Podcast: Partnering with US Signal

Vivian Lee

Episode Summary

In this episode, Pat Cannon, Field CTO at US Signal, joins Art Ocain. With 10+ years of Cloud Architecture experience at US Signal, Pat gives us great insight on what US signal offers, how partnering with Airiam helps improve both companies’ services, and why he is excited to work with Airiam!

US Signal

Since its founding in 2001, US Signal has grown into the Midwest’s largest debt-free, privately held data center services provider. They offer a comprehensive suite of solutions, including connectivity, cloud hosting, colocation, data protection, and disaster recovery services. The company is supported by its robust fiber network.

US Signal actively provides industry-leading data center solutions, managed services, and cloud services to meet evolving IT needs. The strategic network enables private WAN, one-hop connections to the internet, and direct links to hyper-scale cloud providers. This growth stems from US Signal’s adept understanding of customer demands, emerging technologies, and industry maturation, establishing it as a proactive and reliable partner in IT solutions.

Video version

Listen to more episodes at www.airiam.com/podcast, on SpotifyApple Podcasts, Google PodcastsAmazon Music, and other podcast platforms.

New Resources In Your Inbox

Get our latest cybersecurity resources, content, tips and trends.

Other resources that might be of interest to you.

AI in Cybersecurity Job Market: Reshaping Careers in 2025

AI in cybersecurity is revolutionizing how organizations defend against digital threats. From automating threat detection to predicting attacks before they occur, artificial intelligence is transforming security operations and significantly impacting t
Vivian Lee
>>Read More

What Is Patching and Why Is It Important?

Fix Vulnerabilities with Effective Patch Management Software Development and Vulnerabilities Software development involves the creation of software designed to solve a problem or improve efficiencies within an organization. When writing the code, devel
Avatar photo
Conor Quinlan
>>Read More

What Are Identity and Access Management (IAM) Solutions?

Imagine logging into your system one morning to find that sensitive data has been accessed by unauthorized users. Your stomach drops. How did this happen? Could it have been prevented? This is where identity and access management (IAM) solutions can he
Jesse Sumrak
>>Read More