Featured Post

The Next Great Translation: Hyperscale Cloud

The Next Great Translation: Hyperscale Cloud

Moving and managing data centers is the core of our Managed Service business. Transitioning our clients to hyperscale cloud requires a different level of engineering, because much of what we do in the enterprise needs to be translated to Public Cloud. This translation does require some investment; however, once you’ve done it, the opportunities to accelerate […]

Most Recent

The Next Great Translation: Hyperscale Cloud

The Next Great Translation: Hyperscale Cloud

Moving and managing data centers is the core of our Managed Service business. Transitioning our clients to hyperscale cloud requires a different level of engineering, because much of what we do in the enterprise needs to be translated to Public Cloud. This translation does require some investment; however, once you’ve done it, the opportunities to accelerate […]

Does your cloud environment have enough protection

Does Your Cloud Environment Have Enough Protection?

Level One: Essential Protection Your first line of advanced support is built on a basic, straightforward foundation that’s easy to implement. Log manager and log review. This analyzes the huge volumes of data in your cloud. You can look for things like performance management, security incident response, and compliance requirements.   Fully managed intrusion detection. […]

Why Intrusion Detection Does Not Go Far Enough

  Intrusion Detection Is Not A Cure-All A ransomware attack in early 2016 dubbed “SamSam” was so severe — and, frankly, frightening — that the FBI sent out an alert to watch out for it. The problem was hackers discovered a huge security hole in a popular piece of open-source networking software and used it […]

OnX Blog

Keeping Intruders Out of Your Web Apps

Understand the Key Web App Attack Vectors Start by familiarizing yourself with hackers’ favorite ways into apps, such as: SQL injections Cross-site scripting (XSS) Denial of service (DoS) attacks There are many more, of course, and new ones are being dreamed up every day. Make sure your security team stays abreast of all of these […]

onx-setting-your-2017-IT-strategy

Setting your 2017 IT strategy…in dual speed

Level One of Dual-Speed IT involves a continuous, steady acceleration to support the stability of the organization and operational needs of the core business. This level is internally focused – the traditional enterprise IT that companies like OnX have worked with for many years, designing systems that promote scale and provide availability for their mission […]

5 Top IT Manager Concerns Addressed by a Security Intelligence Appliance

5 Top IT Manager Concerns Addressed by a Security Intelligence Appliance

So after completing your research, if you decide Splunk Enterprise Security is the right solution, then you must determine how to get Splunk up and running quickly with the limited time available from your IT staff? Enter the OnX Security Intelligence Appliance. OnX has developed the appliance in partnership with Splunk and Cisco to address […]

Back Back Backup, Encrypt Encrypt! Data Protection Services Leveraging the Public Cloud

Back Back Backup, Encrypt Encrypt! Data Protection Services Leveraging the Public Cloud

What’s Included? Fully managed data backup, replication and restoration solutions Data is encrypted & backed up from production to the secure high availability Azure cloud Monitoring and management confirms that the daily backup is successful Upon alert, OnX Network Operations Staff will identify the issue and rerun the backup Easily upgrade to a fully replicated […]

ONX-IT-Security-Patching-and-Vulnerability-Management

IT Security Patching and Vulnerability Management

How best to optimize your IT security patching? It can be useful to first break down patches between those that address functionality or incorrect code in an application/OS, and those which address security. The first requires an understanding of how the applications and operating systems work in concert and, therefore, what new code enhancements may […]

Traditional Backups are not for IT Disaster Recovery

Traditional Backups are not for IT Disaster Recovery

I like to look at an IT disaster recovery model like the OSI model for networking. At the bottom of the model layers 1-3 would be traditional backups. The middle layers 4-5 would be storage array replication. This method works well but it normally comes with added steps of storage presentation, drive scanning, VM imports, […]

Succeed with Every IT Disaster Recovery and Business Recovery Test / Exercise

What If They Taught Us All Wrong? What if the approach and established consulting methodology and process that we have all been taught is wrong? “Blasphemy!” some of the franchised establishment will say to my ideas – but hear me out if you are tired of doing the same thing and expecting different results. As […]