Blog

Four Reasons Your Business Needs ShareFile

Posted on Apr 28, 2017 by

Businesses are becoming increasingly mobile, information-focused and collaborative. Sharing files and business information requires a dependable, secure structure. Recognized by Gartner as a Leader in the File Synchronization and Sharing market for three years, Citrix ShareFile is committed to providing secure file sharing, storage and sync for businesses. What is ShareFile? Citrix ShareFile helps businesses […]

Read More

Why A SIEM Platform is Critical to Every Organization

Why A SIEM Platform is Critical to Every Organization One of the most intensive and time consuming processes that any security engineer tackles is trying to put together the pieces of an attack lifecycle. From the endpoint analysis to the detection capabilities on the network devices, tracing an incident throughout your organization requires advanced technical […]

Read More

Moving Beyond the FUD Factor

Posted on Apr 24, 2017 by

Moving Beyond the FUD Factor “If the world would be perfect, it wouldn’t be” ~ Yogi Berra Likewise, so are the actions of some information security practitioners. Have you ever spoken to an information security practitioner who loves to ring the alarm?  They tell everyone about the latest breaches and whose data was stolen, grumble about […]

Read More

5 Phases of Ransomware Attacks

Posted on Mar 20, 2017 by

5 Phases of Ransomware Attacks Ransomware is one of the most sinister threats out there for organizations because it is the most profitable type of malware attack. Once a cybercriminal hacks into a company’s files and encrypts them, organizations have little option but to pay the asking price for the code to decrypt and regain […]

Read More

The Health and Success of Your Organization Depends on Security

Posted on Mar 16, 2017 by

In today’s high-risk world, it’s more challenging than ever to defend your organization against ever-increasing attack surfaces, security vulnerabilities and social engineering attacks. In order to defend your network and data efficiently, you need to implement strong processes and integrated security technologies. The experienced data security specialists at EDCi have recently done some great things […]

Read More

Statement on Genesys Acquisition of Interactive Intelligence

Posted on Jan 13, 2017 by

On August 31, 2016 Interactive Intelligence announced they had entered into a definitive agreement to be acquired by Genesys.  And last week, on December 1, that transaction was completed!  The team at EDCi is excited to move forward as your contact center expert by leveraging both our extensive expertise with the Interactive product suite, as […]

Read More

Genesys Partnership Announcement

Posted on Jan 13, 2017 by

Genesys Partnership Announcement Since the August 31, 2016 announcement that Interactive Intelligence entered into an agreement to be acquired by Genesys, EDCi has been excited to learn more about how this transaction can enhance our solution offerings. In early September we started the process of becoming a Genesys partner and are pleased to announce that […]

Read More

7 Dumb Blunders You’ve Probably Made in the Data Center

Posted on Nov 11, 2015 by

7 Dumb Blunders You’ve Probably Made in the Data Center The data center is a centralized facility where an organization’s IT operations and equipment stores, manages and disseminates its data. Vital to daily operations, the data center needs backup systems like uninterruptible power systems, cooling systems, etc. to run and protect core applications. Whether you […]

Read More