802.1x protocol, your network's first line of defense
Last year 90% of organisations considered that they were vulnerable to insider threats. According to Insider Threat Report 2018, the main risk factors indicated were: the great number of users who can access information which, according to their job description, they shouldn't even be able to view (37%); the ever-increasing number of equipment that has access to sensitive data (36%); the increasing level of complexity of IT technologies (35%).
In order to prevent and block such categories of risks, there are advanced solutions for Data Loss Prevention (DLP), Intrusion Prevention System (IPS), Intrusion Detection Solutions (IDS), Unified Threat Management (UTM) bundles, etc. In addition, by implementing the IEEE 802.1x security protocol you can ensure the basic protection of physical access to wired and/or WIFI networks within the company.
5 useful pieces of information from the VeeamON 2019 global event
The end of May has found part of the ECKO team at VeeamON 2019 in Florida, the annual event organised by Veeam, together with the most relevant global partners. Why a 5000 km and 12 hour flight in the age of videoconferences? Because we like being wherever people talk about technology, because several product releases were announced, and because we could not miss the chance to meet with the Veeam specialists, as well as the best global partners. Moreover, by going beyond the threshold representing a turnover of 1 billion and more than 350,000 customers (many of them from Romania, as well), Veeam has crossed over into a new league so we expected that the event would be bigger, which actually happened.
10 reasons why Azure is the first choice in your Disaster Recovery strategy
Guaranteed availability and data security, low costs and constant addition of new functionalities make Azure Site Recovery the leader of the global Disaster Recovery-as-a-Service market. ECKO's specialists can help you turn to account such competitive advantages, and thus to benefit from the quality of the Microsoft Cloud services.
Reality checked use cases for SD-WAN deployments
Pushed in the public agenda since 2013 - 2014, Software Defined WAN (SD-WAN) is already a mature technology. Moreover, the earnings generated by SD-WAN make many specialists recommend it as the ultimate solution for all the network problems. But the pace and adoption pattern differ depending on the requirements and resources of each company, and the start of such a project requires some more attention.
VersaStack, converged infrastructure solution forged by Cisco and IBM
In today's business world, every IT department is required to develop a simple, manageable, efficient and flexible infrastructure that can easily adapt to any change. However, the expansion of mobility, Cloud services, distributed applications and heterogeneous equipment complicates the situation and generates critical issues.
Keep your organization safe with CyberSecurity SAM
Managing the life cycle of software solutions has become a complex task that not many companies manage to perform efficiently. Cybersecurity Software Asset Management (SAM) processes by ECKO can help you not only cope with your licensing requirements and make some savings, but also increase the security of your entire organization.
Three common myths about NVMe storage devices
Due to the drop in purchase price and the growing adoption of SSD in the enterprise environment, companies are starting to show increasing interest in Non-Volatile Memory Express (NVMe) technology. The subject of NVMe is, however, "overwhelmed" by a series of preconceived ideas.
The phenomenon is visible not only globally, but also in Romania, as confirmed by the demands of organizations that have turned to the skills and experience that ECKO already has in this field. However, the interactions we have had so far on this topic have shown us that quite a few companies automatically associate technological novelties with a low level of applicability, business risks and high acquisition costs.
In regard to NVMe, these assumptions are not valid. This is why we wanted to quickly identify them.