1 - 877 - JESKELL

Jeskell's Technology Blog

Not Everything That Happens in Vegas Stays There – A Recap of Dell EMC World

Posted by Bill Gleich on Jun 20, 2017 10:42:19 AM

Sometimes when you go to Las Vegas, you actually come home a winner.  Jeskell attended the Dell EMC World user forum last month in Las Vegas to explore what our expanded relationship means to you, our valued customers. We think you’ll like what we brought back.

 

A New Partnership - Jeskell and Dell

The atmosphere at Dell EMC World was electric. More than 13,000 users and partners gathered to explore the recent Dell EMC convergence.  The quantity and intensity of learning experiences was like drinking from a fire hose.  And founder Michael Dell seemed to be everywhere, whether sitting next to a Jeskell team member at a luncheon, or making himself available at training sessions. Plus, we got up-close exposure to emerging technologies and new customer support offerings.

Read More

Topics: Dell

Jeskell Security Blitz: Security Gap #5 - Long Term Investment

Posted by Joseph Swartz on May 26, 2017 3:37:00 PM

Every security initiative comes with a different set of tools, costs, and benefits.  Some tools are relatively easy to implement and bring a straightforward cost benefit analysis.  IPS devices and endpoint management tools, which still take some planning, are relatively easy to incorporate.  Other tools, however, while simple to install, take time to plan for, configure, and populate.  SIEM systems need to be integrated with other security tools and populated with log and flow sources.  They need to be tuned for efficiency and relevance.  But even those tools have a straightforward integration plan.

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #4 - Not Synching Network and Security Design

Posted by Joseph Swartz on May 25, 2017 4:46:00 PM

Often times, we tend to think of security as an external concern.  We have infrastructure like servers and storage, networks for our communication, and a team for developing our applications.  Oh, and security, that goes on top.  That’s not to say that this approach won’t work.  It will cover many of the security threats.  But will it cover as many security threats as possible and will it do so in a way that supports your business processes?

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #3 - Set and Forget

Posted by Joseph Swartz on May 24, 2017 5:13:00 PM

One of the most common gaps our engineers encounter is post-installation neglect.  Think of the number of security devices in any given network – IPS, firewall, encryption devices, aggregators, SIEM, patch management, malware, access management - to name but a few.  Each one of these gets attention during installation, but then too often languishes, forgotten, unless something breaks.

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #2 - No or Slow Workflow Plan

Posted by Joseph Swartz on May 23, 2017 4:06:00 PM

As threats increase and organizations rely more heavily on IT infrastructure, even a Security Information Event Manager (SIEM) may not be enough.  While a SIEM can tell you what’s happening, it can’t control responses.  Every organization is different, but many mature organizations still use manual processes in order to respond to and remediate incidents.

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #1 - No Common Operating Picture

Posted by Joseph Swartz on May 22, 2017 5:20:07 PM

Continuing in the theme of last week's post on cyber security (read that post here), we will be running a security "blitz" this week. Jeskell security expert Joey Swartz will review the "Top 5 Security Integration Gaps," from Common Operating Picture to Network Design, and more. The purpose of this series is to give you relevant, timely information to help modernize your organization's IT security practices.

Read More

Topics: Security

Some Thoughts on the WannaCrypt Ransomware Attack

Posted by Bruce Brown on May 18, 2017 4:20:26 PM

What Is WannaCrypt?

Read More

Topics: Security

Storage Tiers and the Future of Data Storage

Posted by Russell T. Schneider on Apr 25, 2017 4:03:14 PM

Last year, Jeskell’s Director of Storage Systems Practice, Russ Schneider, sat down with Jason Fornicola of the DC-based Federal News Radio for an interview about "The Future of Data Storage."

Here is a segment of Russ’s comments about storage tiers:

Read More

Topics: Storage

Dealing With Exponential Data Growth On A Massive Scale: High-Performance Storage System (HPSS)

Posted by Cameron Dupuis on Mar 23, 2017 4:30:09 PM

With exponential data growth a top storage concern, here’s a quick look at High-Performance Storage System (HPSS), one of the most powerful, mega-scale storage systems out there

Read More

Topics: Storage

Top Multi-Vendor Storage Virtualization Solution Introduces Transparent Cloud Tiering

Posted by JD Spruell on Feb 3, 2017 2:28:02 PM

Back in 2003 while working for IBM, I had the opportunity to work on a project called loadstone/redstone.  Working with the Remote Technical Support team out of Atlanta and Tucson, the project provided technical assistance and open systems support for customers with Shark storage (which later evolved into the DS8000).  These were the early days of fibre channel protocol, virtualization, and multipath drivers, and much mixing and meshing of technologies was going on. 

Read More

Topics: Storage