top of page

All Posts


Team iKan
Nov 18, 20250 min read


Team iKan
Nov 10, 20250 min read


Meraki in the Modern Network: Part 6 – MT Environmental Sensors
A secure, reliable network does more than move data - it protects the environment it lives in. Power, temperature, and humidity all play a part in uptime, and Meraki MT sensors make it simple to monitor them without extra tools or guesswork. Meraki MT sensors track temperature, humidity, water leaks, door access, and even ambient noise. They connect wirelessly to your existing MR access points or MV cameras, eliminating the need for separate gateways or controllers. Once onli
Team iKan
Nov 7, 20251 min read


Meraki in the Modern Network: Part 5 – MV Smart Cameras
A secure network doesn’t stop at firewalls and switches. Physical security is just as important, and Meraki brings that same cloud simplicity to your cameras. Meraki MV smart cameras turn video security into part of your connected ecosystem. Each camera records, stores, and analyzes footage locally, while the cloud dashboard handles management, access, and analytics. No NVRs, no complicated wiring, and no manual backups - just reliable, secure video that’s easy to deploy and
Team iKan
Nov 5, 20251 min read


Meraki in the Modern Network: Part 4 – MR Wireless Access Points
A network is only as good as its connection points. Your users depend on Wi-Fi to work, collaborate, and stay productive, which means your wireless needs to be as reliable and secure as the rest of your infrastructure. Meraki MR access points bring the same simplicity, visibility, and cloud-first management that define the Meraki ecosystem. From the dashboard, you can create SSIDs, monitor clients in real time, and troubleshoot performance issues before they impact users - al
Team iKan
Nov 2, 20252 min read


Meraki in the Modern Network: Part 3 – MS Switching
A network is only as strong as its foundation. Behind every great Wi-Fi connection and secure gateway sits the part of your network that quietly makes it all possible - the switch. Meraki MS switches bring the same cloud-managed simplicity you get from the rest of the Meraki ecosystem. From the dashboard, you can assign VLANs to ports, apply QoS rules, and monitor every connected device in real time - all without having to touch a console cable. With automatic provisioning, c
Team iKan
Oct 31, 20251 min read


Meraki in the Modern Network: Part 2 – MX Security & SD-WAN
Every network starts at the edge - where users connect and threats try to get in. That’s why the Meraki MX is more than just a firewall. It’s a unified security and connectivity platform that brings visibility, control, and protection to every site in your network. The Meraki MX combines enterprise-grade security with cloud-managed simplicity. From the Meraki Dashboard, you can configure site-to-site VPNs, deploy SD-WAN policies, and enforce content filtering without needing
Team iKan
Oct 29, 20251 min read


Meraki in the Modern Network: Part 1 – Building a Cloud-First Network
The way we design and manage networks has changed. Traditional on-prem firewalls, switches, and access points once required constant manual configuration, site visits, and local logins. But today’s hybrid work environment demands flexibility, visibility, and security that extends far beyond a single office. That is where Cisco Meraki comes in. Built from the ground up as a cloud-first platform, Meraki gives IT teams complete visibility and control over their network from anyw
Team iKan
Oct 27, 20251 min read


Identity in the Cloud Series: Part 7 – External Users and B2B Collaboration
Collaboration doesn’t stop at your organization’s walls. Vendors, contractors, and partners often need access to files, Teams channels, and shared resources to keep business moving. But when that access isn’t managed properly, it becomes one of the easiest ways for attackers to get in. Microsoft Entra makes external collaboration secure by allowing you to invite external users while still maintaining full control over what they can see and do. You can apply the same Condition
Team iKan
Oct 24, 20251 min read


Identity in the Cloud Series: Part 6 – Multi-Factor and Passwordless Authentication Done Right
Passwords have been the foundation of authentication for decades, but they are also one of the weakest links in security. Between phishing, credential reuse, and password spraying attacks, relying on them alone is no longer enough. That’s why multi-factor authentication (MFA) has become a baseline for any secure organization. MFA adds a layer of verification to ensure that even if a password is stolen, attackers can’t gain access without the second factor. But MFA must be imp
Team iKan
Oct 21, 20251 min read


Identity in the Cloud Series: Part 5 – Identity Governance
Managing access might seem simple at first - until your organization starts growing. Suddenly, users have access to files, apps, and groups they no longer need. Contractors come and go, employees change roles, and old accounts remain active far too long. Without the right framework, identity management becomes reactive instead of secure. Microsoft Entra Identity Governance gives you the tools to take control of that sprawl. It helps ensure that the right people have the right
Team iKan
Oct 20, 20252 min read


Identity in the Cloud Series: Part 4 – Privileged Identity Management
Admin access is one of the biggest security risks in any organization. Attackers know that compromising a single privileged account can open the door to everything. That is why limiting and monitoring elevated access is critical. Microsoft Entra’s Privileged Identity Management (PIM) gives organizations control over who can activate admin roles, when they can use them, and for how long. Instead of leaving admin rights assigned permanently, PIM lets you make users eligible and
Team iKan
Oct 16, 20251 min read


Team iKan
Oct 14, 20250 min read


Identity in the Cloud Series: Part 2 – Conditional Access Basics
Strong authentication is a great start, but identity protection needs context. Conditional Access gives you that context by deciding when, where, and how users can access your data. It works by evaluating signals such as user location, device compliance, risk level, and the app being accessed. Based on those conditions, it can allow, block, or challenge the sign-in. For example, a user logging in from an unmanaged device or unfamiliar country might be required to complete MFA
Team iKan
Oct 13, 20251 min read


Identity in the Cloud Series: Part 1 – The New Perimeter
The way we secure businesses has changed. In the past, companies built strong firewalls and assumed anything inside the network was safe....
Team iKan
Oct 10, 20251 min read


Microsoft 365 Modern Workplace Series: Tying It All Together
Modern work is no longer about just having the right apps. It is about how those apps connect. Microsoft 365 creates a digital workplace...
Team iKan
Oct 8, 20251 min read


Team iKan
Oct 6, 20250 min read


Microsoft 365 Modern Workplace Series: Part 4 – OneDrive vs SharePoint: Where to Store What
One of the most common questions we hear is, “Should I save this in OneDrive or SharePoint?” Both are part of Microsoft 365, both store...
Team iKan
Oct 3, 20252 min read


Team iKan
Oct 1, 20250 min read


Microsoft 365 Modern Workplace Series: Part 2 – SharePoint as a Modern Intranet
Every company needs a central place for information. Without it, employees waste time digging through emails, old chats, or multiple...
Team iKan
Sep 29, 20251 min read
bottom of page