Collaboration + Bryan Payne + Nov 14, 2024
We have all heard about tragic events at schools, universities, and workplaces. When a threat to life and safety occurs, how we react and how quickly we react matters. Technologies are available today that can enhance emergency preparedness and the ability to communicate with large numbers of people in an emergency or crisis, including external emergency resources.
Security + Paul Lenhard + Nov 14, 2024
The 2024 Holiday season is right around the corner. Cyber Security Awareness month provides us with reason to pause and ensure we enter the Season prepared. Fortunately, it looks like the ports will be open for business, ensuring that goods will be shipped to those loved ones and friends on time. Online shopping continues to be the primary source of Holiday spend.
Security + Jim Bundy + Nov 7, 2024
SaaS plays a fundamental role in our modern technology ecosystem and elevates the need for mature IT processes. Nearly every organization relies on SaaS for some part of service delivery, but dependency on these solutions cannot override adherence to IT processes. Because if organizations become too complacent, they run the risk of a vendor outage affecting their ability to do business with their customers.
Security + Jessy Gonzalez + Oct 29, 2024
Artificial intelligence (AI) offers unprecedented possibilities. But with opportunity comes risk. Whatever you do with AI, make sure you have proper guardrails in place before you start.
Security + Lee Waskevich, ePlus and Avia Navickas, Varonis + Oct 24, 2024
Generative AI has the potential to improve arguably every industry, but with its productivity gains come new data security risks to mitigate and monitor. In this blog, we’ll share how ePlus and Varonis work together to help organizations adopt gen AI intelligently and with confidence.
Cloud + Jonathan Davis + Oct 21, 2024
From time to time, developers need custom Identity and Access Management (IAM) roles in Azure—typically to perform a specific activity in the lower lifecycles that isn't covered by a built-in role. Learn more about tools to safely deliver nearly any scenario and best practices to develop clear requirements, test fully, and enable application developers to more successfully execute their jobs.
Security + Jeremy Jackson + Oct 16, 2024
When I moved to Chesapeake, VA in 2018 I was already 12 years into my IT career. Up until then, the majority of it had been spent as a systems administrator for several customers within a variety of types of organizations. Every day was a bit of a mystery in terms of what I might have to deal with. All of that changed in 2018...
Artificial Intelligence + Sudheesh Subhash + Oct 11, 2024
Choosing the right infrastructure for your AI workload begins with understanding the options available to you, which can be confusing if you’re not familiar with the language.
Artificial Intelligence + Sudheesh Subhash + Sep 27, 2024
Whether you're running machine learning (ML) models, processing large datasets, or deploying AI-driven applications, the foundation of your success lies in the infrastructure you build.
Security + Lee Waskevich + Sep 5, 2024
Is a best-of-breed strategy still the best approach to cybersecurity? For over 20 years, the cybersecurity community has been conditioned to choose best-of-breed security solutions. After all, when a new threat emerges, it’s only logical to want the best protection available to combat that threat.
Managed Services + Jonathan Davis + Aug 9, 2024
As we’ve studied Disaster Recovery-as-a-Service (DRaaS) over the last few years it was hard to find a consistent approach to testing, even the most basic testing. In disaster recovery, we typically refer to isolated testing as “Bubble” testing. Workloads are made available in a disconnected network for limited (or possible extensive) testing to ensure they are in a strong position for recovery.
Networking + Bob Brewer + Jul 30, 2024
The network infrastructure forms the backbone of enterprise operations. As enterprise-class clients strive for seamless connectivity, robust security, and optimized performance, the importance of conducting comprehensive network assessments cannot be overstated. Network assessments serve as a vital tool for organizations to gain valuable insights, identify vulnerabilities, and make informed decisions to enhance their network infrastructure.
Security + Chris Hayner + Jul 23, 2024
Members of the ePlus Security team recently attended the Gartner Summit and came back even more excited to help our customers achieve stronger security postures. There are a few main themes that emerged from this year’s Gartner Security and Risk Summit. Let’s discuss...
Healthcare + Ken Puffer + Jul 22, 2024
In the United States, healthcare organizations are navigating a path to elevate patient care and fortify data security amidst evolving challenges. The strategic deployment of IT upgrades has become integral to this journey. The onset of the COVID-19 pandemic brought these challenges into sharp focus, particularly for the healthcare sector, accelerating the search for innovative IT solutions.
Artificial Intelligence + Justin Mescher + May 28, 2024
Feeling pressured to spin up an AI pilot quickly? If you are, you’re not alone. After all, it’s easy, right? Just turn it on and see what happens. Many analyst firms and vendors claim this is the year when AI proves its value, which is adding even more pressure on companies to get started. But rushing into a pilot project—or a proof of concept (POC)—without first doing the necessary groundwork is risky. Here’s how you can set yourself up for success.
Artificial Intelligence + Justin Mescher + Apr 29, 2024
If you’ve been following our AI series, we have covered the art of the possible, reviewed how to get started, defined a use case, and assessed AI preparedness. At this point, we arrive at the first inflection point in the AI journey: Do we build the infrastructure needed to support our use case or consume it from a service provider?
Cloud + Andy Ritter + Apr 8, 2024
We are thrilled to announce that ePlus has been recognized with the AWS Migration Competency for our proven methodology of migrating and modernizing applications to AWS. This recognition further establishes ePlus as a trusted and valued AWS partner, with over eight years of collaboration and nine recognitions from AWS based on the positive results we provide our customers.
Artificial Intelligence + Justin Mescher + Apr 2, 2024
In the last blog, I covered the importance of a well-defined use case for AI. Because without a clear use case, the next step in the AI journey—AI preparedness—would be difficult to determine at best and nearly impossible at the worst. How do you know if you are prepared to support AI in your organization? As I mentioned earlier, the answer depends on your use case.
Healthcare + Ken Puffer + Apr 1, 2024
The annual HIMSS (Healthcare Information and Management Systems Society) conference, labeled HIMSS24, was held in the Orange County Convention Center in Orlando, Florida. While educational sessions were running with several focus areas, Artificial Intelligence (AI) took center stage. AI captivated attendees with its potential to impact healthcare organizations. Read more about how.
Artificial Intelligence + Justin Mescher + Mar 13, 2024
The promise of AI is alluring—there are so many exciting, intriguing possibilities (and attractive advertising), who can resist wanting to dive in? But if AI is going to be your business partner, what kind of partner will it be? That depends a lot upon your use case(s). Let’s explore five steps to help you think through and define an AI use case.
Artificial Intelligence + Justin Mescher + Feb 21, 2024
When it comes to AI use cases, the possibilities are endless. Best practices for deploying AI-powered technologies to deliver business value, however, depend on your organization and its goals. How do you get started? Begin by developing a strategy based on your desired outcomes and use cases, which will allow you to properly evaluate your AI preparedness and create a path to success.
Security + Robert Thomas + Feb 20, 2024
It’s 2024 and AI is everywhere. The recent Consumer Electronics Show in Las Vegas had AI added to everything - grills, backpacks, televisions, cars. For those (like me) who are old enough to remember the early, halcyon days of the internet, it's the same hype cycle. AI is transforming everything, those who hesitate will be left behind, so forth and so on.
Security + David Tumlin, ePlus and Leif Rasmussen, F5 + Feb 12, 2024
Application programming interfaces (APIs) have redefined how businesses connect and scale apps for their users, customers, and partners at large. By providing a standardized interaction layer between software and systems, APIs have drastically improved how organizations consume, integrate with, and create digital experiences. But they come with inherent risk. While APIs modernize application delivery, they have become prime targets of cyberattacks and can introduce new vulnerabilities that must be accounted for. Successfully protecting apps from emerging threats requires businesses to properly manage, control, and secure this growing API layer.
Artificial Intelligence + Sudheesh Subhash + Feb 1, 2024
The story in 2023 was artificial intelligence (AI). With the emergence of ChatGPT, generative AI has all but taken over the tech world, and the possibilities are incredible. All indicators point to exponential AI growth as we move into 2024. Unlocking the full capability of AI, however, takes planning and preparation, and 86% of companies globally are not prepared to fully leverage the technology.
Security + Robert Thomas + Jan 3, 2024
In the ever-evolving landscape of cybersecurity threats and business uncertainties, the significance of preparedness cannot be overstated. Of all the strategies used to prepare employees and key third parties for a cybersecurity incident, tabletop exercises are consistently thought to be the best method for training. During the tabletops we have performed for our clients, some trends have become apparent.
Cloud + Andy Ritter + Nov 30, 2023
ePlus is proud to announce its recognition by the AWS Resilience Competency Program for its technical expertise and proven customer success. The AWS Competency Program is an AWS Specialization Program, validating ePlus’ partner expertise in delivering specialized professional services across industries, use cases, and workloads.
Security + Todd Redding + Nov 16, 2023
The holiday season is meant to bring out the best in all of us. It is the season we celebrate thankfulness, grace, light, and the new beginnings of a whole new year. Unfortunately, bad actors can see our good mood as an opportunity to take advantage of us. So how do we keep the joy in the season? Read more for some tips to help protect yourself and your information during the holiday season.
Networking + Todd Gingrass + Nov 6, 2023
The Service Provider Group at ePlus brings the knowledge of carrier-grade infrastructure and how those architectures can be applied to varying market verticals with a continued emphasis on service provider networking. The combined organization provides access to more than 2000 industry manufacturers, enhancing the services and solutions extended to broadband providers and bringing more options to new and existing customers.
Security + Corey Wilburn + Nov 1, 2023
In an era of ever-increasing cyber threats, the Securities and Exchange Commission (SEC) is taking strides to safeguard investors from the financial ramifications of cybersecurity incidents. Recently, the SEC introduced new regulations mandating that public companies disclose significant cybersecurity incidents within four business days of detection.
Cloud + Jack McVickar + Oct 30, 2023
The cloud is a fantastic resource, but it also poses challenges. Staying abreast of the 300+ Azure services and 38 weekly service updates is no easy task. This is where ePlus Cloud Managed Services (ECMS) comes in—with an experienced team focused on Azure, every day. Typically, our assessments reveal an average health score of around 60% before remediation, but after we address the issues, environments often reach the high 90% mark with emphasis on security, architecture, and financial elements.
Cloud + Jack McVickar + Oct 18, 2023
Recently, a major healthcare organization found itself in the eye of the storm when it fell victim to a devastating cyberattack. As a technologist, I couldn't help but wonder how their systems, including their website and phone lines, seemingly crumbled under the assault. Several weeks later, as I write this blog post, they are still striving to recover their systems and restore normalcy. As a patient, I share the concern of many others – was my personal data compromised, and how can such a disaster be prevented in the future?
Data Center + Justin Mescher + Sep 12, 2023
Prioritizing sustainability is important for numerous reasons, including customer demand, increased regulations, and attracting/retaining top talent. While technology leaders can help lead the way by making smart decisions on energy conservation, responsible asset disposal, and efficient data center management, fully operationalizing these strategies to meet company environment, social and government (ESG) goals is often challenging. Here are three initiatives that can have a major impact on an organization’s ability to minimize its environmental impact.
Security + Ken Puffer + Aug 2, 2023
Consumer expectations regarding the patient journey have evolved, emphasizing efficiency, digital operability, convenience, and user-friendliness. While some healthcare entities may be hesitant to embrace change and modernize long-established processes, others recognize the imperative of updating and adapting the user experience to re-engage patients and reassess care delivery by embracing recent advancements. Leveraging technology, hospitals can fundamentally enhance the patient experience, enabling them not only to survive but also to thrive amidst these paradigm shifts. Read more on three key areas of focus for hospitals seeking to enhance user experience in 2023 and beyond.
Artificial Intelligence + Bryan Payne + Jul 9, 2023
Artificial intelligence (AI) has been used in Customer Experience and Contact Center platforms for over 20 years. Data-driven predictive routing, self-service chatbots, and real-time agent assistance via big data are several key benefits that have improved customer experience as a result of AI.
Security + Lori MacVittie + Jul 7, 2023
Resilience allows organizations to bounce back quickly when the unexpected happens, whether problems arise from human error, technology failures, natural disasters, or cybersecurity incidents. A resilient business can avoid costly downtime, lost revenue, and a damaged reputation.
Security + Jason Nelson + May 4, 2023
Tales from the Road: RSA Conference 2023. A few main themes emerged from this year’s RSA Conference - artificial intelligence, asset management, DevSecOps, automation and email security. Let’s discuss.
Collaboration + Sean Wilson + Feb 22, 2023
Remote and hybrid work has created the need for reliable video conferencing. It has also created more work for IT and services technicians. That’s where automation comes in. Automation can help organizations reduce meeting delays due to technical problems, enhance user experiences, and increase worker productivity.
Security + Ivan Gil + Feb 3, 2023
Ivan Gil, Senior Information Security Consultant at ePlus, shares his insight on tackling a complex regulatory landscape while enhancing your security posture through virtual CISO services.
Managed Services + Kyle Nicolo + Jan 24, 2023
Regular upgrades to your AKS clusters ensure that you have the latest features, bug fixes, and improvements to security. AKS is one of the few Azure PaaS that require customer-initiated upgrades, and while they are significantly easier than traditional Kubernetes upgrades they still require some planning. In this blog we’ll discuss the pros and cons of two general approaches to AKS upgrades.
Collaboration + Sean Wilson + Dec 5, 2022
For the courts, technology allows attorneys to meet remotely with litigants. It enables expert witnesses to testify without traveling, and young victims to tell their story without the trauma of facing their accusers. And it makes it possible for citizens to schedule hearings without taking time off from work, arranging for childcare, or finding transportation, which can reduce the number of missed court appearances.
Security + Lisa Marks + Nov 22, 2022
While there are dangers-a-plenty surrounding our online holiday shopping exploits…(think exposed credit card numbers or intercepted packages)…many people overlook or are unaware of the risks of booking online travel that become prevalent during the holiday season. Don’t let social engineers ruin your vacation. Take a look at these tips when you are booking your holiday travel.
Services + Bob Brewer + Nov 11, 2022
With the introduction of software-defined wide-area networking (SD-WAN), network engineering changed. SD-WAN technology is both transformational and disruptive, and it requires organizations to embrace a new approach to wide-area network (WAN) design and operation—and the roles and responsibilities of network engineers. Engaging a managed services provider (MSP) to manage SD-WAN networks offers several benefits. Here are seven reasons to consider SD-WAN Managed Services.
Collaboration + Dan Farrell + Nov 3, 2022
WebexOne ‘22 is proof that remarkable things come in threes. Cisco held their exclusive Collaboration event last week for the third year in a row and announced over 40 new enhancements to the portfolio.
Managed Services + Jonathan Davis + Oct 20, 2022
Governance tools are powerful, but they can overwhelm an organization with data. Since the original inception of our internally-developed “Ongoing Validation” toolset, we wanted to implement a scoring system to help make data more digestible and practical—to easily identify issues, then remediate as effectively and efficiently as possible. With our recent ECMS release, we’ve debuted a new scoring system and distributed it to all of our current customers as well as those evaluating our service.
Networking + Leo Rentzis + Oct 17, 2022
Smart devices and sensors may provide the technology to collect and transmit data, but they can’t do it if the infrastructure is not capable of handling the workload. Before embarking on an IoT project (or vastly expanding a pilot project), review your IoT strategy and consider how your IT environment will have to change to support it.
Managed Services + Jonathan Davis + Oct 4, 2022
At ePlus, we’re fortunate to talk to a wide variety of organizations around their use of Microsoft Azure. It’s absolutely one of my favorite parts of the job. A frequent topic that comes up in conversation is our approach to deliver ePlus Cloud Managed Services for Azure using proprietary tools. Being dependent on external tools can delay the consumption of new Azure features or services at times, whereas ePlus can quickly expand our tooling to accommodate. We’re not forced to wait to see how it fits into someone else’s roadmap.
Managed Services + Jonathan Davis + Sep 7, 2022
Microsoft owns a lot of IP blocks—at last count ~95K ranges between IPv4 and IPv6. If you've reviewed requirements for a service or application that consumes other Microsoft services, you may be daunted by the need to determine which IP blocks are needed. Microsoft Service Tags allow us to have a concise way of referring to large numbers of IP blocks that are constantly updating in the Azure Firewall and Network Security Groups (NSGs). But some firewalls do not support Azure Service Tags. ePlus has created a handy tool to easily pull the IP blocks for the various Service Tags.
Security + Jason Nelson + Aug 25, 2022
The ePlus Security team was on site at this year’s BlackHat 2022 conference. Read one expert’s take on XDR and the importance of getting back to the basics.
Managed Services + Jonathan Davis + Aug 24, 2022
At ePlus, we’re big fans of Microsoft Azure's built-in cost optimization tooling and leverage it heavily. However, there are a few gaps from our view, and we've built tools to help other organizations resolve those shortcomings—one of which is the right sizing of various Platform as a Service (PaaS) instances. Utilizing the full suite of FinOps tooling that ePlus has developed as part of our Cloud Managed Services offering, we have been able to save organizations significantly (typically well past 20% on their average Azure spend, and at times exceeding 50%).
Networking + Bob Brewer + Aug 22, 2022
SD-WAN improves network intelligence and application performance through increased traffic visibility, but it is not a complete network infrastructure monitoring tool. SD-WAN visibility tools can help reduce the amount of time and effort it takes for your network resources to manage your SD-WAN infrastructure by applying intelligence, self-healing techniques, threshold management, application workload performance, and steering analysis.
Managed Services + Jonathan Davis + Aug 12, 2022
So what does that even mean? Most IT staff have heard of Infrastructure as Code (IaC) but committing fully to it eludes a lot of organizations. Why is that? Check out a technical deep dive exploring how integrating any of the concepts of Infrastructure as Code (IaC) into your existing non-IaC automation approach will pay dividends.
Managed Services + Jonathan Davis + Aug 5, 2022
Learn more about ePlus’ approach to Ongoing Validation and how we've been able to help organizations ensure that no matter who deploys instances in Azure—with what toolset or approach—they get a consistent result. This extends many security and governance concepts that are built into the platform and easily customized for the needs of different deployments. Because our approach (and codebase) are fully modular, we also use the core of this to assess new environments as we are introduced to new organizations.
Networking + Bob Brewer + Aug 1, 2022
There are many reasons to implement SD-WAN, but one of the main reasons organizations deploy SD-WAN is for cloud access. Whether your overall cloud strategy is hybrid cloud, multiple clouds, multi-cloud, or some combination of all three you’ll need to select the SD-WAN product that best supports your needs. In this article, we will discuss the different SD-WAN cloud access capabilities and what they mean for you and your organization.
Managed Services + Andy Ritter + Jul 29, 2022
FinOps is one of the eight core tenets of the ePlus Cloud Managed Services approach. With an integrated and mature approach to FinOps, you can effectively consume cloud at scale while measuring the true value that it brings to your business. Read more, including a real-world use case.
Cloud + Andy Ritter, Global Cloud Practice Director & Jonathan Davis, Chief Architect + Jul 22, 2022
Welcome to our first ePlus Cloud Managed Services (ECMS) blog. Our goal is to share our viewpoint of being on the leading edge as an Azure Managed Services Provider (MSP). We developed this blog series to provide relevant content and tips, practical use cases, and examples of how to reduce risk and optimize spend. Let’s start by sharing a bit about ePlus, and explain how we’ve gained a unique perspective in the Azure Managed Services space.
Services + Bryan Payne + Jul 11, 2022
On July 16, 2022, the FCC rules require phone service providers and carriers to be enabled to forward the dialed digits 988 to the National Suicide Prevention Hotline. These FCC rules will apply to all telecommunications carriers as well as all interconnected and one-way Voice over Internet Protocol (VoIP) service providers in the United States and the five major U.S. territories--American Samoa, Guam, Northern Mariana Islands, Puerto Rico, and U.S. Virgin Islands.
Networking + Bob Brewer + Jul 6, 2022
Zero touch provisioning (ZTP) automates steps in the SD-WAN setup process, but it doesn't mean you will never touch the device. Get up to speed on the reality of ZTP.
Networking + Bob Brewer + Jun 14, 2022
Most SD-WAN products on the market today offer security features that enable you to deliver secure WAN communications. But these products do not offer the same scope of functionality found in top enterprise security platforms or appliances and cannot be considered a replacement. Each SD-WAN product has nuances, slight differences in the way the vendors choose to deploy functionality. Some products offer more features than others, so it’s important that you evaluate each one carefully before making a selection.
Healthcare + Chad Fredrick + Jun 13, 2022
Inflation, rising interest rates, and the threat of recession make it the perfect time to rethink your access to cash and how it affects your technology purchases.
Networking + Bob Brewer + May 23, 2022
Two factors changed to make the traditional WAN architecture suboptimal: 1) some applications shifted from the data center to the cloud; 2) less expensive transport options emerged. How do you deliver a high-quality application experience for remote users, leverage newer transport options, and optimize (or lower) costs in this environment? This is where connectivity diversity comes in. Having diverse network connections available at each site gives you more “bang” for your WAN spend. Learn more.
Networking + Bob Brewer + May 13, 2022
There are a number of benefits to SD-WAN technology and we're ready to deep dive into them in our latest technical blog series. Part one focuses on Application Steering, the ability to assign and manage SD-WAN resources by application and what that brings to your organization.
Services + Anthony Labita + Apr 20, 2022
It’s harder than ever to retain IT talent these days. A recent Gartner Survey found that only 29% of IT workers intend to stay with their current employer. This statistic—while alarming—quantifies something we’ve been seeing for quite some time with our clients: their continuing struggle to get and keep the people they need. See how ePlus’ resourcing expertise can help you navigate with the talent shortage.
Security + Ivan Gil + Apr 11, 2022
In IT security, we see social engineering techniques used all the time. Bad actors employ social engineering to exploit our psychological vulnerability and to build trust. Once trust is established, the actor can use a variety of tactics to launch cyberattacks against employees and the organizations where they work. With the popularity of social media and more people working remotely than ever before, the field is ripe for cyber criminals. Here are some steps you can take to protect your organization.
Services + Zeki Yasar + Mar 23, 2022
For many years, ePlus has helped its customers across nearly all industries implement transformational technology. And, while all technology has the ability to propel organizations forward, artificial intelligence is arguably one that carries significant potential to impact organizations for the better through the proactive and efficient use of data.
Cloud + Justin Mescher + Feb 10, 2022
You may not realize it, but there’s an important deadline coming up in just a few weeks—March 1, 2022. That’s the day when Microsoft 365 pricing and subscription options will be changing considerably, and there are ways that you can, and should, optimize your subscriptions before then. The reason for the urgency? The changes outlined below have the potential to raise Microsoft 365 pricing by 20-40% for many organizations. Find out how ePlus can help you cut through the complexity to reduce the impact to your organization while continuing to get the most out of your Microsoft solutions.
Security + Lee Waskevich + Feb 7, 2022
We are wrapping up our “soon to be famous” Threats, Trends and Tech Trilogy with a spotlight on what cyber security technologies took center stage this past year. This post will dig a bit deeper into the maturing spaces that shaped this past year’s cyber purchases.
Networking + Kit Johnston + Feb 4, 2022
Wi-Fi 6 can support more devices and bandwidth-hungry applications on your wireless network, if your infrastructure is ready for it. But what exactly is it and how do you prepare for it? Read more.
Security + Lee Waskevich + Jan 10, 2022
In part two of our trilogy, called Cyber Schmear of a Year, we explore one of the top trends of the year. No, not the cream cheese shortage… the wakeup call for companies regarding increased cyber liability insurance premiums and supplemental guidelines -- why it’s happening and what you can do to be prepared.
Security + ePlus Security Team + Dec 21, 2021
Everyone loves a good trilogy and we’re here to deliver. Over the next few weeks we’ll explore the threats, trends and tech that made 2021 what it was, as we look ahead and plan for what might be in store for 2022.
Collaboration + Bryan Payne + Dec 3, 2021
We hear from our customers, “if I update my phone system will I be in compliance with Kari’s Law and Ray Baum’s Act?” The answer is often a “maybe”. The legislation directed the FCC to create rules around 911 emergency calling. The rules created are intended to provide better results when a caller from a Multi-Line Telephone System (MLTS) places a call to 911 for emergency services.
Cloud + Brian Roets + Dec 3, 2021
In an increasingly cloud-dominant world, automation can help close the growing gap between procurement, finance, and software engineering groups when it comes to procurement processes and today’s software development needs.
Networking + Bob Brewer + Nov 29, 2021
New business challenges and accelerated digital transformation are putting pressure on network infrastructures, requiring IT leaders to focus more effort and investment on modernization.
Collaboration + Sean Wilson + Nov 4, 2021
Since the pandemic, hybrid working models continue to evolve presenting us with new challenges every day. Cisco’s highly anticipated WebexOne event was filled with exciting announcements that will help organizations of all sizes better support their hybrid work challenges. The virtual conference spanned two days, with the first day focused on Hybrid Work, and the second on Customer Experience. Webex is creating consistent, easy to use and inclusive experiences that make it possible for organizations of all shapes and sizes to work anywhere. Read more.
Security + Ken Puffer + Oct 12, 2021
With ransomware attacks becoming more costly, cyber insurance no longer should be considered optional. But getting or even maintaining coverage isn’t guaranteed, and your organization’s security posture matters to insurers.
Services + ePlus CX Team + Sep 27, 2021
Customers interact with businesses in different ways, and their resulting experiences from those interactions affect their satisfaction and their future buying decisions. Picking a partner with a strong customer experience (CX) practice, which includes technical experts, processes and tools, improves those experiences over time through data-driven insight and actions. Read more about what a strong CX program can do for you.
Services + Kalani Silva + Sep 22, 2021
Sooner or later, everyone in IT has that moment. You’ve just lost your primary internet circuit, and everything is down. You can’t process POs, customers can’t get to your product, and your phone is ringing. You know without looking that it’s senior leadership calling. And even though there’s nothing wrong with the thermostat, the back of your neck is suddenly sweaty. It’s failover time.
Networking + Bob Brewer + Sep 3, 2021
The enterprise shift to a cloud and hybrid-cloud infrastructure is fueling strong growth of the SD-WAN software market, which is projected to hit $4.6 billion by 2023.
Data Center + Jeremiah Stuppy + Sep 2, 2021
Eight out of ten enterprises, according to Gartner, will abandon their traditional data centers for public cloud, hosted private cloud, or co-location alternatives by 2025.1 That prediction was given in 2019, before the pandemic.
Financing + Jay Farrell + Aug 31, 2021
Organizational agility can mean the difference between a business thriving in the marketplace or struggling to stay afloat. This was a harsh lesson learned by many in 2020.
Services + Chris Sutton, PMP + Aug 18, 2021
When the pandemic hit, no one knew the full effect it would have. Now, a year and a half later, as we deal with new virus surges and changing public health guidelines, we’re still learning the implications. The lessons of the initial lockdown continue to be relevant as businesses look to the future—get ahead of disruptions before they happen, if you can. It’s tricky to do that in the best of times but add a worldwide shortage of computer chips and the resulting backlogs for pretty much all hardware, and it becomes even trickier. So how can you make sure you’ll have the tech you need in these uncertain times? Read more to find out.
Services + Anthony Labita + Aug 10, 2021
Talent shortages have always been a top concern for CIOs. These days, finding the specialized expertise you need to drive your IT initiatives can seem like an impossible challenge. Instead of plowing through a bewildering stack of resumes, wouldn’t you rather have a manageable selection of rigorously vetted pros, all of whom have the unique technology skillset you need? ePlus can make that happen.
Networking + Bob Brewer + Jul 22, 2021
Research firm Dell'Oro Group projects global sales of SD-WAN technologies will grow at a CAGR of 24% over the next five years -- and it expects the market to eclipse $4 billion by 2025. These nifty data points speak to SD-WAN technologies' potential but don't really tell you how SD-WAN can help grow your business or even how SD-WAN works. This blog does.
Cloud + Jeremiah Stuppy, Solutions Director, and Andy Ritter, Cloud Practice Director + Jul 21, 2021
Public cloud adoption continues to accelerate. With the increase in cloud spend—where costs are tied directly to variable consumption—many organizations face a growing concern over efficiency. Public cloud makes it easy to spin up new environments, develop new software features, deploy new apps, and shutdown resources when they are no longer needed. But who remembers to turn off unused resources? Organizations need to make smart investments in public cloud to minimize wasted costs and to get real business value. That’s where FinOps—or cloud financial operations—comes in.
Security + Lee Waskevich + Jul 12, 2021
This is the third article in a three-part series: Achieve Zero Trust with Secure Access. Our first article covered the importance of managing identity through strong authentication and privileges. The second article focused on securing the endpoint. In this piece, we will bring it all together and cover the third element of a zero trust security architecture: SASE, a new concept in network security architecture.
Services + Mark Barker, Director of Services Support & Strategy and Paul Lenhard, Director, Security Advisory Services + Jun 14, 2021
The sudden shift to a remote workforce required an unprecedented degree of network agility. And as we look back on the past year, the challenges of decentralized security have become painfully clear. With VPN traffic at an all-time high and less than perfect control over employee laptops, many organizations face new security threats that weren’t a problem when employees were in the office. Assessments are a key piece of charting the best way forward from here.
Healthcare + Ken Puffer + Jun 10, 2021
Ransomware in Healthcare is a three-part series discussing the source, impact and effect that threat actors have on the systems used by clinicians to provide care. In this final segment, we will discuss ways to prepare, recover, and continue providing patient care when faced with a successful ransomware attack. You can also read Part One: Motive and Impact and Part Two: Strategic and Tactical Approaches to Prevent and Protect Clinical and Information Assets and Operations.
Managed Services + Bob Brewer + Jun 3, 2021
Organizations of all sizes are looking to transform wide area networks (WANs) from “fragile to agile” by implementing software-defined WAN (SD-WAN) technology. SD-WAN serves as the connective tissue between applications, clouds and branch offices, enabling organizations to deliver applications to users without losing visibility, security or performance. However, while implementing an SD-WAN solution can provide substantial benefits, there is specific expertise required to effectively manage it and optimize its benefits.
Services + Security Advisory Services Team + Jun 1, 2021
Security and compliance pose some of the most complex and challenging issues facing IT professionals today, but things could be easier. While there is some truly amazing technology out there, solutions need to be implemented, not just installed. Organizations need strategy, processes, supporting policies, runbooks, security operations centers, and a plan for when things go wrong. Explore how Advisory Services can help.
Financing + Jay Farrell + May 21, 2021
Painting a picture of state and local government financial health more than one year into the pandemic is no easy task. Declining budgets have proven especially tricky when it comes to financing IT projects across State, Local & Education (SLED) organizations. CIOs and other stakeholders had to simultaneously tackle two immense challenges. The first: quickly pivoting to meet the technology needs of remote workforces and students. The second: ensuring IT infrastructure could support a massive digital transformation in how citizen services were being delivered. Financing IT projects was a helpful strategy. Here are some others you should keep in mind when going this route.
Cloud + Jeremiah Stuppy + May 17, 2021
Over the past year of market disruption from COVID-19, there’s been a renewed spotlight on business continuity overall, including disaster recovery, ransomware protection, and accelerating IT modernization. Many enterprises need to rethink their disaster recovery strategy.
Healthcare + Ron Remy + Apr 30, 2021
Artificial intelligence, or AI, has become nearly ubiquitous in our interactions with the web and smart devices. We use the virtual assistant on our smartphones to complete simple tasks like telling us the weather or relaying our schedule for the day—even search engines leverage a form of AI to better understand search queries and provide more accurate results.
Security + Lee Waskevich + Apr 26, 2021
This is the second article in a three-part series: Achieve Zero Trust with Secure Access. External actors are behind 70% of data breaches, according to the latest report from Verizon. And the endpoint continues to be one of the most often targeted attack vectors for these perpetrators. Learn more about what aspects to consider when evaluating endpoint security.
Security + Ken Puffer + Apr 22, 2021
Ransomware in Healthcare is a three-part series discussing the source, impact and effect that threat actors have on the systems used by clinicians to provide care. In Part One: Motive and Impact, we discussed how the potential for financial gain drives malicious persons to compromise health workers and poorly secured systems to corrupt access to clinical information. In this segment, we will discuss strategic and tactical approaches to help prevent, identify and protect systems from compromise.
Data Center + Louis Vitiello + Apr 16, 2021
Organizations are facing exponential data growth, especially with unstructured data, along with increasing customer expectations and performance demands. Their traditional storage infrastructures are just not able to support their evolving business requirements.
Collaboration + Bryan Payne + Apr 8, 2021
Now, more than ever, leveraging the cloud for collaboration solutions is critical. Outside pressures have motivated organizations to reprioritize a move to the cloud. ePlus’ Cloud Collaboration solution powered by Cisco UCM Cloud can help to accelerate your transition to the cloud in a much smoother and worry-free manner while leveraging investments you’ve already made in existing telephony hardware.
Security + Ken Puffer + Mar 18, 2021
The impact of a successful ransomware attack on any organization is dramatic, which can result in lost revenue and productivity- and healthcare organizations are particularly sensitive to outages caused by ransomware. This is part one of a three-part series exploring the current state of ransomware in Healthcare and explores the threat actors, their motives and the strategies they use to gain a foothold in an organization.
Security + Lee Waskevich + Mar 5, 2021
This is the first article in a three-part series: Achieve Zero Trust with Secure Access. Security philosophy has changed. The “trust but verify” approach is now obsolete—due in part to increased digitization, higher cloud adoption, and more distributed users—and it’s been replaced with a policy of zero trust. But building a zero trust security architecture is a multifaceted endeavor.
Cloud + Justin Mescher + Feb 2, 2021
As of December 2020, AWS Marketplace customers will discover something new: listings for ePlus professional and managed services. It’s the latest milestone in our journey to make it easier for organizations to find and deploy solutions and services in AWS.
Services + Dan Farrell + Jan 22, 2021
No one could have predicted 2020. Looking ahead, there’s only one thing we can predict with any certainty—more disruption. And no one can afford to be caught off guard when the next change hits. That’s why you need agility, speed, resiliency, and an IT architecture that enables your company to thrive, no matter what surprises come our way in 2021. ePlus can show you the big picture—the high-level strategies and solutions that facilitate business outcomes—and manage the small details—the practical technological requirements for realizing those outcomes.
Managed Services + Wayne St. Jacques + Jan 8, 2021
As an IT professional, have you ever felt so overwhelmed with projects and strapped for time that you knew important things were getting missed? Maybe some servers were being configured wrong or security profiles were too lax? That’s where ePlus Consulting Services can help. Here are four ways you can leverage our services to help you tackle your most difficult challenges and get the most value from your technology spend.
Security + Lee Waskevich + Dec 10, 2020
In support of National Cyber Security Awareness Month (NCSAM) 2020, we launched a companion effort called ePlus CyberSmart, a four-week educational series offering resources and expert insight from our security professionals and partners designed to help you expand your knowledge of security topics, so you can help your organization implement better security controls based on today’s dynamic threat landscape.
Security + Paul Lenhard + Dec 8, 2020
The 2020 Holiday season, while vastly different this year, is well underway. There is a large uptick in online shopping. In fact, Adobe Analytics predicts that U.S. online sales for the months of November and December 2020 will reach $189 billion, representing a 33% year-over-year increase and setting a new record. The forecast is also equal to two years of growth in one season, Adobe says, noting that the increase in 2019 was just 13%. Wow.
Security + ePlus Security Team + Nov 13, 2020
With the explosive growth of employees working from home, the need for an easy-to-use but secure way for employees to connect to the office has become even more important and a reason you may consider modernizing your network. Juniper’s Enterprise at Home solution extends the AI-Driven Enterprise to remote workers.
Security + Brian Zimmer + Nov 13, 2020
For the first few decades of our human experience with computers, passwords were simple and short. Only in very few environments, usually those with national security concerns, were there additional controls in place. These were things like keys, safes with sealed envelopes with passwords, or a secondary password. Life with passwords was simple. The password had become and remains to this day, one of the single most important elements an attacker needed to inflict serious harm on a victim organization.
Education + Nick D'Archangelo + Oct 8, 2020
Students have returned to school—some physically, some virtually, and some in a hybrid capacity. But how many will stay enrolled and engaged from their family homes and dorm rooms? And will next year’s high school graduates recognize the value of such a college or university experience?
Security + Jason Nelson + Mar 11, 2020
RSAC 2020 brought a lot of conversation around the coming “death” of passwords. All over the show floor were discussions of “passwordless access” married with difficult to steal factors like biometrics and physical key fobs. A few main themes emerged from this year’s RSA Conference. Let’s discuss.
Security + Lee Waskevich + Mar 9, 2020
Organizations around the globe are preparing for and executing precautionary plans to protect the health and welfare of their employees and citizens. The past few weeks have been a whirlwind of information, caution and concern as COVID-19 virus spreads around the globe. Fortunately, the digital age in which we live provides unique abilities to remain connected to our organizations, business applications and customers so as to minimize the disruption to our secular responsibilities.
Healthcare + George Pashardis + Feb 18, 2020
Healthcare is one of the hottest industries for transformative technology! With HIMSS 20 right around the corner, thousands of healthcare professionals, clinicians and executives will turn out in search of innovation, emerging technology, insights, best practices and new applications for better health, patient engagement, patient care and security.
Security + Ken Puffer + Jan 22, 2020
Healthcare organizations in the U.S. do a very good job of addressing the clinical needs of their patients. Though there is always room for improvement, it cannot be denied that hospitals today have deep experience and commitment to the health and wellness of their patients and the communities they serve.
Security + Ken Puffer + Jan 15, 2020
Securing networks from outside threats and periodically evaluating these tools and alerting mechanisms has become commonplace in most organizations. It is reassuring to see that external threats have gained the attention of hospital boards and that additional support is being put behind data security. With the continuing instances of breaches and ransomware attacks that are reported, the process of effectively protecting an organization remains complicated.
Security + ePlus Security Team + Jan 13, 2020
Hindsight is 2020 -- and given the increase in cyber-attacks we saw in 2019 -- we don’t need a crystal ball to predict that 2020 and the coming decade will keep cyber security in the limelight as the single most important foundational anchor to organizational success, and smooth operations. A fresh new decade will bring with it a freshly evolved set of threats, concerns and sophisticated cyber-attacks.
Security + Ken Puffer + Jan 8, 2020
Cyber Security Insurance, or Cyber Liability Insurance, is a category of insurance products that is intended to cover losses associated with data breaches, network security failures and business interruption from these events. Cyber Security Policy coverage varies, but most include: errors & omissions, media liability, network security and privacy.
Security + Paul Lenhard + Dec 16, 2019
The 2019 Holiday season is in full swing. While we spend time with loved ones, search for the next “it” device, or simply take a breath from this year’s pace of life, we must remain cognizant that threat actor campaigns are ready to catch us off guard. Our data continues to be under constant attack. Here are a few helpful tips to ensure you’re adequately protected all season long.
Services + Ron Barnes + Oct 18, 2019
How common is cybercrime? Well, one expert notes a ransomware attack occurs every 14 seconds. And in a separate article, he says cryptojacking, distributed denial of service attacks, phishing, and other schemes are costing the world economy $2 trillion a year.
Security + Sam Curcio + Oct 3, 2019
Lack of visibility into east-west traffic is a problem for data-center operators and their ongoing battle to prevent a breach or theft of sensitive and confidential information. If organizations cannot monitor and log internal network segments, they cannot respond to active threats or prevent hackers from stealing confidential and sensitive information which often times includes customer and employee data.
Security + Brian Zimmer + Sep 27, 2019
Enterprises looking to the future of Information Security should look to Purple Teaming Exercises. Partnering together as a single Purple Team, defenders – the Blue Team - and the attackers – who are the Red Teams – can better prepare the enterprise for modern adversaries.
Artificial Intelligence + Andrew Malinow + Aug 13, 2019
Despite a steady increase in GPU development activities, misunderstandings about the value of using GPUs to accelerate workloads persist. In this post, I debunk four of these myths and explain why I think the technology has broader utility than standard artificial intelligence (AI) use cases might suggest.
Security + Marc Cohen + Aug 8, 2019
Every technology has its place, and the people that use the systems have a responsibility to society to ensure the systems are not misused, and data captured is handled appropriately. Technology giants have acknowledged this and called for government regulation of face recognition technologies due to their far-reaching impacts.
Security + ePlus Security Team + Jun 4, 2019
Healthcare systems and providers have been seeking ways to increase efficiency and productivity while embracing value-based care models and enabling patient empowerment. Efforts to make these goals a reality have manifested in two ways: the adoption of new tools and technology and through mergers and acquisitions.
Security + ePlus Security Team + May 16, 2019
With recent advancements in technology, the healthcare space is changing. Specifically, new applications and connected devices are being developed to improve productivity and patient access to medical information. This is known as the consumerization of IT, in which technology tools and solutions focus on empowering the end user. In healthcare, this means the patient or physician.
Security + ePlus Cloud Team + Apr 30, 2019
An increasing number of organizations are investigating options to migrate workloads to the cloud or replace legacy applications with a software as a service (SaaS) application. Moving assets from on-premise to the public or private cloud can enable substantial positive business outcomes but requires additional thought around how to protect sensitive information to maintain compliance, audit and privacy requirements.
Healthcare + George Pashardis + Apr 4, 2019
Anyone who walked around the Healthcare Information Management and Systems Society (HIMSS19) show in February saw some distinct themes in Healthcare IT emerging. Healthcare IT is forward-looking, futuristic, full of possibility and global. Keep reading for a breakdown of what’s hot, what’s emerging, what’s top of mind– and what’s full speed ahead.
Cloud + ePlus Cloud Team + Apr 3, 2019
Are you pursuing a multiple cloud strategy? If so, you're among the majority of companies. In fact, according to Rightscale's 2019 State of the Cloud survey, 94% of respondents said they use cloud platforms in their enterprise. Not just one cloud platform-on average, they use almost five. In fact, 84% of respondents have a multi-cloud strategy.1
Security + Marc Cohen | Jason Nelson + Mar 28, 2019
Read more as we talk with our team on the ground at this year’s RSAC. ePlus Lead Security Engineer Jason Nelson attended sessions, and Marc Cohen, ePlus Solutions Director walked the floor, saw the demos and talked the talk!
Security + ePlus Security Team + Mar 20, 2019
"Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.
Data Center + ePlus Networking Team + Feb 11, 2019
The world is experiencing a top-to-bottom digital transformation that will impact virtually every aspect of business, from competitive capabilities to security exposure. Making that transformation requires the essential elements of a modern data center – and a solid plan with a trusted advisor to help set them into place.
Security + Sophat Chev + Feb 7, 2019
The first data breach of 2019 took place less than 24 hours after the new year. The Australian State of Victoria reported an estimated 30,000 civil identities exfiltrated by way of spear phishing (using email to lure its victim to initiate a vulnerability). The agency claims all personal identifiable information (PII) was encrypted, which thankfully renders the data exfiltrated unusable. This security approach was a result of a compliance effort to meet the GDPR requirement for encrypting all PII data.
Security + Christopher Williams + Jan 24, 2019
There is no doubt that the world of the Internet of Things (IoT) is here to stay. Consumer grade products such as TVs, speakers, toys, wearables, appliances and much more continue to flood the retail space offering enticing features to consumers. Learn how to reduce your attack surface with an IoT security strategy.
Security + Marc Cohen + Jan 10, 2019
In early December, the Department of Homeland Security (DHS), the National Cybersecurity and Communications Integration Center (NCCIC), and the Federal Bureau of Investigation (FBI) issued an alert regarding SamSam ransomware. Threat actors exploit Windows servers to gain persistent access to a victim’s network, utilizing SamSam to infect all reachable hosts.
Cloud + ePlus Networking Team + Dec 11, 2018
SD-WAN is here to stay. According to International Data Corporation (IDC), worldwide revenue for software-defined wide-area networking (SD-WAN) infrastructure and services is expected to reach $8.05 billion in 2021 - compare that to approximately $500M in 2017.
Security + Paul Lenhard + Dec 4, 2018
As 2018 comes to an end, threat actors continue to drive campaigns in hopes of catching shoppers, and the industry, off guard. With the increase in IoT devices for both personal and business use, we must ensure we remain protected while we ourselves, or our employees, are online.
Cloud + Justin Mescher + Nov 29, 2018
As organizations continue to rapidly adopt cloud services, they are undergoing countless changes such as consumption-based cost models, security, ongoing optimization, cloud architecture considerations, and procurement options. All of these changes can be concerning which can be an inhibitor to cloud adoption for many customers. Amazon Web Services (AWS) just took a huge step in easing some of this pain with the release of AWS Marketplace Consulting Partner Private Offers Program.
Artificial Intelligence + ePlus Networking Team + Oct 19, 2018
A new class of storage has arrived, one that’s predictive and poised for the future. It is future-proofed, standardized on Non-Volatile Memory Express (NVMe) and storage-class memory (SCM) for speed and performance gains. These storage innovations are powering reliability in enterprise workloads that depend on performance and speed. With more than 4.4 zettabytes of data — and 450 billion business transactions per day by 2020 demand for fast, reliable, and predictive storage couldn’t come at a better time.
Artificial Intelligence + ePlus Networking Team + Oct 19, 2018
Storage optimization isn’t just a data problem, it’s an application issue if storage latency degrades app performance. As many as 61 percent of companies say faster app and IT service delivery are significant initiatives. Yet core to both of those goals is data availability, and legacy storage can be a hindrance that leads to costly application downtime if storage reliability isn’t addressed.
Artificial Intelligence + ePlus Networking Team + Oct 19, 2018
Artificial intelligence (AI) is making significant inroads in the data center, transforming manual tasks into automated ones that save time and optimize the overall health of the IT system. With so much to be gained from AI, it’s no wonder that IDC estimates that spending on this technology will grow to $19.1 billion in 2018.
Security + Paul Lenhard + Oct 17, 2018
We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.
Security + Russ Ortmann + Oct 11, 2018
Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.
Security + Russ Ortmann + Sep 20, 2018
One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.
Security + Lee Waskevich + Aug 24, 2018
If you were a hacker, how would you infiltrate a well-protected target? How would you get inside an organization that has a solid security framework and has invested millions in cyber security?
Security + Lee Waskevich + Aug 15, 2018
Data breaches in the retail sector are well-known and widely covered by the media—we all remember hearing about Target, Home Depot, and TJ Maxx. But with recent breaches at Panera Bread and Hudson’s Bay Company (owners of Saks Fifth Avenue and Lord & Taylor), we see that retail will continue to be a popular and prevalent target for cyber thieves. To avoid becoming the next victim, you must remain diligent and take action now.
Security + Lee Waskevich + Aug 8, 2018
Ransomware attacks hit us hard in 2017. SamSam, WannaCry, NotPetya, and other variants infected computers around the world, locking up systems, disrupting operations, and of course, extorting large sums of money from victims
Security + George Pashardis + Aug 7, 2018
As an industry with strict privacy and security regulations, healthcare is challenged to implement increased cybersecurity measures to mitigate current threats. Failure to protect confidential information can result in fines amounting to millions of dollars. So whether you’re an IT security professional or the CIO of a hospital, medical university, health clinic, insurance company or a third-party organization involved in the industry, a robust Data Loss Prevention strategy should be a critical part of your security program.
Security + Justin Bodie + Jun 21, 2018
With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.
Security + George Pashardis + Jun 13, 2018
When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I've taken time to really think about what I saw and heard.
Artificial Intelligence + Zeki Yasar + Jun 8, 2018
With so many technologies and moving parts involved in a Deep Learning project, many times stitching these components together and other manual infrastructure work along the path of experimentation to consumption can create significant challenges.
Security + Lee Waskevich + May 30, 2018
Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.
Security + Marc Cohen + Apr 26, 2018
Identity management is a fundamental part of an effective security program. And, given the risks out there, it’s essential for protecting your organization against today’s cyber threats.
Artificial Intelligence + Zeki Yasar + Mar 27, 2018
The concepts behind AI and Deep Learning are not new, but until recently the application of Artificial Neural Networks has been limited and impractical. What has changed over the past couple of years is we now have the data, use cases, Deep Learning software tools, and powerful, specialized hardware that allow for us to create AI applications never before possible.
Security + Russ Ortmann + Mar 26, 2018
Freshly installed operating systems and network-connected devices, by default, are usually configured for ease of deployment and ease of use. This means that the security controls are set to the least restrictive settings to ensure users experience little to no issues deploying their products. While this is great from the deployment perspective, it is not so great from the security perspective. Default admin accounts, unused protocols, and unnecessary pre-installed software can all be exploited in their default configuration.
Security + Marc Cohen + Feb 22, 2018
Keeping your account information secure is the vital first step to good security hygiene. Below are some easy steps that can help keep your accounts safe. Much of the advice applies to both employees in an organization as well as to individuals’ personal online security.
Networking + ePlus Networking Team + Feb 13, 2018
Network endpoint growth is explosive due to the surge in mobility and Internet of Things (IoT) devices. In today’s always-on world, work/life lines have blurred thanks to smartphones, laptops, and other devices that can be used for work. Along the same lines, companies need to be able to host these devices — especially companies that have a bring-your-own-device (BYOD) policy — on their own networks and, in some situations, provide remote access, while keeping networks and data safe in the process.
Cloud + ePlus Cloud Team + Feb 13, 2018
Just because businesses are driven by mobile technology and the cloud doesn’t mean that every company can afford an extensive networking staff to support it. To meet escalating connectivity demands with limited resources, our team at ePlus recommends simplified, mobile-first network design that integrates advanced security and control from the start.
Cloud + ePlus Cloud Team + Feb 13, 2018
Today's companies need the ability to accelerate application development in order to keep up with the competition. But that's difficult to do with aging infrastructures filled with slow applications that bring workloads to a crawl. To have any chance at innovation, more and more companies are moving to a hybrid infrastructure.
Collaboration + ePlus Networking Team + Feb 13, 2018
Two-thirds of enterprises report that improving IT efficiency is a top business priority.[1] In addition, 68 percent of IT managers in the same Forrester Research study state that cutting costs is critical. So how does an organization improve IT efficiency and reduce spending?
Healthcare + George Pashardis + Feb 7, 2018
Despite the frequent headlines and all the hype that goes with them, blockchain is a difficult concept for many people to understand. Is it a technology or is it a new currency? Is it reality or is it just hype? As with many new things in the technology world, it’s easy to get confused initially, depending on how much information and education is available in the beginning. Two things that I can tell you is that blockchain is becoming disruptive and a lot of industries (Financial, Insurance, Healthcare, Music Industry, Airline Industry and even governments) are adopting or testing it.
Security + Russ Ortmann + Feb 1, 2018
In my last blog post, I discussed the history of the CIS 20 Critical Security Controls and the relevance they hold for organizations today. In my second post on this topic, let’s dive a bit deeper in CSC 2 security control, which is very tightly aligned with CSC 1 (Inventory of Authorized and Unauthorized Devices) control.
Cloud + Wayne St. Jacques + Jan 19, 2018
I think we all agree that a successful cloud strategy is important today. In fact, for most organizations, it's imperative. Global competition and rising costs are driving businesses large and small to explore ways to integrate more cloud services into their operations. In fact, according to Gartner, the public cloud services market will reach $246 billion in 2017, an 18% increase from 2016.
Security + ePlus Security Team + Jan 18, 2018
In 2017, the industry saw the birth of security automation. As it continues to grow from infancy into something more robust, now is a good time to reflect on what it is and what operational impacts it is having on our systems.
Security + Paul Lenhard + Jan 12, 2018
As most of you are aware by now, researchers have discovered a set of critical vulnerabilities in all Intel CPU hardware, currently impacting the vast majority of devices in the wild. These devices include desktops, servers, mobiles devices and appliances, regardless of Operating System and whether they are located in the cloud or on premises.
Security + Russ Ortmann + Jan 4, 2018
The modern world of information security can often be a confusing one. Security practitioners are continually inundated with a barrage of data coming from reports, alerts, security tools, threat feeds, and more. At the same time, they are trying to align this data with the multiple security requirements, regulatory mandates, best practices, and frameworks that define their environment. Unchecked, the sheer volume of information can easily paralyze an organization from taking action when necessary. The ‘Fog of More’ can essentially become the larger threat to the environment.
Security + Paul Lenhard + Dec 14, 2017
As we get closer and closer to ringing in the New Year, threat actors remain very busy attempting to intrigue us with phishing campaigns that promise great deals on products and services. In an effort to keep these final weeks of 2017 as joyful as possible, below are a few tips to stay ahead of the Grinch as he looks on with a malicious grin over your data.
Artificial Intelligence + ePlus AI Team + Nov 30, 2017
“Big data.” “Data analytics.” “Big data analytics.” All of us are familiar with these terms, aren’t we? In fact, these words have been part of our vocabulary for long enough that they sometimes get used interchangeably. But that can lead us to make some false assumptions.
Security + ePlus Security Team + Nov 30, 2017
For nearly ten years, I’ve looked forward to the release of Verizon’s annual Data Breach Investigation Report (DBIR). With its analysis on the thousands of breaches and incidents from across the globe, occurring over its last full revolution around the sun, which cybersecurity pro among us does not look forward to such a treasure trove of insights and predictions to guide our focus for the coming year?
Cloud + ePlus Cloud Team + Nov 27, 2017
In looking at definitions of DevOps, I found a general consensus that DevOps is primarily about enabling “cultural shifts” and increasing “collaboration” among technology development and operations/infrastructure teams. A much smaller emphasis is placed on the automation processes around delivering software and infrastructure changes. While I know I’m going to ruffle some feathers with this view, I am going to say it: we need to stop confusing the process efficiencies needed to reach DevOps excellence with the need for broader (and important!) organizational change.
Cloud + ePlus Cloud Team + Nov 27, 2017
There is a veritable cloud gold rush occurring today. CIOs are declaring “cloud-first strategies” while companies are pasting “cloud” onto any and every product they have. Their hope is to hit pay dirt amid uncharted and widespread IT transformation. As with most euphoric and rapid endeavors, reality is setting in for those who have made the journey to the cloud. Big payouts require work. For the cloud, a lot of that work happens at the application level.
Security + Mark Pellechio + Nov 10, 2017
Organizations are inundated with the latest security solutions and “expert” opinions on what they should be doing. In many cases, it might make more sense to take a step back and decide on a framework to map your current security posture against and get back to basics in developing solid cyber hygiene. One of these frameworks would be the Critical Security Controls (CSC) published and maintained by the Center for Internet Security (CIS).
Artificial Intelligence + ePlus Security Team + Nov 1, 2017
Are you struggling with security? If so, you’re not alone. Security gets harder every year. Thanks to digital business and mobility, you need to guard more attack vectors than ever before. Product updates and new software innovations often result in new vulnerabilities—and hackers are getting craftier and more adept at exploiting them.
Security + Bryce Floyd + Oct 18, 2017
Well it’s been an interesting start to the week to say the least. We all woke up Monday to read about a new wireless vulnerability labeled KRACK, or key reinstallation attack.
Security + Paul Lenhard + Oct 4, 2017
March 1, 2017 marked the date in which the NYS Department of Financial Services announced their compliance requirements for all covered entities that do business in New York State
Artificial Intelligence + ePlus AI Team + Oct 2, 2017
You can’t go to a conference or look at an article without hearing or reading something about data analytics. As an industry, we’ve gone from the recognition that we have all of this data (i.e. Big Data) to focusing on how to derive insight and value from that data. It’s been part of our world for so long that the term “Big Data” isn’t used in the same way it was before —we just talk about data. The scope and complexity of it is understood.
Collaboration + Ken Farber + Sep 27, 2017
Today, most organizations struggle through a myriad of complexities associated with purchasing and managing software licenses. Apart from dealing with differing termination dates and compliance, the permissible usage of a license can also be governed by elements such as named users, concurrent users, perpetual use, subscriptions, and negotiated volume discounts. Licenses can also be tied to specific hardware devices limiting the manner by which they may be transferred.
Security + Bill Wheeler + Sep 21, 2017
Ever feel like you’re fighting a losing battle? Your organization is pretty diligent when it comes to security. You have firewalls at the perimeter between your internal networks and the Internet. You have an anti-virus product deployed on every laptop, desktop, and server within your organization and the updates are kept current. You may have even deployed an application-aware next generation firewall, an IPS, or a SEIM/SEIM to collect and correlate security events from many data sources. Yet, despite your best efforts, your end users still manage to become infected with malware—or perhaps even ransomware. You may ask yourself, “With all of this protection in place, how is this possible?”
Cloud + Sam Curcio + Sep 14, 2017
Want to move more data and apps into the cloud, but you’re hesitant to do so because of security? It’s a valid concern. After all, protecting your sensitive data is your responsibility. When you put your data in the cloud, you’re taking a risk. It’s a calculated risk, one you’ve thought about carefully. But nonetheless, it’s still a risk.
Security + Justin Bodie + Sep 12, 2017
The world is changing rapidly, and we’re starting to see cracks in the security controls we’ve come to rely on in our digital society. Even Equifax, one of the largest credit reporting organizations out there, has suffered a data breach. I’m often asked by friends and family how I react to the news and what I recommend, so I thought I’d share my suggestions with you
Security + ePlus Security Team + Sep 11, 2017
Information security is a top concern in every industry. In 2015, the percentage of reported data breaches caused by hacking incidents increased 8.4 percent over 2014 numbers to reach the highest value in nine years (37.9 percent), according to a report from the Identity Theft Center. Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
Networking + ePlus Networking Team + Aug 30, 2017
Downtime is an ugly word in IT, unless you’re talking about taking a vacation. It’s negative. No user wants to hear it or suffer the consequences of it. None of the IT managers that I know want to walk into an executive’s office and utter the words, “We’re down.”
Security + ePlus Security Team + Aug 15, 2017
According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.
Healthcare + George Pashardis + Jul 10, 2017
According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).
Cloud + ePlus Cloud Team + Jun 28, 2017
Stop by our booth at Cisco Live and meet the new ePlus OneCloud team; Sudheesh Subhash, Manish Tandon, Anjali Tyagi, and Desi Acosta! We are in Booth T12 in the Solutions Showcase – right near the House of Brews!
Cloud + ePlus Cloud Team + Mar 29, 2017
Simon Sinek, well-known author, speaker, and consultant, made headlines a few years ago with his business book (and extremely popular Ted Talk) titled Start with Why. In his presentation, Simon explains his belief that companies must understand what they do and how they do it. But more importantly, they first need to understand why they do it.
Security + Lee Waskevich + Mar 16, 2017
Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it's having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.
Networking + ePlus Networking Team + Mar 2, 2017
We hear a lot about network programmability these days. It's a popular topic at conferences and a common subject in articles and blogs. Many experts and industry analysts are writing and talking about it, mostly in connection with a broader discussion about industry trends and software-defined networking (SDN).
Security + Wayne St. Jacques + Feb 10, 2017
I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.
Networking + ePlus Networking Team + Feb 9, 2017
What is your strategy for software-defined networking (SDN)? Are you just starting to think about it? Are you already utilizing the technology and realizing the benefits it has to offer? Or do you have the building blocks in place but haven't yet made the transition?
Security + ePlus Security Team + Jan 12, 2017
New cybersecurity regulations go into effect for financial services companies in the state of New York on March 1, 2017. And the time to act is now.
Security + ePlus Security Team + Jan 6, 2017
Ransomware attacks are increasing. And it’s costing U.S. companies millions to extract themselves from the clutches of these blackmailers—to the tune of $209 million in the first three months of this year, according to information provided to CNN by the Federal Bureau of Investigation (FBI).
Security + ePlus Security Team + Jan 6, 2017
Beware of the insider threat. For those of us in information security, those words represent sage advice we’ve heard (and given) for years. Long before Eric Snowden and the incident involving the National Security Agency (NSA) hit the headlines.
Security + ePlus Security Team + Dec 13, 2016
If you work in the area of IT security—or manage teams of people who do—I bet you’ve heard these statements before (or something similar): We’re constantly battling malware. Although we keep our antivirus software up to date, malware continues to get through. What else can we do?
Networking + ePlus Networking Team + Dec 2, 2016
Not long ago, wireless access was a novelty—a cool way to disconnect from a cubicle at work, so you could move around the building or collaborate with colleagues in a conference room and still have access to the applications and data you needed to do your job. Needless to say, much has changed since then.
Data Center + ePlus Data Center Team + Oct 28, 2016
While not widely adopted yet, Software-defined WAN (SD-WAN) solutions are intriguing, and the technology continues to gain buzz in the marketplace. And it only makes sense that it would. After all, SD-WAN offers to simplify WAN operations, to improve application performance, and to lower costs.
Security + ePlus Security Team + Oct 14, 2016
Your business depends on applications and data. In today’s digital age, both are vital assets, and protecting them against cyber attacks is essential. But as you know, staying ahead of cyber threats is a never-ending job, and one that seems to get more difficult every day.
Security + ePlus Security Team + Oct 14, 2016
SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.
Security + ePlus Security Team + Sep 30, 2016
Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
Security + Nick D'Archangelo + Sep 30, 2016
Summer break is over, and the new school year is underway. If you’re like most school districts, you’ve had a busy summer, performing much needed system maintenance and installing or upgrading technology for the upcoming year.
Services + Wayne St. Jacques + Aug 19, 2016
The 2016 Olympic Games are winding down, and the competition has been exciting. I love watching the Olympics. What I appreciate most is hearing the stories of the athletes and their coaches. Their hard work, dedication, commitment to excellence, and competitiveness inspire me. And in my own way, I can relate to how difficult global competition can be.
Security + ePlus Security Team + Aug 5, 2016
Without question, today’s threats are more sophisticated than their predecessors. Cyber criminals have become experts at utilizing innovative techniques and social engineering to breach common layered-security defenses, implanting malware throughout corporate networks and stealing information.
Financing + Nick D'Archangelo + Jul 15, 2016
In the face of increasing demand for new and better service levels, administrators and educators are constantly challenged to do more with less. Technology innovation helps managers meet this growing demand as well as increase efficiency, improve productivity, and reduce costs.
Financing + Andrew Norton + Jul 15, 2016
In the face of increasing demand for new and better service levels, administrators and educators are constantly challenged to do more with less. Technology innovation helps managers meet this growing demand as well as increase efficiency, improve productivity, and reduce costs.
Artificial Intelligence + Jim Murray and Joe DiPentino + Jul 14, 2016
New use cases for video data have emerged. And camera technology has improved, offering onboard analytics and 360-degree monitoring of viewing areas at a price point more affordable than ever before. As a result, more cameras are being deployed by both public and private entities alike.
Data Center + Ken Farber + Jun 17, 2016
The digital business era is here and more than ever, IT must be agile, innovative, and efficient in order for our businesses to compete.
Security + ePlus Security Team + Jun 3, 2016
In 2015, the number of zero-day vulnerabilities discovered increased 125 percent from the year before, according to data compiled by Symantec. In addition, massive data breaches were again reported last year, resulting in an estimated 429 million identities exposed to cyber villains. That’s a huge number.
Services + David Kloes + Jun 3, 2016
In professional services, your people are your product. Their skills, knowledge, and experience are what separate you and your company in the marketplace. Attracting talented people and retaining them are essential, and your managers play a pivotal role.
Cloud + Scott Gilgallon + Apr 28, 2016
The promise of the cloud is compelling, and more companies are making the leap than ever before. In fact, Gartner predicts the worldwide public cloud services market will grow 16.5 percent in 2016 to total $204 billion. Those numbers are not surprising, given the tremendous opportunities made possible by cloud services.
Security + Heather Axworthy + Apr 15, 2016
Sales of smartphones totaled 1.2 billion units in 2014. We can all agree that is no real surprise. Ours is a society increasingly on the move. And these devices help to improve our productivity, both personally and professionally, and to satisfy our basic human need for instant gratification.
Services + ePlus Networking Team + Apr 1, 2016
The marketplace is shifting. Competition is dropping in nearly every industry. As a result, companies are turning their focus away from customers and fixing their attention inward, savoring their market dominance and building rigid, hierarchical organizations that move at a snail’s pace. Did I forget to mention today is April Fool’s Day?
Security + ePlus Security Team + Mar 18, 2016
The biggest threat to your company’s information security could be sitting two cubicles away from you. Make no mistake. Outside threats are real and shouldn’t be ignored. But the greatest risk to enterprise information security today is the insider threat.
Cloud + Wayne St. Jacques + Mar 4, 2016
There is little separation between business and IT, making the latter an increasingly vital component for business success. That fact, coupled with heightened market pressure, technology-savvy consumers, increased IT complexity, and the on-going need to find new ways to optimize OpEx spend, has shifted the conversation away from simple device management to strategic value and lifecycle management.
Services + Lori Kasper + Mar 4, 2016
ePlus has an obsession, albeit a very healthy one, for your company's managed IT environment. Our obsession with excellence in ensuring that your critical systems are secure and reliable garnered ePlus its sixth consecutive Type 2 SSAE 16 for our Managed Services Center.
Security + ePlus Networking Team + Dec 18, 2015
I read an article the other day about a technology product. It’s a well-known brand, so I won’t use the company name. The piece caught my attention because it used a well-worn phrase in the content: “…align IT with the business…”
Artificial Intelligence + ePlus AI Team + Dec 18, 2015
All I want for the holidays this year is an outcome! As an engineer at heart I love the technical details of a product or a solution. But a long time ago I realized that the outcome—solving the business problem—was much more important than the technical specifications.
Security + John Reckner + Dec 2, 2015
Data is the life blood of nearly every business. But, what if something happened to that data or it fell into the wrong hands? Want to do analytics on your structured and unstructured data? Good luck if that data is lost, stolen, corrupted or sabotaged.
Collaboration + Sonny Hudson + Dec 2, 2015
With advancements in UC/Collaboration technology over the years, especially over the last decade, a whole plethora of applications have emerged to help users stay better connected with their customers, their suppliers, and their coworkers. But, only if they are used.
Security + Lee Waskevich + Oct 16, 2015
I speak to customers regularly about security, and one of the first questions I always ask them is, “What are the two most popular applications you use on a daily basis?” And the majority of the time, the answer I get is web and email.
Preparation and success go hand in hand.
Connect with us or use the form.
+1 888-482-1122