More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • The Future of Storage Is Predictive, NVMe- and SCM-ready. Are You Prepared?

    • ePlus Digital Infrastructure Team
    • Oct 19, 2018
    A new class of storage has arrived, one that’s predictive and poised for the future. It is future-proofed, standardized on Non-Volatile Memory Express (NVMe) and storage-class memory (SCM) for speed and performance gains. These storage innovations are powering reliability in enterprise workloads that depend on performance and speed. With more than 4.4 zettabytes of data — and 450 billion business transactions per day by 2020 demand for fast, reliable, and predictive storage couldn’t come at a better time.
    Continue Reading >
  • Power App Performance with AI-Driven Storage

    • ePlus Digital Infrastructure Team
    • Oct 19, 2018
    Storage optimization isn’t just a data problem, it’s an application issue if storage latency degrades app performance. As many as 61 percent of companies say faster app and IT service delivery are significant initiatives. Yet core to both of those goals is data availability, and legacy storage can be a hindrance that leads to costly application downtime if storage reliability isn’t addressed.
    Continue Reading >
  • It’s Time to Embrace Predictive Storage Capacity. Here’s Why.

    • ePlus Digital Infrastructure Team
    • Oct 19, 2018
    Artificial intelligence (AI) is making significant inroads in the data center, transforming manual tasks into automated ones that save time and optimize the overall health of the IT system. With so much to be gained from AI, it’s no wonder that IDC estimates that spending on this technology will grow to $19.1 billion in 2018.
    Continue Reading >
  • Ensuring a Risk-Aware Culture, Year-Round

    • Paul Lenhard
    • Oct 17, 2018
    We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.
    Continue Reading >
  • CSC 5: Controlled Use of Administrative Privileges

    • Russ Ortmann
    • Oct 11, 2018
    Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.
    Continue Reading >
  • CSC 4: Continuous Vulnerability Assessment and Remediation

    • Russ Ortmann
    • Sep 20, 2018
    One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.
    Continue Reading >
  • Breach Series - Part Three: Is Your Supply Chain Putting Your Systems or Data at Risk?

    • ​Lee Waskevich
    • Aug 24, 2018
    If you were a hacker, how would you infiltrate a well-protected target? How would you get inside an organization that has a solid security framework and has invested millions in cyber security?
    Continue Reading >
  • Breach Series - Part Two: Cyber Criminals are Assaulting the Retail Sector—Don’t Be the Next Victim

    • ​Lee Waskevich
    • Aug 15, 2018
    Data breaches in the retail sector are well-known and widely covered by the media—we all remember hearing about Target, Home Depot, and TJ Maxx. But with recent breaches at Panera Bread and Hudson’s Bay Company (owners of Saks Fifth Avenue and Lord & Taylor), we see that retail will continue to be a popular and prevalent target for cyber thieves. To avoid becoming the next victim, you must remain diligent and take action now.
    Continue Reading >
  • Breach Series - Part One: Follow These Steps to Avoid Becoming a Victim to Ransomware

    • ​Lee Waskevich
    • Aug 8, 2018
    Ransomware attacks hit us hard in 2017. SamSam, WannaCry, NotPetya, and other variants infected computers around the world, locking up systems, disrupting operations, and of course, extorting large sums of money from victims
    Continue Reading >
  • Data Loss Prevention in Healthcare

    • George Pashardis
    • Aug 7, 2018
    As an industry with strict privacy and security regulations, healthcare is challenged to implement increased cybersecurity measures to mitigate current threats. Failure to protect confidential information can result in fines amounting to millions of dollars. So whether you’re an IT security professional or the CIO of a hospital, medical university, health clinic, insurance company or a third-party organization involved in the industry, a robust Data Loss Prevention strategy should be a critical part of your security program.
    Continue Reading >
  • What you need to know about social media and IT security

    • Justin Bodie
    • Jun 21, 2018
    With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.
    Continue Reading >
  • What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

    • George Pashardis
    • Jun 13, 2018
    When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I’ve taken time to really think about what I saw and heard.
    Continue Reading >
  • HX AIM: Quickly Getting Started with Deep Learning

    • Zeki Yasar
    • Jun 8, 2018
    With so many technologies and moving parts involved in a Deep Learning project, many times stitching these components together and other manual infrastructure work along the path of experimentation to consumption can create significant challenges.
    Continue Reading >
  • IoT & Consumer Gear Attacks on the Rise…

    • ​Lee Waskevich
    • May 30, 2018
    Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.
    Continue Reading >
  • How to Get Started with Identity and Access Management (IAM)

    • Marc Cohen
    • Apr 26, 2018
    Identity management is a fundamental part of an effective security program. And, given the risks out there, it’s essential for protecting your organization against today’s cyber threats.
    Continue Reading >
  • Tales from the Road: RSA 2018

    • Jason Nelson
    • Apr 23, 2018
    A few main themes emerged from this year’s RSA Conference. Let’s discuss.
    Continue Reading >
  • Deep Learning Is Ready for Broad Adoption

    • Zeki Yasar
    • Mar 27, 2018
    The concepts behind AI and Deep Learning are not new, but until recently the application of Artificial Neural Networks has been limited and impractical. What has changed over the past couple of years is we now have the data, use cases, Deep Learning software tools, and powerful, specialized hardware that allow for us to create AI applications never before possible.
    Continue Reading >
  • Using the CSC 3 Control to Secure Configurations for Hardware and Software

    • Russ Ortmann
    • Mar 26, 2018
    Freshly installed operating systems and network-connected devices, by default, are usually configured for ease of deployment and ease of use. This means that the security controls are set to the least restrictive settings to ensure users experience little to no issues deploying their products. While this is great from the deployment perspective, it is not so great from the security perspective. Default admin accounts, unused protocols, and unnecessary pre-installed software can all be exploited in their default configuration.
    Continue Reading >
  • Don’t get phished! Personal Online Identity Protection

    • Marc Cohen
    • Feb 22, 2018
    Keeping your account information secure is the vital first step to good security hygiene. Below are some easy steps that can help keep your accounts safe. Much of the advice applies to both employees in an organization as well as to individuals’ personal online security.
    Continue Reading >
  • New Technologies = New Data Risks

    • ePlus Digital Infrastructure Team
    • Feb 13, 2018
    Network endpoint growth is explosive due to the surge in mobility and Internet of Things (IoT) devices. In today’s always-on world, work/life lines have blurred thanks to smartphones, laptops, and other devices that can be used for work. Along the same lines, companies need to be able to host these devices — especially companies that have a bring-your-own-device (BYOD) policy — on their own networks and, in some situations, provide remote access, while keeping networks and data safe in the process.
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation