Knowledge as a Service (KaaS): Technical Expert Series

We created this series with our Technical Experts to breakdown hot industry topics and trends and make them available live, podcast, video or blog.  So far we’ve covered Networking as a Service (NaaS), Cyber Security Mesh Architecture (CSMA), MFA, Passwordless Logins and Security Keys, and SSE (Secure Service Edge) – the evolution to remove SD-WAN from SASE.

If you have ideas or would like to be included on the distribution list, let us know at

Episode 5: Supporting Your Cyber Fusion Center with Former Head of Counterterrorism Operations, NSA 

Tune in as we talk with special guest Rachel Wilson, Head of Data Security and Infrastructure Risk, Morgan Stanley Wealth Management, Former NSA Senior Executive, discuss the differences between a Security Operations Center (SOC) and a Cyber Fusion Center and share insights on cybersecurity here.

Episode 4: Secure Service Edge (SSE) – It’s the evolution to remove SD-WAN from SASE 

We are seeing a shift to SSE in approach. Gartner expects that by 2025, 80% of enterprises will have a unified solution that secures web access, cloud access, and private applications.

Tune in as Shannon and Kyle break down SSE vs SASE (Secure Access Service Edge) , talk about the differences and why you might choose one versus the other. See more here.

Episode 3: MFA and Passwordless Logins

Passwords are notoriously weak and can be easily hacked, guessed, or stolen. And how many times have you forgotten a password, leading to frustration and loss or productivity? Passwords have been the primary authentication method for decades, but they are increasingly being replaced by more secure methods such as passwordless logins and multi-factor authentication (MFA). View episode page: here.

Episode 2: Cyber Security Mesh Architecture (CSMA)

According to Gartner, “By 2024, adopting a CSMA will reduce the financial impact of security incidents by an average of 90%.”  CSMA is a relatively new approach to network security that helps protect an organization’s data and systems from cyber threats. It is called a “mesh” because it is made up of interconnected nodes, that work together to provide a robust defense against cyber attacks.

Episode 1: Network as a Service (NaaS)

Organizations have taken advantage of nearly everything As-A-Service for infrastructure components in the past decade, except for networking. It has been the last for this consumption model due to the on-prem necessity and use case. It has finally started to emerge this year, but how does that work? Is it really pay for what you use and elastic as we expect from As-A-Service?

Think of us as KaaS (Knowledge as a Service). If you have specific questions or an idea for a future topic, submit it to

Our Experts are Amazing

Shannon Gillenwater, Director of Technology

Shannon applies a wide breadth of experiences and deep technology skills to craft technology solutions that help businesses be agile, operate efficiently and satisfy customers. An articulate collaborator and effective change agent, Gillenwater has led diverse teams in designing and deploying enterprise-scale data centers and global networks. Always searching the horizon for what’s next, Gillenwater is a cloud-first adopter and now helps customers evaluate and develop software-defined solutions. Click here to connect.

Kyle Husted, Senior Solutions Architect

An experienced Virtualization expert, Kyle has achieved the highly sought-after VMware Certified Design Expert (VCDX) certification. He was the 48th person to receive the certification of which there are less than 300 certified globally. Kyle will leverage his 25 years of customer and partner experience in IT to assess business needs, IT design, and implement solutions offerings to provide positive business outcomes. Click here to connect.


Subscribe for Email Updates

Speak with an
IT Professional Today!

Please fill out this form and we'll get right back to you.

"*" indicates required fields

This field is for validation purposes and should be left unchanged.