More Perspective
IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.
-
Cloud Native or Bust
There is a veritable cloud gold rush occurring today. CIOs are declaring “cloud-first strategies” while companies are pasting “cloud” onto any and every product they have. Their hope is to hit pay dirt amid uncharted and widespread IT transformation. As with most euphoric and rapid endeavors, reality is setting in for those who have made the journey to the cloud. Big payouts require work. For the cloud, a lot of that work happens at the application level.Continue Reading > -
Critical Security Controls - A Close Look at the Six Sub-Controls to CSC1
Organizations are inundated with the latest security solutions and “expert” opinions on what they should be doing. In many cases, it might make more sense to take a step back and decide on a framework to map your current security posture against and get back to basics in developing solid cyber hygiene. One of these frameworks would be the Critical Security Controls (CSC) published and maintained by the Center for Internet Security (CIS).Continue Reading > -
What does the rise of artificial intelligence mean for your security operations?
Are you struggling with security? If so, you’re not alone. Security gets harder every year. Thanks to digital business and mobility, you need to guard more attack vectors than ever before. Product updates and new software innovations often result in new vulnerabilities—and hackers are getting craftier and more adept at exploiting them.Continue Reading > -
KRACKing the Code: New Wireless Exploit
Well it’s been an interesting start to the week to say the least. We all woke up Monday to read about a new wireless vulnerability labeled KRACK, or key reinstallation attack.Continue Reading > -
Are You Prepared to Meet the Next Benchmark in the New NYS DFS Cyber Security Regulations?
March 1, 2017 marked the date in which the NYS Department of Financial Services announced their compliance requirements for all covered entities that do business in New York StateContinue Reading > -
Getting Started with Data Analytics
You can’t go to a conference or look at an article without hearing or reading something about data analytics. As an industry, we’ve gone from the recognition that we have all of this data (i.e. Big Data) to focusing on how to derive insight and value from that data. It’s been part of our world for so long that the term “Big Data” isn’t used in the same way it was before —we just talk about data. The scope and complexity of it is understood.Continue Reading > -
Understanding the Benefit and Value of the Cisco Enterprise Agreement
Today, most organizations struggle through a myriad of complexities associated with purchasing and managing software licenses. Apart from dealing with differing termination dates and compliance, the permissible usage of a license can also be governed by elements such as named users, concurrent users, perpetual use, subscriptions, and negotiated volume discounts. Licenses can also be tied to specific hardware devices limiting the manner by which they may be transferred.Continue Reading > -
Navigating the World of Advanced Endpoint Protection
Ever feel like you’re fighting a losing battle? Your organization is pretty diligent when it comes to security. You have firewalls at the perimeter between your internal networks and the Internet. You have an anti-virus product deployed on every laptop, desktop, and server within your organization and the updates are kept current. You may have even deployed an application-aware next generation firewall, an IPS, or a SEIM/SEIM to collect and correlate security events from many data sources. Yet, despite your best efforts, your end users still manage to become infected with malware—or perhaps even ransomware. You may ask yourself, “With all of this protection in place, how is this possible?”Continue Reading > -
5 Things to Consider About Security in a Public/Hybrid Cloud
Want to move more data and apps into the cloud, but you’re hesitant to do so because of security? It’s a valid concern. After all, protecting your sensitive data is your responsibility. When you put your data in the cloud, you’re taking a risk. It’s a calculated risk, one you’ve thought about carefully. But nonetheless, it’s still a risk.Continue Reading > -
Et Tu, Equifax? Navigating IT Security and Keeping Your Personal Data Safe
The world is changing rapidly, and we’re starting to see cracks in the security controls we’ve come to rely on in our digital society. Even Equifax, one of the largest credit reporting organizations out there, has suffered a data breach. I’m often asked by friends and family how I react to the news and what I recommend, so I thought I’d share my suggestions with youContinue Reading > -
10 Considerations to Build Strong Security Programs in Education
Information security is a top concern in every industry. In 2015, the percentage of reported data breaches caused by hacking incidents increased 8.4 percent over 2014 numbers to reach the highest value in nine years (37.9 percent), according to a report from the Identity Theft Center. Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.Continue Reading > -
3 Ways Network Visibility Reduces Cost and Improves the Customer Experience
Downtime is an ugly word in IT, unless you’re talking about taking a vacation. It’s negative. No user wants to hear it or suffer the consequences of it. None of the IT managers that I know want to walk into an executive’s office and utter the words, “We’re down.”Continue Reading > -
Can’t Find Cyber Security Talent? Try These 5 Things
According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.Continue Reading > -
Storage Just Keeps Growing – Dealing with the Impact of IOT and other Digital “Enablers”
Demand for storage capacity is growing. While enterprise storage systems factory revenue was down in the fourth quarter of 2016, according to International Data Corporation (IDC), total capacity shipments of enterprise storage were up, reaching 52.4 exabytes, an 18.3% increase from the fourth quarter of 2015.Continue Reading > -
Top Priorities for Healthcare CIOs in 2017
According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).Continue Reading > -
ePlus and OneCloud at Cisco Live
Stop by our booth at Cisco Live and meet the new ePlus OneCloud team; Sudheesh Subhash, Manish Tandon, Anjali Tyagi, and Desi Acosta! We are in Booth T12 in the Solutions Showcase – right near the House of Brews!Continue Reading > -
Harford County, MD Tackles IT Modernization with ePlus Staffing
Like all local governments, the government of Harford County, Maryland, a suburb of Baltimore founded in 1773, is committed to delivering the best services possible to the 250,000 or so residents who call the county their home—while always remaining fiscally responsible. That can be a delicate balancing act at times, especially in the area of information technology.Continue Reading > -
Don’t Overlook the Why in Your Move to the Cloud
Simon Sinek, well-known author, speaker, and consultant, made headlines a few years ago with his business book (and extremely popular Ted Talk) titled Start with Why. In his presentation, Simon explains his belief that companies must understand what they do and how they do it. But more importantly, they first need to understand why they do it.Continue Reading > -
Connecting Cloud and Security in the Digital Age
Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it’s having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.Continue Reading > -
Why Should Network Programmability Matter to You?
We hear a lot about network programmability these days. It’s a popular topic at conferences and a common subject in articles and blogs. Many experts and industry analysts are writing and talking about it, mostly in connection with a broader discussion about industry trends and software-defined networking (SDN).Continue Reading >
- 1
- 2
- 3 (current)
- 4
- 5