
Open SystemsBlog
Read our blog to gain insight from industry and Open Systems experts on the business impact of transforming to a SASE organization.
All Topics
- All Topics
- Corporate
- SASE
- SD-WAN
All Authors
- All Authors
Showing 0 out of 105 Blog Posts

Revolutionizing MDR: Say Hello to Ontinue

Open Systems Awarded Great Place to Work – in SEVEN Countries

Microsoft Verifies Open Systems MDR+ with MXDR Status

Today’s Cybersecurity Vulnerabilities Require Everyone’s Vigilance

Microsoft Ignite Recap

Innovative IoT Security Monitoring Protects Customers Against Cyberthreats

What is Microsoft Doing in the World of IoT and OT Security?

Build Your Coalition: Cybersecurity as a Team Sport

Where to Start with Security for IOT and OT Monitoring

OT Devices: 5 Ways IoT and OT Security Falls Short

Outpacing Threat Actors with Rapid Cover for MDR+

Paul Keely Awarded Microsoft MVP in New Security Category

An Action-oriented Approach to Security Service Reporting

Open Systems Recognized as Winner of 2022 Microsoft Swiss Partner of the Year

Open Systems Wins 5 Industry Awards in First Half of 2022

RSA Conference Recap: The Future of MDR, Microsoft Recognition, and More

Open Systems Voices: Advice for Women Considering Engineering Roles

Why You Should Care about IoT and OT

Open Systems Achieves Carbon-Neutral Status

Open Systems Wins Microsoft Security Excellence Award for Security MSSP of the Year

Open Systems Achieves Microsoft Cloud Security Advanced Specialization Certification

CISOs Balance Business and Supply Chain Risk With Talent Shortages

Open Systems Selected as Security MSSP of the Year Finalist in Microsoft Security Excellence Awards

Cybersecurity Demands an Olympic-Caliber Team

The First 5 Minutes of a Cyberattack: What Happens, and What to Do

In Tools We (Do Not) Trust

Cybersecurity Relies on Understanding, Speed, Action and Consistency

5 Things CISOs Can Do To Actually Sleep At Night

Prepare Your Cyber Defenses for Stormy Weather, Because Winter is Coming

We’re on a Mission: Separating MDR Contenders From Pretenders

Mission Control: We Never Quit on Our Customers

How Open Systems Uses Microsoft Tools to Improve Security Maturity

Why You Need Technology and Talent to Address the Growing Cyberthreat

Securing Organizations that Make the World a Better Place

Thwarted Phishing Attack Shuts the Door to Ransomware

Calculating the Security, Scalability and Savings of Managed Detection and Response (MDR)

Clinical Research Organizations (CROs) Shift to New Cloud Platforms to Accelerate and Secure Innovation

Open Systems Receives Microsoft’s Certification in Threat Protection

The Core Components of SASE

Prepare for the Worst, Hope for the Best: Zero Trust Everything

Gartner Recognizes Open Systems as One of Eight Vendors With Complete SASE Solutions

What IT Pros Are Feeling, Doing and May Be Overlooking in the Post-Pandemic Environment

Not All Endpoint Sensors are Created Equal

How To Contain Threats Fast Using SOAR And An Authorization Framework

What’s Driving SOC NOC Convergence

Password Check Required Immediately:
8 Steps for Creating Engaging Cybersecurity Awareness Campaigns

ZTNA: A Key SASE Capability Enabling Digital Transformation

To Protect and Serve? Why Not all Managed Security Services are Created Equal

Houston, We Have a Problem: Why a Strong Incident Response Plan Must Go Beyond Alerts

Data Privacy in 2021
3 Realities that Will Drive Change

CISO Insights: Highlights from Tech Talk Podcast’s Interview with Ric Longenecker

Why You May Need To Get Out Of The Cybersecurity Business

CISO to CISO

How Healthcare Institutions Can Stop Bad Actors from Capitalizing on COVID

So Many Alerts, So Few Insights: Moving The Focus To Awareness And Response

SASE Hype and Reality: Our Key Takeaways From Gartner’s Hype Cycle Reports

Stopping a Cyberattack: Managed Detection and Response In Action

8,000 Trees to Celebrate 8,000 Deployments

Our MDR Service Wins Cybersecurity Breakthrough Award!

Why Gartner’s MDR Market Guide is a Must Read – And Must Follow

Managed Detection and Response – How to stay safe in three acts

Open Systems’ Key Takeaways from Gartner’s Competitive Landscape: Managed SD-WAN Services

Business Continuity Success: MEP Enables 135K+ Employees of 72 Enterprises to Work Remotely During COVID Crisis

Open Systems Gets Inspired by Microsoft!

Application Optimization – The Cherry on Top of the SD-WAN Cake

Combining AI and Human Intuition to Maximize Cybersecurity

Contingency Plan or Current Reality — How to Meet Critical Needs for Secure Remote Access and Collaboration

Why Your Digital Enterprise Needs to Rethink Networking and Network Security

Why Tight Integration Is the True Core Component of SASE

Why You Need to Turn Network Security Inside-Out

Gartner Calls SASE Transformational

The New Face of Cybercrime: Considerations for Personal and Enterprise Security

Chipping Away at the Gray Zone: Is Responsible Information and Communication Technology Possible?

Breaches Happen: Why Great Incident Response Is Key to Managing Cyberattacks

SD-WAN Security Services Get Integrated

The $3 billion European opportunity for Channel Partners

How a Hybrid WAN Can Solve Your Biggest Networking Challenges

Cloud-Based Security in the SD-WAN Era

On the Edge: How Sprawling Networks Have Redefined WAN Security Requirements

SD-WAN Will Drive Enterprise Adoption of 5G Services

How SD-WAN Removes Complexity in Today’s IoT Era

Protect Yourself Against the Newest Wave of Ransomware

SD-WAN and the Renewed Focus on Applications

Balancing Security and Agility with SD-WAN

SD-WAN Must Support Network Freedom

Multi-Cloud Enterprises Require Unified, Secure SD-WAN

When Disruptions Converge: AI, SD-WAN, and the Edge

What is NDR? Network Detection and Response

What is NOC?

What is SOC?

Next Gen MDR

What is XDR? Extended Detection and Response

What is EDR? A Guide on Endpoint Detection and Response

Your Guide to Vulnerability Management

Everything You Need to Know about Zero Trust Architecture

What is Digital Risk Protection?

Password Attacks

Ransomware Playbook

What Are SIEM Tools?

Threat Response Solutions

What is Microsoft Sentinel?

Threat Detection and Response

What are Managed Security Services (MSS)?

What is SIEM?
