Author: Brett Bogler

5 New Tech Tested Products for Your Business

Ever wondered what the best in tech products are at this very moment? The experts at Network World weigh in and give us a little glimpse of the newest innovations on the market.

Vidder PrecisionAccess – By rendering applications invisible to unauthorized users PrecisionAccess does a fantastic job at preventing application hacking. Even with stolen credentials hackers can’t access protected applications with unauthorized devices.precision-vpn_clip_image002

VeloCloud SD-WAN – VeloCloud provides a hybrid WAN solution that works with MPLS private links as well as ATT-U-Verse with cable or any broadband DSL links. One tech pro reported an increase from almost zero network visibility to nearly 100% network visibility. A great tool for IT management across multiple locations without staff needing to be onsite at all times. Facilitates communication and network visibility.  velocloudlogo

Cisco Identity Services Engine (ISE) – With so many features that help with managing user-facing ports and devices, whats not to love about Cisco ISE. One huge factor reported by tech pros is the integration of TACACS within Cisco ISE, making it easy to run Cisco ISE as a Radius server or TACACS server for network devices. In addition to this, Cisco ISE significantly improves management of devices especially restricting machines from devices and sites they are not permitted to visit.Cisco_ISE

 

 

 

 

 

 

 

 

Intermedia SecuriSync – For backup and file sharing SecuriSync is the way to go. As a two-in-one tool for consolidated file backup and management of continuous file backups, Intermedia SecuriSync makes relevant files easier to access as they are all stored in a secured shared folder. If you have team members spread across different locations, this tool is very helpful in making sure the data is always backed up and kept secure. One platform with a master source keeps project collaboration as safe as it can be.securisync-logo-247x300

OpenSpan Transformation Platform – OpenSpan collects all employee desktop activities both productive and nonproductive, including time away from the computer. This platform allows businesses to evaluate from employee activities how employees work best and what can be improved upon in order to drive down operational costs and maximize revenue. Providing data about employee activities takes away the need for manual employee logs. Lack of employee logs that need to be analyzed by supervisors for key performance indicators (KPIs), such as call volumes, proves to be a huge time saver. OpenSpan Transformation Platform takes working smarter to a higher level.

yKVWo9CQ_400x400


If you would like to educate yourself in more detail about the information presented in this blog post please visit: Fave Raves: 29 tech pros share their favorite IT products 

Apple Watch 2 Predictions

apple-watch-21According to an investors note issued by Ming-Chi Kuo Securities, most of the changes to the Apple Watch will be to the inside rather than to the appearance. This solidifies rumors that the next version of the Apple Watch will be virtually the same as the previous except for minor hardware and application upgrades. Longer battery life and faster charging is one of the elements consumers are hoping the next generation will improve upon. The screen visibility when outdoors or in heavy natural lighting is less than perfect and is also on the radar as a possible improvement to be seen in the newer version.

Most customers are on board will updating their phones and PCs in a timely manner, even every year when the latest model makes its debut. However, watches are not a revolving door item. This leads me to believe that most of those buying the next version of the Apple Watch are new to the Apple Watch and want the latest and greatest in watch technology. Leaving the design of the device alone is one of the smartest things Apple can do. A change in design would exclude first generation buyers.

Kuo predicted a decline in watch shipments this year, to 7.5 million units shipped from 10.6 million in 2015, AppleInsider reported. It is proposed that this drop in sales could be due to the increased desire for more standalone features and specialized must have features that can only be found on the Apple Watch. Researchers and IT professionals predict Apple will begin segmenting the Apple Watch into different models with specific price points and features as they usually do with the iPhone and iPad.

One thing we know to be true, Apple will continue to polish up each new version of the Apple Watch until we are all itching for one on our wrists.

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: Next Apple Watch Will Be More ‘S’ Than 2

Software Defined Networking – 5 best practices

software-defined-networking_sdn

Software Defined Networking, (SDN) provides cost-effective, easily adaptable management of network control and forwarding functions. In simple terms, SDN is the physical separation of the network control plane from the forwarding plane, where a control plane controls multiple devices. Software Defined Networking is an emerging technology and therefore lacks long term examples to be used as a guideline for success. Greg Stemberger, Principal Solutions Architect, has laid out what he has seen in his experience with SDN, creating a five step process for best practices of implementation.

The first step, as it most often it with any new technology employment it to define usage. Bringing in a new technology for your company is only helpful if the technology fits the needs of your organization. Determine the problems your company is facing and proceed to evaluate whether the desired technology will be able to handle and alleviate such problems accordingly. No one technology will be able to solve all your problems. Identify specific problems you believe SDN can fix, specifically just one problem at a time. As Stemberger suggests, “A single use case with tangible, positive results, offers more reliable, measurable outcomes than implementing SDN across your entire network.”

It is crucial to assemble a cross functional team with SDN. Utilizing SDN in the correct manner means having a skilled team with a united approach. A team of well versed members is the best way to manage SDN. You need people who can combine skill sets to work together. Increasing efficiency lets you IT staff spend more of their time on you IT infrastructure rather than operational overhead. Get everyone on the same page, toward a universal goal.

Remember to test in a less critical network area. This is common sense for most. Find a less critical network that you can play with first before moving to your network. This way you avoid uprooting your entire network and facing the wrath of angry coworkers. A small-scale SDN test allows the flexibility to learn and make mistakes.

After testing for a while, make sure to go over the data you gather and review your test case. Did it solve your current problem? Is it a wise investment to expand SDN to the entire network? Do you have the infrastructure ready on both a personnel and technical level?

As a gentle reminder that it’s okay to stay on the cautious side, it is suggested that you gain maturity before expanding deployment.  Rather than diving head first, proceed slowly and make the implementation gradual. Even if the SDN went better than expected in one area of the network, this is not a gurantee that the entire network will function at the same caliber. How will SDN performance change across higher trafficked areas of the network?

These steps are meant to evaluate risks, gain perspective and ensure efficiency. In order to get the most out of Software Defined Networking, it’s best to get all your ducks in a row.


If you would like to educate yourself in more detail about the information presented in this blog post please visit: 5 steps to launching Software Defined Networking

VMware takes on the big boys with Boxer app for AirWatch

VMware launched a new version of the Boxer iOS app earlier this month and its pretty awesome. The app is for companies using VMware to manage their employee’s mobile devices VMware Boxer is available for both AirWatch and Workspace One customers. The app includes some attractive features, not surprising as Boxer is intended to replace the preloaded Mail feature on the Apple iPhone and iPad.

screen-shot-2015-10-15-at-9-03-16-amThe new app allows for preference customization such as change of sound when new emails arrives. You can also take different actions by swiping email messages, and easily bulk edit messages. The app combines email and calendar taking away the need to navigate away from Boxer in order to see your calendar events. Similar to other applications put forth by Microsoft and Google in terms of functionality.

Boxer VMware will be made free for AirWatch users on the orange, blue and yellow plans. For those who have already committed their email needs to VMware, no need to worry. If you are one of the many that still want VMware purely for email management, VMware will release a special build on the app that will let consumers more more slowly and provide more time between updates. Most consumer and commercial users will be presented with rapid release updates as they are made available, but the extra feature for businesses that wish to update at a slower pace is an attractive option.


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: VMware goes after Outlook with Boxer email app for Airwatch

 

Storage and Backup Products that Save the Day

Nasuni Cloud Storage – Leveraging the cloud as a primary storage component, Nasumi Cloud NAS combines local storage controllers and cloud storage to provide global access to data with local performance. The only file system of its kind that can scale from hundreds to hundreds of billions of objects without any degradation of performance. If your company is having trouble taking on highly data-intensive projects because of limited storage capacity that is costly to upgrade, NAS is the right solution.pic

DataCore’s SANsymphony-V – This software-defined storage option maximizes IT infrastructure performance by virtualizing storage hardware in a universally compatible format. The SANsymphony-V software runs on standard x86 servers, providing one set of common storage services across all storage devices even allowing communication between unlike storage devices. Customers and IT techs rave about the increase in performance and especially the 75% reduction in storage costs. “[It] meets our replication needs — replicates all critical data between two data centers. Also provides rich SAN capability.”says David Blaisdell, assistant IT director at the New London, NH, college.

Intermedia SecuriSync – Backup and File sharing with Intermedia SecuriSync is made easier by providing real-time backup and point-in-time restore for PCs and Macs. When data is the core of your business, you need to be able to retrieve and analyze data without delay. SecuriSync provides both consolidated file management and continuous backup of documents, while securing access to sensitive data. Going beyond read-only access, employees can edit documents from mobile devices without having to worry about version control. Real time backups give users the comfort of being able to easily restore corrupted files.

CloudBerry Managed Backup – This flexible and cost effective solution allows the user to choose the storage providers as well as provides remote management capabilities. For small to mid-sized businesses this is the perfect option. Cloudberry provides all of the benefits of cloud based storage, scalability, reliability and security but at a size attainable for small businesses. Backups are made both easier and less costly.


If you would like to educate yourself in more detail about the information presented in this blog post please visit: Go-to storage and disaster recovery products

 

ATM’s – The Next Target For Hackers

Use of outdated operating systems like Windows XP and lack of security means it’s still possible to crack ATM security, warn researchers.

As one of the millions of people who frequent their banks ATM at least once a week, the last thing on my mind is usually the security of the operating system. But when you think about the foundation of the machine taking your card and spitting back cash, you’ll realize this machine is just a PC running on old software. Easily susceptible to malware. Not comforting.

There was a 15 percent jump in ATM fraud activity between 2014 and 2015 and researchers believe statistics will only increase. Within this time cyber criminals were able to get their hands on more than $150 million. Researchers credit security vulnerabilities to the use of outdated platforms that no longer receive patches and fixes such as Windows XP.

“If we think of a modern ATM as a MS Windows PC with a money box attached to it that’s controlled through software, it is easy to see how it becomes an attractive target for any malware writer,” Sancho and Huq said.

Trend Micro and Europol’s European Cybercrime Center (EC3) discovered two main malware threats that either provide hackers with the card details of the user, or give the hacker privileges to dispensed cash. Most worrisome is the lack of extreme measures hackers have to employ in order to infect ATMS. Simply put all hackers have to do is install malware onto the machines via a USB or the CD- drive.

At the moment, malware ATM fraud has only been reported in international cases, Eastern Europe and South America. Despite little activity in the United States, authorities are aware of increasing malware ATM concerns and are monitoring cyber criminal forums for activity.1447059385670243


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: A Windows PC with a money box attached: Why hacking ATMs is big business for criminals

Ransomware Attacked My Mom’s Computer

04CYBERWALL-facebookJumbo
How My Mom Got Hacked, a real life story about Brooklyn artist who receives a panicked phone call from her mom one day complaining her personal computer has been taken over by some sort of strange encryption. The story unravels the journey Alina Simone and her mom Inna endure in order to restore the files back from the hackers. After the initial shock of the situation sets in the two research their options and realize, as many do, that there is little to no answer as to how to get the files back without paying the hefty $500 ransom fee.

“I thought it was a typical mom rant about hr hardware crashing and having to pay the repair people $500 because her computer crashed.” Like many of us do when our parents call us after a long days work, Alina didnt take her mom seriously. Seeing as it was Thanksgiving weekend, a major snowstorm had just hit, and the ransom deadline was already decreasing to less than a 24 hour bracket, Alina and her mother were frantic. Her mother didn’t make the deadline, and according the the hackers the ransom would double due to this. Inna pleaded with the hackers and they let her off with $500 ransom and all her files. Luckily.

Others, such as the case of the Hollywood Presbyterian Medical Center that was hacked in early February and had to pay a whooping 40 bitcoin, $17,000 ransom, in order to get their system back on track.

“The value of my personal files and pictures caps off somewhere. But [if] I encrypt the back-end of your corporate system and prevent you from processing payments, that has a tremendous value. And if the hacker can recognize the value of what he has, the ransom can be more dynamically set based on the content of the data.”explains Grayson Milbourne, Security Intelligence Director for Internet security firm Webroot.

From personal to corporate, ransomware is most certainly an eye opening experience to security vulnerabilities.

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: The Growing Threat of Ransomware

VPN, you need one

tunnelA Virtual Private Network, or VPN, is used to connect a private network, such as a company’s internal network, using public wires. In other words you can use an other IP other than your own to appear you are something other than where you actually are. Pretty nifty.

The use of VPNs started as a way for work at home users to access their workplace network just like if they were working in the office. Benefits reach farther now than just work from home capabilities. It is difficult for advanced malware to self install through open ports because the computer will always appear to be another system someplace else. This other machine is often a server that is more heavily protected and harder to attack. Not a sure fire way to avoid attack, but most certainly a viable preventative option.

This presents an extra method of protection, basically playing a little hid and go seek with potential malware. Increased mobile internet usage will eventual open a new vulnerability for hackers to infiltrate, and VPNs could be the eventual answer to avoiding attacks on mobile devices as well. Need for mobile phone VPNs could be the next big thing for data protection.

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: You Need a VPN, or You’re Screwed

Who’s in Charge of Your Cybersecurity?

 

The first step in successful cyber-security is getting every employee on board. It is pretty obvious that some hardware goes into creating a security shield around important data. As an Information Technology company ourselves, we already know the value Firewall, and anti virus software have on making your network more secure. However, in order to adopt a more proactive protection policy, the groundwork needs to be laid, starting with company culture and communication. It is increasingly important to enforce awareness and education in order to save a lot of headache later down the line.

The CEO of the company needs to take interest in cyber-security before any of the employees can get on board. Simple risk analysis is a great start. Buying products online is not sufficient. A knowledgeable IT professional should be on hand. You need someone who is going to leverage the right equipment as well as set security measures that fit your establishment.

“The cyber threat cannot be solved by buying products” says Tim Holman, president of the Information Systems Security Association in the UK. Holman has the right idea, if your company is not equipped with the right skills to manage these products they are basically junk. It is important to attack cyber-security the way a hacker does. Common sense leads us to find that reducing the amount of sensitive data stored will always be a great measure. Restricting access to information and getting cyber liability cover is another way to lessen the probability of attack.

As information continues to flow in and out of your business remember that with any exchange over the internet comes a great deal of risk. Ensure your company professionals understand how to practice good security efforts. Never open an attachment that is unfamiliar, back up data in two separate places, and utilize solid Firewall and anti-virus software. Keep all platforms up to date with the latest patches and security fixes. Top to bottom, cyber-security is the responsibility of all.bva_withninja_teal-centered

 


 

 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: The CISO, the CIO, the CEO, or you: Who is really responsible for cybersecurity?

The Rumors are True, Ubuntu Coming to Windows 10

 

Windows 10 Ubuntu

“The Bash shell is coming to Windows. Yes, the real Bash is coming to Windows” said Microsoft’s Kevin Gallo at the Build 2016 keynote.

The partnering of Canonical and Microsoft have made way for Ubuntu users to run Ubuntu simultaneously with Windows, not as a virtual machine, but as an integrated part of Windows 10. Speculation leads us to believe that Ubuntu will run on top of Windows 10’s Linux subsystems in a new Windows 10 Redstone build. Rather than integrate Linux into Windows, Ubuntu will run on the foundation of native Windows libraries.

With this new addition, Ubuntu users will be able to run Ubuntu simultaneously with Windows.”This is not a VM. This is not cross-compiled tools. This is native,” Gallo said. “We’ve partnered with Canonical to offer this great experience, which you’ll be able to download right from the Windows Store.”  

Although Ubuntu has not taken the container approach, Canonical and Microsoft have joined forces to bring containers to Windows. Using LXD, an open-source hypervisor designed for use with containers rather than virtual machines. You can look for the finished product in Azure, but most likely not Windows 10. In addition to this, the focus will not be on the Ubuntu Unity Interface but instead with CLI tools such as Bash and make, gawk, and grep.

The collaboration of companies stems from the shared user demographic. Both Ubuntu and Windows 10 main audience of users are developers. It is suspected that as the two companies continue to work together, more tools will appear that benefit the needs of programmers. For instance, as ZD.net anticipates, Ubuntu and Azure cloud effortlessly working together.

 

 


 

If you would like to educate yourself in more detail about the information presented in this blog post please visit: Microsoft and Canonical partner to bring Ubuntu to Windows 10