eSights: Blog

eSights: Blog

ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.


  • Three Features that Enable NAC Solutions to Secure Healthcare Networks

    • ePlus Security Team
    • May 16, 2019
    With recent advancements in technology, the healthcare space is changing. Specifically, new applications and connected devices are being developed to improve productivity and patient access to medical information. This is known as the consumerization of IT, in which technology tools and solutions focus on empowering the end user. In healthcare, this means the patient or physician.
    Continue Reading >
  • Demystifying Cloud Security

    • Jeff McCardel and Sam Curcio
    • Apr 30, 2019
    An increasing number of organizations are investigating options to migrate workloads to the cloud or replace legacy applications with a software as a service (SaaS) application. Moving assets from on-premise to the public or private cloud can enable substantial positive business outcomes but requires additional thought around how to protect sensitive information to maintain compliance, audit and privacy requirements.
    Continue Reading >
  • Top 10 IT Healthcare Trends to Watch

    • George Pashardis
    • Apr 4, 2019
    Anyone who walked around the Healthcare Information Management and Systems Society (HIMSS19) show in February saw some distinct themes in Healthcare IT emerging. Healthcare IT is forward-looking, futuristic, full of possibility and global. Keep reading for a breakdown of what’s hot, what’s emerging, what’s top of mind– and what’s full speed ahead.
    Continue Reading >
  • Beyond Cloud – Why You Need A Multi-Cloud Architecture

    • ePlus Cloud Team
    • Apr 3, 2019
    Are you pursuing a multiple cloud strategy? If so, you’re among the majority of companies. In fact, according to Rightscale’s 2019 State of the Cloud survey, 94% of respondents said they use cloud platforms in their enterprise. Not just one cloud platform—on average, they use almost five. In fact, 84% of respondents have a multi-cloud strategy.1
    Continue Reading >
  • An Interview from the Road: RSA Conference 2019

    • Marc Cohen | Jason Nelson
    • Mar 28, 2019
    Read more as we talk with our team on the ground at this year’s RSAC. ePlus Lead Security Engineer Jason Nelson attended sessions, and Marc Cohen, ePlus Solutions Director walked the floor, saw the demos and talked the talk!
    Continue Reading >
  • The Growing Importance of 'Security by Design'

    • ePlus Security Team
    • Mar 20, 2019
    "Security by design" is at an inflection point as a result of advances in automation, orchestration, artificial intelligence and machine learning, says Lee Waskevich of ePlus Technology. In a video interview with Information Security Media Group at RSA Conference 2019 in San Francisco, Waskevich discusses: why security by design is at a critical turning point; leveraging automation, orchestration, AI and ML; and the need for changes in organizations' cultures.
    Continue Reading >
  • Business Transformation Begins with Data Center Modernization

    • Mark Henson
    • Feb 11, 2019
    The world is experiencing a top-to-bottom digital transformation that will impact virtually every aspect of business, from competitive capabilities to security exposure. Making that transformation requires the essential elements of a modern data center – and a solid plan with a trusted advisor to help set them into place.
    Continue Reading >
  • California Data Privacy Bill: What You Need to Know

    • Sophat Chev
    • Feb 7, 2019
    The first data breach of 2019 took place less than 24 hours after the new year. The Australian State of Victoria reported an estimated 30,000 civil identities exfiltrated by way of spear phishing (using email to lure its victim to initiate a vulnerability). The agency claims all personal identifiable information (PII) was encrypted, which thankfully renders the data exfiltrated unusable. This security approach was a result of a compliance effort to meet the GDPR requirement for encrypting all PII data.
    Continue Reading >
  • Reduce Your Attack Surface with an IoT Security Strategy

    • Christopher Williams
    • Jan 24, 2019
    There is no doubt that the world of the Internet of Things (IoT) is here to stay. Consumer grade products such as TVs, speakers, toys, wearables, appliances and much more continue to flood the retail space offering enticing features to consumers. Learn how to reduce your attack surface with an IoT security strategy.
    Continue Reading >
  • SamSam Ransomware: How ePlus Helps Mitigate Threats

    • Marc Cohen
    • Jan 10, 2019
    In early December, the Department of Homeland Security (DHS), the National Cybersecurity and Communications Integration Center (NCCIC), and the Federal Bureau of Investigation (FBI) issued an alert regarding SamSam ransomware. Threat actors exploit Windows servers to gain persistent access to a victim’s network, utilizing SamSam to infect all reachable hosts.
    Continue Reading >
  • Fact or Fiction: 5 Misconceptions about SD-WAN

    • ePlus Networking Team
    • Dec 11, 2018
    SD-WAN is here to stay. According to International Data Corporation (IDC), worldwide revenue for software-defined wide-area networking (SD-WAN) infrastructure and services is expected to reach $8.05 billion in 2021 – compare that to approximately $500M in 2017. The rapid development in this market has not gone unnoticed. Today, there are over 60 options for consuming SD-WAN. Two years ago, there were only a dozen or so. With the rapid growth of this market, and significant customer adoption, there is no shortage of information on what SD-WAN is, what the options are, why it is important, what role connectivity plays, how to implement, and how to manage this next generation technology. This information comes in many forms: vendor marketing, service provider marketing, and articles and blogs by independent analysts and consultants, to name a few. A wealth of information is valuable, but it can lead to misconceptions about what SD-WAN is, why you should care, and how to get started. All of that can add unnecessary complexity to the evaluation and decision-making process.
    Continue Reading >
  • Stay Secure During the Holidays

    • Paul Lenhard
    • Dec 4, 2018
    As 2018 comes to an end, threat actors continue to drive campaigns in hopes of catching shoppers, and the industry, off guard. With the increase in IoT devices for both personal and business use, we must ensure we remain protected while we ourselves, or our employees, are online.
    Continue Reading >
  • ePlus and AWS Marketplace: Delivering Software and Services to Enable Technology Innovation

    • Justin Mescher
    • Nov 29, 2018
    As organizations continue to rapidly adopt cloud services, they are undergoing countless changes such as consumption-based cost models, security, ongoing optimization, cloud architecture considerations, and procurement options. All of these changes can be concerning which can be an inhibitor to cloud adoption for many customers. Amazon Web Services (AWS) just took a huge step in easing some of this pain with the release of AWS Marketplace Consulting Partner Private Offers Program.
    Continue Reading >
  • The Future of Storage Is Predictive, NVMe- and SCM-ready. Are You Prepared?

    • ePlus Networking Team
    • Oct 19, 2018
    A new class of storage has arrived, one that’s predictive and poised for the future. It is future-proofed, standardized on Non-Volatile Memory Express (NVMe) and storage-class memory (SCM) for speed and performance gains. These storage innovations are powering reliability in enterprise workloads that depend on performance and speed. With more than 4.4 zettabytes of data — and 450 billion business transactions per day by 2020 demand for fast, reliable, and predictive storage couldn’t come at a better time.
    Continue Reading >
  • Power App Performance with AI-Driven Storage

    • ePlus Networking Team
    • Oct 19, 2018
    Storage optimization isn’t just a data problem, it’s an application issue if storage latency degrades app performance. As many as 61 percent of companies say faster app and IT service delivery are significant initiatives. Yet core to both of those goals is data availability, and legacy storage can be a hindrance that leads to costly application downtime if storage reliability isn’t addressed.
    Continue Reading >
  • It’s Time to Embrace Predictive Storage Capacity. Here’s Why.

    • ePlus Networking Team
    • Oct 19, 2018
    Artificial intelligence (AI) is making significant inroads in the data center, transforming manual tasks into automated ones that save time and optimize the overall health of the IT system. With so much to be gained from AI, it’s no wonder that IDC estimates that spending on this technology will grow to $19.1 billion in 2018.
    Continue Reading >
  • Ensuring a Risk-Aware Culture, Year-Round

    • Paul Lenhard
    • Oct 17, 2018
    We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.
    Continue Reading >
  • CSC 5: Controlled Use of Administrative Privileges

    • Russ Ortmann
    • Oct 11, 2018
    Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.
    Continue Reading >
  • CSC 4: Continuous Vulnerability Assessment and Remediation

    • Russ Ortmann
    • Sep 20, 2018
    One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.
    Continue Reading >
  • Breach Series - Part Three: Is Your Supply Chain Putting Your Systems or Data at Risk?

    • ​Lee Waskevich
    • Aug 24, 2018
    If you were a hacker, how would you infiltrate a well-protected target? How would you get inside an organization that has a solid security framework and has invested millions in cyber security?
    Continue Reading >

Want to Learn More?

We have proven success engineering and deploying solutions that enable our customers to thrive in today's constantly changing, complex technology landscape.

 

LET'S GET STARTED