Discover the Latest Network Monitoring Trends

Taking the Pulse of IT Pros

Richard Emil

The last few months have seen many high-profile security breaches brought to light—and now even our Wi-Fi standards aren’t as secure as we once thought. So, how can organizations best manage their networks in this rapidly changing threat landscape? A recent survey conducted with IDG revealed that being able to identify suspicious activities and breaches is the top concern for IT pros nationwide—and it’s no wonder. The response to the other options—automated remediation of threats and receiving real-time notifications of suspicious activity—paled in comparison. They’re certainly useful features, but proactive detection clearly has to come first.

Read the full survey below or download the PDF to see how your goals align with your peers. Then leave a comment to let us know if you agree with the results and  what steps your organization is taking to defend against everyday threats.

 

Managed-IT-Services-TechPulse-SMB

Richard Emil is VP of Managed Services for Connection with over 20 years of experience in the areas of sales and service. Mr. Emil holds a Bachelor of Science, Business Administration, and Finance from California State, Long Beach. Rich's hobbies include camping, fishing, watersports, and spending time with his family.

© PC CONNECTION, INC. ALL RIGHTS RESERVED.