Open Systems
Blog

Read our blog to gain insight from industry and Open Systems experts on the business impact of transforming to a SASE organization.

All Topics

  • All Topics
  • Corporate
  • SASE
  • SD-WAN

All Authors

  • All Authors
  • Alaska May
  • André van der Walt
  • Andrina Brun
  • Charlie Gough
  • Christian Brauchli
  • Dave Martin
  • David Balaban
  • Geoff Haydon
  • James Pearse
  • John Koetsier
  • Lenka Sykorova
  • Moritz Mann
  • Open Systems
  • Paul Keely
  • Renato Iten
  • Ric Longenecker
  • Stefan Keller
  • Vijay Viswanathan
Showing 0 out of 105 Blog Posts

Revolutionizing MDR: Say Hello to Ontinue

Geoff Haydon

Open Systems Awarded Great Place to Work – in SEVEN Countries

Alaska May

Microsoft Verifies Open Systems MDR+ with MXDR Status

Dave Martin

Today’s Cybersecurity Vulnerabilities Require Everyone’s Vigilance

André van der Walt

Microsoft Ignite Recap

Charlie Gough

Innovative IoT Security Monitoring Protects Customers Against Cyberthreats

Dave Martin

What is Microsoft Doing in the World of IoT and OT Security?

Paul Keely

Build Your Coalition: Cybersecurity as a Team Sport

Ric Longenecker

Where to Start with Security for IOT and OT Monitoring

Paul Keely

OT Devices: 5 Ways IoT and OT Security Falls Short

Paul Keely

Outpacing Threat Actors with Rapid Cover for MDR+

Lenka Sykorova

Paul Keely Awarded Microsoft MVP in New Security Category

Open Systems

An Action-oriented Approach to Security Service Reporting

Dave Martin

Open Systems Recognized as Winner of 2022 Microsoft Swiss Partner of the Year

Open Systems

Open Systems Wins 5 Industry Awards in First Half of 2022

Open Systems

RSA Conference Recap: The Future of MDR, Microsoft Recognition, and More

Vijay Viswanathan

Open Systems Voices: Advice for Women Considering Engineering Roles

Andrina Brun

Why You Should Care about IoT and OT

Paul Keely

Open Systems Achieves Carbon-Neutral Status

Renato Iten

Open Systems Wins Microsoft Security Excellence Award for Security MSSP of the Year

Open Systems

Open Systems Achieves Microsoft Cloud Security Advanced Specialization Certification

Open Systems

CISOs Balance Business and Supply Chain Risk With Talent Shortages

Ric Longenecker

Open Systems Selected as Security MSSP of the Year Finalist in Microsoft Security Excellence Awards

Open Systems

Cybersecurity Demands an Olympic-Caliber Team

James Pearse

The First 5 Minutes of a Cyberattack: What Happens, and What to Do

John Koetsier

In Tools We (Do Not) Trust

John Koetsier

Cybersecurity Relies on Understanding, Speed, Action and Consistency

James Pearse

5 Things CISOs Can Do To Actually Sleep At Night

John Koetsier

Prepare Your Cyber Defenses for Stormy Weather, Because Winter is Coming

John Koetsier

We’re on a Mission: Separating MDR Contenders From Pretenders

Open Systems

Mission Control: We Never Quit on Our Customers

Christian Brauchli

How Open Systems Uses Microsoft Tools to Improve Security Maturity

Open Systems

Why You Need Technology and Talent to Address the Growing Cyberthreat

Open Systems

Securing Organizations that Make the World a Better Place

Open Systems

Thwarted Phishing Attack Shuts the Door to Ransomware

Open Systems

Calculating the Security, Scalability and Savings of Managed Detection and Response (MDR)

Open Systems

Clinical Research Organizations (CROs) Shift to New Cloud Platforms to Accelerate and Secure Innovation

Open Systems

Open Systems Receives Microsoft’s Certification in Threat Protection

Open Systems

The Core Components of SASE

David Balaban

Prepare for the Worst, Hope for the Best: Zero Trust Everything

Ric Longenecker

Gartner Recognizes Open Systems as One of Eight Vendors With Complete SASE Solutions

Stefan Keller

What IT Pros Are Feeling, Doing and May Be Overlooking in the Post-Pandemic Environment

Open Systems

Not All Endpoint Sensors are Created Equal

Dave Martin

How To Contain Threats Fast Using SOAR And An Authorization Framework

Open Systems

What’s Driving SOC NOC Convergence

Moritz Mann

Password Check Required Immediately:
8 Steps for Creating Engaging Cybersecurity Awareness Campaigns

Ric Longenecker

ZTNA: A Key SASE Capability Enabling Digital Transformation

Open Systems

To Protect and Serve? Why Not all Managed Security Services are Created Equal

Dave Martin

Houston, We Have a Problem: Why a Strong Incident Response Plan Must Go Beyond Alerts

Open Systems

Data Privacy in 2021
3 Realities that Will Drive Change

Open Systems

CISO Insights: Highlights from Tech Talk Podcast’s Interview with Ric Longenecker

Open Systems

Why You May Need To Get Out Of The Cybersecurity Business

Open Systems

CISO to CISO

Ric Longenecker

How Healthcare Institutions Can Stop Bad Actors from Capitalizing on COVID

Open Systems

So Many Alerts, So Few Insights: Moving The Focus To Awareness And Response

Open Systems

SASE Hype and Reality: Our Key Takeaways From Gartner’s Hype Cycle Reports

Open Systems

Stopping a Cyberattack: Managed Detection and Response In Action

Open Systems

8,000 Trees to Celebrate 8,000 Deployments

Renato Iten

Our MDR Service Wins Cybersecurity Breakthrough Award!

Dave Martin

Why Gartner’s MDR Market Guide is a Must Read – And Must Follow

Dave Martin

Managed Detection and Response – How to stay safe in three acts

Open Systems

Open Systems’ Key Takeaways from Gartner’s Competitive Landscape: Managed SD-WAN Services

Open Systems

Business Continuity Success: MEP Enables 135K+ Employees of 72 Enterprises to Work Remotely During COVID Crisis

Open Systems

Open Systems Gets Inspired by Microsoft!

Open Systems

Application Optimization – The Cherry on Top of the SD-WAN Cake

Open Systems

Combining AI and Human Intuition to Maximize Cybersecurity

Open Systems

Contingency Plan or Current Reality — How to Meet Critical Needs for Secure Remote Access and Collaboration

Open Systems

Why Your Digital Enterprise Needs to Rethink Networking and Network Security

Open Systems
BLOG_600x300_tighter_integration

Why Tight Integration Is the True Core Component of SASE

Open Systems
Why You Need to Turn Network Security Inside-Out

Why You Need to Turn Network Security Inside-Out

Open Systems

Gartner Calls SASE Transformational

Open Systems
Cybercrime and breaches

The New Face of Cybercrime: Considerations for Personal and Enterprise Security

Open Systems

Chipping Away at the Gray Zone: Is Responsible Information and Communication Technology Possible?

Open Systems
Blog: Breaches Happen: Why Great Incident Response Is Key to Managing Cyber Attacks

Breaches Happen: Why Great Incident Response Is Key to Managing Cyberattacks

Open Systems
SD-WAN Security Services Get Integrated

SD-WAN Security Services Get Integrated

Open Systems
Channel blog

The $3 billion European opportunity for Channel Partners

Open Systems
How a Hybrid WAN Can Solve Your Biggest Networking Challenges

How a Hybrid WAN Can Solve Your Biggest Networking Challenges

Moritz Mann
Cloud-Based Security in the SD-WAN Era

Cloud-Based Security in the SD-WAN Era

Open Systems
How Sprawling Networks Have Redefined WAN Security Requirements

On the Edge: How Sprawling Networks Have Redefined WAN Security Requirements

Moritz Mann
Blog: SD-WAN Will Drive Enterprise Adoption of 5G Services

SD-WAN Will Drive Enterprise Adoption of 5G Services

Open Systems
BLOG How SD-WAN Removes Complexity in Today’s IoT Era

How SD-WAN Removes Complexity in Today’s IoT Era

Open Systems

Protect Yourself Against the Newest Wave of Ransomware

Open Systems
SD-WAN and the Renewed Focus on Applications

SD-WAN and the Renewed Focus on Applications

Open Systems
Balancing Security and Agility with SD-WAN

Balancing Security and Agility with SD-WAN

Open Systems
SD-WAN Must Support Network Freedom

SD-WAN Must Support Network Freedom

Open Systems
multi-cloud

Multi-Cloud Enterprises Require Unified, Secure SD-WAN

Open Systems
Open Systems IoT

When Disruptions Converge: AI, SD-WAN, and the Edge

Open Systems

What is NDR? Network Detection and Response

Open Systems

What is NOC?

Open Systems

What is SOC?

Open Systems

Next Gen MDR

Open Systems

What is XDR? Extended Detection and Response

Open Systems

What is EDR? A Guide on Endpoint Detection and Response

Open Systems

Your Guide to Vulnerability Management

Open Systems

Everything You Need to Know about Zero Trust Architecture

Open Systems

What is Digital Risk Protection?

Open Systems

Password Attacks

Open Systems

Ransomware Playbook

Open Systems

What Are SIEM Tools?

Open Systems

Threat Response Solutions

Open Systems

What is Microsoft Sentinel?

Open Systems

Threat Detection and Response

Open Systems

What are Managed Security Services (MSS)?

Open Systems

What is SIEM?

Open Systems

What is Remote Access VPN

Open Systems
Load More