More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • 7 Reasons to Consider SD-WAN Managed Services

    • Bob Brewer
    • May 14, 2020
    With the introduction of software-defined wide-area networking (SD-WAN), network engineering changed. SD-WAN technology is both transformational and disruptive, and it requires organizations to embrace a new approach to wide-area network (WAN) design and operation—and the roles and responsibilities of network engineers. Engaging a managed services provider (MSP) to manage SD-WAN networks offers several benefits. Here are seven reasons to consider SD-WAN Managed Services.
    Continue Reading >
  • Tales from the Road: RSA Conference 2020

    • Jason Nelson
    • Mar 11, 2020
    RSAC 2020 brought a lot of conversation around the coming “death” of passwords. All over the show floor were discussions of “passwordless access” married with difficult to steal factors like biometrics and physical key fobs. A few main themes emerged from this year’s RSA Conference. Let’s discuss.
    Continue Reading >
  • Don't trade one virus for another

    • ​Lee Waskevich
    • Mar 9, 2020
    Organizations around the globe are preparing for and executing precautionary plans to protect the health and welfare of their employees and citizens. The past few weeks have been a whirlwind of information, caution and concern as COVID-19 virus spreads around the globe. Fortunately, the digital age in which we live provides unique abilities to remain connected to our organizations, business applications and customers so as to minimize the disruption to our secular responsibilities.
    Continue Reading >
  • Countdown To HIMSS 20: Top 5 Technologies to Watch

    • George Pashardis
    • Feb 18, 2020
    Healthcare is one of the hottest industries for transformative technology! With HIMSS 20 right around the corner, thousands of healthcare professionals, clinicians and executives will turn out in search of innovation, emerging technology, insights, best practices and new applications for better health, patient engagement, patient care and security.
    Continue Reading >
  • Consumerism in Healthcare

    • Ken Puffer
    • Jan 22, 2020
    Healthcare organizations in the U.S. do a very good job of addressing the clinical needs of their patients. Though there is always room for improvement, it cannot be denied that hospitals today have deep experience and commitment to the health and wellness of their patients and the communities they serve.
    Continue Reading >
  • Medical Information Security & Medical Imaging Encryption

    • Ken Puffer
    • Jan 15, 2020
    Securing networks from outside threats and periodically evaluating these tools and alerting mechanisms has become commonplace in most organizations. It is reassuring to see that external threats have gained the attention of hospital boards and that additional support is being put behind data security. With the continuing instances of breaches and ransomware attacks that are reported, the process of effectively protecting an organization remains complicated.
    Continue Reading >
  • Cyber Security 2020: A Look Ahead

    • ePlus Security Team
    • Jan 13, 2020
    Hindsight is 2020 -- and given the increase in cyber-attacks we saw in 2019 -- we don’t need a crystal ball to predict that 2020 and the coming decade will keep cyber security in the limelight as the single most important foundational anchor to organizational success, and smooth operations. A fresh new decade will bring with it a freshly evolved set of threats, concerns and sophisticated cyber-attacks.
    Continue Reading >
  • Cyber Security Insurance

    • Ken Puffer
    • Jan 8, 2020
    Cyber Security Insurance, or Cyber Liability Insurance, is a category of insurance products that is intended to cover losses associated with data breaches, network security failures and business interruption from these events. Cyber Security Policy coverage varies, but most include: errors & omissions, media liability, network security and privacy.
    Continue Reading >
  • Stay Safe This Holiday Season

    • Paul Lenhard
    • Dec 16, 2019
    The 2019 Holiday season is in full swing. While we spend time with loved ones, search for the next “it” device, or simply take a breath from this year’s pace of life, we must remain cognizant that threat actor campaigns are ready to catch us off guard. Our data continues to be under constant attack. Here are a few helpful tips to ensure you’re adequately protected all season long.
    Continue Reading >
  • A Managed Security Services Q&A for First-Time Buyers

    • Ron Barnes
    • Oct 18, 2019
    How common is cybercrime? Well, one expert notes a ransomware attack occurs every 14 seconds. And in a separate article, he says cryptojacking, distributed denial of service attacks, phishing, and other schemes are costing the world economy $2 trillion a year.
    Continue Reading >
  • Poor East-West Visibility Gives Hackers a License to Steal

    • Sam Curcio
    • Oct 3, 2019
    Lack of visibility into east-west traffic is a problem for data-center operators and their ongoing battle to prevent a breach or theft of sensitive and confidential information. If organizations cannot monitor and log internal network segments, they cannot respond to active threats or prevent hackers from stealing confidential and sensitive information which often times includes customer and employee data.
    Continue Reading >
  • Enterprises looking to the future of Information Security should look to Purple Teaming Exercises

    • Brian Zimmer
    • Sep 27, 2019
    Enterprises looking to the future of Information Security should look to Purple Teaming Exercises. Partnering together as a single Purple Team, defenders – the Blue Team - and the attackers – who are the Red Teams – can better prepare the enterprise for modern adversaries.
    Continue Reading >
  • 4 Myths About GPU Acceleration

    • Andrew Malinow
    • Aug 13, 2019
    Despite a steady increase in GPU development activities, misunderstandings about the value of using GPUs to accelerate workloads persist. In this post, I debunk four of these myths and explain why I think the technology has broader utility than standard artificial intelligence (AI) use cases might suggest.
    Continue Reading >
  • Facial Recognition Systems

    • Marc Cohen
    • Aug 8, 2019
    Every technology has its place, and the people that use the systems have a responsibility to society to ensure the systems are not misused, and data captured is handled appropriately. Technology giants have acknowledged this and called for government regulation of face recognition technologies due to their far-reaching impacts.
    Continue Reading >
  • The Role of Network Access Controls in Healthcare Mergers

    • ePlus Security Team
    • Jun 4, 2019
    Healthcare systems and providers have been seeking ways to increase efficiency and productivity while embracing value-based care models and enabling patient empowerment. Efforts to make these goals a reality have manifested in two ways: the adoption of new tools and technology and through mergers and acquisitions.
    Continue Reading >
  • Three Features that Enable NAC Solutions to Secure Healthcare Networks

    • ePlus Security Team
    • May 16, 2019
    With recent advancements in technology, the healthcare space is changing. Specifically, new applications and connected devices are being developed to improve productivity and patient access to medical information. This is known as the consumerization of IT, in which technology tools and solutions focus on empowering the end user. In healthcare, this means the patient or physician.
    Continue Reading >
  • Demystifying Cloud Security

    • ePlus Cloud Team
    • Apr 30, 2019
    An increasing number of organizations are investigating options to migrate workloads to the cloud or replace legacy applications with a software as a service (SaaS) application. Moving assets from on-premise to the public or private cloud can enable substantial positive business outcomes but requires additional thought around how to protect sensitive information to maintain compliance, audit and privacy requirements.
    Continue Reading >
  • Top 10 IT Healthcare Trends to Watch

    • George Pashardis
    • Apr 4, 2019
    Anyone who walked around the Healthcare Information Management and Systems Society (HIMSS19) show in February saw some distinct themes in Healthcare IT emerging. Healthcare IT is forward-looking, futuristic, full of possibility and global. Keep reading for a breakdown of what’s hot, what’s emerging, what’s top of mind– and what’s full speed ahead.
    Continue Reading >
  • Beyond Cloud - Why You Need A Multi-Cloud Architecture

    • ePlus Cloud Team
    • Apr 3, 2019
    Are you pursuing a multiple cloud strategy? If so, you're among the majority of companies. In fact, according to Rightscale's 2019 State of the Cloud survey, 94% of respondents said they use cloud platforms in their enterprise. Not just one cloud platform-on average, they use almost five. In fact, 84% of respondents have a multi-cloud strategy.1
    Continue Reading >
  • An Interview from the Road: RSA Conference 2019

    • Marc Cohen | Jason Nelson
    • Mar 28, 2019
    Read more as we talk with our team on the ground at this year’s RSAC. ePlus Lead Security Engineer Jason Nelson attended sessions, and Marc Cohen, ePlus Solutions Director walked the floor, saw the demos and talked the talk!
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation