Myriad Supply Named One of Inc. Magazine’s Best Workplaces of 2018

New York, NY, May 23, 2018 – Myriad Supply, a cybersecurity consultancy and integrator, has been named one of Inc. magazine’s Best Workplaces of 2018, the publication’s third annual ranking in the fast-growing private company sector.  

“We are honored to receive this recognition that represents what we believe is a critical element to the success of our company: team culture,” said Andrew Fisher, CEO and Founder of Myriad Supply. “We are constantly working towards becoming a more diverse, inclusive, and equitable organization that attracts and supports top performers.”  

The award is the result of a comprehensive assessment of private American companies who have created exceptional workplaces beyond good pay and good perks by providing vibrant cultures, deep employee engagement, exceptional benefits, and leadership that inspires collaboration and teamwork. Out of thousands of applicants, Inc. recognized just under 300 winning companies. This is Myriad Supply’s second year receiving this recognition.  

“By including an employee survey into this year’s Best Workplaces selection process, we’ve really raised the bar. Companies that don’t score at the very top of their peer group don’t make the cut. So, our hats are off to the winners. They all excelled at engaging their workers, making them feel appreciated, and aligning them behind a mission. And remember, that’s not just our opinion: The employees told us that themselves.” says James Ledbetter, Inc. editor-in-chief.  

In the last year, Myriad Supply has implemented Equity, Diversity, and Inclusion (EDI) training, a company-wide coaching platform called 15Five, monthly “Ask Me Anything” sessions with executive leadership members, employee resource groups, and CEO Dine Arounds that provide an opportunity for the CEO to share his vision with small, rotating groups of employees and listen to their thoughts, feedback and ideas over lunch. This recognition from Inc. highlights both Myriad’s rich company culture and its commitment to ensuring employees feel heard, understood, and valued. 

The 2018 Best Places to Work list will be featured in the June issue of Inc. magazine hitting newsstands today and online at   

About Myriad Supply
Myriad Supply is a cybersecurity consultancy and integrator focused on providing complete, secure IT infrastructure solutions to enterprises. Using industry-specific knowledge and a security first approach, Myriad helps clients define, design, and implement their technology vision within the areas of security, SDN, mobility, and cloud. Myriad, located in New York City, has been serving clients since 2003. To learn more, visit or email 

About Inc. Media 
Founded in 1979 and acquired in 2005 by Mansueto Ventures, Inc. is the only major brand dedicated exclusively to owners and managers of growing private companies, with the aim to deliver real solutions for today’s innovative company builders.  Winner of Advertising Age’s “The A-List” in January 2015, and the National Magazine Award for General Excellence in both 2014 and 2012. Total monthly audience reach for the brand has grown significantly from 2,000,000 in 2010 to over 20,000,000 today.  For more information, visit 

About Quantum Workplace 
Quantum Workplace is an HR technology company that serves organizations through employee engagement surveys, action-planning tools, exit surveys, peer-to-peer recognition, performance evaluations, goal tracking, and leadership assessment. For more information, visit 

Myriad Supply Media Contact:
Kirsten Gonzalez 
Myriad Supply 

Stacey Solomon of Myriad Supply Recognized as One of CRN’s 2018 Women of the Channel

New York, NY, May 17, 2018 – Myriad Supply, a leading IT consultancy and integrator, announced today CRN®, a brand of The Channel Company, has named Stacey Solomon, Vice President of Purchasing at Myriad Supply, to its prestigious 2018 Women of the Channel list.

“It’s a great honor to be recognized amongst this group of extraordinary women,” said Stacey Solomon, Vice President of Purchasing at Myriad Supply. “I have had many great opportunities with Myriad and am excited and encouraged to continue this journey in the channel, helping Myriad achieve greatness within the area of cybersecurity.” 

The executives who comprise this annual list span the IT channel, representing vendors, distributors, solution providers and other organizations that figure prominently in the channel ecosystem. CRN editors select the Women of the Channel honorees based on their professional accomplishments, demonstrated expertise and ongoing dedication to the IT channel. 

“This accomplished group of leaders is steadily guiding the IT channel into a prosperous new era of services-led business models and deep, strategic partnerships,” said Bob Skelley, CEO of The Channel Company. “CRN’s 2018 Women of the Channel list honors executives who are driving channel progress through a number of achievements—exemplary partner programs, innovative product development and marketing, effective team-building, visionary leadership and accelerated sales growth—as well as advocacy for the next generation of women channel executives.”   

Solomon joined Myriad in 2010. Over the past 8 years, she has played a critical role in the development of the purchasing department and fostering relationships with a number of distributors. As an integrator and consultancy, the function of the purchasing department is crucial to supporting Myriad’s client offerings. Under Solomon’s lead, the purchasing department has earned the trust of Myriad’s clients and sales team alike through hard work, attention to detail, and their dedication to ensuring purchase orders meet the deadline set forth in client agreements. 

The 2018 Women of the Channel list will be featured in the June issue of CRN Magazine and online at 

About Myriad Supply
Myriad is an IT consultancy and integrator focused on providing complete, secure IT infrastructure solutions to enterprises. Using industry-specific knowledge and a security first approach, Myriad helps clients define, design, and implement their technology vision within the areas of security, SDN, mobility, and cloud. Myriad, located in New York City, has been serving clients since 2003. To learn more, visit us at or email 

About the Channel Company 
The Channel Company enables breakthrough IT channel performance with our dominant media, engaging events, expert consulting and education, and innovative marketing services and platforms. As the channel catalyst, we connect and empower technology suppliers, solution providers and end users. Backed by more than 30 years of unequaled channel experience, we draw from our deep knowledge to envision innovative new solutions for ever-evolving challenges in the technology marketplace.  

CRN is a registered trademark of The Channel Company, LLC. All rights reserved.  

Myriad Supply Media Contact:
Kirsten Gonzalez
Myriad Supply

The Channel Company Contact:
Kim Sparks
The Channel Company
(508) 416-1193  

Understanding Data Loss Prevention

I’ll assume that you’ve watched the Indiana Jones movie Raiders of the Lost Ark – if not, be warned, there are spoilers in the next sentence.  At the end of the movie, the Ark is reported to be in a place that is “very safe.”  To which Indy replies, “From whom?” Later, the scene cuts to a man rolling a wooden crate through a huge warehouse, already filled with other large wooden crates, to an open spot on the floor where he leaves the crate to sit for eternity… or at least until the Kingdom of the Crystal Skulls movie came out.  Sure, the location had a menacing fence topped with barbed wire surrounding the perimeter, and guards posted to check that incoming and outgoing traffic was permitted or blocked based on the schedule (policy) for the day – but those didn’t seem to be enough to keep the data… errr… artifacts safe in the next movie, when a determined force of baddies set their sights on removing one.

Imagine the warehouse, the surrounding property, and the security measures in place as your  IT ecosystem.  The large wooden crates could be systems and files within the ecosystem, and the artifacts could be considered the data housed within the systems and files.  Some of the crates might be consolidated into a specific area of the warehouse that has carefully guarded access.  Similarly, critical systems in organization’s environments are likely grouped onto network segments with access policies governing who can access the content.  By setting file permissions, what actions can be performed on data by specific people (or groups of people) can be even further restricted.  These network and system level rules do not, however, provide complete coverage or control over all data to prevent its loss or leakage.

Consider for a moment the lifecycle of the content before it is placed onto the protected system – it might go through many iterations of refinement on a user desktop and exchanged via email to various internal departments.  At any time, that unprotected content might be leaked if a laptop or phone is stolen or compromised, or if an errant destination email address was typed.

According to Gartner’s MQ for Enterprise Data Loss Protection (DLP), the DLP market is defined as those technologies that, as a core function, provide remediation for data loss based on both content inspection and contextual analysis of data.  In other words, a system or software that can interpret the content of a file (or email) and apply a set of rules based on how the content is being used (prevent everyone except authorized users from opening a file, prevent a file from being sent outside the organization, etc).  The interpretation and rule sets would be applied to data:

  • At rest on premises, or in cloud applications and cloud storage
  • In motion over the network
  • In use on a managed endpoint device

In its most simple form, a DLP solution gives the ability to assign a classification to data, which can be used to match against rules that assign some action to the data while it is at rest, in use, or in motion.  For instance, a policy may require that data at rest be encrypted and can only be unencrypted by someone with the correct entitlement to do so regardless of where the data resides – on a network share, or on your desktop.  The classification of the data resides within the file’s own metadata; therefore, enforcement of the policy will follow the file!  Agents on the network use policies to determine if the data can be shared from one user to another, internally or externally, possibly even by time of day.  Further enhancements to DLP also include anomaly-based triggers that understand what is normal and what stands out as different, thus making it actionable.

In the warehouse example, these controls would have enabled the facility to truly ensure the artifact was “very safe”:

Encrypt the data at rest. (Seal the artifact in an unbreakable box inside the crate which only an authorized person can open.)

Protect the data in use. (Ensure the artifact could not be read, modified, moved, deleted, etc by an unauthorized person.)

Protect the data in motion by sanitizing/redacting the sensitive data, and enforcing strict send/receive rules. (Magically remove the artifact from the crate without anyone noticing, or prevent the artifact from being sent in the first place.)

Finally, I’d like to address Indy’s question regarding safety.  We should also ask, “Safe from whom?” when considering data.  Many threats to our network today are internal – whether intentional or not.  How many times have you typed the first two or three letters of someone’s email address then hit tab or clicked the dropdown to complete?  Mistakes happen, however a DLP solution can help prevent data loss and leakage outside of your network.

In conclusion, I hope the above scenario helped you to understand what a DLP solution is and how it can help your organization. The ability to classify data and implement rule sets based on classification adds another layer of defense and further protects a company’s intellectual property.

Network Visibility is A Security Must-Have 

Given the trends of massive growth in bandwidth, deployment of large enterprise data centers, and significant adoption of cloud-based applications, enterprise networks have become more challenging to secure and manage. Organizations now have a reliance on the network for critical business functions, including remote access to data center and cloud-based applications. This increased reliance on the network has opened new avenues for cyberattacks. 

Hackers and cybercriminals are exploiting this increased network reliance to threaten most (if not all) organizations with operational disruption and data loss. The exponential growth in the network footprint, the shift in traffic patterns within the data center and the sophistication of cyberattacks are breaking traditional network security designs – making it impossible to secure the network perimeter. Worse, many security breaches are hard to detect, making remediation problematic. Security products (e.g. firewalls) are increasingly burdened with too many connections and too much traffic, resulting in significant impacts on performance. Visibility into who is accessing the network and the ability to identify anomalous traffic is essential to detecting cyberattacks and addressing security problems. 

If, Not When? Think Again 

The resulting growth in the frequency of malicious attacks has shifted the security landscape. The requirement must be to design IT security to defend systems when you are attacked, not if you will be attacked. The ramifications of successful attacks and the related adverse commercial impact have never been greater, so this shift in thinking is critical. The emphasis of security is now geared toward detection, containment, and fast remediation. 

As a transit point for all information exchange, the network is the critical point for identifying cyberattacks. Network monitoring systems are key to detecting anomalies and variances compared to normal traffic flows. As networks grow, the amount of traffic can quickly exceed the capabilities of security devices and related management tools. High performance, intelligent network monitoring systems capture packets (the building blocks of information), apply pattern matching, and can then send relevant traffic or metadata to the appropriate security appliances. Thus, monitoring can help match (limited) security performance with rapidly growing network performance. The visibility provided by network monitoring enables rapid decision-making in real time in response to threats, before they have time to affect the entire infrastructure. 

How Network Monitoring Tools Can Benefit Your Organization 

Using real-time network traffic is the best way to gain visibility into your IT infrastructure. To meet the monitoring and security needs of a modern network, a modern Network Packet Broker (NPB) is required. 

Monitoring throughout the network is critical to enable network visibility and dynamically mitigate security threats. Network monitoring tools must filter and aggregate huge traffic flows, isolate bad traffic on-demand to improve security, and ensure compliance. The specific benefits of enhanced network-wide visibility include: 

  • Rapid detection and resolution of application and network security breaches 
  • Improved network performance and reduced latency 
  • Ability to dynamically isolate bad traffic 
  • Improved tool utilization and performance  

The introduction of low-cost white box switches combined with SDN software have significantly improved performance, management, and lowered the cost of pervasive network monitoring. IT organizations can benefit from advances in network monitoring performance and capacity to improve application performance, end-user satisfaction, and to identify security challenges. 

Secure Email Gateways: Perimeter Security for the Mailbox

In the business world, 90 trillion emails are being sent each year. According to Kaspersky research, over 57% of those emails were classified as spam and malware. This makes email a very real threat vector that can infiltrate a user’s endpoint, branch offices, and even the data center. It’s important as ever to secure employee and user inboxes, and there have been continual advancements in security surrounding products that identify threats and safeguard users against them. 

Security Email Gateways are one of the many sets of products used to mitigate email threats. SEGs act as perimeter security for both incoming and outgoing email to ensure that threats from outside an organization can be flagged and quarantined from a user’s mailbox, as well as preventing the spreading of malicious content from a compromised endpoint. 

For personal accounts, many popular email providers have some form of SEG implemented that will safeguard individual mailboxes. The business world, however, looks to specialized solutions that will provide a higher level of flexibility and effectiveness to meet the needs of an organization while safeguarding employee mailboxes from compromising attacks. 

SEGs for inbound email security work by positioning themselves as an organization’s email server. The system then scans each email that comes in before making the determination to either block a message as spam or send it to an employee’s mailbox as legitimate email. This helps defend against threats outside of the organization such as compromised employees at an organization that has normal communication with the protected business or botnets that are utilized to send out spam. 

SEGs for outbound email security work similarly to inbound security except they mitigate email threats from within the organization. An IT administrator can set up their SEG to route all outbound email, to people both inside and outside the organization through its system to apply the same email security scanning and block potential threats. 

Security vendors have leveraged solutions that work both with a business’s on-premise email infrastructure as well as enterprise cloud email solutions such as Microsoft Office 365. At Myriad, we focus on leveraging vendors that have moved beyond the standard scanning of emails and use more efficient pattern matching and hashing to balance security and speed to the mailbox. We also look to make sure there have also been improvements on granularity based on an organization’s needs, placing enhanced security and safeguards on more at-risk departments or users, such as an organization’s finance department. 

While SEGs are not the only solution in the realm of email security, it is a very effective one, allowing security from the perimeter of an organization’s email infrastructure. As new and inventive ways are being developed to compromise users through their mailboxes, SEGs are constantly evolving to take on these changing threats and will continue to help provide a layer of security on the de-facto standard of electronic communication between business and users on the Internet in general. At Myriad, we’ll work for you to find, evaluate, recommend, and implement the best SEG to secure the perimeter in your business to help keep you ahead of the curve. 

Myriad Celebrates December & January Work Anniversaries

It’s the most wonderful time of the year… for anniversaries! Big congrats are due to those celebrating in December and January: 

Guthrie Jones – 4 years 

Guthrie started as an Account Executive in 2014, was promoted to Senior Account Executive in 2015, and then promoted to Senior Professional Services Specialist in 2017. He attributes his success to “the diverse, enthusiastic, and intelligent people who work here.” 

Best Myriad memory: “The support from everyone at Myriad when I became a first-time dad.” 

Caleb Lunsford – 4 years 

Right around the time of his work anniversary two years ago, Caleb was promoted to Senior Account Executive (what a way to celebrate!). “I love the company culture here. Everyone that is here believes in our brand and what we are trying to accomplish. I also think we have some of the absolute best sales management in the business.” 

Best Myriad memory: “My favorite memory was my first winter party. Andy and Mark went the extra mile to let me sing my favorite Enrique Iglesias song, ‘Hero.’ Mark was running around getting the audio set up. I thought it was really cool of a CEO/CFO to set that up for a fairly new employee.”  

Kyle Fahey – 4 years 

Over the course of his career at Myriad, Kyle was promoted from Account Executive to Senior Account Executive and earned many certifications from Cisco, Arista, Palo, Dell Storage, F5, and Fortinet. He enjoys “being given a chance to be a part of something great, and seeing direct results of [his] efforts as Myriad’s growth continues.”  

Best Myriad memory: “Margaritas pre-summer party being served up by none other than the CEO himself! (If I remember correctly, with an old network switch as the serving tray!)” 

Derek Diaz – 4 years 

After starting as an IT dispatcher, Derek completed training to earn his PMP certification in 2015 and was promoted to project manager. “I love the freedom and trust. As long you’ve demonstrated being dependable and a hard worker, your daily tasks are up to you. No micromanaging.” 

Best Myriad memory: “I’d have to go with my first winter party in 2013. Everyone was super welcoming and we had a blast!” 

Amanda McCall – 2 years 

Amanda has certainly been busy during her time at Myriad. Last year, she earned a certification in Data Analytics for Business and has been involved in organizing office 5k teams for many charitable causes, including “Heroes and Villains” for Memorial Sloan Kettering, “Santa Hat Dash” for Covenant House, and “Tunnel 2 Towers” for The Stephen Siller Foundation. 

Best Myriad memory: “The many volunteer opportunities that have been facilitated by Myriad, especially with SAGE (Advocacy & Services for LGBT Elders).” 

Alex Ho – 1 year 

Alex is celebrating his first year at Myriad! So how did it go? “My favorite thing about working at Myriad is the people. Really fun bunch everyone is.” 

Best Myriad memory: “Winning the ping pong tournament with Nick W. The competition was epic!” 

Many thanks to Guthrie, Caleb, Kyle, Derek, Amanda, and Alex for their dedication, passion, and impressive business acumen. Happy anniversary!