Are organizations managing IT security internally, or are they outsourcing to specialized security companies? If they are outsourcing, how do they ensure the security vendor can handle all potential threats and vulnerabilities?
2.9k views2 Comments
Sort by:
Director of IT in Educationa year ago
We do a combination of both.
Content you might like
We are dealing with a specific issue in our VDI non-persistent environment, which operates using Omnissa Horizon (formerly VMware). We are employing a hybrid join for authentication that integrates ADFS and Entra ID. Here are the details of our problem: 1. **Environment**: VDI non-persistent using Omnissa Horizon 2. **Authentication Method**: Hybrid join with ADFS and Entra ID 3. **Issue**: Users are experiencing difficulties authenticating to Microsoft 365 apps within the virtual machine. The authentication process gets stuck in a loop when attempting to access the smartcard. I would appreciate any insights or experiences from others who have encountered similar issues or have a similar environment working successfully.
Has anyone implemented Zelle directly with EWS (Enterprise Web Services) instead of going through a reseller-hosted experience? What were the biggest architectural, compliance, and operational challenges you encountered, and how did you address them? Can you please share your views on below...
1. Integration Complexity (How did you handle real-time messaging and settlement flows with Zelle via EWS & what middleware or orchestration layers were required?)
2. Compliance & Risk: What additional regulatory or fraud controls did you need to implement without the buffer of a reseller? How did you manage OFAC screening, KYC, and transaction monitoring?
3. Customer Experience: Were there any trade-offs in terms of UI/UX or mobile app integration? How did you handle customer support and dispute resolution?
4. Operational Overhead: What internal capabilities did you need to build or scale (e.g., 24/7 support, reconciliation, exception handling)? How did you manage updates and changes to the Zelle network?
5. Cost-Benefit Analysis: Was the direct integration more cost-effective in the long run? How did you measure ROI compared to a hosted solution?
6. Vendor & Network Relationships: What was your experience working directly with Early Warning Services (EWS)? Were there onboarding or certification hurdles?
Are CISA's current recommendations for preventing Maui ransomware attacks sufficient?
Yes, if followed correctly.39%
Unsure38%
No, there is still a significant risk.19%
Other (please tell us in the comments)3%
What do you think are the top 3 enterprise-level social media management tools that can compete with Sprinklr?
What's your most indispensable cloud infrastructure tools to use in addition to what you get from GCP, AWS, Azure?
HashiCorp (Terraform, Vault, Packer, etc.)22%
Cloud infra automation (Ansible, Puppet, Chef, etc.)56%
APM (Datadog, AppD, SignalFX, NewRelic, etc.)10%
Others?10%
I have managed both kinds. While the first one is seamless there has to be a tight coupling with the vendor in the second case. They have to become part of the team rather than being seen as a service provider.