cybersecurity
Cyber Resilience Managed Detection and Response

How Managed Detection and Response Helps Public Sector Agencies Build Cyber Resilience

Public sector organizations sit at the crossroads of mission, service, and trust. From state agencies and county governments to school districts and public safety departments, these institutions hold some of the most sensitive data and deliver services communities depend on every day. And yet, they’re under constant cyber pressure. With attackers growing bolder, budgets stretched thin, and legacy systems humming along like old cars held together with optimism and duct tape, the threat landscape isn’t slowing down, and public sector teams need a defense strategy that’s equal parts resilient, efficient, and downright clever.  Enter Managed Detection and Response (MDR): a modern, always-on approach that strengthens cyber resilience without requiring agencies to build their own 24/7 security operations center.  Let’s explore how it works, why it matters, and how it keeps services running smoothly even when threats strike.  Defending Public Services in a Relentless Threat Landscape  Government environments operate under constraints that private-sector organizations might raise an eyebrow at: limited staff, aging infrastructure, strict regulations, and workloads stretched across sprawling environments.  Meanwhile, attackers have discovered that public sector agencies are prime targets. Disrupting government systems doesn’t just cause financial damage, it jeopardizes public trust and critical services.   Common issues include:  Ransomware and phishing attacks targeting endpoints, shared services, and remote workers.  Difficulty staffing a 24/7 SOC, especially with competitive cybersecurity hiring markets.  Hybrid environments blending legacy on‑prem systems, cloud workloads, and remote access.  Compliance pressures including NIST, CJIS, CMMC, and state-level mandates.  The need for accountability, auditability, and transparent incident response measures.  Modern attackers increasingly use fileless and “living off the land” techniques that mimic legitimate administrative activity. Traditional perimeter defenses simply can’t keep up.  Agencies need something better, something proactive, adaptive, and built for mission assurance.  MDR That Pairs Machine Speed With Human Judgment  ProCern’s AI-Flex MDR gives public sector teams the power of a full-scale, always-on security operation, without the headcount, hardware, or complexity of running one in-house.  Think of it as a wise, fast, ever-awake co-pilot for your security stack.  Core MDR capabilities designed for government environments:   24/7 Behavioral Monitoring  Constant visibility across endpoints, servers, and cloud workloads to detect abnormal activity fast, even the subtle stuff attackers hope you’ll miss.   AI-Assisted Threat Intelligence  Identifies fileless attacks, credential abuse, and advanced persistent threats that hide in normal system traffic.  Human-in-the-Loop Validation  Before major actions (like isolating an endpoint), a trained analyst reviews the situation to ensure accuracy and avoid disruption to public services.  Rapid Containment & Recovery  Isolate threats, roll back malicious changes, and terminate unauthorized sessions, all aligned with your agency’s risk tolerance.  Audit-Ready Documentation  Detailed, structured reporting that supports compliance, leadership briefings, and regulatory reviews.  This hybrid model ensures decisions are fast, accurate, and grounded in real-world mission priorities.  When MDR Stops an Attack Mid‑Move  Picture this:  A state agency notices suspicious behavior coming from a remote employee’s laptop. Unknown to the user, an attacker has stolen credentials and begun poking around internal systems, even attempting to move toward infrastructure holding sensitive citizen data.  Here’s how MDR stops the threat in its tracks:  Behavioral analytics flag unusual activity from the remote device.  The incident escalates to a human analyst for validation and context.  MDR isolates the compromised endpoint, without taking down public-facing services.  The system blocks lateral movement and terminates unauthorized sessions.  Any malicious changes are rolled back, and verification confirms no data was exfiltrated.  A full incident report is delivered for audits, briefings, and required disclosures.  The threat is neutralized before it becomes a disruption, a headline, or a legislative hearing.  Why MDR Delivers Real Value for Public Sector Teams  Public sector agencies adopting MDR see benefits that go far beyond improved security.  Service Continuity & Public Trust  Rapid detection and containment keep essential services running, without unexpected downtime or citizen-facing outages.  Regulatory & Audit Readiness  Clear, consistent documentation simplifies compliance and ensures traceability across NIST, CJIS, CMMC, and state frameworks.  Cost Efficiency  Agencies gain enterprise-level protection without hiring a full SOC staff or purchasing specialized tools.  IT Team Enablement  With continuous monitoring handled by MDR, internal teams can focus on modernization, digital transformation, and mission delivery.  Cyber Resilience Is Mission Resilience  For public sector organizations, cybersecurity is an essential part of protecting communities and upholding public trust.  With the right MDR solution, agencies can outpace modern threats, ensure continuity of critical services, and meet strict compliance demands without stretching teams beyond their limits.  By combining AI-powered detection with expert human oversight, MDR delivers a decisive, accountable, and mission-aligned approach to cyber defense. It keeps attackers out, keeps systems resilient, and keeps public services running the way communities expect: reliably, securely, and without drama. 

Backup and Disaster Recovery
Protecting your Data with Veeam Backup - Procern Blog Featured Image

Protecting your Data with Veeam Backup

Ransomware incidents increased ~34% year-over-year (2024 → 2025). Recovery costs commonly reach hundreds of thousands to millions, depending on downtime and data loss. Attackers increasingly use double extortion (encrypt + steal data). Cyber security is quickly becoming one of the most important investments for companies large and small. Organizations now rely on a multilayered cybersecurity approach that includes employee training, endpoint protection platforms, advanced threat detection (EDR/XDR), spam filtering, identity controls like MFA, and a robust backup strategy. But once data is compromised, the most reliable way to recover quickly is still to restore from clean, verified backups. How does Veeam backup help protect data against ransomware? Immutable backups Immutable backups are copies of your data that cannot be altered or deleted for a defined retention period. Veeam provides immutability through multiple options, including Linux Hardened Repositories and Object Storage with Object Lock capabilities. These technologies prevent any user—even an administrator or a ransomware process—from modifying or encrypting your backup files. Immutability ensures you always have clean, recoverable data no matter what happens in production. Air-Gapping Air-gapping keeps backup copies isolated from the network, preventing ransomware from reaching them. Traditional air-gapping uses tape media that is removed and stored offline after each backup. Today, organizations also use rotated external drives or cloud object storage tiers that remain disconnected or isolated except during backup jobs. These offline or semi-offline copies ensure that at least one version of your data remains untouched by any attack. Veeam ONE Detecting ransomware early can be challenging. Veeam ONE provides continuous monitoring and now includes advanced anomaly-detection capabilities that use behavioral analytics to identify suspicious activity. By tracking metrics such as CPU spikes, abnormal write patterns, or unusual data change rates, Veeam ONE can alert administrators in real time and help stop an attack before it spreads. Veeam SureBackup SureBackup is a feature of Veeam that allows you to create a sandbox to test your backups before restoring them to production. It can run virus and malware scans on backup sets, automatically or manually. It ensures your data is not infected without the need to restore the data somewhere first. Secure Restore Secure Restore scans backup data for malware during the recovery process, ensuring you don’t accidentally reintroduce infected files into production. Veeam now supports multiple anti-malware engines and integrates the latest virus definitions at restore time. This gives you an added layer of assurance that the data you are recovering is clean—even if the original backup was created before a threat was known. Veeam DataLabs Unsure of a workload, or suspect it may be infected? DataLabs gives you the ability to restore the data to a fully secured and isolated environment to test. A fully isolated sandbox lets you run any tests you want without impacting production systems, so you can make sure your workloads are uninfected before you restore them. Ransomware protection alliance Veeam is part of a group of leading hardware and software companies, like HPE, Cisco, and AWS, that work together to make sure their products integrate using the highest security standards possible. They bring together the most powerful recovery solutions to combat ransomware. Veeam Backup & Replication is a powerful tool in the fight against ransomware, but its effectiveness depends on how it is implemented. Following modern best practices—such as the 3-2-1-1-0 rule (three copies of data, on two media types, one off-site, one immutable or offline, and zero backup-verification errors)—dramatically improves your ability to recover quickly. Combine immutability, air-gapping, monitoring, secure restore features, and regular testing to ensure your organization is prepared long before an attack ever happens. Contact ProCern to find out more about Veeam backup and recovery solutions for your organization.

vulnerability
Software Updates – A Necessary Evil - Procern Blog Featured Image

Software Updates – A Necessary Evil

It’s that item on your to do list that you often ignore and say you will do later –  software updates. Not only may you be missing out on the latest improvements, but you can create a major security risk for your organization by ignoring these updates. One of the largest data breaches on record is the Equifax data breach in 2017. It exposed the personal information of 147 million people. Hackers were able to get in due to a known system vulnerability for which a security patch had been issued two months before the breach. Unfortunately, no one at Equifax applied the patch. It cost the company $700 million in a settlement reached with the FTC. Nearly 60% of data breaches are the result of unpatched vulnerabilities. Before you get distracted by another project or think that you can wait to do your next update, here are a few reasons why software updates matter. Security Security is the number one reason to make sure you take care of updates as soon as possible. Software vulnerabilities often give cyber criminals access to one’s computer and plant malware. Malware enables one to take control of computers and steal information. It also can encrypt files, documents and other programs so they are unusable. Security patches block these open doors in the software to protect a device from attacks. Risks from third-party vendors account for over two-thirds of all data breaches today. Third-party applications often interact with the internet. This makes them highly vulnerable to ransomware. Hackers know companies often overlook updating various programs that don’t seem important. Cybercriminals want to exploit the most vulnerabilities as possible simultaneously. They are constantly searching for popular third-party programs. They will jump on an opportunity to hack millions of users who delayed updating their software. New Features On a positive side, software updates can give you access to the latest improvements and remove the old ones that are out of date.  A software program may get a new shot of stability — no more crashing. Or an update might boost program performance — more speed. Some of these new features could save you time and most importantly enable the software to keep working and not shut down. Protect Your Data Your Data is your most valuable asset at any organization. Often hackers will search for personal data such as financial information, passwords, usernames or other documents with sensitive information. They will look to sell this information to the dark web and commit crimes. Allowing your customer’s information to be vulnerable can impact your company’s reputation and future business. Improve Performance Just like your vehicle needs regular maintenance to help improve its performance, your software can benefit from updates. Bugs are often found in programs or enhancements are made to improve the overall experience. Ensure Compatability With technology constantly changing, often older software will not be compatible with new technologies without the appropriate update. Microsoft, Google and Apple are frequently updating their technology interfaces. Most of us use multiple devices so compatibility is essential. Don’t Fall for Fake Update Messages It important to update your software but beware of fake messages or popups out there. Pop-ups are typically a scam to get you to click somewhere that you should not. Close the pop-up and go directly to the vendor website to look for downloads. There a suspicious emails making their rounds stating that your updates are past due and make an update now. It is best to reach out to the vendor directly. You may have the option with some software to do automatic updates. Some software makes it possible to choose the time of day you update or even how often. Scheduling and automating your updates this way will make them less of a nuisance. Take Time to Update Like ignoring the check engine light on your car is something you shouldn’t do, the same goes for software updates. They can help protect personal information as well as company data. Contact ProCern to find out more about how we can help.

network management
The Little Human ClearPass - Procern Blog Featured Image

The Little Human ClearPass

“Keep the malware, ya filthy animal” is NOT a line uttered in the 1990 Christmas Classic, Home Alone….but it should be! Well…not really. The internet was still in its infancy in 1990 and infection of computers and networks by malicious software was still a relatively new concept (the term “malware” was first coined only months before Home Alone’s theatrical release). The line would DEFINITELY apply today, however. As nearly everything is operated online, to some extent, and network security is becoming more important than ever! Thankfully, there are high-end tools we use today to ensure that we can control and monitor what devices are accessing our networks. Review how these devices are behaving while on the network. Give the ability to remove said devices if malicious activity is detected. Little Human ClearPass There are numerous blogs and articles that explain how the entire plot of Home Alone would not have occurred had the technology that we use today been available. I’m not going to go down that rabbit hole here. Instead I am going to use the film as an analogy for technology itself…namely HPE Aruba Networking’s security platform “ClearPass”. I’m doing this because I think it makes some of the nuances of the technology easier to understand and because I just feel like it, ok? So, sit back, grab a cheese pizza, and put on some after-shave…I’m about to tell you all about the story of Kevin McCallister, “The Little Human ClearPass”. For those of you that don’t know, HPE Aruba Networking ClearPass is a policy management platform that allows network admins to onboard new devices, grant varying access levels, and help keep their networks secure. It can be dissected into three primary security functions: Identify, Enforce and Protect. And I will use Kevin McCallister to demonstrate each process. Identify Much of Kevin’s success in thwarting full-grown men who are attempting to rob his parent’s house, stems from the fact that he is a very observant little fella. He notices the highly suspicious “Wet Bandits” following him. Kevin monitors their behavior and overhears their conversations. Preemptively, he defends his family home based on his findings. His observations operate in much the same way as ClearPass. ClearPass helps identify what devices are trying to access the network. These findings include where the devices are connecting from and device-specific information such as IP address, OS, type and model name etc. Enforce The key for the “Wet Bandits” to successfully loot all of the luxurious homes in Kevin’s neighborhood while they are all vacant for the holidays. If you’re a burglar…you’re not going to attempt to waltz into a house full of people and hope you go unnoticed, are you? Remember when Kevin turns on every single light in his house and makes it look like there’s an epic party occurring there? Bingo. The burglar policy seems to be: “if the place is occupied, don’t risk it.” Networks have policies too. Ones that can similarly prevent unwanted visitors. ClearPass allows you to enforce these network policies during the onboarding of new devices. Rules can be put into place that define what type of devices users can onboard, how many, and who may onboard a device. After this, access can be enforced in a number of ways. A simple portal can be used or the more secure method of using encryption in the authentication process. Protect The final area of focus in ClearPass security is “Protect”.  With ClearPass OnGuard, one can define the “health level” a device must have in order to gain access to the network.  The health of individual devices that are connected to the network is crucial to network security. If a device that is attempting to connect does not meet these requirements, it is not allowed on the network. Moreover, policy controls and threat remediation give real-time insight into the activity on the network, allowing threats to be quickly identified. This allows the IT staff to quickly block traffic or disconnect devices if unusual network behavior is detected. What does all that mean in layman’s terms and can I use a metaphor? Sure thing! If you see suspicious folks skulking around your residence, you better ice down your steps, heat your doorknobs and place Christmas ornaments by the windows to discourage unwanted entry. If those crafty villains still a manage to gain entry, you better have some Micro Machines strewn across the floor and have a tarantula handy. It worked for Kevin McCallister and it can work for you and your network! HPE Aruba Networking is just one of the many great vendors that ProCern works with daily. Contact us today for all of your IT needs. Including, but not limited to, cyber security. If you find yourself “home alone” just think, “what would Kevin do?”.

cybersecurity
Username Password 2FA - Procern Blog Featured Image

Username + Password != 2FA

What are MFA, 2FA, and why do we need them? “Something you know, something you have, something you are.”   This is stated by Multi-Factor Authentication enthusiasts all over the web. They are ways of identifying yourself for the purpose of gaining access to a system.  Examples of these would be your username/password combination, a OTP (One Time Password) sent be SMS or authenticator app, and biometrics.  2FA is of course a subset of MFA.  It uses two factors to authenticate your logon.  AND NO, USERNAME + PASSWORD ARE NOT TWO FACTORS. Compared to single factor authentication, MFA ensures that your accounts are much better protected. “99.9% less likely to be compromised” is found on Microsoft based on their records of 99.9% of compromised accounts not using MFA.  This was stated by Alex Weinert, Director of Identity Security at Microsoft at a recent cyber security conference. Perhaps even more disturbing is that there is ONLY AN 11% MFA ADOPTION RATE AMONG ENTERPRISE CLOUD USERS.  It’s not like we keep important data in our business emails.  We also don’t use these same emails as recovery addresses for other business related online accounts.  Joking aside, we are almost asking for security breaches. Related: What’s in a Name? Importance of Good Password Habits Why aren’t you using Multi-factor Authentication? We live in times where ransomware, social engineering, and other cyber attacks are on the rise.  By not utilizing multi-factor authentication, you are doing the equivalent of using 1-2-3-4-5 as your combination on your luggage.  Something almost as bad is re-using the same couple of passwords everywhere.  Your password expired?  Just update it from SecurePW1! to SecurePW2@ and it will meet complexity requirements and be super secure, right? The practical issue with using very complicated passwords is that they are very difficult to remember by design.  This is where a password manager is very helpful.  You don’t want to be the person with a bunch of sticky notes on your monitor with login credentials written on them. Combined with a complicated password, using MFA will make it much harder for bad actors to impersonate you.  Most online services these days give the option of enabling multi-factor authentication.  Examples are business apps like Office 365, Google Apps/Gmail, your work’s VPN application, and even personal apps like your bank, Amazon, or Facebook offer this.  Your password manager is also a very good candidate to enable MFA. How can you get started? First, you need another factor for authentication.  Hardware devices such as RSA SecureID or Yubico’s YubiKey are good choices if you really want to take things seriously.  You can also just use an app.  Popular apps such as Google Authenticator, Microsoft Authenticator, Authy, and Lastpass Authenticator are all good examples. Next, head over to your favorite application and log in.  Usually in the same place in the settings area where you would change a password, there should be an option to enable 2FA/MFA/2-step verification/etc.  While you’re at it, you should probably change your password if it isn’t complex or you haven’t done so in a while. Just follow the instructions to enable MFA.  This will vary slightly depending on application.  In general, you’ll select your authenticator app or hardware key when prompted.  If using an authenticator app, you will need to scan a QR code to add that account.  Once you complete the setup, enjoy knowing that your security posture has been greatly improved. Need help enabling MFA on your business applications such as Microsoft 365 or your VPN client?  Contact us today.  Our friendly ProCern engineers are here to help!

cybersecurity
Why It’s Important to Install Windows updates and patches - Procern Blog Featured Image

Why It’s Important to Install Windows updates and patches

Are Windows updates necessary? Applying updates every month is not something system administrators look forward to but they are necessary and extremely important in the times we live in. Most updates each month include security updates. Security issues are the worst possible type as they may be exploited by malware or hackers. These types of situations are regularly identified in various parts of Windows – ActiveX, IIS, Internet Explorer and .Net Framework are just examples. Other updates address other bugs and issues in Windows. Even though they are not responsible for security vulnerabilities, they might impact the stability of your Operating System. Last, but not least, Windows Updates sometimes come with new features, while patching some known issues – and the best example for this is IIS and Internet Explorer. The code that makes up the Windows operating system contains security loop holes, errors, incompatibilities, or outdated software elements. In short, Windows isn’t perfect, we all know that. The latest Windows security patches fix the vulnerabilities and errors in Windows and associated software, and they occasionally add new features. This essentially summarizes why you should regularly run a Windows Update. Security issues are regularly identified in various parts of the Windows operating system, including the main platform. Even if you do not run the respective software, it is a risk not to patch it, simply because it is installed on your system. Note that these updates are required, even if you are running anti-malware or anti-virus software, as that software may not sufficiently protect you from Windows security issues. Consequences to Not Installing Updates Potential consequences of not installing security updates are damaged software, loss of data, or identity theft. Every year, malware causes damage of millions of dollars worldwide. The main reason is that users don’t install critical software or operating system updates, allowing malware to exploit loopholes that exist in every software ever developed. Vulnerabilities can potentially be exploited within hours of them becoming publicly known. So once a security update is available, you should plan to install the fix to protect your system from malware attacks. Some ways to control and monitor the deployment of Microsoft updates in a corporate environment is with products like WSUS or System Center Configuration Manager(SCCM). Here is a list taken from Microsoft of some common types of updates available each month. Critical Updates Critical Updates are a widely released fix for a specific problem that addresses a critical non-security-related bug. Security Updates Security updates are a widely released fix for a product-specific, security-related vulnerability. Security vulnerabilities are rated by their severity. The severity rating is indicated in the Microsoft security bulletin as critical, important, moderate, or low. Monthly Rollups Monthly Rollups are relatively new. They are a tested, cumulative set of updates. They include both security and reliability updates that are packaged together and distributed over Windows Update, WSUS, System Center Configuration Manager and Microsoft Update Catalog for easy deployment. The Monthly Rollup is product specific, addresses both new security issues and non-security issues in a single update and will proactively include updates that were released in the past. Security vulnerabilities are rated by their severity. The severity rating is indicated in the Microsoft security bulletin as critical, important, moderate, or low. This Monthly Rollup would be displayed under the title Security Monthly Quality Rollup when you download or install. This Monthly Rollup will be classified as an “Important” update on Windows Update and will automatically download and install if your Windows Update settings are configured to automatically download and install Important updates. Service Packs A service pack is a tested, cumulative set of all hotfixes, security updates, critical updates, and other updates. Additionally, service packs may contain additional fixes for problems that are found internally since the release of the product. Service packs may also contain a limited number of customer-requested design changes or features. Non Critical Updates While non critical updates are not responsible for security-relevant vulnerabilities, they may still be very annoying as they potentially impact the performance and stability of Windows. So the main reason for installing general updates is to avoid or resolve Windows issues and hopefully have a smooth running System. Testing Microsoft will test the latest updates prior to release on the second Tuesday of each month. Unfortunately, there are an infinite number of hardware and software configurations that could exist on a Windows computer. Testing all possible computers systems would be almost impossible.When a Windows update causes a problem it’s likely due to a software or driver that has issues with the update, not the update itself. It is very important to create a group of desktops and servers for testing the latest updates. Once the updates are applied to the test, computers monitor and document any irregularities in behavior of the test systems. Although Microsoft updates rarely cause a problem it has been known to happen thus the reason for a test group of computers. If all is well after at least a week with the test group, it is relatively safe to deploy the tested updates to production. Even after testing, there is no guarantee a problem won’t arise but it’s not worth the risk you may be taking of not applying these security patches. Conclusion It is critical to install security updates to protect your systems from malicious attacks. In the long run, it is also important to install software updates, not only to access new features, but also to be on the safe side in terms of security loop holes being discovered in outdated programs. And it is in your own best interest to install all other updates, which may potentially cause your system to become vulnerable to attack. Questions about your unique environment? End your IT frustration today. Discuss your situation with ProCern IT Engineers today.

Video Analytics
Using Video Data to Improve Safety – ClearPass Policy Management Platform - Procern Blog Featured Image

Using Video Data to Improve Safety

Most companies are gathering trillions of bytes of data, day after day, at no small cost, and then doing very little with it. Worse still, the data often is not serving its primary function very cost effectively. The “culprit,” so to speak, is video surveillance data, the information captured by the video cameras that are used throughout most modern facilities. But the situation is changing rapidly, thanks to the new landscape of Video AI Analytics Applications. What is Video Analytics? Video Analytics can be described as “the emerging technology where computer vision is used to filter and manage real time CCTV video for security and intelligent traffic monitoring.” Simply put, Video Analytics is an automated approach to managing and analyzing video, without the cost or man-hours previously required. There are many different brands and technology platforms for Video Analytics, but they all work on the same basic principles, using pattern recognition and other Algorithms technology to provide two critical capabilities: Recognize unusual activities as they happen and notify the security system in real-time. Functionality Today’s Video Analytics software offers growing functionality. For example, it can be programmed to look for specifically defined anomalies. It can even be programmed to give special attention to specific elements in a video frame—such as a computer, door, or filing cabinet. Video Analytics software tracks people and objects, and can send alarms when suspicious activities occur. Furthermore, Video Analytics can be integrated with other security and information systems to create new possibilities for using and managing video data. The first step for most companies is to use Video Analytics to support and enhance guard performance. In this application, Video Analytics software continuously monitors everything that happens in the field of vision of every surveillance camera, every second of every day. When it sees suspicious or unusual patterns and activities, it sends an alert to the security system so guards can look at the monitors, see first-hand what is happening, and take any needed immediate action. It can also trigger other security events, such as coordinating the motion of several cameras to track the movement of a suspect through a facility.  In some programs this is called “guard service.” Guard service should make every guard more effective, so companies find they can improve security and reduce staff at the same time.  Recent studies show that it’s common for guard service applications to generate savings of 75% or more in total guard costs.   Adding on to that value, Video Analytics can then be linked to card access systems to improve security.  A card being used in an unauthorized or suspicious way can trigger cameras to zero in on the event and record the time and other information in a searchable video log. The real power of Video Analytics may be the fact that it turns analog video into useable data that can be analyzed, searched and managed. This opens endless possibilities for guiding decisions on facility use, energy consumption, personnel safety, and many other issues.  Vitally is the improved response time. You can simply find information and act on it more quickly with Video Analytics, whether the problem is a break-in happening right now, or a building use problem that pops up every day. Key Features of Video Analytics Value with Video Analytics: Augment staff and improve camera investment ROI by extracting key information from captured video to uncover insights and patterns. Create a Security Model: Customize the “monitor and alert” parameters from live-streaming fixed cameras to help identify perimeter breaches, abandoned objects and more. Find the Buried Pictures: Save time when searching for relevant images. Advanced content-based algorithms for detection improve time and accuracy of cross-correlation and trend analysis. After collecting and storing petabytes of video data, organizations now want more value out of their investment. Video Analytics provides an answer, helping most companies improve security and lower costs. By starting with applications that deliver rapid ROI, like guard enhancement, companies can implement the technology in a way that pays for itself. The value can then be extended to other security and information systems, leveraging many technology investments to improve security and building management.

infrastructure Modernization
You’re a Timex Watch in a Digital Age – ClearPass Policy Management Platform - Procern Blog Featured Image

You’re a Timex Watch in a Digital Age

“John, you’re a Timex watch in a digital age” snidely quips Thomas Gabriel, the brilliant, but maniacal, cyber-villain of Live Free or Die Hard, the fourth (and some would argue best) entry in the Die Hard film series. The “John” in question is, of course, none other than protagonist John McClane, the old-fashioned NYC Police Detective who becomes the reluctant hero in all five Die Hard films. In this particular installment, sophisticated hackers launch a targeted attack on the United States’ infrastructure, gaining control of all government controlled computers, and essentially hold the country for ransom. Can an aging cop with old school tactics hold his own against these advanced and intelligent cyber-terrorists? The Best Ways to Prepare for the Future  Well, first of all…of course he can. We ARE talking about a Bruce Willis movie here (and he always wins, right? Maybe not in The Sixth Sense…but I’ll save that for another blog). By this point in the series, John has already saved dozens of hostages, taken on countless henchmen, and happily exclaimed “yippe-ki-yay” all along the way. His encounters thus far, however, have strictly been with semi-traditional adversaries using semi-traditional means of operation. How then, you might ask, is a fifty-something cop who’s known for being “the wrong guy, in the wrong place, at the wrong time” going to keep pace with such a formidable, high-tech group of foes? By rolling with the punches! Duh! Though he definitely takes matters into his own hands and deals with the situation “the John McClane way”, he does so while also gaining a different perspective, aligning with the proper allies, and obtaining the needed resources that do not come to him naturally (in this case, seeking out help from a couple of virtuous hackers, Matt Farrell and ‘The Warlock’, who are willing to use their talents to aid his cause). Later in the film, after narrowly surviving an onslaught of lethal henchmen, John retorts to Thomas Gabriel, “I know I’m not as smart as you guys at all this computer stuff. But, hey… I’m still alive, ain’t I?” Although it may seem superfluous, the character arc that I have just laid out brings up an interesting point. Change. We see it in almost every aspect of our lives. Our neighborhoods, our bodies, the media, the stock market, our friends…you name it! The IT industry is no different. From the massive big-data servers of yesteryear to virtualization and advancements in cloud computing…infrastructure and disruptive technologies are constantly evolving and improving. It is how we adapt and move forward with this change that is important. Here at Zunesis, we strive to be the support system that helps customers implement and transition into this change. This is where the Die Hard analogy comes into play. Bruce Willis’ character from the film series is relatable, simply because he is often a victim of circumstance and forced to react when these seemingly insurmountable situations arise. His old-school style is appealing but it cannot be maintained forever. This becomes evident in Live Free or Die Hard when the villains John McClane is pitted against use tactics that are completely alien to him. Does he completely transform overnight? No. But he does reassess his environment and adapt accordingly. The same can be said of IT. The industry, technology, and processes are constantly changing and it is imperative that the customer base have the means to follow suit. ProCern has all the tools to make this happen. We partner with the top technology organizations and our Solution Architects have an average 20+ years of experience. Whether it is hyperconvergence, cloud migrations, hybrid IT, infrastructure refresh, health checks, assessments…you name it! ProCern is here to help. Nothing must change overnight. A complete 180 is not necessitated. Just a gradual discovery of the exciting new things on the IT horizon. We are here to help! In this scenario, ProCern is “The Warlock” (watch the movie and you will understand) and you, the customer, are John McClane. That’s right, YOU get to be John McClane! You’re the hero and we are the humble sidekick that helps you accomplish your goals! We are here for all your infrastructure solutions. Just let us know how we can help! In closing, there are many ways to evaluate your IT environment and ascertain the best ways to prepare for the future. Cost efficiency, security, consolidation, streamlining, and many others can all be addressed. Remember…you’re John McClane! And ProCern is here to aid you in your quest. Yippe-ki-yay!