More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • Fact or Fiction: 5 Misconceptions about SD-WAN

    • Bill Evans
    • Dec 11, 2018
    SD-WAN is here to stay. According to International Data Corporation (IDC), worldwide revenue for software-defined wide-area networking (SD-WAN) infrastructure and services is expected to reach $8.05 billion in 2021 – compare that to approximately $500M in 2017. The rapid development in this market has not gone unnoticed. Today, there are over 60 options for consuming SD-WAN. Two years ago, there were only a dozen or so. With the rapid growth of this market, and significant customer adoption, there is no shortage of information on what SD-WAN is, what the options are, why it is important, what role connectivity plays, how to implement, and how to manage this next generation technology. This information comes in many forms: vendor marketing, service provider marketing, and articles and blogs by independent analysts and consultants, to name a few. A wealth of information is valuable, but it can lead to misconceptions about what SD-WAN is, why you should care, and how to get started. All of that can add unnecessary complexity to the evaluation and decision-making process.
    Continue Reading >
  • Stay Secure During the Holidays

    • Paul Lenhard
    • Dec 4, 2018
    As 2018 comes to an end, threat actors continue to drive campaigns in hopes of catching shoppers, and the industry, off guard. With the increase in IoT devices for both personal and business use, we must ensure we remain protected while we ourselves, or our employees, are online.
    Continue Reading >
  • ePlus and AWS Marketplace: Delivering Software and Services to Enable Technology Innovation

    • Justin Mescher
    • Nov 29, 2018
    As organizations continue to rapidly adopt cloud services, they are undergoing countless changes such as consumption-based cost models, security, ongoing optimization, cloud architecture considerations, and procurement options. All of these changes can be concerning which can be an inhibitor to cloud adoption for many customers. Amazon Web Services (AWS) just took a huge step in easing some of this pain with the release of AWS Marketplace Consulting Partner Private Offers Program.
    Continue Reading >
  • The Future of Storage Is Predictive, NVMe- and SCM-ready. Are You Prepared?

    • ePlus Digital Infrastructure Team
    • Oct 19, 2018
    A new class of storage has arrived, one that’s predictive and poised for the future. It is future-proofed, standardized on Non-Volatile Memory Express (NVMe) and storage-class memory (SCM) for speed and performance gains. These storage innovations are powering reliability in enterprise workloads that depend on performance and speed. With more than 4.4 zettabytes of data — and 450 billion business transactions per day by 2020 demand for fast, reliable, and predictive storage couldn’t come at a better time.
    Continue Reading >
  • Power App Performance with AI-Driven Storage

    • ePlus Digital Infrastructure Team
    • Oct 19, 2018
    Storage optimization isn’t just a data problem, it’s an application issue if storage latency degrades app performance. As many as 61 percent of companies say faster app and IT service delivery are significant initiatives. Yet core to both of those goals is data availability, and legacy storage can be a hindrance that leads to costly application downtime if storage reliability isn’t addressed.
    Continue Reading >
  • It’s Time to Embrace Predictive Storage Capacity. Here’s Why.

    • ePlus Digital Infrastructure Team
    • Oct 19, 2018
    Artificial intelligence (AI) is making significant inroads in the data center, transforming manual tasks into automated ones that save time and optimize the overall health of the IT system. With so much to be gained from AI, it’s no wonder that IDC estimates that spending on this technology will grow to $19.1 billion in 2018.
    Continue Reading >
  • Ensuring a Risk-Aware Culture, Year-Round

    • Paul Lenhard
    • Oct 17, 2018
    We are now halfway through Cyber Security Awareness Month. While we all know that we can’t simply place emphasis on risk mitigation for only one month a year, this is a great time to give pause and think about where we are and where we want to go. Below are a few areas that we can spend some time reflecting on to ensure proper organizational security hygiene in order to maintain a strong, risk-aware culture.
    Continue Reading >
  • CSC 5: Controlled Use of Administrative Privileges

    • Russ Ortmann
    • Oct 11, 2018
    Denying users administrative access to their local workstations is not often received well. As computers have become an integral part of our daily life, users often get upset and frustrated when they do not have the privileges to complete specific tasks. This frustration is usually felt in the IT department as well, both from disgruntled users that are complaining about their lack of access and also from the increased workload because the IT department now needs to complete any task that requires administrative access.
    Continue Reading >
  • CSC 4: Continuous Vulnerability Assessment and Remediation

    • Russ Ortmann
    • Sep 20, 2018
    One of the more challenging aspects of cybersecurity is that the job is never done. New vulnerabilities, exploits, malware, and attacks are launched and discovered on a daily basis. According to Panda Security, an average of over 200,000 new malware samples are captured every day. With this continuous onslaught of new attacks coming every day, the security that defends an organization needs to be just as adaptable. In order to complete that mission, both the security technology that has been deployed and the professionals that deploy and operate it must be continually updating their ability to provide a robust security defense. Maintaining a current understanding of the cybersecurity world usually requires a significant investment of time, energy, and resources.
    Continue Reading >
  • Breach Series - Part Three: Is Your Supply Chain Putting Your Systems or Data at Risk?

    • ​Lee Waskevich
    • Aug 24, 2018
    If you were a hacker, how would you infiltrate a well-protected target? How would you get inside an organization that has a solid security framework and has invested millions in cyber security?
    Continue Reading >
  • Breach Series - Part Two: Cyber Criminals are Assaulting the Retail Sector—Don’t Be the Next Victim

    • ​Lee Waskevich
    • Aug 15, 2018
    Data breaches in the retail sector are well-known and widely covered by the media—we all remember hearing about Target, Home Depot, and TJ Maxx. But with recent breaches at Panera Bread and Hudson’s Bay Company (owners of Saks Fifth Avenue and Lord & Taylor), we see that retail will continue to be a popular and prevalent target for cyber thieves. To avoid becoming the next victim, you must remain diligent and take action now.
    Continue Reading >
  • Breach Series - Part One: Follow These Steps to Avoid Becoming a Victim to Ransomware

    • ​Lee Waskevich
    • Aug 8, 2018
    Ransomware attacks hit us hard in 2017. SamSam, WannaCry, NotPetya, and other variants infected computers around the world, locking up systems, disrupting operations, and of course, extorting large sums of money from victims
    Continue Reading >
  • Data Loss Prevention in Healthcare

    • George Pashardis
    • Aug 7, 2018
    As an industry with strict privacy and security regulations, healthcare is challenged to implement increased cybersecurity measures to mitigate current threats. Failure to protect confidential information can result in fines amounting to millions of dollars. So whether you’re an IT security professional or the CIO of a hospital, medical university, health clinic, insurance company or a third-party organization involved in the industry, a robust Data Loss Prevention strategy should be a critical part of your security program.
    Continue Reading >
  • What you need to know about social media and IT security

    • Justin Bodie
    • Jun 21, 2018
    With Facebook and data privacy in the news recently, it’s a great time to think about reviewing your social media presence. As you probably realize, everything you click on, like, or tweet is recorded. Assume it’s there forever, and the information could be made available to both authorized and unauthorized users or services.
    Continue Reading >
  • What I Learned at HIMSS18: The Hottest Topics in Healthcare IT

    • George Pashardis
    • Jun 13, 2018
    When you bring together more than 40,000 professionals, clinicians, executives and vendors from around the world, a massive amount of information gets shared. Too much to digest all at once. So in the three months since HIMSS18, I’ve taken time to really think about what I saw and heard.
    Continue Reading >
  • HX AIM: Quickly Getting Started with Deep Learning

    • Zeki Yasar
    • Jun 8, 2018
    With so many technologies and moving parts involved in a Deep Learning project, many times stitching these components together and other manual infrastructure work along the path of experimentation to consumption can create significant challenges.
    Continue Reading >
  • IoT & Consumer Gear Attacks on the Rise…

    • ​Lee Waskevich
    • May 30, 2018
    Imagine pulling an ordinary “average joe” off the street and placing him into an NFL playoff game. No football experience, no safety equipment, and no workout regime. What would you expect to happen? That’s about where we stand with the majority of our home internet gateways.
    Continue Reading >
  • How to Get Started with Identity and Access Management (IAM)

    • Marc Cohen
    • Apr 26, 2018
    Identity management is a fundamental part of an effective security program. And, given the risks out there, it’s essential for protecting your organization against today’s cyber threats.
    Continue Reading >
  • Tales from the Road: RSA 2018

    • Jason Nelson
    • Apr 23, 2018
    A few main themes emerged from this year’s RSA Conference. Let’s discuss.
    Continue Reading >
  • Deep Learning Is Ready for Broad Adoption

    • Zeki Yasar
    • Mar 27, 2018
    The concepts behind AI and Deep Learning are not new, but until recently the application of Artificial Neural Networks has been limited and impractical. What has changed over the past couple of years is we now have the data, use cases, Deep Learning software tools, and powerful, specialized hardware that allow for us to create AI applications never before possible.
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation