Featured Post

4 questions to ask before hiring a DRaaS provider

Where is your DR site? The night Hurricane Sandy hit the New York metropolitan area in 2012, some Manhattan companies that backed up to New Jersey data centers found themselves in a major jam: The storm had knocked out power across the entire region, crippling backup sites as well as main sites. Conclusion: You want […]

Most Recent

OnX customer Survey

What we’re learning about our clients through Net Promoter Score (NPS)

OnX Rankings Compare Well So, how did we do? The majority of our clients approve of the job OnX is doing for them. Our NPS is 50.6, which is considered excellent by survey standards. We also scored well above the average score for all industries (44) and for our closest industry, technology/hardware/software (32.5). Regionally, OnX […]

retail commerce

Retail Commerce Makes a Giant Leap Forward

One of the key providers in this space is Salesforce’s Commerce Cloud, which the CRM giant developed after purchasing e-commerce specialist Demandware in 2016. This is a great option for retailers because they can avoid punishing up-front expenses for licensing and architecture. The unique revenue-sharing expense model to e-commerce is another welcome advance. As a […]

Ransomware attacks

Ransomware Attacks: Protecting Your Business from Becoming a Statistic

This particular ransomware strain, although hitting numerous hospitals in the UK and many other organizations across the world had a kill switch. The ransomware would attempt to connect to a domain with a very long and complex name, if the domain was _not_ live, the ransomware proceeded to encrypt all files. If the domain _was_ […]

3 Essential Steps for Disaster Recovery Testing

Avoidance and procrastination are not good options — especially in an age of high-profile cyberattacks. DR programs have to be tested to work out the kinks and discover unanticipated problems. Taking these three steps will help your company get serious about disaster recovery testing: 1. Create a culture of testing Start with the assumption that […]

4 questions to ask before hiring a DRaaS provider

Where is your DR site? The night Hurricane Sandy hit the New York metropolitan area in 2012, some Manhattan companies that backed up to New Jersey data centers found themselves in a major jam: The storm had knocked out power across the entire region, crippling backup sites as well as main sites. Conclusion: You want […]

3 Common Mistakes of OpenStack Beginners

I’ve just co-authored a new book on OpenStack architecture. Part of my motivation for writing it was to help people avoid the most common mistakes when embarking on a new OpenStack initiative. First, I’ll talk about avoiding three of these errors, and then I’ll talk a bit about the new OpenStack book. Mistake 1: Failing […]

The Next Great Translation: Hyperscale Cloud

Moving and managing data centers is the core of our Managed Service business. Transitioning our clients to hyperscale cloud requires a different level of engineering, because much of what we do in the enterprise needs to be translated to Public Cloud. This translation does require some investment; however, once you’ve done it, the opportunities to accelerate […]

Does your Cloud Environment have enough protection?

Does Your Cloud Environment Have Enough Protection?

Level One: Essential Protection Your first line of advanced support is built on a basic, straightforward foundation that’s easy to implement. Log manager and log review. This analyzes the huge volumes of data in your cloud. You can look for things like performance management, security incident response, and compliance requirements.   Fully managed intrusion detection. […]

Why intrusion detection does not go far enough

Why Intrusion Detection Does Not Go Far Enough

Intrusion Detection Is Not A Cure-All A ransomware attack in early 2016 dubbed “SamSam” was so severe — and, frankly, frightening — that the FBI sent out an alert to watch out for it. The problem was hackers discovered a huge security hole in a popular piece of open-source networking software and used it to […]