More Perspective

IGX Global UK Limited is a subsidiary of ePlus inc., a Delaware corporation, traded on NASDAQ GSM. ePlus is known for our engineering talent and rigor, and we employ many experts who have a keen pulse on the IT industry. From security, cloud, and storage to lifecycle and deployment services, our staff has a unique perspective. Read our thought leadership articles below.

  • Can’t Find Cyber Security Talent? Try These 5 Things

    • Tom Bowers
    • Aug 15, 2017
    According to a recent survey by Enterprise Storage Group (as reported in this Network World article), 45% of organizations reported a “problematic shortage” of cyber security skills, representing a 17% increase from their 2015 survey results. The shortage of skills creates a problem. But the obstacle is not insurmountable. Despite the talent shortage, here are five things you can do to find resources and build an effective cyber security program.
    Continue Reading >
  • Storage Just Keeps Growing – Dealing with the Impact of IOT and other Digital “Enablers”

    • Bill Evans
    • Aug 2, 2017
    Demand for storage capacity is growing. While enterprise storage systems factory revenue was down in the fourth quarter of 2016, according to International Data Corporation (IDC), total capacity shipments of enterprise storage were up, reaching 52.4 exabytes, an 18.3% increase from the fourth quarter of 2015.
    Continue Reading >
  • Top Priorities for Healthcare CIOs in 2017

    • George Pashardis
    • Jul 10, 2017
    According to International Data Corporation (IDC), IT spending is expected to reach $2.7 trillion worldwide in 2020. Financial services, manufacturing, and healthcare are expected to lead in spending. Among all industries, healthcare is projected to remain the fastest growing industry at 5.7% compound annual growth rate (CAGR).
    Continue Reading >
  • ePlus and OneCloud at Cisco Live

    • ePlus
    • Jun 28, 2017
    Stop by our booth at Cisco Live and meet the new ePlus OneCloud team; Sudheesh Subhash, Manish Tandon, Anjali Tyagi, and Desi Acosta! We are in Booth T12 in the Solutions Showcase – right near the House of Brews!
    Continue Reading >
  • Harford County, MD Tackles IT Modernization with ePlus Staffing

    • An Interview with ePlus Customer Ted Pibil
    • Mar 29, 2017
    Like all local governments, the government of Harford County, Maryland, a suburb of Baltimore founded in 1773, is committed to delivering the best services possible to the 250,000 or so residents who call the county their home—while always remaining fiscally responsible. That can be a delicate balancing act at times, especially in the area of information technology.
    Continue Reading >
  • Don’t Overlook the Why in Your Move to the Cloud

    • Mike Trojecki
    • Mar 29, 2017
    Simon Sinek, well-known author, speaker, and consultant, made headlines a few years ago with his business book (and extremely popular Ted Talk) titled Start with Why. In his presentation, Simon explains his belief that companies must understand what they do and how they do it. But more importantly, they first need to understand why they do it.
    Continue Reading >
  • Connecting Cloud and Security in the Digital Age

    • ​Lee Waskevich
    • Mar 16, 2017
    Cloud adoption is increasing. While growth rate estimates vary, the trend is going up. But some studies reveal that cloud security remains a big concern, and it’s having an impact on cloud services adoption. According to a study by Intel, 49% of customers said they slowed down their rate of adoption last year over security-related concerns, specifically citing a shortage of cybersecurity skills.
    Continue Reading >
  • Why Should Network Programmability Matter to You?

    • Bill Evans
    • Mar 2, 2017
    We hear a lot about network programmability these days. It’s a popular topic at conferences and a common subject in articles and blogs. Many experts and industry analysts are writing and talking about it, mostly in connection with a broader discussion about industry trends and software-defined networking (SDN).
    Continue Reading >
  • Optimize Your Security Program with Managed Security Services

    • Wayne St. Jacques
    • Feb 10, 2017
    I talk about security a lot these days. It’s unavoidable, really. In my position, I meet and speak with so many IT people—colleagues, customers, and prospective customers—from commercial industry, healthcare, government, and education. And all of them share one similar concern: security.
    Continue Reading >
  • Is Software-Defined Networking Relevant Outside of the Data Center?

    • Bill Evans
    • Feb 9, 2017
    What is your strategy for software-defined networking (SDN)? Are you just starting to think about it? Are you already utilizing the technology and realizing the benefits it has to offer? Or do you have the building blocks in place but haven’t yet made the transition?
    Continue Reading >
  • New Cybersecurity Regulations Soon to Take Effect in New York. Is Your Company Ready?

    • Tom Bowers
    • Jan 12, 2017
    New cybersecurity regulations go into effect for financial services companies in the state of New York on March 1, 2017. And the time to act is now.
    Continue Reading >
  • Ransomware Attacks on the Rise. Take Steps Now to Avoid Being a Victim.

    • Tom Bowers
    • Jan 6, 2017
    Ransomware attacks are increasing. And it’s costing U.S. companies millions to extract themselves from the clutches of these blackmailers—to the tune of $209 million in the first three months of this year, according to information provided to CNN by the Federal Bureau of Investigation (FBI).
    Continue Reading >
  • Worried About Insider Threats? Bolster Your Defenses with User Behavior Analytics

    • Tom Bowers
    • Jan 6, 2017
    Beware of the insider threat. For those of us in information security, those words represent sage advice we’ve heard (and given) for years. Long before Eric Snowden and the incident involving the National Security Agency (NSA) hit the headlines.
    Continue Reading >
  • Malware Slipping through Your AV Defenses? Endpoint Detection and Response Solutions Can Help

    • Tom Bowers
    • Dec 13, 2016
    If you work in the area of IT security—or manage teams of people who do—I bet you’ve heard these statements before (or something similar): We’re constantly battling malware. Although we keep our antivirus software up to date, malware continues to get through. What else can we do?
    Continue Reading >
  • Mobility – Beyond Wireless Access

    • Bill Evans
    • Dec 2, 2016
    Not long ago, wireless access was a novelty—a cool way to disconnect from a cubicle at work, so you could move around the building or collaborate with colleagues in a conference room and still have access to the applications and data you needed to do your job. Needless to say, much has changed since then.
    Continue Reading >
  • Deliver Better Experiences and Lower Cost with SD-WAN

    • Bill Evans
    • Oct 28, 2016
    ​While not widely adopted yet, Software-defined WAN (SD-WAN) solutions are intriguing, and the technology continues to gain buzz in the marketplace. And it only makes sense that it would. After all, SD-WAN offers to simplify WAN operations, to improve application performance, and to lower costs.
    Continue Reading >
  • Mitigate Business Risk with a Next-Generation Data Center Firewall

    • Tom Bowers
    • Oct 14, 2016
    Your business depends on applications and data. In today’s digital age, both are vital assets, and protecting them against cyber attacks is essential. But as you know, staying ahead of cyber threats is a never-ending job, and one that seems to get more difficult every day.
    Continue Reading >
  • Avoid the Dreaded SSL Encryption Blind Spot

    • Tom Bowers
    • Oct 14, 2016
    SSL encryption is a vital tool in protecting data in flight. Transmitting sensitive data without modification is risky because if it is stolen, the data is in clear text and easily can be used by identity thieves. SSL encryption addresses this issue by using an encryption algorithm to encode the data before it is transmitted, protecting the data in transit by preventing it from being sent in clear text.
    Continue Reading >
  • Is Your Security Program Effective Against Today’s Advanced Threats?

    • John Otte
    • Sep 30, 2016
    Cyber crime is a sophisticated criminal enterprise, and billions are lost annually through breaches of businesses, healthcare organizations, and government entities; and yes, educational institutions too.
    Continue Reading >
  • How Will You Use E-rate Funding for FY2017? Here Are Some Considerations.

    • Nick D'Archangelo
    • Sep 30, 2016
    ​Summer break is over, and the new school year is underway. If you’re like most school districts, you’ve had a busy summer, performing much needed system maintenance and installing or upgrading technology for the upcoming year.
    Continue Reading >

Tags

Ready To Begin? Contact Us Today.

Request A Presentation