More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • Is Data Analytics More than Big Data?

    • Bill Evans
    • Nov 30, 2017
    “Big data.” “Data analytics.” “Big data analytics.” All of us are familiar with these terms, aren’t we? In fact, these words have been part of our vocabulary for long enough that they sometimes get used interchangeably. But that can lead us to make some false assumptions.
    Continue Reading >
  • When It Comes to IT Security: Don’t Forget the Mail

    • ePlus
    • Nov 30, 2017
    For nearly ten years, I’ve looked forward to the release of Verizon’s annual Data Breach Investigation Report (DBIR). With its analysis on the thousands of breaches and incidents from across the globe, occurring over its last full revolution around the sun, which cybersecurity pro among us does not look forward to such a treasure trove of insights and predictions to guide our focus for the coming year?
    Continue Reading >
  • DevOps Today: Automation First, Collaboration Second

    • Joe Brown
    • Nov 27, 2017
    In looking at definitions of DevOps, I found a general consensus that DevOps is primarily about enabling “cultural shifts” and increasing “collaboration” among technology development and operations/infrastructure teams. A much smaller emphasis is placed on the automation processes around delivering software and infrastructure changes. While I know I’m going to ruffle some feathers with this view, I am going to say it: we need to stop confusing the process efficiencies needed to reach DevOps excellence with the need for broader (and important!) organizational change.
    Continue Reading >
  • Cloud Native or Bust

    • Joe Brown
    • Nov 27, 2017
    There is a veritable cloud gold rush occurring today. CIOs are declaring “cloud-first strategies” while companies are pasting “cloud” onto any and every product they have. Their hope is to hit pay dirt amid uncharted and widespread IT transformation. As with most euphoric and rapid endeavors, reality is setting in for those who have made the journey to the cloud. Big payouts require work. For the cloud, a lot of that work happens at the application level.
    Continue Reading >
  • Critical Security Controls - A Close Look at the Six Sub-Controls to CSC1

    • Mark Pellechio
    • Nov 10, 2017
    Organizations are inundated with the latest security solutions and “expert” opinions on what they should be doing. In many cases, it might make more sense to take a step back and decide on a framework to map your current security posture against and get back to basics in developing solid cyber hygiene. One of these frameworks would be the Critical Security Controls (CSC) published and maintained by the Center for Internet Security (CIS).
    Continue Reading >
  • What does the rise of artificial intelligence mean for your security operations?

    • Tom Bowers
    • Nov 1, 2017
    Are you struggling with security? If so, you’re not alone. Security gets harder every year. Thanks to digital business and mobility, you need to guard more attack vectors than ever before. Product updates and new software innovations often result in new vulnerabilities—and hackers are getting craftier and more adept at exploiting them.
    Continue Reading >
  • KRACKing the Code: New Wireless Exploit

    • Bryce Floyd
    • Oct 18, 2017
    Well it’s been an interesting start to the week to say the least. We all woke up Monday to read about a new wireless vulnerability labeled KRACK, or key reinstallation attack.
    Continue Reading >
  • Are You Prepared to Meet the Next Benchmark in the New NYS DFS Cyber Security Regulations?

    • Paul Lenhard
    • Oct 4, 2017
    March 1, 2017 marked the date in which the NYS Department of Financial Services announced their compliance requirements for all covered entities that do business in New York State
    Continue Reading >
  • Getting Started with Data Analytics

    • Bill Evans
    • Oct 2, 2017
    You can’t go to a conference or look at an article without hearing or reading something about data analytics. As an industry, we’ve gone from the recognition that we have all of this data (i.e. Big Data) to focusing on how to derive insight and value from that data. It’s been part of our world for so long that the term “Big Data” isn’t used in the same way it was before —we just talk about data. The scope and complexity of it is understood.
    Continue Reading >
  • Understanding the Benefit and Value of the Cisco Enterprise Agreement

    • Ken Farber
    • Sep 27, 2017
    Today, most organizations struggle through a myriad of complexities associated with purchasing and managing software licenses. Apart from dealing with differing termination dates and compliance, the permissible usage of a license can also be governed by elements such as named users, concurrent users, perpetual use, subscriptions, and negotiated volume discounts. Licenses can also be tied to specific hardware devices limiting the manner by which they may be transferred.
    Continue Reading >
  • Navigating the World of Advanced Endpoint Protection

    • Bill Wheeler
    • Sep 21, 2017
    Ever feel like you’re fighting a losing battle? Your organization is pretty diligent when it comes to security. You have firewalls at the perimeter between your internal networks and the Internet. You have an anti-virus product deployed on every laptop, desktop, and server within your organization and the updates are kept current. You may have even deployed an application-aware next generation firewall, an IPS, or a SEIM/SEIM to collect and correlate security events from many data sources. Yet, despite your best efforts, your end users still manage to become infected with malware—or perhaps even ransomware. You may ask yourself, “With all of this protection in place, how is this possible?”
    Continue Reading >
  • 5 Things to Consider About Security in a Public/Hybrid Cloud

    • Sam Curcio
    • Sep 14, 2017
    Want to move more data and apps into the cloud, but you’re hesitant to do so because of security? It’s a valid concern. After all, protecting your sensitive data is your responsibility. When you put your data in the cloud, you’re taking a risk. It’s a calculated risk, one you’ve thought about carefully. But nonetheless, it’s still a risk.
    Continue Reading >
  • Et Tu, Equifax? Navigating IT Security and Keeping Your Personal Data Safe

    • Justin Bodie
    • Sep 12, 2017
    The world is changing rapidly, and we’re starting to see cracks in the security controls we’ve come to rely on in our digital society. Even Equifax, one of the largest credit reporting organizations out there, has suffered a data breach. I’m often asked by friends and family how I react to the news and what I recommend, so I thought I’d share my suggestions with you
    Continue Reading >
  • 10 Considerations to Build Strong Security Programs in Education

    • John Otte
    • Sep 11, 2017
    Information security is a top concern in every industry. In 2015, the percentage of reported data breaches caused by hacking incidents increased 8.4 percent over 2014 numbers to reach the highest value in nine years (37.9 percent), according to a report from the Identity Theft Center. Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
    Continue Reading >
  • 3 Ways Network Visibility Reduces Cost and Improves the Customer Experience

    • Bill Evans
    • Aug 30, 2017
    Downtime is an ugly word in IT, unless you’re talking about taking a vacation. It’s negative. No user wants to hear it or suffer the consequences of it. None of the IT managers that I know want to walk into an executive’s office and utter the words, “We’re down.”
    Continue Reading >
  • Can’t Find Cyber Security Talent? Try These 5 Things

    • Tom Bowers
    • Aug 15, 2017
    According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.
    Continue Reading >
  • Storage Just Keeps Growing – Dealing with the Impact of IOT and other Digital “Enablers”

    • Bill Evans
    • Aug 2, 2017
    Demand for storage capacity is growing. While enterprise storage systems factory revenue was down in the fourth quarter of 2016, according to International Data Corporation (IDC), total capacity shipments of enterprise storage were up, reaching 52.4 exabytes, an 18.3% increase from the fourth quarter of 2015.
    Continue Reading >
  • Top Priorities for Healthcare CIOs in 2017

    • George Pashardis
    • Jul 10, 2017
    According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).
    Continue Reading >
  • ePlus and OneCloud at Cisco Live

    • ePlus
    • Jun 28, 2017
    Stop by our booth at Cisco Live and meet the new ePlus OneCloud team; Sudheesh Subhash, Manish Tandon, Anjali Tyagi, and Desi Acosta! We are in Booth T12 in the Solutions Showcase – right near the House of Brews!
    Continue Reading >
  • Harford County, MD Tackles IT Modernization with ePlus Staffing

    • An Interview with ePlus Customer Ted Pibil
    • Mar 29, 2017
    Like all local governments, the government of Harford County, Maryland, a suburb of Baltimore founded in 1773, is committed to delivering the best services possible to the 250,000 or so residents who call the county their home—while always remaining fiscally responsible. That can be a delicate balancing act at times, especially in the area of information technology.
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation