Prioritizing Security Part 1: Why VPN is No Longer Enough to Secure Your Company

Don Boxley Jr | May 16, 2019

VPN is the past, not the future, and even in the now—it’s time for enterprises to start reevaluating their perimeter security approaches before it’s too late. VPN already comes with a list of inherent security risks such as credential theft, excessive network access, and more, but today’s cloud-based world has increased these risks exponentially. Operating Read More…

Software Defined Perimeter Webinar: Q&A Write-Up

Lauren Hawes | May 8, 2019

Thanks to all those who joined us for our recent webinar: “Don’t Dig a Moat: Stay Ahead of Network Security Obsolescence.” Below is a write-up of the Q&A section of this webinar. Topics covered include free trials, supported platforms, and administration. What is the trial software and how long is that license valid for? If Read More…

Cloud Networking Webinar Wrap-Up with 451 Research

Lauren Hawes | March 27, 2019

When the hybrid cloud is there, you know it’s going to be a party! It was great turnout for our recent webinar with 451 Research’s Chief Analyst, Eric Hanselman. Eric brought a ton of great research to the table regarding the journey of many companies thinking about or on their way to the cloud, as well Read More…

Join 451 Research and DH2i to Learn What NOT to Do When Your Organization Jumps to the Cloud

Lauren Hawes | March 12, 2019

The devil is in the detail, so don’t be the organization that finally makes the labor-intensive jump to the cloud and realizes it overlooked something rather significant: secure networking. Join 451 Research’s Chief Analyst, Eric Hanselman, and DH2i’s Connor Cox on March 20th as they take you through the primary motivators sending seemingly every organization Read More…

Challenge Accepted: Install DxOdyssey within a Hybrid Cloud in Under 5 Minutes

Lauren Hawes | March 4, 2019

Cloud networking of the future: no VPN, no direct links, no external ports, and let’s get it installed within this hybrid cloud in less than 5 minutes. DxOdyssey software allows you to create secure networking connections between users, sites or clouds on any Windows or Linux machines. The software is so lightweight that it can Read More…

See You in San Francisco for RSA Conference!

Connor Cox | February 25, 2019

Come for the Golden Gate Bridge and Fisherman’s Wharf – stay for the security (not an Alcatraz joke). DH2i’s DxOdyssey Software Defined Perimeter technology has intrigued a lot of IT pros around the world in its short existence so far, and that means we get to attend RSA Conference USA 2019 for the first time Read More…

CEO Speaks: Acknowledging Obsolescence on the Path to Data Security

Lauren Hawes | February 20, 2019

So majestic! So compact! So precisely engineered! Behold: the floppy disk. There was certainly a day and age when IT pros held this sentiment regarding the good ol’ floppy disk, and there were definitely those of us who were excessively reluctant to let them go (and maybe still haven’t completely). But, in today’s IT industry, Read More…

SQL Server 2008 / R2 migrations can cause migraines, but they don’t have to

Connor Cox | August 10, 2018

With Microsoft Extended Support for SQL Server 2008 and 2008 R2 ending in just under a year, there are quite a few things to consider if you’re still using either of these versions.   There are several different phases of support that Microsoft offers for their SQL Server releases. Mainstream Support covers years 0-5 and Read More…

Smart Data Governance: Ensuring Regulatory Compliance with Smart Availability

Don Boxley Jr | June 26, 2018

Originally posted on June 18th, 2018 by Dataversity.net (http://www.dataversity.net/smart-data-governance-ensuring-regulatory-compliance-smart-availability/) Traditionally, high availability (HA) concerns revolved around performance. HA offered various redundancy and failover options to ensure business continuity in the event of workload spikes, planned maintenance, and unplanned downtime. Today, HA methods have been superseded by Smart Availability’s intelligent workload routing automation, in which data Read More…