More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • What you need to know about social media and IT security

    • Justin Bodie
    • Jun 21, 2018
    With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.
    Continue Reading >
  • What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

    • George Pashardis
    • Jun 13, 2018
    When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I’ve taken time to really think about what I saw and heard.
    Continue Reading >
  • HX AIM: Quickly Getting Started with Deep Learning

    • Zeki Yasar
    • Jun 8, 2018
    With so many technologies and moving parts involved in a Deep Learning project, many times stitching these components together and other manual infrastructure work along the path of experimentation to consumption can create significant challenges.
    Continue Reading >
  • IoT & Consumer Gear Attacks on the Rise…

    • ​Lee Waskevich
    • May 30, 2018
    Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.
    Continue Reading >
  • How to Get Started with Identity and Access Management (IAM)

    • Marc Cohen
    • Apr 26, 2018
    Identity management is a fundamental part of an effective security program. And, given the risks out there, it’s essential for protecting your organization against today’s cyber threats.
    Continue Reading >
  • Tales from the Road: RSA 2018

    • Jason Nelson
    • Apr 23, 2018
    A few main themes emerged from this year’s RSA Conference. Let’s discuss.
    Continue Reading >
  • Deep Learning Is Ready for Broad Adoption

    • Zeki Yasar
    • Mar 27, 2018
    The concepts behind AI and Deep Learning are not new, but until recently the application of Artificial Neural Networks has been limited and impractical. What has changed over the past couple of years is we now have the data, use cases, Deep Learning software tools, and powerful, specialized hardware that allow for us to create AI applications never before possible.
    Continue Reading >
  • Using the CSC 3 Control to Secure Configurations for Hardware and Software

    • Russ Ortmann
    • Mar 26, 2018
    Freshly installed operating systems and network-connected devices, by default, are usually configured for ease of deployment and ease of use. This means that the security controls are set to the least restrictive settings to ensure users experience little to no issues deploying their products. While this is great from the deployment perspective, it is not so great from the security perspective. Default admin accounts, unused protocols, and unnecessary pre-installed software can all be exploited in their default configuration.
    Continue Reading >
  • Don’t get phished! Personal Online Identity Protection

    • Marc Cohen
    • Feb 22, 2018
    Keeping your account information secure is the vital first step to good security hygiene. Below are some easy steps that can help keep your accounts safe. Much of the advice applies to both employees in an organization as well as to individuals’ personal online security.
    Continue Reading >
  • New Technologies = New Data Risks

    • ePlus
    • Feb 13, 2018
    Network endpoint growth is explosive due to the surge in mobility and Internet of Things (IoT) devices. In today’s always-on world, work/life lines have blurred thanks to smartphones, laptops, and other devices that can be used for work. Along the same lines, companies need to be able to host these devices — especially companies that have a bring-your-own-device (BYOD) policy — on their own networks and, in some situations, provide remote access, while keeping networks and data safe in the process.
    Continue Reading >
  • How Does Mobility Affect the Cloud?

    • ePlus
    • Feb 13, 2018
    Just because businesses are driven by mobile technology and the cloud doesn’t mean that every company can afford an extensive networking staff to support it. To meet escalating connectivity demands with limited resources, our team at ePlus recommends simplified, mobile-first network design that integrates advanced security and control from the start.
    Continue Reading >
  • Public vs. Private Clouds: Why Can’t You Have It All?

    • ePlus
    • Feb 13, 2018
    Today’s companies need the ability to accelerate application development in order to keep up with the competition. But that’s difficult to do with aging infrastructures filled with slow applications that bring workloads to a crawl. To have any chance at innovation, more and more companies are moving to a hybrid infrastructure.
    Continue Reading >
  • How Hyperconvergence Increases Business Productivity

    • ePlus
    • Feb 13, 2018
    Two-thirds of enterprises report that improving IT efficiency is a top business priority.[1] In addition, 68 percent of IT managers in the same Forrester Research study state that cutting costs is critical. So how does an organization improve IT efficiency and reduce spending?
    Continue Reading >
  • Does Blockchain have a Place in Healthcare?

    • George Pashardis
    • Feb 7, 2018
    Despite the frequent headlines and all the hype that goes with them, blockchain is a difficult concept for many people to understand. Is it a technology or is it a new currency? Is it reality or is it just hype? As with many new things in the technology world, it’s easy to get confused initially, depending on how much information and education is available in the beginning. Two things that I can tell you is that blockchain is becoming disruptive and a lot of industries (Financial, Insurance, Healthcare, Music Industry, Airline Industry and even governments) are adopting or testing it.
    Continue Reading >
  • Taking a Closer Look at CSC 2: Inventory of Authorized and Unauthorized Software

    • Russ Ortmann
    • Feb 1, 2018
    In my last blog post, I discussed the history of the CIS 20 Critical Security Controls and the relevance they hold for organizations today. In my second post on this topic, let’s dive a bit deeper in CSC 2 security control, which is very tightly aligned with CSC 1 (Inventory of Authorized and Unauthorized Devices) control.
    Continue Reading >
  • Three Reasons Why Managed Services are a Cloud’s Best Friend

    • Wayne St. Jacques
    • Jan 19, 2018
    I think we all agree that a successful cloud strategy is important today. In fact, for most organizations, it’s imperative. Global competition and rising costs are driving businesses large and small to explore ways to integrate more cloud services into their operations. In fact, according to Gartner, the public cloud services market will reach $246 billion in 2017, an 18% increase from 2016.
    Continue Reading >
  • The Year of Security Automation: A Look Back

    • Tom Bowers
    • Jan 18, 2018
    In 2017, the industry saw the birth of security automation. As it continues to grow from infancy into something more robust, now is a good time to reflect on what it is and what operational impacts it is having on our systems.
    Continue Reading >
  • Spectre, Meltdown, and What Can Be Done!

    • Paul Lenhard
    • Jan 12, 2018
    As most of you are aware by now, researchers have discovered a set of critical vulnerabilities in all Intel CPU hardware, currently impacting the vast majority of devices in the wild. These devices include desktops, servers, mobiles devices and appliances, regardless of Operating System and whether they are located in the cloud or on premises.
    Continue Reading >
  • A History of the CIS 20 Critical Security Controls

    • Russ Ortmann
    • Jan 4, 2018
    The modern world of information security can often be a confusing one. Security practitioners are continually inundated with a barrage of data coming from reports, alerts, security tools, threat feeds, and more. At the same time, they are trying to align this data with the multiple security requirements, regulatory mandates, best practices, and frameworks that define their environment. Unchecked, the sheer volume of information can easily paralyze an organization from taking action when necessary. The ‘Fog of More’ can essentially become the larger threat to the environment.
    Continue Reading >
  • AWS re:Invent: One Revolutionary Event, Three Unique Takeaways

    • ePlus
    • Dec 18, 2017
    AWS re:Invent 2017 was the largest global conference focused on cloud computing, bringing together some of the brightest minds in the IT world. ePlus sent three of our experts to re:Invent in Vegas to view the conference through three lenses: Digital Infrastructure, Cloud, and Security. Here’s what they have to share about their Amazonian experience.
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation