All 
AI 
Artificial Intelligence 
Cloud 
Collaboration 
Data Center 
Education 
Financing 
Healthcare 
Managed Services 
Networking 
Security 
Security Blog 
Services 
Staffing 
Alyssa’s Law

Collaboration + Bryan Payne + Nov 14, 2024

Alyssa’s Law

We have all heard about tragic events at schools, universities, and workplaces. When a threat to life and safety occurs, how we react and how quickly we react matters. Technologies are available today that can enhance emergency preparedness and the ability to communicate with large numbers of people in an emergency or crisis, including external emergency resources.

Read more

Stay Cyber-Safe This Holiday Season: Essential Tips for Protecting Your Digital World

Security + Paul Lenhard + Nov 14, 2024

Stay Cyber-Safe This Holiday Season: Essential Tips for Protecting Your Digital World

The 2024 Holiday season is right around the corner. Cyber Security Awareness month provides us with reason to pause and ensure we enter the Season prepared. Fortunately, it looks like the ports will be open for business, ensuring that goods will be shipped to those loved ones and friends on time. Online shopping continues to be the primary source of Holiday spend.

Read more

How to Lower Business Risk with SaaS Providers

Security + Jim Bundy + Nov 7, 2024

How to Lower Business Risk with SaaS Providers

SaaS plays a fundamental role in our modern technology ecosystem and elevates the need for mature IT processes. Nearly every organization relies on SaaS for some part of service delivery, but dependency on these solutions cannot override adherence to IT processes. Because if organizations become too complacent, they run the risk of a vendor outage affecting their ability to do business with their customers.

Read more

Why AI Success Depends on Data Governance

Security + Jessy Gonzalez + Oct 29, 2024

Why AI Success Depends on Data Governance

Artificial intelligence (AI) offers unprecedented possibilities. But with opportunity comes risk. Whatever you do with AI, make sure you have proper guardrails in place before you start.

Read more

ePlus + Varonis – Your Guide to a Successful Microsoft 365 Copilot Implementation

Security + Lee Waskevich, ePlus and Avia Navickas, Varonis + Oct 24, 2024

ePlus + Varonis – Your Guide to a Successful Microsoft 365 Copilot Implementation

Generative AI has the potential to improve arguably every industry, but with its productivity gains come new data security risks to mitigate and monitor. In this blog, we’ll share how ePlus and Varonis work together to help organizations adopt gen AI intelligently and with confidence.

Read more

Best Practices for Creating Custom Roles in Azure

Cloud + Jonathan Davis + Oct 21, 2024

Best Practices for Creating Custom Roles in Azure

From time to time, developers need custom Identity and Access Management (IAM) roles in Azure—typically to perform a specific activity in the lower lifecycles that isn't covered by a built-in role. Learn more about tools to safely deliver nearly any scenario and best practices to develop clear requirements, test fully, and enable application developers to more successfully execute their jobs.

Read more

How ePlus Security Academy Became the Foundation of My Security Career

Security + Jeremy Jackson + Oct 16, 2024

How ePlus Security Academy Became the Foundation of My Security Career

When I moved to Chesapeake, VA in 2018 I was already 12 years into my IT career. Up until then, the majority of it had been spent as a systems administrator for several customers within a variety of types of organizations. Every day was a bit of a mystery in terms of what I might have to deal with. All of that changed in 2018...

Read more

NVIDIA AI Platforms: Understanding the Acronyms and Terminology

Artificial Intelligence + Sudheesh Subhash + Oct 11, 2024

NVIDIA AI Platforms: Understanding the Acronyms and Terminology

Choosing the right infrastructure for your AI workload begins with understanding the options available to you, which can be confusing if you’re not familiar with the language.

Read more

Introduction to AI Infrastructure

Artificial Intelligence + Sudheesh Subhash + Sep 27, 2024

Introduction to AI Infrastructure

Whether you're running machine learning (ML) models, processing large datasets, or deploying AI-driven applications, the foundation of your success lies in the infrastructure you build.

Read more

Cybersecurity Technology Consolidation – A Balanced View

Security + ​Lee Waskevich + Sep 5, 2024

Cybersecurity Technology Consolidation – A Balanced View

Is a best-of-breed strategy still the best approach to cybersecurity? For over 20 years, the cybersecurity community has been conditioned to choose best-of-breed security solutions. After all, when a new threat emerges, it’s only logical to want the best protection available to combat that threat.

Read more

Disaster Recovery and “Bubble” Testing

Managed Services + Jonathan Davis + Aug 9, 2024

Disaster Recovery and “Bubble” Testing

As we’ve studied Disaster Recovery-as-a-Service (DRaaS) over the last few years it was hard to find a consistent approach to testing, even the most basic testing. In disaster recovery, we typically refer to isolated testing as “Bubble” testing. Workloads are made available in a disconnected network for limited (or possible extensive) testing to ensure they are in a strong position for recovery.

Read more

Maximizing Network Performance: The Value of Network Assessments for Enterprise Class Clients

Networking + Bob Brewer + Jul 30, 2024

Maximizing Network Performance: The Value of Network Assessments for Enterprise Class Clients

The network infrastructure forms the backbone of enterprise operations. As enterprise-class clients strive for seamless connectivity, robust security, and optimized performance, the importance of conducting comprehensive network assessments cannot be overstated. Network assessments serve as a vital tool for organizations to gain valuable insights, identify vulnerabilities, and make informed decisions to enhance their network infrastructure.

Read more

Tales from Gartner Summit

Security + Chris Hayner + Jul 23, 2024

Tales from Gartner Summit

Members of the ePlus Security team recently attended the Gartner Summit and came back even more excited to help our customers achieve stronger security postures. There are a few main themes that emerged from this year’s Gartner Security and Risk Summit. Let’s discuss...

Read more

Aligning Healthcare IT Strategy with Better Outcomes

Healthcare + Ken Puffer + Jul 22, 2024

Aligning Healthcare IT Strategy with Better Outcomes

In the United States, healthcare organizations are navigating a path to elevate patient care and fortify data security amidst evolving challenges. The strategic deployment of IT upgrades has become integral to this journey. The onset of the COVID-19 pandemic brought these challenges into sharp focus, particularly for the healthcare sector, accelerating the search for innovative IT solutions.

Read More

How to Ensure a Successful Proof of Concept for AI

Artificial Intelligence + Justin Mescher + May 28, 2024

How to Ensure a Successful Proof of Concept for AI

Feeling pressured to spin up an AI pilot quickly? If you are, you’re not alone. After all, it’s easy, right? Just turn it on and see what happens. Many analyst firms and vendors claim this is the year when AI proves its value, which is adding even more pressure on companies to get started. But rushing into a pilot project—or a proof of concept (POC)—without first doing the necessary groundwork is risky. Here’s how you can set yourself up for success.

Read more

To Build or to Consume? Selecting the Right Option for Your AI Initiative

Artificial Intelligence + Justin Mescher + Apr 29, 2024

To Build or to Consume? Selecting the Right Option for Your AI Initiative

If you’ve been following our AI series, we have covered the art of the possible, reviewed how to get started, defined a use case, and assessed AI preparedness. At this point, we arrive at the first inflection point in the AI journey: Do we build the infrastructure needed to support our use case or consume it from a service provider?

Read more

ePlus Achieves AWS Migration Competency

Cloud + Andy Ritter + Apr 8, 2024

ePlus Achieves AWS Migration Competency

We are thrilled to announce that ePlus has been recognized with the AWS Migration Competency for our proven methodology of migrating and modernizing applications to AWS. This recognition further establishes ePlus as a trusted and valued AWS partner, with over eight years of collaboration and nine recognitions from AWS based on the positive results we provide our customers.

Read more

Prepared for AI? Check Your Readiness in These Areas and Find Out

Artificial Intelligence + Justin Mescher + Apr 2, 2024

Prepared for AI? Check Your Readiness in These Areas and Find Out

In the last blog, I covered the importance of a well-defined use case for AI. Because without a clear use case, the next step in the AI journey—AI preparedness—would be difficult to determine at best and nearly impossible at the worst. How do you know if you are prepared to support AI in your organization? As I mentioned earlier, the answer depends on your use case.

Read more

HIMSS24 Top Takeaway: Making Sense of How, Where and When to Use AI

Healthcare + Ken Puffer + Apr 1, 2024

HIMSS24 Top Takeaway: Making Sense of How, Where and When to Use AI

The annual HIMSS (Healthcare Information and Management Systems Society) conference, labeled HIMSS24, was held in the Orange County Convention Center in Orlando, Florida. While educational sessions were running with several focus areas, Artificial Intelligence (AI) took center stage. AI captivated attendees with its potential to impact healthcare organizations. Read more about how.

Read more

Defining AI Use Cases

Artificial Intelligence + Justin Mescher + Mar 13, 2024

Defining AI Use Cases

The promise of AI is alluring—there are so many exciting, intriguing possibilities (and attractive advertising), who can resist wanting to dive in? But if AI is going to be your business partner, what kind of partner will it be? That depends a lot upon your use case(s). Let’s explore five steps to help you think through and define an AI use case.

Read more

Getting Started on Your AI Journey

Artificial Intelligence + Justin Mescher + Feb 21, 2024

Getting Started on Your AI Journey

When it comes to AI use cases, the possibilities are endless. Best practices for deploying AI-powered technologies to deliver business value, however, depend on your organization and its goals. How do you get started? Begin by developing a strategy based on your desired outcomes and use cases, which will allow you to properly evaluate your AI preparedness and create a path to success.

Read more

Hope Is Not A Strategy: Compliance and Risk in the Age of AI

Security + Robert Thomas + Feb 20, 2024

Hope Is Not A Strategy: Compliance and Risk in the Age of AI

It’s 2024 and AI is everywhere. The recent Consumer Electronics Show in Las Vegas had AI added to everything - grills, backpacks, televisions, cars. For those (like me) who are old enough to remember the early, halcyon days of the internet, it's the same hype cycle. AI is transforming everything, those who hesitate will be left behind, so forth and so on.

Read more

Unmanaged APIs: The Hidden Security Threat to Your Business

Security + David Tumlin, ePlus and Leif Rasmussen, F5 + Feb 12, 2024

Unmanaged APIs: The Hidden Security Threat to Your Business

Application programming interfaces (APIs) have redefined how businesses connect and scale apps for their users, customers, and partners at large. By providing a standardized interaction layer between software and systems, APIs have drastically improved how organizations consume, integrate with, and create digital experiences. But they come with inherent risk. While APIs modernize application delivery, they have become prime targets of cyberattacks and can introduce new vulnerabilities that must be accounted for. Successfully protecting apps from emerging threats requires businesses to properly manage, control, and secure this growing API layer.

Read More

Unlocking the Full Capability of AI

Artificial Intelligence + Sudheesh Subhash + Feb 1, 2024

Unlocking the Full Capability of AI

The story in 2023 was artificial intelligence (AI). With the emergence of ChatGPT, generative AI has all but taken over the tech world, and the possibilities are incredible. All indicators point to exponential AI growth as we move into 2024. Unlocking the full capability of AI, however, takes planning and preparation, and 86% of companies globally are not prepared to fully leverage the technology.

Read more

Tabletop Exercises: The Best Risk Mitigation Strategy You Aren’t Using (Yet)

Security + Robert Thomas + Jan 3, 2024

Tabletop Exercises: The Best Risk Mitigation Strategy You Aren’t Using (Yet)

In the ever-evolving landscape of cybersecurity threats and business uncertainties, the significance of preparedness cannot be overstated. Of all the strategies used to prepare employees and key third parties for a cybersecurity incident, tabletop exercises are consistently thought to be the best method for training. During the tabletops we have performed for our clients, some trends have become apparent.

Read More

ePlus Achieves AWS Resilience Competency, Underscoring Expertise in Resilience, Business Continuity Planning and Disaster Recovery

Cloud + Andy Ritter + Nov 30, 2023

ePlus Achieves AWS Resilience Competency, Underscoring Expertise in Resilience, Business Continuity Planning and Disaster Recovery

ePlus is proud to announce its recognition by the AWS Resilience Competency Program for its technical expertise and proven customer success. The AWS Competency Program is an AWS Specialization Program, validating ePlus’ partner expertise in delivering specialized professional services across industries, use cases, and workloads.

Read more

Staying Secure During the Holidays

Security + Todd Redding + Nov 16, 2023

Staying Secure During the Holidays

The holiday season is meant to bring out the best in all of us. It is the season we celebrate thankfulness, grace, light, and the new beginnings of a whole new year. Unfortunately, bad actors can see our good mood as an opportunity to take advantage of us. So how do we keep the joy in the season? Read more for some tips to help protect yourself and your information during the holiday season.

Read More

ePlus Helps Broadband Service Providers Add Value in Underserved and Rural Communities

Networking + Todd Gingrass + Nov 6, 2023

ePlus Helps Broadband Service Providers Add Value in Underserved and Rural Communities

The Service Provider Group at ePlus brings the knowledge of carrier-grade infrastructure and how those architectures can be applied to varying market verticals with a continued emphasis on service provider networking. The combined organization provides access to more than 2000 industry manufacturers, enhancing the services and solutions extended to broadband providers and bringing more options to new and existing customers.

Read more

Navigating the New SEC Cybersecurity Rules: How Incident Management Services Can Help

Security + Corey Wilburn + Nov 1, 2023

Navigating the New SEC Cybersecurity Rules: How Incident Management Services Can Help

In an era of ever-increasing cyber threats, the Securities and Exchange Commission (SEC) is taking strides to safeguard investors from the financial ramifications of cybersecurity incidents. Recently, the SEC introduced new regulations mandating that public companies disclose significant cybersecurity incidents within four business days of detection.

Read More

How to Achieve a 90% Azure Health Score?  It’s All About Assessments

Cloud + Jack McVickar + Oct 30, 2023

How to Achieve a 90% Azure Health Score? It’s All About Assessments

The cloud is a fantastic resource, but it also poses challenges. Staying abreast of the 300+ Azure services and 38 weekly service updates is no easy task. This is where ePlus Cloud Managed Services (ECMS) comes in—with an experienced team focused on Azure, every day. Typically, our assessments reveal an average health score of around 60% before remediation, but after we address the issues, environments often reach the high 90% mark with emphasis on security, architecture, and financial elements.

Read more

The Significance of a Resilient and Reliable Disaster Recovery and Business Continuity Plan – A Customer Perspective

Cloud + Jack McVickar + Oct 18, 2023

The Significance of a Resilient and Reliable Disaster Recovery and Business Continuity Plan – A Customer Perspective

Recently, a major healthcare organization found itself in the eye of the storm when it fell victim to a devastating cyberattack. As a technologist, I couldn't help but wonder how their systems, including their website and phone lines, seemingly crumbled under the assault. Several weeks later, as I write this blog post, they are still striving to recover their systems and restore normalcy. As a patient, I share the concern of many others – was my personal data compromised, and how can such a disaster be prevented in the future?

Read more

Technology Leaders Can Lead the Way on Sustainability

Data Center + Justin Mescher + Sep 12, 2023

Technology Leaders Can Lead the Way on Sustainability

Prioritizing sustainability is important for numerous reasons, including customer demand, increased regulations, and attracting/retaining top talent. While technology leaders can help lead the way by making smart decisions on energy conservation, responsible asset disposal, and efficient data center management, fully operationalizing these strategies to meet company environment, social and government (ESG) goals is often challenging. Here are three initiatives that can have a major impact on an organization’s ability to minimize its environmental impact.

Read more

Pioneering the Next Phase of the Patient Experience Journey

Security + Ken Puffer + Aug 2, 2023

Pioneering the Next Phase of the Patient Experience Journey

Consumer expectations regarding the patient journey have evolved, emphasizing efficiency, digital operability, convenience, and user-friendliness. While some healthcare entities may be hesitant to embrace change and modernize long-established processes, others recognize the imperative of updating and adapting the user experience to re-engage patients and reassess care delivery by embracing recent advancements. Leveraging technology, hospitals can fundamentally enhance the patient experience, enabling them not only to survive but also to thrive amidst these paradigm shifts. Read more on three key areas of focus for hospitals seeking to enhance user experience in 2023 and beyond.

Read more

AI and Collaboration Series:  How AI is Helping Improve Customer Interactions

Artificial Intelligence + Bryan Payne + Jul 9, 2023

AI and Collaboration Series:  How AI is Helping Improve Customer Interactions

Artificial intelligence (AI) has been used in Customer Experience and Contact Center platforms for over 20 years. Data-driven predictive routing, self-service chatbots, and real-time agent assistance via big data are several key benefits that have improved customer experience as a result of AI.

Read more

Boost Customer Satisfaction and Cost Savings with Resilient Applications and Infrastructure

Security + Lori MacVittie + Jul 7, 2023

Boost Customer Satisfaction and Cost Savings with Resilient Applications and Infrastructure

Resilience allows organizations to bounce back quickly when the unexpected happens, whether problems arise from human error, technology failures, natural disasters, or cybersecurity incidents. A resilient business can avoid costly downtime, lost revenue, and a damaged reputation.

Read more

Tales from the Road: RSA Conference 2023

Security + Jason Nelson + May 4, 2023

Tales from the Road: RSA Conference 2023

Tales from the Road: RSA Conference 2023. A few main themes emerged from this year’s RSA Conference - artificial intelligence, asset management, DevSecOps, automation and email security. Let’s discuss.

Read more

Supporting Hybrid Work: Automation Reduces Problems and Increases Worker Productivity

Collaboration + Sean Wilson + Feb 22, 2023

Supporting Hybrid Work: Automation Reduces Problems and Increases Worker Productivity

Remote and hybrid work has created the need for reliable video conferencing. It has also created more work for IT and services technicians. That’s where automation comes in. Automation can help organizations reduce meeting delays due to technical problems, enhance user experiences, and increase worker productivity.

Read more

Don't Let Complex Security Regulations Overwhelm You

Security + Ivan Gil + Feb 3, 2023

Don't Let Complex Security Regulations Overwhelm You

Ivan Gil, Senior Information Security Consultant at ePlus, shares his insight on tackling a complex regulatory landscape while enhancing your security posture through virtual CISO services.

Read more

Planning for Microsoft Azure Kubernetes Services (AKS) Upgrades

Managed Services + Kyle Nicolo + Jan 24, 2023

Planning for Microsoft Azure Kubernetes Services (AKS) Upgrades

Regular upgrades to your AKS clusters ensure that you have the latest features, bug fixes, and improvements to security. AKS is one of the few Azure PaaS that require customer-initiated upgrades, and while they are significantly easier than traditional Kubernetes upgrades they still require some planning. In this blog we’ll discuss the pros and cons of two general approaches to AKS upgrades.

Read more

Connect, Protect, Collaborate, and Serve: How Technology Can Improve the Justice System for Everyone

Collaboration + Sean Wilson + Dec 5, 2022

Connect, Protect, Collaborate, and Serve: How Technology Can Improve the Justice System for Everyone

For the courts, technology allows attorneys to meet remotely with litigants. It enables expert witnesses to testify without traveling, and young victims to tell their story without the trauma of facing their accusers. And it makes it possible for citizens to schedule hearings without taking time off from work, arranging for childcare, or finding transportation, which can reduce the number of missed court appearances.

Read more

Stay Safe With Holiday Travel

Security + Lisa Marks + Nov 22, 2022

Stay Safe With Holiday Travel

While there are dangers-a-plenty surrounding our online holiday shopping exploits…(think exposed credit card numbers or intercepted packages)…many people overlook or are unaware of the risks of booking online travel that become prevalent during the holiday season. Don’t let social engineers ruin your vacation. Take a look at these tips when you are booking your holiday travel.

Read more

7 Reasons to Consider SD-WAN Managed Services

Services + Bob Brewer + Nov 11, 2022

7 Reasons to Consider SD-WAN Managed Services

With the introduction of software-defined wide-area networking (SD-WAN), network engineering changed. SD-WAN technology is both transformational and disruptive, and it requires organizations to embrace a new approach to wide-area network (WAN) design and operation—and the roles and responsibilities of network engineers. Engaging a managed services provider (MSP) to manage SD-WAN networks offers several benefits. Here are seven reasons to consider SD-WAN Managed Services.

Read more

WebexOne ’22 Highlights

Collaboration + Dan Farrell + Nov 3, 2022

WebexOne ’22 Highlights

WebexOne ‘22 is proof that remarkable things come in threes. Cisco held their exclusive Collaboration event last week for the third year in a row and announced over 40 new enhancements to the portfolio.

Read more

Making Sense of Governance Data

Managed Services + Jonathan Davis + Oct 20, 2022

Making Sense of Governance Data

Governance tools are powerful, but they can overwhelm an organization with data. Since the original inception of our internally-developed “Ongoing Validation” toolset, we wanted to implement a scoring system to help make data more digestible and practical—to easily identify issues, then remediate as effectively and efficiently as possible. With our recent ECMS release, we’ve debuted a new scoring system and distributed it to all of our current customers as well as those evaluating our service.

Read more

IoT Continues to Grow—Is Your Network Ready?

Networking + Leo Rentzis + Oct 17, 2022

IoT Continues to Grow—Is Your Network Ready?

Smart devices and sensors may provide the technology to collect and transmit data, but they can’t do it if the infrastructure is not capable of handling the workload. Before embarking on an IoT project (or vastly expanding a pilot project), review your IoT strategy and consider how your IT environment will have to change to support it.

Read more

Evolving Beyond Conventional Tooling

Managed Services + Jonathan Davis + Oct 4, 2022

Evolving Beyond Conventional Tooling

At ePlus, we’re fortunate to talk to a wide variety of organizations around their use of Microsoft Azure. It’s absolutely one of my favorite parts of the job. A frequent topic that comes up in conversation is our approach to deliver ePlus Cloud Managed Services for Azure using proprietary tools. Being dependent on external tools can delay the consumption of new Azure features or services at times, whereas ePlus can quickly expand our tooling to accommodate. We’re not forced to wait to see how it fits into someone else’s roadmap.

Read more

Microsoft Network Ranges

Managed Services + Jonathan Davis + Sep 7, 2022

Microsoft Network Ranges

Microsoft owns a lot of IP blocks—at last count ~95K ranges between IPv4 and IPv6. If you've reviewed requirements for a service or application that consumes other Microsoft services, you may be daunted by the need to determine which IP blocks are needed. Microsoft Service Tags allow us to have a concise way of referring to large numbers of IP blocks that are constantly updating in the Azure Firewall and Network Security Groups (NSGs). But some firewalls do not support Azure Service Tags. ePlus has created a handy tool to easily pull the IP blocks for the various Service Tags.

Read more

Tales from the Road: BlackHat 2022 Edition: XDR….XDR Everywhere

Security + Jason Nelson + Aug 25, 2022

Tales from the Road: BlackHat 2022 Edition: XDR….XDR Everywhere

The ePlus Security team was on site at this year’s BlackHat 2022 conference. Read one expert’s take on XDR and the importance of getting back to the basics.

Read more

PaaS Right Sizing

Managed Services + Jonathan Davis + Aug 24, 2022

PaaS Right Sizing

At ePlus, we’re big fans of Microsoft Azure's built-in cost optimization tooling and leverage it heavily. However, there are a few gaps from our view, and we've built tools to help other organizations resolve those shortcomings—one of which is the right sizing of various Platform as a Service (PaaS) instances. Utilizing the full suite of FinOps tooling that ePlus has developed as part of our Cloud Managed Services offering, we have been able to save organizations significantly (typically well past 20% on their average Azure spend, and at times exceeding 50%).

Read more

SD-WAN Part 6: Increased Traffic Visibility for a Modern WAN

Networking + Bob Brewer + Aug 22, 2022

SD-WAN Part 6: Increased Traffic Visibility for a Modern WAN

SD-WAN improves network intelligence and application performance through increased traffic visibility, but it is not a complete network infrastructure monitoring tool. SD-WAN visibility tools can help reduce the amount of time and effort it takes for your network resources to manage your SD-WAN infrastructure by applying intelligence, self-healing techniques, threshold management, application workload performance, and steering analysis.

Read more

Bringing IaC Concepts to Non-IaC Deployment

Managed Services + Jonathan Davis + Aug 12, 2022

Bringing IaC Concepts to Non-IaC Deployment

So what does that even mean? Most IT staff have heard of Infrastructure as Code (IaC) but committing fully to it eludes a lot of organizations. Why is that? Check out a technical deep dive exploring how integrating any of the concepts of Infrastructure as Code (IaC) into your existing non-IaC automation approach will pay dividends.

Read more

Getting a Consistent Result with Ongoing Validation

Managed Services + Jonathan Davis + Aug 5, 2022

Getting a Consistent Result with Ongoing Validation

Learn more about ePlus’ approach to Ongoing Validation and how we've been able to help organizations ensure that no matter who deploys instances in Azure—with what toolset or approach—they get a consistent result. This extends many security and governance concepts that are built into the platform and easily customized for the needs of different deployments. Because our approach (and codebase) are fully modular, we also use the core of this to assess new environments as we are introduced to new organizations.

Read more

Benefits of SD-WAN Part 5: How does SD-WAN support your cloud strategy?

Networking + Bob Brewer + Aug 1, 2022

Benefits of SD-WAN Part 5: How does SD-WAN support your cloud strategy?

There are many reasons to implement SD-WAN, but one of the main reasons organizations deploy SD-WAN is for cloud access. Whether your overall cloud strategy is hybrid cloud, multiple clouds, multi-cloud, or some combination of all three you’ll need to select the SD-WAN product that best supports your needs. In this article, we will discuss the different SD-WAN cloud access capabilities and what they mean for you and your organization.

Read more

Manage and Optimize Your Azure Consumption with FinOps

Managed Services + Andy Ritter + Jul 29, 2022

Manage and Optimize Your Azure Consumption with FinOps

FinOps is one of the eight core tenets of the ePlus Cloud Managed Services approach. With an integrated and mature approach to FinOps, you can effectively consume cloud at scale while measuring the true value that it brings to your business. Read more, including a real-world use case.

Read more

Lessons Learned in Azure Managed Services: An Introduction

Cloud + Andy Ritter, Global Cloud Practice Director & Jonathan Davis, Chief Architect + Jul 22, 2022

Lessons Learned in Azure Managed Services: An Introduction

Welcome to our first ePlus Cloud Managed Services (ECMS) blog. Our goal is to share our viewpoint of being on the leading edge as an Azure Managed Services Provider (MSP). We developed this blog series to provide relevant content and tips, practical use cases, and examples of how to reduce risk and optimize spend. Let’s start by sharing a bit about ePlus, and explain how we’ve gained a unique perspective in the Azure Managed Services space.

Read more

Carrier Changes Required in Support of National Suicide Prevention Hotline

Services + Bryan Payne + Jul 11, 2022

Carrier Changes Required in Support of National Suicide Prevention Hotline

On July 16, 2022, the FCC rules require phone service providers and carriers to be enabled to forward the dialed digits 988 to the National Suicide Prevention Hotline. These FCC rules will apply to all telecommunications carriers as well as all interconnected and one-way Voice over Internet Protocol (VoIP) service providers in the United States and the five major U.S. territories--American Samoa, Guam, Northern Mariana Islands, Puerto Rico, and U.S. Virgin Islands.

Read more

Technical Benefits of SD-WAN Part 4: Zero Touch Provisioning – Or is it?

Networking + Bob Brewer + Jul 6, 2022

Technical Benefits of SD-WAN Part 4: Zero Touch Provisioning – Or is it?

Zero touch provisioning (ZTP) automates steps in the SD-WAN setup process, but it doesn't mean you will never touch the device. Get up to speed on the reality of ZTP.

Read more

Technical Benefits of SD-WAN Part 3: Secure SD-WAN Protects You Against Today’s Advanced Threats

Networking + Bob Brewer + Jun 14, 2022

Technical Benefits of SD-WAN Part 3: Secure SD-WAN Protects You Against Today’s Advanced Threats

Most SD-WAN products on the market today offer security features that enable you to deliver secure WAN communications. But these products do not offer the same scope of functionality found in top enterprise security platforms or appliances and cannot be considered a replacement. Each SD-WAN product has nuances, slight differences in the way the vendors choose to deploy functionality. Some products offer more features than others, so it’s important that you evaluate each one carefully before making a selection.

Read more

Healthcare CFOs: Current Economic Conditions Dictate the Need for Access to Cash

Healthcare + Chad Fredrick + Jun 13, 2022

Healthcare CFOs: Current Economic Conditions Dictate the Need for Access to Cash

Inflation, rising interest rates, and the threat of recession make it the perfect time to rethink your access to cash and how it affects your technology purchases.

Read more

Technical Benefits of SD-Wan Part 2:  How Connectivity Diversity Helps You Optimize Performance and Cost

Networking + Bob Brewer + May 23, 2022

Technical Benefits of SD-Wan Part 2: How Connectivity Diversity Helps You Optimize Performance and Cost

Two factors changed to make the traditional WAN architecture suboptimal: 1) some applications shifted from the data center to the cloud; 2) less expensive transport options emerged. How do you deliver a high-quality application experience for remote users, leverage newer transport options, and optimize (or lower) costs in this environment? This is where connectivity diversity comes in. Having diverse network connections available at each site gives you more “bang” for your WAN spend. Learn more.

Read more

Technical Benefits of  SD-WAN  Part One: How Application Awareness Puts Service Delivery into Business Context

Networking + Bob Brewer + May 13, 2022

Technical Benefits of SD-WAN Part One: How Application Awareness Puts Service Delivery into Business Context

There are a number of benefits to SD-WAN technology and we're ready to deep dive into them in our latest technical blog series. Part one focuses on Application Steering, the ability to assign and manage SD-WAN resources by application and what that brings to your organization.

Read more

Navigating the IT Retention Challenge

Services + Anthony Labita + Apr 20, 2022

Navigating the IT Retention Challenge

It’s harder than ever to retain IT talent these days. A recent Gartner Survey found that only 29% of IT workers intend to stay with their current employer. This statistic—while alarming—quantifies something we’ve been seeing for quite some time with our clients: their continuing struggle to get and keep the people they need. See how ePlus’ resourcing expertise can help you navigate with the talent shortage.

Read more

Social Engineering Scams are on the Rise: Are You Ready?

Security + Ivan Gil + Apr 11, 2022

Social Engineering Scams are on the Rise: Are You Ready?

In IT security, we see social engineering techniques used all the time. Bad actors employ social engineering to exploit our psychological vulnerability and to build trust. Once trust is established, the actor can use a variety of tactics to launch cyberattacks against employees and the organizations where they work. With the popularity of social media and more people working remotely than ever before, the field is ripe for cyber criminals. Here are some steps you can take to protect your organization.

Read more

Simplify AI Development and Speed Up Business Innovation with ePlus

Services + Zeki Yasar + Mar 23, 2022

Simplify AI Development and Speed Up Business Innovation with ePlus

For many years, ePlus has helped its customers across nearly all industries implement transformational technology. And, while all technology has the ability to propel organizations forward, artificial intelligence is arguably one that carries significant potential to impact organizations for the better through the proactive and efficient use of data.

Read more

How to Optimize Your Microsoft 365 Subscription

Cloud + Justin Mescher + Feb 10, 2022

How to Optimize Your Microsoft 365 Subscription

You may not realize it, but there’s an important deadline coming up in just a few weeks—March 1, 2022. That’s the day when Microsoft 365 pricing and subscription options will be changing considerably, and there are ways that you can, and should, optimize your subscriptions before then. The reason for the urgency? The changes outlined below have the potential to raise Microsoft 365 pricing by 20-40% for many organizations. Find out how ePlus can help you cut through the complexity to reduce the impact to your organization while continuing to get the most out of your Microsoft solutions.

Read more

Security Year in Review: Threats, Trends & Tech - Episode 3

Security + ​Lee Waskevich + Feb 7, 2022

Security Year in Review: Threats, Trends & Tech - Episode 3

We are wrapping up our “soon to be famous” Threats, Trends and Tech Trilogy with a spotlight on what cyber security technologies took center stage this past year. This post will dig a bit deeper into the maturing spaces that shaped this past year’s cyber purchases.

Read more

Are You READI for Wi-Fi 6?

Networking + Kit Johnston + Feb 4, 2022

Are You READI for Wi-Fi 6?

Wi-Fi 6 can support more devices and bandwidth-hungry applications on your wireless network, if your infrastructure is ready for it. But what exactly is it and how do you prepare for it? Read more.

Read more

Security Year in Review: Threats, Trends & Tech - Episode 2

Security + ​Lee Waskevich + Jan 10, 2022

Security Year in Review: Threats, Trends & Tech - Episode 2

In part two of our trilogy, called Cyber Schmear of a Year, we explore one of the top trends of the year. No, not the cream cheese shortage… the wakeup call for companies regarding increased cyber liability insurance premiums and supplemental guidelines -- why it’s happening and what you can do to be prepared.

Read more

Security Year in Review: Threats, Trends & Tech - Episode 1

Security + ePlus Security Team + Dec 21, 2021

Security Year in Review: Threats, Trends & Tech - Episode 1

Everyone loves a good trilogy and we’re here to deliver. Over the next few weeks we’ll explore the threats, trends and tech that made 2021 what it was, as we look ahead and plan for what might be in store for 2022.

Read more

A Deep Dive into Kari’s Law and Ray Baum’s Act

Collaboration + Bryan Payne + Dec 3, 2021

A Deep Dive into Kari’s Law and Ray Baum’s Act

We hear from our customers, “if I update my phone system will I be in compliance with Kari’s Law and Ray Baum’s Act?” The answer is often a “maybe”. The legislation directed the FCC to create rules around 911 emergency calling. The rules created are intended to provide better results when a caller from a Multi-Line Telephone System (MLTS) places a call to 911 for emergency services.

Read more

Are Your Software Procurement Processes Slowing Down Your Development Initiatives?

Cloud + Brian Roets + Dec 3, 2021

Are Your Software Procurement Processes Slowing Down Your Development Initiatives?

In an increasingly cloud-dominant world, automation can help close the growing gap between procurement, finance, and software engineering groups when it comes to procurement processes and today’s software development needs.

Read more

Is Your Network READI for What Comes Next?

Networking + Bob Brewer + Nov 29, 2021

Is Your Network READI for What Comes Next?

New business challenges and accelerated digital transformation are putting pressure on network infrastructures, requiring IT leaders to focus more effort and investment on modernization.

Read more

Webex Elevates Hybrid Work and Customer Care

Collaboration + Sean Wilson + Nov 4, 2021

Webex Elevates Hybrid Work and Customer Care

Since the pandemic, hybrid working models continue to evolve presenting us with new challenges every day. Cisco’s highly anticipated WebexOne event was filled with exciting announcements that will help organizations of all sizes better support their hybrid work challenges. The virtual conference spanned two days, with the first day focused on Hybrid Work, and the second on Customer Experience. Webex is creating consistent, easy to use and inclusive experiences that make it possible for organizations of all shapes and sizes to work anywhere. Read more.

Read more

Ransomware Remediation Costs are in the Millions: Cyber Insurance, for your Consideration

Security + Ken Puffer + Oct 12, 2021

Ransomware Remediation Costs are in the Millions: Cyber Insurance, for your Consideration

With ransomware attacks becoming more costly, cyber insurance no longer should be considered optional. But getting or even maintaining coverage isn’t guaranteed, and your organization’s security posture matters to insurers.

Read more

Why Your Technology Partner Should Have a Customer Experience Program

Services + ePlus CX Team + Sep 27, 2021

Why Your Technology Partner Should Have a Customer Experience Program

Customers interact with businesses in different ways, and their resulting experiences from those interactions affect their satisfaction and their future buying decisions. Picking a partner with a strong customer experience (CX) practice, which includes technical experts, processes and tools, improves those experiences over time through data-driven insight and actions. Read more about what a strong CX program can do for you.

Read more

Are You Prepared for Your Next Failover?

Services + Kalani Silva + Sep 22, 2021

Are You Prepared for Your Next Failover?

Sooner or later, everyone in IT has that moment. You’ve just lost your primary internet circuit, and everything is down. You can’t process POs, customers can’t get to your product, and your phone is ringing. You know without looking that it’s senior leadership calling. And even though there’s nothing wrong with the thermostat, the back of your neck is suddenly sweaty. It’s failover time.

Read more

6 Key Considerations for SD-WAN Deployment Success

Networking + Bob Brewer + Sep 3, 2021

6 Key Considerations for SD-WAN Deployment Success

The enterprise shift to a cloud and hybrid-cloud infrastructure is fueling strong growth of the SD-WAN software market, which is projected to hit $4.6 billion by 2023.

Read more

Journey to Modernization - How to Take the Next Step Toward Enterprise Hybrid Cloud

Data Center + Jeremiah Stuppy + Sep 2, 2021

Journey to Modernization - How to Take the Next Step Toward Enterprise Hybrid Cloud

Eight out of ten enterprises, according to Gartner, will abandon their traditional data centers for public cloud, hosted private cloud, or co-location alternatives by 2025.1 That prediction was given in 2019, before the pandemic.

Read more

Creating Organizational Agility Through Technology Financing  ​

Financing + Jay Farrell + Aug 31, 2021

Creating Organizational Agility Through Technology Financing ​

Organizational agility can mean the difference between a business thriving in the marketplace or struggling to stay afloat. This was a harsh lesson learned by many in 2020.

Read more

Out-of-the-Box Functionality; Better Business Outcomes

Services + Chris Sutton, PMP + Aug 18, 2021

Out-of-the-Box Functionality; Better Business Outcomes

When the pandemic hit, no one knew the full effect it would have. Now, a year and a half later, as we deal with new virus surges and changing public health guidelines, we’re still learning the implications. The lessons of the initial lockdown continue to be relevant as businesses look to the future—get ahead of disruptions before they happen, if you can. It’s tricky to do that in the best of times but add a worldwide shortage of computer chips and the resulting backlogs for pretty much all hardware, and it becomes even trickier. So how can you make sure you’ll have the tech you need in these uncertain times? Read more to find out.

Read more

Is the Talent Shortage Creating a Gap in Your Bench?

Services + Anthony Labita + Aug 10, 2021

Is the Talent Shortage Creating a Gap in Your Bench?

Talent shortages have always been a top concern for CIOs. These days, finding the specialized expertise you need to drive your IT initiatives can seem like an impossible challenge. Instead of plowing through a bewildering stack of resumes, wouldn’t you rather have a manageable selection of rigorously vetted pros, all of whom have the unique technology skillset you need? ePlus can make that happen.

Read more

What is SD-WAN and What Does it Mean for Networking?

Networking + Bob Brewer + Jul 22, 2021

What is SD-WAN and What Does it Mean for Networking?

Research firm Dell'Oro Group projects global sales of SD-WAN technologies will grow at a CAGR of 24% over the next five years -- and it expects the market to eclipse $4 billion by 2025. These nifty data points speak to SD-WAN technologies' potential but don't really tell you how SD-WAN can help grow your business or even how SD-WAN works. This blog does.

Read more

Adopting a Cloud FinOps Approach Begins with Visibility

Cloud + Jeremiah Stuppy, Solutions Director, and Andy Ritter, Cloud Practice Director + Jul 21, 2021

Adopting a Cloud FinOps Approach Begins with Visibility

Public cloud adoption continues to accelerate. With the increase in cloud spend—where costs are tied directly to variable consumption—many organizations face a growing concern over efficiency. Public cloud makes it easy to spin up new environments, develop new software features, deploy new apps, and shutdown resources when they are no longer needed. But who remembers to turn off unused resources? Organizations need to make smart investments in public cloud to minimize wasted costs and to get real business value. That’s where FinOps—or cloud financial operations—comes in.

Read more

Achieve Zero Trust with Access-  Part 3: SASE- Bringing Together Your Zero Trust Architecture

Security + ​Lee Waskevich + Jul 12, 2021

Achieve Zero Trust with Access-  Part 3: SASE- Bringing Together Your Zero Trust Architecture

This is the third article in a three-part series: Achieve Zero Trust with Secure Access. Our first article covered the importance of managing identity through strong authentication and privileges. The second article focused on securing the endpoint. In this piece, we will bring it all together and cover the third element of a zero trust security architecture: SASE, a new concept in network security architecture.

Read more

Assessments: First Line of Defense in the Post-Pandemic World

Services + Mark Barker, Director of Services Support & Strategy and Paul Lenhard, Director, Security Advisory Services + Jun 14, 2021

Assessments: First Line of Defense in the Post-Pandemic World

The sudden shift to a remote workforce required an unprecedented degree of network agility. And as we look back on the past year, the challenges of decentralized security have become painfully clear. With VPN traffic at an all-time high and less than perfect control over employee laptops, many organizations face new security threats that weren’t a problem when employees were in the office. Assessments are a key piece of charting the best way forward from here.

Read more

Ransomware in Healthcare – Part 3: Recovering from a Successful Ransomware Attack

Healthcare + Ken Puffer + Jun 10, 2021

Ransomware in Healthcare – Part 3: Recovering from a Successful Ransomware Attack

Ransomware in Healthcare is a three-part series discussing the source, impact and effect that threat actors have on the systems used by clinicians to provide care. In this final segment, we will discuss ways to prepare, recover, and continue providing patient care when faced with a successful ransomware attack. You can also read Part One: Motive and Impact and Part Two: Strategic and Tactical Approaches to Prevent and Protect Clinical and Information Assets and Operations.

Read more

Making the Case for SD-WAN Managed Services

Managed Services + Bob Brewer + Jun 3, 2021

Making the Case for SD-WAN Managed Services

Organizations of all sizes are looking to transform wide area networks (WANs) from “fragile to agile” by implementing software-defined WAN (SD-WAN) technology. SD-WAN serves as the connective tissue between applications, clouds and branch offices, enabling organizations to deliver applications to users without losing visibility, security or performance. However, while implementing an SD-WAN solution can provide substantial benefits, there is specific expertise required to effectively manage it and optimize its benefits.

Read more

Services to Elevate Your Security Game

Services + Security Advisory Services Team + Jun 1, 2021

Services to Elevate Your Security Game

Security and compliance pose some of the most complex and challenging issues facing IT professionals today, but things could be easier. While there is some truly amazing technology out there, solutions need to be implemented, not just installed. Organizations need strategy, processes, supporting policies, runbooks, security operations centers, and a plan for when things go wrong. Explore how Advisory Services can help.

Read more

How To Finance Your SLED IT Project

Financing + Jay Farrell + May 21, 2021

How To Finance Your SLED IT Project

Painting a picture of state and local government financial health more than one year into the pandemic is no easy task. Declining budgets have proven especially tricky when it comes to financing IT projects across State, Local & Education (SLED) organizations. CIOs and other stakeholders had to simultaneously tackle two immense challenges. The first: quickly pivoting to meet the technology needs of remote workforces and students. The second: ensuring IT infrastructure could support a massive digital transformation in how citizen services were being delivered. Financing IT projects was a helpful strategy. Here are some others you should keep in mind when going this route.

Read more

Hybrid IT is Making Recovery More Complex—Is it Time to Rethink your DR Strategy?

Cloud + Jeremiah Stuppy + May 17, 2021

Hybrid IT is Making Recovery More Complex—Is it Time to Rethink your DR Strategy?

Over the past year of market disruption from COVID-19, there’s been a renewed spotlight on business continuity overall, including disaster recovery, ransomware protection, and accelerating IT modernization. Many enterprises need to rethink their disaster recovery strategy.

Read more

The Evolution and Future of AI in Healthcare

Healthcare + Ron Remy + Apr 30, 2021

The Evolution and Future of AI in Healthcare

Artificial intelligence, or AI, has become nearly ubiquitous in our interactions with the web and smart devices. We use the virtual assistant on our smartphones to complete simple tasks like telling us the weather or relaying our schedule for the day—even search engines leverage a form of AI to better understand search queries and provide more accurate results.

Read more

Achieve Zero Trust with Access- Part 2: Endpoint Security—Protecting the Device Persona in a Zero Trust Network

Security + ​Lee Waskevich + Apr 26, 2021

Achieve Zero Trust with Access- Part 2: Endpoint Security—Protecting the Device Persona in a Zero Trust Network

This is the second article in a three-part series: Achieve Zero Trust with Secure Access. External actors are behind 70% of data breaches, according to the latest report from Verizon. And the endpoint continues to be one of the most often targeted attack vectors for these perpetrators. Learn more about what aspects to consider when evaluating endpoint security.

Read more

Ransomware in Healthcare – Part Two: Strategic & Tactical Security Approaches

Security + Ken Puffer + Apr 22, 2021

Ransomware in Healthcare – Part Two: Strategic & Tactical Security Approaches

Ransomware in Healthcare is a three-part series discussing the source, impact and effect that threat actors have on the systems used by clinicians to provide care. In Part One: Motive and Impact, we discussed how the potential for financial gain drives malicious persons to compromise health workers and poorly secured systems to corrupt access to clinical information. In this segment, we will discuss strategic and tactical approaches to help prevent, identify and protect systems from compromise.

Read more

Building Scale for Unstructured Data

Data Center + Louis Vitiello + Apr 16, 2021

Building Scale for Unstructured Data

Organizations are facing exponential data growth, especially with unstructured data, along with increasing customer expectations and performance demands. Their traditional storage infrastructures are just not able to support their evolving business requirements.

Read more

Accelerate Your Digital Transformation with Cloud Collaboration Solutions

Collaboration + Bryan Payne + Apr 8, 2021

Accelerate Your Digital Transformation with Cloud Collaboration Solutions

Now, more than ever, leveraging the cloud for collaboration solutions is critical. Outside pressures have motivated organizations to reprioritize a move to the cloud. ePlus’ Cloud Collaboration solution powered by Cisco UCM Cloud can help to accelerate your transition to the cloud in a much smoother and worry-free manner while leveraging investments you’ve already made in existing telephony hardware.

Read more

Ransomware in Healthcare – Part One: Motive and Impact

Security + Ken Puffer + Mar 18, 2021

Ransomware in Healthcare – Part One: Motive and Impact

The impact of a successful ransomware attack on any organization is dramatic, which can result in lost revenue and productivity- and healthcare organizations are particularly sensitive to outages caused by ransomware. This is part one of a three-part series exploring the current state of ransomware in Healthcare and explores the threat actors, their motives and the strategies they use to gain a foothold in an organization.

Read more

Achieve Zero Trust with Access- Part 1: Identity

Security + ​Lee Waskevich + Mar 5, 2021

Achieve Zero Trust with Access- Part 1: Identity

This is the first article in a three-part series: Achieve Zero Trust with Secure Access. Security philosophy has changed. The “trust but verify” approach is now obsolete—due in part to increased digitization, higher cloud adoption, and more distributed users—and it’s been replaced with a policy of zero trust. But building a zero trust security architecture is a multifaceted endeavor.

Read more

Professional Services Listings: ePlus’ Next Step with AWS Marketplace

Cloud + Justin Mescher + Feb 2, 2021

Professional Services Listings: ePlus’ Next Step with AWS Marketplace

As of December 2020, AWS Marketplace customers will discover something new: listings for ePlus professional and managed services. It’s the latest milestone in our journey to make it easier for organizations to find and deploy solutions and services in AWS.

Read more

Perspective: The Key to Thriving Through Disruption

Services + Dan Farrell + Jan 22, 2021

Perspective: The Key to Thriving Through Disruption

No one could have predicted 2020. Looking ahead, there’s only one thing we can predict with any certainty—more disruption. And no one can afford to be caught off guard when the next change hits. That’s why you need agility, speed, resiliency, and an IT architecture that enables your company to thrive, no matter what surprises come our way in 2021. ePlus can show you the big picture—the high-level strategies and solutions that facilitate business outcomes—and manage the small details—the practical technological requirements for realizing those outcomes.

Read more

Four Ways of Leveraging Consulting Services to See the Forest and the Trees

Managed Services + Wayne St. Jacques + Jan 8, 2021

Four Ways of Leveraging Consulting Services to See the Forest and the Trees

As an IT professional, have you ever felt so overwhelmed with projects and strapped for time that you knew important things were getting missed? Maybe some servers were being configured wrong or security profiles were too lax? That’s where ePlus Consulting Services can help. Here are four ways you can leverage our services to help you tackle your most difficult challenges and get the most value from your technology spend.

Read more

It’s a Wrap! Key Takeaways from ePlus CyberSmart 2020

Security + ​Lee Waskevich + Dec 10, 2020

It’s a Wrap! Key Takeaways from ePlus CyberSmart 2020

In support of National Cyber Security Awareness Month (NCSAM) 2020, we launched a companion effort called ePlus CyberSmart, a four-week educational series offering resources and expert insight from our security professionals and partners designed to help you expand your knowledge of security topics, so you can help your organization implement better security controls based on today’s dynamic threat landscape.

Read more

‘Your package is delayed!’ What you need to know to stay safe during the 2020 Holiday Season

Security + Paul Lenhard + Dec 8, 2020

‘Your package is delayed!’ What you need to know to stay safe during the 2020 Holiday Season

The 2020 Holiday season, while vastly different this year, is well underway. There is a large uptick in online shopping. In fact, Adobe Analytics predicts that U.S. online sales for the months of November and December 2020 will reach $189 billion, representing a 33% year-over-year increase and setting a new record. The forecast is also equal to two years of growth in one season, Adobe says, noting that the increase in 2019 was just 13%. Wow.

Read more

Delivering Business Continuity With Secure Telework Solutions

Security + ePlus Security Team + Nov 13, 2020

Delivering Business Continuity With Secure Telework Solutions

With the explosive growth of employees working from home, the need for an easy-to-use but secure way for employees to connect to the office has become even more important and a reason you may consider modernizing your network. Juniper’s Enterprise at Home solution extends the AI-Driven Enterprise to remote workers.

Read more

Thoughts on SSO (and Okta) for Newcomers

Security + Brian Zimmer + Nov 13, 2020

Thoughts on SSO (and Okta) for Newcomers

For the first few decades of our human experience with computers, passwords were simple and short. Only in very few environments, usually those with national security concerns, were there additional controls in place. These were things like keys, safes with sealed envelopes with passwords, or a secondary password. Life with passwords was simple. The password had become and remains to this day, one of the single most important elements an attacker needed to inflict serious harm on a victim organization.

Read more

4 Ways to Build Campus Culture with Technology in Today’s Virtual World

Education + Nick D'Archangelo + Oct 8, 2020

4 Ways to Build Campus Culture with Technology in Today’s Virtual World

Students have returned to school—some physically, some virtually, and some in a hybrid capacity. But how many will stay enrolled and engaged from their family homes and dorm rooms? And will next year’s high school graduates recognize the value of such a college or university experience?

Read more

Tales from the Road: RSA Conference 2020

Security + Jason Nelson + Mar 11, 2020

Tales from the Road: RSA Conference 2020

RSAC 2020 brought a lot of conversation around the coming “death” of passwords. All over the show floor were discussions of “passwordless access” married with difficult to steal factors like biometrics and physical key fobs. A few main themes emerged from this year’s RSA Conference. Let’s discuss.

Read more

Don't trade one virus for another

Security + ​Lee Waskevich + Mar 9, 2020

Don't trade one virus for another

Organizations around the globe are preparing for and executing precautionary plans to protect the health and welfare of their employees and citizens. The past few weeks have been a whirlwind of information, caution and concern as COVID-19 virus spreads around the globe. Fortunately, the digital age in which we live provides unique abilities to remain connected to our organizations, business applications and customers so as to minimize the disruption to our secular responsibilities.

Read more

Countdown To HIMSS 20: Top 5 Technologies to Watch

Healthcare + George Pashardis + Feb 18, 2020

Countdown To HIMSS 20: Top 5 Technologies to Watch

Healthcare is one of the hottest industries for transformative technology! With HIMSS 20 right around the corner, thousands of healthcare professionals, clinicians and executives will turn out in search of innovation, emerging technology, insights, best practices and new applications for better health, patient engagement, patient care and security.

Read more

Consumerism in Healthcare

Security + Ken Puffer + Jan 22, 2020

Consumerism in Healthcare

Healthcare organizations in the U.S. do a very good job of addressing the clinical needs of their patients. Though there is always room for improvement, it cannot be denied that hospitals today have deep experience and commitment to the health and wellness of their patients and the communities they serve.

Read more

Medical Information Security & Medical Imaging Encryption

Security + Ken Puffer + Jan 15, 2020

Medical Information Security & Medical Imaging Encryption

Securing networks from outside threats and periodically evaluating these tools and alerting mechanisms has become commonplace in most organizations. It is reassuring to see that external threats have gained the attention of hospital boards and that additional support is being put behind data security. With the continuing instances of breaches and ransomware attacks that are reported, the process of effectively protecting an organization remains complicated.

Read more

Cyber Security 2020: A Look Ahead

Security + ePlus Security Team + Jan 13, 2020

Cyber Security 2020: A Look Ahead

Hindsight is 2020 -- and given the increase in cyber-attacks we saw in 2019 -- we don’t need a crystal ball to predict that 2020 and the coming decade will keep cyber security in the limelight as the single most important foundational anchor to organizational success, and smooth operations. A fresh new decade will bring with it a freshly evolved set of threats, concerns and sophisticated cyber-attacks.

Read more

Cyber Security Insurance

Security + Ken Puffer + Jan 8, 2020

Cyber Security Insurance

Cyber Security Insurance, or Cyber Liability Insurance, is a category of insurance products that is intended to cover losses associated with data breaches, network security failures and business interruption from these events. Cyber Security Policy coverage varies, but most include: errors & omissions, media liability, network security and privacy.

Read more

Stay Safe This Holiday Season

Security + Paul Lenhard + Dec 16, 2019

Stay Safe This Holiday Season

The 2019 Holiday season is in full swing. While we spend time with loved ones, search for the next “it” device, or simply take a breath from this year’s pace of life, we must remain cognizant that threat actor campaigns are ready to catch us off guard. Our data continues to be under constant attack. Here are a few helpful tips to ensure you’re adequately protected all season long.

Read more

A Managed Security Services Q&A for First-Time Buyers

Services + Ron Barnes + Oct 18, 2019

A Managed Security Services Q&A for First-Time Buyers

How common is cybercrime? Well, one expert notes a ransomware attack occurs every 14 seconds. And in a separate article, he says cryptojacking, distributed denial of service attacks, phishing, and other schemes are costing the world economy $2 trillion a year.

Read more

Poor East-West Visibility Gives Hackers a License to Steal

Security + Sam Curcio + Oct 3, 2019

Poor East-West Visibility Gives Hackers a License to Steal

Lack of visibility into east-west traffic is a problem for data-center operators and their ongoing battle to prevent a breach or theft of sensitive and confidential information. If organizations cannot monitor and log internal network segments, they cannot respond to active threats or prevent hackers from stealing confidential and sensitive information which often times includes customer and employee data.

Read more

Enterprises looking to the future of Information Security should look to Purple Teaming Exercises

Security + Brian Zimmer + Sep 27, 2019

Enterprises looking to the future of Information Security should look to Purple Teaming Exercises

Enterprises looking to the future of Information Security should look to Purple Teaming Exercises. Partnering together as a single Purple Team, defenders – the Blue Team - and the attackers – who are the Red Teams – can better prepare the enterprise for modern adversaries.

Read more

4 Myths About GPU Acceleration

Artificial Intelligence + Andrew Malinow + Aug 13, 2019

4 Myths About GPU Acceleration

Despite a steady increase in GPU development activities, misunderstandings about the value of using GPUs to accelerate workloads persist. In this post, I debunk four of these myths and explain why I think the technology has broader utility than standard artificial intelligence (AI) use cases might suggest.

Read more

Facial Recognition Systems

Security + Marc Cohen + Aug 8, 2019

Facial Recognition Systems

Every technology has its place, and the people that use the systems have a responsibility to society to ensure the systems are not misused, and data captured is handled appropriately. Technology giants have acknowledged this and called for government regulation of face recognition technologies due to their far-reaching impacts.

Read more

The Role of Network Access Controls in Healthcare Mergers

Security + ePlus Security Team + Jun 4, 2019

The Role of Network Access Controls in Healthcare Mergers

Healthcare systems and providers have been seeking ways to increase efficiency and productivity while embracing value-based care models and enabling patient empowerment. Efforts to make these goals a reality have manifested in two ways: the adoption of new tools and technology and through mergers and acquisitions.

Read more

Three Features that Enable NAC Solutions to Secure Healthcare Networks

Security + ePlus Security Team + May 16, 2019

Three Features that Enable NAC Solutions to Secure Healthcare Networks

With recent advancements in technology, the healthcare space is changing. Specifically, new applications and connected devices are being developed to improve productivity and patient access to medical information. This is known as the consumerization of IT, in which technology tools and solutions focus on empowering the end user. In healthcare, this means the patient or physician.

Read more

Demystifying Cloud Security

Security + ePlus Cloud Team + Apr 30, 2019

Demystifying Cloud Security

An increasing number of organizations are investigating options to migrate workloads to the cloud or replace legacy applications with a software as a service (SaaS) application. Moving assets from on-premise to the public or private cloud can enable substantial positive business outcomes but requires additional thought around how to protect sensitive information to maintain compliance, audit and privacy requirements.

Read more

Top 10 IT Healthcare Trends to Watch

Healthcare + George Pashardis + Apr 4, 2019

Top 10 IT Healthcare Trends to Watch

Anyone who walked around the Healthcare Information Management and Systems Society (HIMSS19) show in February saw some distinct themes in Healthcare IT emerging. Healthcare IT is forward-looking, futuristic, full of possibility and global. Keep reading for a breakdown of what’s hot, what’s emerging, what’s top of mind– and what’s full speed ahead.

Read more

Beyond Cloud - Why You Need A Multi-Cloud Architecture

Cloud + ePlus Cloud Team + Apr 3, 2019

Beyond Cloud - Why You Need A Multi-Cloud Architecture

Are you pursuing a multiple cloud strategy? If so, you're among the majority of companies. In fact, according to Rightscale's 2019 State of the Cloud survey, 94% of respondents said they use cloud platforms in their enterprise. Not just one cloud platform-on average, they use almost five. In fact, 84% of respondents have a multi-cloud strategy.1

Read more

An Interview from the Road: RSA Conference 2019

Security + Marc Cohen | Jason Nelson + Mar 28, 2019

An Interview from the Road: RSA Conference 2019

Read more as we talk with our team on the ground at this year’s RSAC. ePlus Lead Security Engineer Jason Nelson attended sessions, and Marc Cohen, ePlus Solutions Director walked the floor, saw the demos and talked the talk!

Read more

The Growing Importance of 'Security by Design'

Security + ePlus Security Team + Mar 20, 2019

The Growing Importance of 'Security by Design'

"Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.

Read more

Business Transformation Begins with Data Center Modernization

Data Center + ePlus Networking Team + Feb 11, 2019

Business Transformation Begins with Data Center Modernization

The world is experiencing a top-to-bottom digital transformation that will impact virtually every aspect of business, from competitive capabilities to security exposure. Making that transformation requires the essential elements of a modern data center – and a solid plan with a trusted advisor to help set them into place.

Read more

California Data Privacy Bill: What You Need to Know

Security + Sophat Chev + Feb 7, 2019

California Data Privacy Bill: What You Need to Know

The first data breach of 2019 took place less than 24 hours after the new year. The Australian State of Victoria reported an estimated 30,000 civil identities exfiltrated by way of spear phishing (using email to lure its victim to initiate a vulnerability). The agency claims all personal identifiable information (PII) was encrypted, which thankfully renders the data exfiltrated unusable. This security approach was a result of a compliance effort to meet the GDPR requirement for encrypting all PII data.

Read more

Reduce Your Attack Surface with an IoT Security Strategy

Security + Christopher Williams + Jan 24, 2019

Reduce Your Attack Surface with an IoT Security Strategy

There is no doubt that the world of the Internet of Things (IoT) is here to stay. Consumer grade products such as TVs, speakers, toys, wearables, appliances and much more continue to flood the retail space offering enticing features to consumers. Learn how to reduce your attack surface with an IoT security strategy.

Read more

SamSam Ransomware: How ePlus Helps Mitigate Threats

Security + Marc Cohen + Jan 10, 2019

SamSam Ransomware: How ePlus Helps Mitigate Threats

In early December, the Department of Homeland Security (DHS), the National Cybersecurity and Communications Integration Center (NCCIC), and the Federal Bureau of Investigation (FBI) issued an alert regarding SamSam ransomware. Threat actors exploit Windows servers to gain persistent access to a victim’s network, utilizing SamSam to infect all reachable hosts.

Read more

Fact or Fiction: 5 Misconceptions about SD-WAN

Cloud + ePlus Networking Team + Dec 11, 2018

Fact or Fiction: 5 Misconceptions about SD-WAN

SD-WAN is here to stay. According to International Data Corporation (IDC), worldwide revenue for software-defined wide-area networking (SD-WAN) infrastructure and services is expected to reach $8.05 billion in 2021 - compare that to approximately $500M in 2017.

Read more

Stay Secure During the Holidays

Security + Paul Lenhard + Dec 4, 2018

Stay Secure During the Holidays

As 2018 comes to an end, threat actors continue to drive campaigns in hopes of catching shoppers, and the industry, off guard. With the increase in IoT devices for both personal and business use, we must ensure we remain protected while we ourselves, or our employees, are online.

Read more

ePlus and AWS Marketplace: Delivering Software and Services to Enable Technology Innovation

Cloud + Justin Mescher + Nov 29, 2018

ePlus and AWS Marketplace: Delivering Software and Services to Enable Technology Innovation

As organizations continue to rapidly adopt cloud services, they are undergoing countless changes such as consumption-based cost models, security, ongoing optimization, cloud architecture considerations, and procurement options. All of these changes can be concerning which can be an inhibitor to cloud adoption for many customers. Amazon Web Services (AWS) just took a huge step in easing some of this pain with the release of AWS Marketplace Consulting Partner Private Offers Program.

Read more

The Future of Storage Is Predictive, NVMe- and SCM-ready. Are You Prepared?

Artificial Intelligence + ePlus Networking Team + Oct 19, 2018

The Future of Storage Is Predictive, NVMe- and SCM-ready. Are You Prepared?

A new class of storage has arrived, one that’s predictive and poised for the future. It is future-proofed, standardized on Non-Volatile Memory Express (NVMe) and storage-class memory (SCM) for speed and performance gains. These storage innovations are powering reliability in enterprise workloads that depend on performance and speed. With more than 4.4 zettabytes of data — and 450 billion business transactions per day by 2020 demand for fast, reliable, and predictive storage couldn’t come at a better time.

Read more

Power App Performance with AI-Driven Storage

Artificial Intelligence + ePlus Networking Team + Oct 19, 2018

Power App Performance with AI-Driven Storage

Storage optimization isn’t just a data problem, it’s an application issue if storage latency degrades app performance. As many as 61 percent of companies say faster app and IT service delivery are significant initiatives. Yet core to both of those goals is data availability, and legacy storage can be a hindrance that leads to costly application downtime if storage reliability isn’t addressed.

Read more

It’s Time to Embrace Predictive Storage Capacity. Here’s Why.

Artificial Intelligence + ePlus Networking Team + Oct 19, 2018

It’s Time to Embrace Predictive Storage Capacity. Here’s Why.

Artificial intelligence (AI) is making significant inroads in the data center, transforming manual tasks into automated ones that save time and optimize the overall health of the IT system. With so much to be gained from AI, it’s no wonder that IDC estimates that spending on this technology will grow to $19.1 billion in 2018.

Read more

Ensuring a Risk-Aware Culture, Year-Round

Security + Paul Lenhard + Oct 17, 2018

Ensuring a Risk-Aware Culture, Year-Round

We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.

Read more

CSC 5: Controlled Use of Administrative Privileges

Security + Russ Ortmann + Oct 11, 2018

CSC 5: Controlled Use of Administrative Privileges

Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.

Read more

CSC 4: Continuous Vulnerability Assessment and Remediation

Security + Russ Ortmann + Sep 20, 2018

CSC 4: Continuous Vulnerability Assessment and Remediation

One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.

Read more

Breach Series - Part Three: Is Your Supply Chain Putting Your Systems or Data at Risk?

Security + ​Lee Waskevich + Aug 24, 2018

Breach Series - Part Three: Is Your Supply Chain Putting Your Systems or Data at Risk?

If you were a hacker, how would you infiltrate a well-protected target? How would you get inside an organization that has a solid security framework and has invested millions in cyber security?

Read more

Breach Series - Part Two: Cyber Criminals are Assaulting the Retail Sector—Don’t Be the Next Victim

Security + ​Lee Waskevich + Aug 15, 2018

Breach Series - Part Two: Cyber Criminals are Assaulting the Retail Sector—Don’t Be the Next Victim

Data breaches in the retail sector are well-known and widely covered by the media—we all remember hearing about Target, Home Depot, and TJ Maxx. But with recent breaches at Panera Bread and Hudson’s Bay Company (owners of Saks Fifth Avenue and Lord & Taylor), we see that retail will continue to be a popular and prevalent target for cyber thieves. To avoid becoming the next victim, you must remain diligent and take action now.

Read more

Breach Series - Part One: Follow These Steps to Avoid Becoming a Victim to Ransomware

Security + ​Lee Waskevich + Aug 8, 2018

Breach Series - Part One: Follow These Steps to Avoid Becoming a Victim to Ransomware

Ransomware attacks hit us hard in 2017. SamSam, WannaCry, NotPetya, and other variants infected computers around the world, locking up systems, disrupting operations, and of course, extorting large sums of money from victims

Read more

Data Loss Prevention in Healthcare

Security + George Pashardis + Aug 7, 2018

Data Loss Prevention in Healthcare

As an industry with strict privacy and security regulations, healthcare is challenged to implement increased cybersecurity measures to mitigate current threats. Failure to protect confidential information can result in fines amounting to millions of dollars. So whether you’re an IT security professional or the CIO of a hospital, medical university, health clinic, insurance company or a third-party organization involved in the industry, a robust Data Loss Prevention strategy should be a critical part of your security program.

Read more

What you need to know about social media and IT security

Security + Justin Bodie + Jun 21, 2018

What you need to know about social media and IT security

With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.

Read more

What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

Security + George Pashardis + Jun 13, 2018

What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I've taken time to really think about what I saw and heard.

Read more

HX AIM: Quickly Getting Started with Deep Learning

Artificial Intelligence + Zeki Yasar + Jun 8, 2018

HX AIM: Quickly Getting Started with Deep Learning

With so many technologies and moving parts involved in a Deep Learning project, many times stitching these components together and other manual infrastructure work along the path of experimentation to consumption can create significant challenges.

Read more

IoT & Consumer Gear Attacks on the Rise…

Security + ​Lee Waskevich + May 30, 2018

IoT & Consumer Gear Attacks on the Rise…

Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.

Read more

How to Get Started with Identity and Access Management (IAM)

Security + Marc Cohen + Apr 26, 2018

How to Get Started with Identity and Access Management (IAM)

Identity management is a fundamental part of an effective security program. And, given the risks out there, it’s essential for protecting your organization against today’s cyber threats.

Read more

Deep Learning Is Ready for Broad Adoption

Artificial Intelligence + Zeki Yasar + Mar 27, 2018

Deep Learning Is Ready for Broad Adoption

The concepts behind AI and Deep Learning are not new, but until recently the application of Artificial Neural Networks has been limited and impractical. What has changed over the past couple of years is we now have the data, use cases, Deep Learning software tools, and powerful, specialized hardware that allow for us to create AI applications never before possible.

Read more

Using the CSC 3 Control to Secure Configurations for Hardware and Software

Security + Russ Ortmann + Mar 26, 2018

Using the CSC 3 Control to Secure Configurations for Hardware and Software

Freshly installed operating systems and network-connected devices, by default, are usually configured for ease of deployment and ease of use. This means that the security controls are set to the least restrictive settings to ensure users experience little to no issues deploying their products. While this is great from the deployment perspective, it is not so great from the security perspective. Default admin accounts, unused protocols, and unnecessary pre-installed software can all be exploited in their default configuration.

Read more

Don’t get phished! Personal Online Identity Protection

Security + Marc Cohen + Feb 22, 2018

Don’t get phished! Personal Online Identity Protection

Keeping your account information secure is the vital first step to good security hygiene. Below are some easy steps that can help keep your accounts safe. Much of the advice applies to both employees in an organization as well as to individuals’ personal online security.

Read more

New Technologies = New Data Risks

Networking + ePlus Networking Team + Feb 13, 2018

New Technologies = New Data Risks

Network endpoint growth is explosive due to the surge in mobility and Internet of Things (IoT) devices. In today’s always-on world, work/life lines have blurred thanks to smartphones, laptops, and other devices that can be used for work. Along the same lines, companies need to be able to host these devices — especially companies that have a bring-your-own-device (BYOD) policy — on their own networks and, in some situations, provide remote access, while keeping networks and data safe in the process.

Read more

How Does Mobility Affect the Cloud?

Cloud + ePlus Cloud Team + Feb 13, 2018

How Does Mobility Affect the Cloud?

Just because businesses are driven by mobile technology and the cloud doesn’t mean that every company can afford an extensive networking staff to support it. To meet escalating connectivity demands with limited resources, our team at ePlus recommends simplified, mobile-first network design that integrates advanced security and control from the start.

Read more

Public vs. Private Clouds: Why Can't You Have It All?

Cloud + ePlus Cloud Team + Feb 13, 2018

Public vs. Private Clouds: Why Can't You Have It All?

Today's companies need the ability to accelerate application development in order to keep up with the competition. But that's difficult to do with aging infrastructures filled with slow applications that bring workloads to a crawl. To have any chance at innovation, more and more companies are moving to a hybrid infrastructure.

Read more

How Hyperconvergence Increases Business Productivity

Collaboration + ePlus Networking Team + Feb 13, 2018

How Hyperconvergence Increases Business Productivity

Two-thirds of enterprises report that improving IT efficiency is a top business priority.[1] In addition, 68 percent of IT managers in the same Forrester Research study state that cutting costs is critical. So how does an organization improve IT efficiency and reduce spending?

Read more

Does Blockchain have a Place in Healthcare?

Healthcare + George Pashardis + Feb 7, 2018

Does Blockchain have a Place in Healthcare?

Despite the frequent headlines and all the hype that goes with them, blockchain is a difficult concept for many people to understand. Is it a technology or is it a new currency? Is it reality or is it just hype? As with many new things in the technology world, it’s easy to get confused initially, depending on how much information and education is available in the beginning. Two things that I can tell you is that blockchain is becoming disruptive and a lot of industries (Financial, Insurance, Healthcare, Music Industry, Airline Industry and even governments) are adopting or testing it.

Read more

Taking a Closer Look at CSC 2: Inventory of Authorized and Unauthorized Software

Security + Russ Ortmann + Feb 1, 2018

Taking a Closer Look at CSC 2: Inventory of Authorized and Unauthorized Software

In my last blog post, I discussed the history of the CIS 20 Critical Security Controls and the relevance they hold for organizations today. In my second post on this topic, let’s dive a bit deeper in CSC 2 security control, which is very tightly aligned with CSC 1 (Inventory of Authorized and Unauthorized Devices) control.

Read more

Three Reasons Why Managed Services are a Cloud's Best Friend

Cloud + Wayne St. Jacques + Jan 19, 2018

Three Reasons Why Managed Services are a Cloud's Best Friend

I think we all agree that a successful cloud strategy is important today. In fact, for most organizations, it's imperative. Global competition and rising costs are driving businesses large and small to explore ways to integrate more cloud services into their operations. In fact, according to Gartner, the public cloud services market will reach $246 billion in 2017, an 18% increase from 2016.

Read more

The Year of Security Automation: A Look Back

Security + ePlus Security Team + Jan 18, 2018

The Year of Security Automation: A Look Back

In 2017, the industry saw the birth of security automation. As it continues to grow from infancy into something more robust, now is a good time to reflect on what it is and what operational impacts it is having on our systems.

Read more

Spectre, Meltdown, and What Can Be Done!

Security + Paul Lenhard + Jan 12, 2018

Spectre, Meltdown, and What Can Be Done!

As most of you are aware by now, researchers have discovered a set of critical vulnerabilities in all Intel CPU hardware, currently impacting the vast majority of devices in the wild. These devices include desktops, servers, mobiles devices and appliances, regardless of Operating System and whether they are located in the cloud or on premises.

Read more

A History of the CIS 20 Critical Security Controls

Security + Russ Ortmann + Jan 4, 2018

A History of the CIS 20 Critical Security Controls

The modern world of information security can often be a confusing one. Security practitioners are continually inundated with a barrage of data coming from reports, alerts, security tools, threat feeds, and more. At the same time, they are trying to align this data with the multiple security requirements, regulatory mandates, best practices, and frameworks that define their environment. Unchecked, the sheer volume of information can easily paralyze an organization from taking action when necessary. The ‘Fog of More’ can essentially become the larger threat to the environment.

Read more

Stay Safe during the Holidays!

Security + Paul Lenhard + Dec 14, 2017

Stay Safe during the Holidays!

As we get closer and closer to ringing in the New Year, threat actors remain very busy attempting to intrigue us with phishing campaigns that promise great deals on products and services. In an effort to keep these final weeks of 2017 as joyful as possible, below are a few tips to stay ahead of the Grinch as he looks on with a malicious grin over your data.

Read more

Is Data Analytics More than Big Data?

Artificial Intelligence + ePlus AI Team + Nov 30, 2017

Is Data Analytics More than Big Data?

“Big data.” “Data analytics.” “Big data analytics.” All of us are familiar with these terms, aren’t we? In fact, these words have been part of our vocabulary for long enough that they sometimes get used interchangeably. But that can lead us to make some false assumptions.

Read more

When It Comes to IT Security: Don’t Forget the Mail

Security + ePlus Security Team + Nov 30, 2017

When It Comes to IT Security: Don’t Forget the Mail

For nearly ten years, I’ve looked forward to the release of Verizon’s annual Data Breach Investigation Report (DBIR). With its analysis on the thousands of breaches and incidents from across the globe, occurring over its last full revolution around the sun, which cybersecurity pro among us does not look forward to such a treasure trove of insights and predictions to guide our focus for the coming year?

Read more

DevOps Today: Automation First, Collaboration Second

Cloud + ePlus Cloud Team + Nov 27, 2017

DevOps Today: Automation First, Collaboration Second

In looking at definitions of DevOps, I found a general consensus that DevOps is primarily about enabling “cultural shifts” and increasing “collaboration” among technology development and operations/infrastructure teams. A much smaller emphasis is placed on the automation processes around delivering software and infrastructure changes. While I know I’m going to ruffle some feathers with this view, I am going to say it: we need to stop confusing the process efficiencies needed to reach DevOps excellence with the need for broader (and important!) organizational change.

Read more

Cloud Native or Bust

Cloud + ePlus Cloud Team + Nov 27, 2017

Cloud Native or Bust

There is a veritable cloud gold rush occurring today. CIOs are declaring “cloud-first strategies” while companies are pasting “cloud” onto any and every product they have. Their hope is to hit pay dirt amid uncharted and widespread IT transformation. As with most euphoric and rapid endeavors, reality is setting in for those who have made the journey to the cloud. Big payouts require work. For the cloud, a lot of that work happens at the application level.

Read more

Critical Security Controls - A Close Look at the Six Sub-Controls to CSC1

Security + Mark Pellechio + Nov 10, 2017

Critical Security Controls - A Close Look at the Six Sub-Controls to CSC1

Organizations are inundated with the latest security solutions and “expert” opinions on what they should be doing. In many cases, it might make more sense to take a step back and decide on a framework to map your current security posture against and get back to basics in developing solid cyber hygiene. One of these frameworks would be the Critical Security Controls (CSC) published and maintained by the Center for Internet Security (CIS).

Read more

What does the rise of artificial intelligence mean for your security operations?

Artificial Intelligence + ePlus Security Team + Nov 1, 2017

What does the rise of artificial intelligence mean for your security operations?

Are you struggling with security? If so, you’re not alone. Security gets harder every year. Thanks to digital business and mobility, you need to guard more attack vectors than ever before. Product updates and new software innovations often result in new vulnerabilities—and hackers are getting craftier and more adept at exploiting them.

Read more

KRACKing the Code: New Wireless Exploit

Security + Bryce Floyd + Oct 18, 2017

KRACKing the Code: New Wireless Exploit

Well it’s been an interesting start to the week to say the least. We all woke up Monday to read about a new wireless vulnerability labeled KRACK, or key reinstallation attack.

Read more

Are You Prepared to Meet the Next Benchmark in the New NYS DFS Cyber Security Regulations?

Security + Paul Lenhard + Oct 4, 2017

Are You Prepared to Meet the Next Benchmark in the New NYS DFS Cyber Security Regulations?

March 1, 2017 marked the date in which the NYS Department of Financial Services announced their compliance requirements for all covered entities that do business in New York State

Read more

Getting Started with Data Analytics

Artificial Intelligence + ePlus AI Team + Oct 2, 2017

Getting Started with Data Analytics

You can’t go to a conference or look at an article without hearing or reading something about data analytics. As an industry, we’ve gone from the recognition that we have all of this data (i.e. Big Data) to focusing on how to derive insight and value from that data. It’s been part of our world for so long that the term “Big Data” isn’t used in the same way it was before —we just talk about data. The scope and complexity of it is understood.

Read more

Understanding the Benefit and Value of the Cisco Enterprise Agreement

Collaboration + Ken Farber + Sep 27, 2017

Understanding the Benefit and Value of the Cisco Enterprise Agreement

Today, most organizations struggle through a myriad of complexities associated with purchasing and managing software licenses. Apart from dealing with differing termination dates and compliance, the permissible usage of a license can also be governed by elements such as named users, concurrent users, perpetual use, subscriptions, and negotiated volume discounts. Licenses can also be tied to specific hardware devices limiting the manner by which they may be transferred.

Read more

Navigating the World of Advanced Endpoint Protection

Security + Bill Wheeler + Sep 21, 2017

Navigating the World of Advanced Endpoint Protection

Ever feel like you’re fighting a losing battle? Your organization is pretty diligent when it comes to security. You have firewalls at the perimeter between your internal networks and the Internet. You have an anti-virus product deployed on every laptop, desktop, and server within your organization and the updates are kept current. You may have even deployed an application-aware next generation firewall, an IPS, or a SEIM/SEIM to collect and correlate security events from many data sources. Yet, despite your best efforts, your end users still manage to become infected with malware—or perhaps even ransomware. You may ask yourself, “With all of this protection in place, how is this possible?”

Read more

5 Things to Consider About Security in a Public/Hybrid Cloud

Cloud + Sam Curcio + Sep 14, 2017

5 Things to Consider About Security in a Public/Hybrid Cloud

Want to move more data and apps into the cloud, but you’re hesitant to do so because of security? It’s a valid concern. After all, protecting your sensitive data is your responsibility. When you put your data in the cloud, you’re taking a risk. It’s a calculated risk, one you’ve thought about carefully. But nonetheless, it’s still a risk.

Read more

Et Tu, Equifax? Navigating IT Security and Keeping Your Personal Data Safe

Security + Justin Bodie + Sep 12, 2017

Et Tu, Equifax? Navigating IT Security and Keeping Your Personal Data Safe

The world is changing rapidly, and we’re starting to see cracks in the security controls we’ve come to rely on in our digital society. Even Equifax, one of the largest credit reporting organizations out there, has suffered a data breach. I’m often asked by friends and family how I react to the news and what I recommend, so I thought I’d share my suggestions with you

Read more

10 Considerations to Build Strong Security Programs in Education

Security + ePlus Security Team + Sep 11, 2017

10 Considerations to Build Strong Security Programs in Education

Information security is a top concern in every industry. In 2015, the percentage of reported data breaches caused by hacking incidents increased 8.4 percent over 2014 numbers to reach the highest value in nine years (37.9 percent), according to a report from the Identity Theft Center. Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.

Read more

3 Ways Network Visibility Reduces Cost and Improves the Customer Experience

Networking + ePlus Networking Team + Aug 30, 2017

3 Ways Network Visibility Reduces Cost and Improves the Customer Experience

Downtime is an ugly word in IT, unless you’re talking about taking a vacation. It’s negative. No user wants to hear it or suffer the consequences of it. None of the IT managers that I know want to walk into an executive’s office and utter the words, “We’re down.”

Read more

Can’t Find Cyber Security Talent? Try These 5 Things

Security + ePlus Security Team + Aug 15, 2017

Can’t Find Cyber Security Talent? Try These 5 Things

According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.

Read more

Top Priorities for Healthcare CIOs in 2017

Healthcare + George Pashardis + Jul 10, 2017

Top Priorities for Healthcare CIOs in 2017

According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).

Read More

ePlus and OneCloud at Cisco Live

Cloud + ePlus Cloud Team + Jun 28, 2017

ePlus and OneCloud at Cisco Live

Stop by our booth at Cisco Live and meet the new ePlus OneCloud team; Sudheesh Subhash, Manish Tandon, Anjali Tyagi, and Desi Acosta! We are in Booth T12 in the Solutions Showcase – right near the House of Brews!

Read more

Don't Overlook the Why in Your Move to the Cloud

Cloud + ePlus Cloud Team + Mar 29, 2017

Don't Overlook the Why in Your Move to the Cloud

Simon Sinek, well-known author, speaker, and consultant, made headlines a few years ago with his business book (and extremely popular Ted Talk) titled Start with Why. In his presentation, Simon explains his belief that companies must understand what they do and how they do it. But more importantly, they first need to understand why they do it.

Read More

Connecting Cloud and Security in the Digital Age

Security + ​Lee Waskevich + Mar 16, 2017

Connecting Cloud and Security in the Digital Age

Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it's having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.

Learn More

Why Should Network Programmability Matter to You?

Networking + ePlus Networking Team + Mar 2, 2017

Why Should Network Programmability Matter to You?

We hear a lot about network programmability these days. It's a popular topic at conferences and a common subject in articles and blogs. Many experts and industry analysts are writing and talking about it, mostly in connection with a broader discussion about industry trends and software-defined networking (SDN).

Read More

Optimize Your Security Program with Managed Security Services

Security + Wayne St. Jacques + Feb 10, 2017

Optimize Your Security Program with Managed Security Services

I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.

Read More

Is Software-Defined Networking Relevant Outside of the Data Center?

Networking + ePlus Networking Team + Feb 9, 2017

Is Software-Defined Networking Relevant Outside of the Data Center?

What is your strategy for software-defined networking (SDN)? Are you just starting to think about it? Are you already utilizing the technology and realizing the benefits it has to offer? Or do you have the building blocks in place but haven't yet made the transition?

Read more

New Cybersecurity Regulations Soon to Take Effect in New York. Is Your Company Ready?

Security + ePlus Security Team + Jan 12, 2017

New Cybersecurity Regulations Soon to Take Effect in New York. Is Your Company Ready?

New cybersecurity regulations go into effect for financial services companies in the state of New York on March 1, 2017. And the time to act is now.

Read More

Ransomware Attacks on the Rise. Take Steps Now to Avoid Being a Victim.

Security + ePlus Security Team + Jan 6, 2017

Ransomware Attacks on the Rise. Take Steps Now to Avoid Being a Victim.

Ransomware attacks are increasing. And it’s costing U.S. companies millions to extract themselves from the clutches of these blackmailers—to the tune of $209 million in the first three months of this year, according to information provided to CNN by the Federal Bureau of Investigation (FBI).

Read More

Worried About Insider Threats? Bolster Your Defenses with User Behavior Analytics

Security + ePlus Security Team + Jan 6, 2017

Worried About Insider Threats? Bolster Your Defenses with User Behavior Analytics

Beware of the insider threat. For those of us in information security, those words represent sage advice we’ve heard (and given) for years. Long before Eric Snowden and the incident involving the National Security Agency (NSA) hit the headlines.

Read more

Malware Slipping through Your AV Defenses? Endpoint Detection and Response Solutions Can Help

Security + ePlus Security Team + Dec 13, 2016

Malware Slipping through Your AV Defenses? Endpoint Detection and Response Solutions Can Help

If you work in the area of IT security—or manage teams of people who do—I bet you’ve heard these statements before (or something similar): We’re constantly battling malware. Although we keep our antivirus software up to date, malware continues to get through. What else can we do?

Read More

Mobility – Beyond Wireless Access

Networking + ePlus Networking Team + Dec 2, 2016

Mobility – Beyond Wireless Access

Not long ago, wireless access was a novelty—a cool way to disconnect from a cubicle at work, so you could move around the building or collaborate with colleagues in a conference room and still have access to the applications and data you needed to do your job. Needless to say, much has changed since then.

Read more

Deliver Better Experiences and Lower Cost with SD-WAN

Data Center + ePlus Data Center Team + Oct 28, 2016

Deliver Better Experiences and Lower Cost with SD-WAN

​While not widely adopted yet, Software-defined WAN (SD-WAN) solutions are intriguing, and the technology continues to gain buzz in the marketplace. And it only makes sense that it would. After all, SD-WAN offers to simplify WAN operations, to improve application performance, and to lower costs.

Read more

Mitigate Business Risk with a Next-Generation Data Center Firewall

Security + ePlus Security Team + Oct 14, 2016

Mitigate Business Risk with a Next-Generation Data Center Firewall

Your business depends on applications and data. In today’s digital age, both are vital assets, and protecting them against cyber attacks is essential. But as you know, staying ahead of cyber threats is a never-ending job, and one that seems to get more difficult every day.

Read more

Avoid the Dreaded SSL Encryption Blind Spot

Security + ePlus Security Team + Oct 14, 2016

Avoid the Dreaded SSL Encryption Blind Spot

SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.

Read more

Is Your Security Program Effective Against Today’s Advanced Threats?

Security + ePlus Security Team + Sep 30, 2016

Is Your Security Program Effective Against Today’s Advanced Threats?

Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.

Read more

How Will You Use E-rate Funding for FY2017? Here Are Some Considerations.

Security + Nick D'Archangelo + Sep 30, 2016

How Will You Use E-rate Funding for FY2017? Here Are Some Considerations.

​Summer break is over, and the new school year is underway. If you’re like most school districts, you’ve had a busy summer, performing much needed system maintenance and installing or upgrading technology for the upcoming year.

Read more

Five Challenges You Can Overcome through Strategic Consulting

Services + Wayne St. Jacques + Aug 19, 2016

Five Challenges You Can Overcome through Strategic Consulting

The 2016 Olympic Games are winding down, and the competition has been exciting. I love watching the Olympics. What I appreciate most is hearing the stories of the athletes and their coaches. Their hard work, dedication, commitment to excellence, and competitiveness inspire me. And in my own way, I can relate to how difficult global competition can be.

Read more

Leverage Advanced Threat Intelligence and Machine Learning with Next-Generation Security Platforms

Security + ePlus Security Team + Aug 5, 2016

Leverage Advanced Threat Intelligence and Machine Learning with Next-Generation Security Platforms

Without question, today’s threats are more sophisticated than their predecessors. Cyber criminals have become experts at utilizing innovative techniques and social engineering to breach common layered-security defenses, implanting malware throughout corporate networks and stealing information.

Read more

Technology Purchases Can Be Expensive—Save Time and Money by Using PEPPM

Financing + Nick D'Archangelo + Jul 15, 2016

Technology Purchases Can Be Expensive—Save Time and Money by Using PEPPM

In the face of increasing demand for new and better service levels, administrators and educators are constantly challenged to do more with less. Technology innovation helps managers meet this growing demand as well as increase efficiency, improve productivity, and reduce costs.

Read more

Use Creative Financing to Accelerate Technology Projects without Busting Your Budget

Financing + Andrew Norton + Jul 15, 2016

Use Creative Financing to Accelerate Technology Projects without Busting Your Budget

In the face of increasing demand for new and better service levels, administrators and educators are constantly challenged to do more with less. Technology innovation helps managers meet this growing demand as well as increase efficiency, improve productivity, and reduce costs.

Read more

3 Factors to Consider Before Selecting a Body-Worn Camera Solution

Artificial Intelligence + Jim Murray and Joe DiPentino + Jul 14, 2016

3 Factors to Consider Before Selecting a Body-Worn Camera Solution

New use cases for video data have emerged. And camera technology has improved, offering onboard analytics and 360-degree monitoring of viewing areas at a price point more affordable than ever before. As a result, more cameras are being deployed by both public and private entities alike.

Read more

Protect Your Network Investments with Cisco Software

Data Center + Ken Farber + Jun 17, 2016

Protect Your Network Investments with Cisco Software

The digital business era is here and more than ever, IT must be agile, innovative, and efficient in order for our businesses to compete.

Read more

Guard Against Advanced Persistent Threats Through Internal Segmentation

Security + ePlus Security Team + Jun 3, 2016

Guard Against Advanced Persistent Threats Through Internal Segmentation

In 2015, the number of zero-day vulnerabilities discovered increased 125 percent from the year before, according to data compiled by Symantec. In addition, massive data breaches were again reported last year, resulting in an estimated 429 million identities exposed to cyber villains. That’s a huge number.

Read more

Developing Managers Is Vital for Employee Growth and Engagement

Services + David Kloes + Jun 3, 2016

Developing Managers Is Vital for Employee Growth and Engagement

In professional services, your people are your product. Their skills, knowledge, and experience are what separate you and your company in the marketplace. Attracting talented people and retaining them are essential, and your managers play a pivotal role.

Read more

3 Steps to Successful Cloud Deployments

Cloud + Scott Gilgallon + Apr 28, 2016

3 Steps to Successful Cloud Deployments

The promise of the cloud is compelling, and more companies are making the leap than ever before. In fact, Gartner predicts the worldwide public cloud services market will grow 16.5 percent in 2016 to total $204 billion. Those numbers are not surprising, given the tremendous opportunities made possible by cloud services.

Read more

Securing Mobile Apps Requires Discipline and Patience

Security + Heather Axworthy + Apr 15, 2016

Securing Mobile Apps Requires Discipline and Patience

Sales of smartphones totaled 1.2 billion units in 2014. We can all agree that is no real surprise. Ours is a society increasingly on the move. And these devices help to improve our productivity, both personally and professionally, and to satisfy our basic human need for instant gratification.

Read more

Differentiation Depends on Customer Experience

Services + ePlus Networking Team + Apr 1, 2016

Differentiation Depends on Customer Experience

The marketplace is shifting. Competition is dropping in nearly every industry. As a result, companies are turning their focus away from customers and fixing their attention inward, savoring their market dominance and building rigid, hierarchical organizations that move at a snail’s pace. Did I forget to mention today is April Fool’s Day?

Read more

Don't Overlook the Biggest Threat of All

Security + ePlus Security Team + Mar 18, 2016

Don't Overlook the Biggest Threat of All

The biggest threat to your company’s information security could be sitting two cubicles away from you. Make no mistake. Outside threats are real and shouldn’t be ignored. But the greatest risk to enterprise information security today is the insider threat.

Read More

Managed Services More than Just Device Management

Cloud + Wayne St. Jacques + Mar 4, 2016

Managed Services More than Just Device Management

There is little separation between business and IT, making the latter an increasingly vital component for business success. That fact, coupled with heightened market pressure, technology-savvy consumers, increased IT complexity, and the on-going need to find new ways to optimize OpEx spend, has shifted the conversation away from simple device management to strategic value and lifecycle management.

Read more

ePlus Awarded SSAE 16 Certification - A Testament to Managed Service Excellence

Services + Lori Kasper + Mar 4, 2016

ePlus Awarded SSAE 16 Certification - A Testament to Managed Service Excellence

ePlus has an obsession, albeit a very healthy one, for your company's managed IT environment. Our obsession with excellence in ensuring that your critical systems are secure and reliable garnered ePlus its sixth consecutive Type 2 SSAE 16 for our Managed Services Center.

Read more

Narrow the Consumption Gap Through Lifecycle Management

Security + ePlus Networking Team + Dec 18, 2015

Narrow the Consumption Gap Through Lifecycle Management

I read an article the other day about a technology product. It’s a well-known brand, so I won’t use the company name. The piece caught my attention because it used a well-worn phrase in the content: “…align IT with the business…”

Read more

All I Want for the Holidays

Artificial Intelligence + ePlus AI Team + Dec 18, 2015

All I Want for the Holidays

All I want for the holidays this year is an outcome! As an engineer at heart I love the technical details of a product or a solution. But a long time ago I realized that the outcome—solving the business problem—was much more important than the technical specifications.

Read more

It's All About the Data And Keeping It Secure

Security + John Reckner + Dec 2, 2015

It's All About the Data And Keeping It Secure

Data is the life blood of nearly every business. But, what if something happened to that data or it fell into the wrong hands? Want to do analytics on your structured and unstructured data? Good luck if that data is lost, stolen, corrupted or sabotaged.

Read more

Getting the Most from Your UC Collaboration Investments

Collaboration + Sonny Hudson + Dec 2, 2015

Getting the Most from Your UC Collaboration Investments

With advancements in UC/Collaboration technology over the years, especially over the last decade, a whole plethora of applications have emerged to help users stay better connected with their customers, their suppliers, and their coworkers. But, only if they are used.

Read more

Content Security - It's Not Just for Spam Anymore

Security + ​Lee Waskevich + Oct 16, 2015

Content Security - It's Not Just for Spam Anymore

I speak to customers regularly about security, and one of the first questions I always ask them is, “What are the two most popular applications you use on a daily basis?” And the majority of the time, the answer I get is web and email.

Read more

Ready to learn more?

Preparation and success go hand in hand.
Connect with us or use the form.
+1 888-482-1122