Keep Exchange Secure: A Checklist

Written by Joe Kozlowicz on Monday, May 8th 2017 — Categories: Enterprise Applications, Security

It’s impossible to imagine modern business without e-mail. While your users may scoff at the idea of a fax or hard line phone, in the background your IT department is working to make sure the e-mail systems your business relies upon continue to function smoothly, both in the moment of sending and receiving and for long term archive and retrieval.

A key element of a functional Exchange server is security. E-mail is an easy route for phishing, social engineering, and malware to enter your environment. It’s also a great way to access confidential information.

To maintain Exchange server security and the integrity of your business e-mail, follow this security checklist.

Continue Reading...

A Primer on VMware Storage Policy and How It Maximizes Capacity

Written by Joe Kozlowicz on Tuesday, April 25th 2017 — Categories: Cloud Hosting, Cloud Storage, VMware

We’ve covered software-defined storage (SDS) in the past on the blog, delving into how it can automate many of your storage administration tasks. Today we’ll get a bit deeper into how SDS improves storage capacity management by maximizing the performance of the storage attached to each virtual machine according to pre-set rules.

In vSphere, storage management involves a combination of performance and service levels and capacity planning. SDS controls in the VMware ecosystem are called Storage Based Policy Management (SPDM) and with their use, you no longer have to provision virtual machines individually according to their storage requirements.

Here’s how SPBM eliminates the need to overprovision and manually manage storage arrays.

Continue Reading...

Reselling Disaster Recovery? Start By Asking These 12 Questions

Written by Joe Kozlowicz on Friday, April 21st 2017 — Categories: Disaster Recovery, IT Channel

One of the best ways to introduce your MSP customers to the cloud is to implement cloud-based backup or disaster recovery infrastructure. As we have previously explained here on the blog, DR is an easy first step into the cloud and can in fact be used to migrate entire applications to cloud as the primary infrastructure.

Disaster Recovery as a Service is a solid avenue to add recurring revenue to your bottom line, then, and it also provides peace of mind for your customers, as they know their data and systems will be accessible even if their primary servers go down.

The first step to selling a disaster recovery plan is the discovery step. Use these twelve questions to learn the needs of your customers and what kind of service level they will need for their DR.

Continue Reading...

Why Expand Our Cloud and Colocation to Atlanta?

Written by Joe Kozlowicz on Monday, April 17th 2017

The news is out: Green House Data has expanded to Atlanta, GA with the acquisition of Cirracore, an enterprise cloud service provider.

While we’re naturally excited about retaining their talented engineers and welcoming the leadership of new CTO Fred Tanzella, there are some other reasons we decided to head to the ATL.

Read on to discover why Atlanta is a great site for a data center — and an attractive option for your cloud infrastructure.

Continue Reading...

Security and Compliance Are Different Areas of Risk Mitigation

Written by Joe Kozlowicz on Monday, April 10th 2017 — Categories: HIPAA Compliance, IT Operations, Security

While many organizations combine Security and Compliance under a single banner, and there is nothing inherently wrong with having a Chief Security and Compliance Officer or managing risk mitigation under a single umbrella, the fact is that compliance and security measures are two overlapping but inherently different practices of information security.

Compliance standards often change quickly and require quite a bit of work to ensure enforcement across an entire organization. Audit trails, regulator inspections, minimum mandates…they have to be tracked and adhered to 24/7. But meeting compliance standards often puts blinders on a security administrator.

Simply meeting a compliance measure — or even four or five — does not mean that your infrastructure is up to snuff with security best practices. Nor does following industry standards of security guarantee that you’ll meet your next compliance audit.

Continue Reading...