealed the results that "the jury is out." Of course, this is far from a controlled scientific study, but it does show a knee-jerk reaction of respondents. In this post we will discuss what makes people think that SD-WAN is secure or a total nightmare and highlight activity in layer 7 of the OSI model.

Content type: Blog Post

Keywords: SD-WAN Security

Links:

When Building a Recipe for Digital Business Success -- Don't Forget the Key Ingredient

In many cuisines, there's one ingredient that makes dishes shine. Sometimes it's obvious, other times it's in the background, enhancing the overall flavor. The same goes for digital businesses and its inclusion of SD-WAN. This post will discuss how in the shift of the digital transformation, SD-WAN plays a critical role in better connectivity, security, IT agility, management, and more.

Content type: Blog Post

Keywords: Digital Business,Transformation,IT agility

Links:

Why We're All Moving to Intelligent Edge Computing

Big companies are re-organizing their businesses around the intelligent edge, but why? Well, because edge computing can increase capability, performance and reliability. This blog will review drivers including latency requirements, customer experience, data protection (GDPR, audit/compliance) and discuss it all using multiple lenses/use cases.

Content type: Blog Post

Keywords: Edge Computing,Customer Experience,Data Protection,Latency

Links:

Don't Just Assume Cloud ROI -- Heed These Warnings

Cloud migrations are complex, and if done improperly, often result in failure. It's not enough to just move 100 apps to the cloud, you need to anticipate moving an average of 70% of your total workload for the cloud to make real financial sense. But it does take planning, because those first 100 apps are cheaper than the more complex migrations to follow. This blog will discuss the financial implications of cloud migration, offer budget tips, and suggest short deployment sprints

Content type: Blog Post

Keywords: Cloud Migration,Cloud Computing,ROI

Links:

3 Strategies to Protect Your Cloud from DDoS Attacks

Creating redundancy, architecting for resiliency, and leveraging detect and protect strategies are three ways you can protect your cloud environment from a DDoS attack. While these aren't bulletproof -- firewalls, cloud monitoring, and other tools will help you identify and scrub malicious traffic before it begins to flood and take down your most precious resources. DDoS attacks can be extremely hard to stop when already underway, that's why it's so important to focus on prevention.

Content type: Blog Post

Keywords: Cloud Security,DDoS,Cyber Security,Application Security,Data,Managed Services

Links:

For payment: Why We're All Moving to Intelligent Edge Computing

Penguin's card is not working. Thanks!

Content type: Blog Post

Links:

For payment: The Jury's Out on SD-WAN Security

For payment since Penguin's card is not working. Thanks!

Content type: Blog Post

Links:

Breaking Down the "How" to Achieve Business IoT

Customers want IoT, but to get from "want" to "how" is often an insurmountable undertaking without the right guidance from experts. In this blog we will discuss the real-world applications of IoT and how service providers can shed light that SD-WAN can be the main facilitator. Points will include prioritization, analytics, easy deployment, and low cost connectivity.

Content type: Blog Post

Keywords: IoT

Links:

Are Advances in Communication Technology Placing Us in Danger?

A study has uncovered UK organizations' contradictory attitudes towards the voice channel, increasing the chances of their customers', employees', and partners' data being exposed to unauthorized parties. It seems that although voice communication technologies have evolved, companies aren't securing from the inside. Instead, they are relying on telcos. This blog will review the ramifications and discuss what key security areas are being overlooked.

Content type: Blog Post

Keywords: GDPR,VoIP,Security,Cybersecurity,IT,Encryption

Links:

What Comes First -- The Cloud or SD-WAN?

Just like the chicken or the egg, when it comes to the Digital Transformation, either the cloud or SD-WAN could come first. Cloud applications are quickly adopted, but often require SD-WAN to act as a catalyst. But then there's also SMBs that may need better connectivity options before they can even consider using cloud services. This blog will review the connection between cloud, SD-WAN, and the digital transformation, plus discuss how SD-WAN benefits cloud applications.

Content type: Blog Post

Links:

Tips for Avoiding Skype for Business Deployment Mistakes

Network readiness, maintenance costs, and use of SBCs are all places that enterprises seem to slip up when deploying Skype for Business. To help you avoid the most common mistakes, we'll outline just what those are and the necessary considerations for a smooth deployment and beyond. This post will have a checklist feel with many bullets for the reader to consider.

Content type: Blog Post

Keywords: skype for business, deployment

Links:

Global Cyber Alliance Pushes for DMARC by RSA 2018

Email-born attacks can often be stopped by Domain-based Message Authentication, Reporting and Conformance (DMARC), but most private and public organizations aren't using it. For those that are, many are using it wrong, limiting its effectiveness. In this blog, we will take a closer look at DMARC's ability to block fishing attacks and review limitations that are holding it back from world-wide adoption.

Content type: Blog Post

Keywords: DMARC,phishing attacks

Links:

Best Cyber Security Certifications for Your Time

About 70 percent of organizations require cyber-security applicants to have a cyber-security certification. While some professionals choose to complete certifications just to have bullet points on their resume, others take a more calculated approach. In the case of cyber security certifications, not all are created equal. This blog post will cover worthwhile certifications and expected benefits.

Content type: Blog Post

Links:

Your UCaaS Won't Sell Without This

According to Gartner user survey data, security is a top factor in choosing a UCaaS provider. If the offering doesn't have some level of security built in, customers are very likely to pass. This blog will review suggestions for service providers to ensure they are providing the most secure offering possible. It will end with an offer of C2E so that all sites are secure, no matter the size.

Content type: Blog Post

Keywords: UCaaS

Links:

3 Trends Redefining Traditional Security

Three big digital transformations are impacting the way we traditionally look at security. These days endpoints are more secure, SaaS is leveraged as the back office, and IaaS has become the data center. So what do all these changes mean? This post aims to provide the reader with predictions on where the security market is headed and the changes necessary to keep pace.

Content type: Blog Post

Keywords: endpoint, SaaS, IaaS, data center, perimeter security, cloud, back office

Links:

Are You Really Ready to Maximize on the European Unified Communications Market?

Last year at the European UC Market Insights Roadshow, Edgewater Networks, BroadSoft, and Polycom shared findings that the SME UC services market was an opportunity that service providers shouldn't wait to capture. But is that even feasible when dealing with a host of problems that affect UC quality? This blog post will review market drivers, problems that prohibit providers from scaling, and resources that support issue remediation and MTTI.

Content type: Blog Post

Links:

Cyber Security Culture for the SMB

Larger organizations have the luxury of big budgets to train and instill a cyber security culture. But even with limited resources, SMBs can and must operate with a security-first mindset. This blog will review what that means, including the basics of strong passwords, antivirus, and overall employee buy-in. The blog will also overview top threats like ransomware and phishing that can financially devastate smaller companies.

Content type: Blog Post

Keywords: Phishing,Managed Security,Ransomware,Password Manager,Virtual CISO

Links:

What to Expect During a Penetration Test: The 6 Stages

Cybersecurity events, while expected by security professionals, often catch organizations off guard. Living in such an unpredictable world can make even the most easy-going person feel a little unsettled. To help prospects feel at ease with penetration testing, we will create a blog that walks them through what to expect during a test by outlining stages from planning to retest.

Content type: Blog Post

Keywords: Penetration Testing,Pen test,cyber resilience

Links:

50 Social Media Posts

Using your existing blog posts, I can create 50 unique Twitter/LinkedIn posts for you to publish. Posts will be text only with researched hashtags.

Content type: Blog Post

Links:

Recommendations

Talented, technical, and trustworthy

An amazing communicator with deep domain expertise, Lea has contributed a ton of value to nDash brands over the years. She takes on some of the most challenging types of assignments, but always delivers in a timely, professional manner. She's been a key part of our success and we look forward to working with her more in the years to come! Thank you Lea!

Michael Brown, nDash.co