Monthly Archives: August 2018

business IT services
Aug 18

Twin Networks Talks: Embracing the Cloud With AWS

By Twin Networks Staff | News

Last week, Founder and CEO of Twin Networks Christopher Brown spoke at an event by Vistage. CEOs, executives, and professionals came together to share knowledge about operating and growing successful businesses. Chris came to the table prepared to talk about upcoming struggles and successes in the IT world – namely cloud computing. We had a great time, and have been asked to come back for the next event! See our presentation deck here.

We talked about:

  • Infrastructure as a Service and Software as a Service
  • Internet of Things: Connecting Everything and Everyone
  • There’s an App for that: Delivering Everything On Demand
  • Cloud: Business Value in Moving to Cloud

And finally, Amazon Web Services:

Amazon Web Services is a major player right now. They are making headlines today after successfully moving Condé Nast into the cloud. Condé Nast, a mass media corporation, is in charge of creating content for a wide variety of audiences, on all manners of media. Their CEO, Joe Simon, explained the company’s decision, how greatly it helps them tighten operations, and what it means for the future of Condé Nast (watch the video here). The executives asked, “Do we really want to be in the business of running data centers anymore?” With a corporation as big as this where data and content is their main business, storage and access to that content is a main concern. But, it should by no means be as important as content creation.

Virtualizing is not the way of the future. It’s the way of right now. Content should be in the hands of the people, with few structures standing in the way of consumers, the content, and the content creators.

BYOD blog
Aug 10

What You Need To Know About The BYOD Movement

By Twin Networks Staff | News

After traveling the East Coast last week to hear from some of our partners, Dell SonicWall and Aruba (an HP company – recently acquired) we’re ready to share what we’ve learned and what’s coming down the line in network and email security, hardware, the elusive Gen Mobile, and the challenges and solutions to the BYOD movement.

Both Dell and Aruba discussed the BYOD (Bring Your Own Device) movement extensively. It’s a consistent problem, and opportunity, in the digital age. There is no separation between work and play anymore; everything lives together in our minds and in our devices. This coincides with the Gen Mobile mentality, the generation of workers that have grown up with technology and consider having the world attached to their body (smart watches) to be second nature. Our personal devices carry all of our data everywhere we go – they tell us when we have a meeting, email, and keep our photos all in the same cloud. This can be a good thing but comes with unique struggles for IT systems and, most importantly, SECURITY. So how do we keep employees happy, take advantage of emerging technology, and keep our most valuable information secure? It’s all about understanding the user’s habits, and solving security problems before they start.

Don’t worry – we don’t have to go back to the COLD era, (that’s Corporate Owned Locked Down). Not too long ago, businesses would be in charge of deciding which devices were used to conduct said business, from computers to telephones – and even mobile devices were often chosen and provided by businesses. This meant that employers and IT engineers could be in complete control of security, set up the necessary systems, and be aware of all risks. Many large enterprises still follow this methodology, but the reality is that it won’t work, and workers won’t be pleased. They will still use their personal devices for corporate activities, and really, we should encourage that. The fact that work is always in your employee’s pockets is amazing for productivity, but an individual is less likely to follow the same precautions they might while at work using a work-sanctioned device.

Are they considering the WiFi network they are connected on?
Does their personal device have a pin code or passcode?
Are they being careful of spam and viruses?

Most likely not, and it can take just one misstep to tear down a system, as we know. What’s worse – these BYOD users are used to assuming that their IT department has implemented all the necessary precautions, so the security of their work data is not a top concern.

Let’s prove them right.

BYOD is not the be-all and end-all. To keep secure while everyone is still smiling, businesses and IT departments should consider other acronyms within the spectrum of BYOD to COLD. Consider COPE, Corporate Owned Personally Enabled – the organization chooses the device, incorporates controls and security, but the user can choose the system and experience. Or, a business could create a list of devices for users to choose from. Win-win. Either way, the IT department needs to be able to understand the devices and apps employees are using, adapt, and make the right decisions on devices and apps for their industry and size.

Pick the devices, lock them down, scale, and repeat.