The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel The pixel
New Normal.

Webinar Series Replay: The New Normal — What We’ve Learned

In May of 2020, We launched this webinar series highlighting our experiences, roadblocks and lessons learned while adapting to the Covid-19 pandemic. This 3-part series that shares the insights gained from helping more than 20,000 workers make the shift to working from home in a short amount of time. Along this journey, we have learned some critical lessons that will help you get the most from your remote workers as well as help you head-off potential security threats and issues that could be lying in wait within your IT ecosystem.

Session One: Keeping Remote Workers Connected, Productive, and Secure

In this webinar, we use Cerium as a use case to cover:

  • Our biggest lessons learned from rapidly deploying our own remote workforce, while helping our customers do the same
  • Tips and best practices for management, IT, and end users to ensure successful remote working
  • Teleworking security threats and how to mitigate them


Session Two: How to make remote work, actually work.

In this installment, we take a deep dive into keeping remote workers connected, productive, and secure in a remote environment. Many environmental variables should be considered when creating a safe and consistent experience.

In this video we cover:

  • Tools for securing remote workers from internal and external threats
  • How to streamline the use for corporate applications both on-premises and cloud-based
  • What a healthy security posture looks like post-COVID-19

Some of the solutions that will be a part of this conversation:

  • Cisco DUO Anyconnect
  • VMware Horizon Virtual Desktops
  • Meraki MDM client
  • Cisco Umbrella
  • Cisco AMP


Session Three: Helping position your company for the new normal

Remote Worker vs Cloud UC, what’s the difference?

  • Cloud UC – Opportunity for revolutionary change
  • Putting the “Unified” into Unified Communications
  • When workers leave the office – they need BETTER communication tools
  • Does connectivity still matter?
  • Post COVID-19, the lasting impact – where do we go from here

Security considerations:

  • Addressing the 7 top security threats to UC – how UCaaS can bridge the gaps
  • Control plane, management plane, and user plane protections
  • Private vs Public Cloud – what’s the right fit?
  • User Adoption = New Vulnerabilities
  • Control = Responsibility and how UCaaS can lessen the IT security burden
  • Employees: Part of the problem or part of the solution?

Recent Posts

PuTTY SSH Client Flaw

CVE-2024-31497 is a vulnerability in PuTTY versions 0.68 through 0.80. PuTTY is a popular open-source terminal emulator, serial console, and network file transfer application that

Read More »


“Darcula” represents a new breed of Phishing-as-a-Service (PaaS) posing a serious threat to both Apple and Android users. This sophisticated attack leverages encrypted text messages

Read More »
For Emergency Support call: (877) 423-7486
For other support requests or to access your Cerium 1463° portal click here
Stay in the Know

Stay in the Know

Don't miss out on critical security advisories, industry news, and technology insights from our experts. Sign up today!

You have Successfully Subscribed!