Managed Services

3 Steps to transforming your business with Unified Communications

Because of this complexity, it makes sense that your business partner with an experienced UCaaS provider to ensure that the migration goes smoothly and that the new technology is managed properly after the UCaaS has gone online. Migrating to a UCaaS system consists of three steps: audit of current system assessment of the tools available […]

OnX OnDemand Residency Services help CIOs fill the IT efficiency gap

Every industry sector has specific IT requirements, and that means each industry is looking for specialized IT skill sets who are familiar with their ever-changing technology landscape and can meet their strategic business objectives. Acquiring technicians with years of experience can be difficult, so many companies are left with the option of hiring individuals who […]

SD-WAN: Rethinking enterprise networks for Canada’s distributed, mobile workforce

The movement from conventional WAN to SD-WAN technology The exponential rise in cloud-based application use during the past few years has impacted the performance of the conventional enterprise WAN. With the bandwidth requirements of today’s cloud-based apps such as Microsoft Office 365, HubSpot, and Salesforce, along with a significant portion of the compute and storage […]

OnX_Microsoft_Azure

4 Steps to Accelerate Your Azure Deployment: Fast Track

Speed is another of the core attractions of the Azure cloud because operations can be standardized and you don’t have to buy and install hardware. In theory, transitioning to Azure is a speedy process. In reality, making the transition to Azure can be long and tedious if you don’t think everything through. For more information, […]

OnX Blog

Setting your 2017 IT strategy…in dual speed

Level One of Dual-Speed IT involves a continuous, steady acceleration to support the stability of the organization and operational needs of the core business. This level is internally focused – the traditional enterprise IT that companies like OnX have worked with for many years, designing systems that promote scale and provide availability for their mission […]

5 Top IT Manager Concerns Addressed by a Security Intelligence Appliance

5 Top IT Manager Concerns Addressed by a Security Intelligence Appliance

So after completing your research, if you decide Splunk Enterprise Security is the right solution, then you must determine how to get Splunk up and running quickly with the limited time available from your IT staff? Enter the OnX Security Intelligence Appliance. OnX has developed the appliance in partnership with Splunk and Cisco to address […]

ONX-IT Security Patching and Vulnerability Management

IT Security Patching and Vulnerability Management

How best to optimize your IT security patching? It can be useful to first break down patches between those that address functionality or incorrect code in an application/OS, and those which address security. The first requires an understanding of how the applications and operating systems work in concert and, therefore, what new code enhancements may […]

OnX Blog

Traditional Backups are not for IT Disaster Recovery

CREDIT UNION GOES TO MANAGED CLOUD FOR TIGHTER SECURITY AND ZERO DATA FOOTPRINT Read the Case Study I like to look at an IT disaster recovery model like the OSI model for networking. At the bottom of the model layers 1-3 would be traditional backups. The middle layers 4-5 would be storage array replication. This […]

Succeed with Every IT Disaster Recovery and Business Recovery Test / Exercise

Succeed with Every IT Disaster Recovery and Business Recovery Test / Exercise

What IS surprising? Why such mature elements, like IT disaster recovery and business continuity, that are so critical to the continuity of business operations and revenues – and in some instances the overall survival of the business – are in such a sorry state? There are not volumes written on these topics which you can […]

Simple Steps to Secure Applications in the Cloud

Simple Steps to Secure Applications in the Cloud

  Deploy the application to the users Let’s start with a web application deployed on a single virtual instance. Most cloud providers will auto assign a public IP from a shared pool. Traffic to these IPs are considered unfiltered without any logical isolation of traffic. Firewalls and Filtering Depending on your cloud provider the features […]

Serving the Connecting Customer Will Require Big Data Solutions

Serving the Connecting Customer Will Require Big Data Solutions

2014 is a year where we saw an organizational shift—where  companies moved towards being ‘always on’ to serve the connected customer. With the proliferation of mobile devices and content delivery portals, it should not be surprising the year also saw escalated efforts by companies to connect with that consumer. As the needs of businesses and […]

EMC Isilon scale-out has massive key advantages.

EMC Isilon scale-out has massive key advantages.

EMC Isilon scale-out Data Lake further extends its leadership as an ideal platform to store, manage and protect unstructured data efficiently while supporting a wide range of applications and workloads. Key advantages of EMC Isilon include: Simplified management: Single file system, single volume, global namespace Massively scalable: Scales from 16 TB to over 50 PB […]

Health Management Services

Why data is the backbone of population health management

Set Long-term Goals for Managing and Analyzing Data in Real TimeOnce your organization has agreed upon the ultimate goals for transforming care under the population health management model, you’ll need to answer a few key questions about data: What data do we need? Where is this data? How should it be collected? How should it […]

HIMSS 15 recap: Transforming the business of healthcare

  One of the keys to making the volume-to-value-based transition is an organization’s ability to use their data to make decisions. For years, healthcare organizations have been leveraging data warehouse technologies using structured data for retrospective decision making. The challenge now is incorporating unstructured, semi-structured, and machine generated data – like nursing and physician notes, written […]

The value of expertise

The value of expertise

Everything went well and I was proud that I was able to fix such a complicated gear system without having to pay an expensive expert. We had several nice days of boating during July, but on the fourth trip out the engine alarm went off due to overheating. I was dead in the water and […]

What do you want to be when you grow up?

What do you want to be when you grow up?

This change is also driving change in the governance structure of the IT organizations I meet with. CIO’s are looking for IT Service Management experience in their employees and partners. There’s more time spent on the relationship with a supplier instead of just commodity pricing. Governance meetings are driven by metrics and dashboards, not change […]

Everyone loves to hate – BackUps

Everyone loves to hate – BackUps

Disk-based backups bring new performance potential to a backup environment.  Tape-based backups are not only limited by the speed of the tape, but in many ways they are limited by the capabilities of the media itself.  The IT staff has had to juggle between “multiplexing” multiple jobs to a tape to reduce the backup window […]

The tall order for data storage

The tall order for data storage

So what can these managers do to get a handle on the situation and create an environment that not only supports the issues of today but provides for future growth and requirements? OnX has developed a process for doing just this! It is a four stage process that can transform the storage environment from what […]

Canadian blood services

Canadian blood services

“Having our data backed up and available at all times is critical to our operations,” says Ivo Mokros, Director of IT Operations and Chief Architect at Canadian Blood Services. “We can’t function if we don’t have access to the records relating to our supply. The data we store also needs to be very secure. We […]