1 - 877 - JESKELL

Jeskell's Technology Blog

Securing Communications at Every Level - Jeskell and CIS

Posted by Tony Celeste on Mar 21, 2018 9:03:00 AM

Is someone listening in on your calls?

If you’re a US federal government employee, this might be a well-founded concern. (If not… hopefully you’re just paranoid!)

With Russia manipulating US elections on social media, and Cuba somehow sickening our embassy staffers, it’s enough to make any American wary. All told, soft attacks on the US are on the rise. And phone lines are no exception.

Read More

Topics: Security

Are You Ready for the MGT Act?

Posted by Tony Celeste on Mar 9, 2018 8:11:00 AM

Is your agency spearheading IT initiatives with a limited budget and aging infrastructure dating back 10, 20 or even 50+ years?

Read More

Topics: Infrastructure Optimization

2018: When Faster and Cheaper Are No Longer Good Enough

Posted by Tony Celeste on Feb 12, 2018 11:55:00 AM

Tony_Celeste_Low Res_website.jpgIn his inaugural blog post, Jeskell's new Vice President of Strategic Initiatives Tony Celeste opines on FITARA, the MGT Act, and more.


Read More

Topics: Infrastructure Optimization

Not Everything That Happens in Vegas Stays There – A Recap of Dell EMC World

Posted by Bill Gleich on Jun 20, 2017 10:42:19 AM

Sometimes when you go to Las Vegas, you actually come home a winner.  Jeskell attended the Dell EMC World user forum last month in Las Vegas to explore what our expanded relationship means to you, our valued customers. We think you’ll like what we brought back.

 

A New Partnership - Jeskell and Dell

The atmosphere at Dell EMC World was electric. More than 13,000 users and partners gathered to explore the recent Dell EMC convergence.  The quantity and intensity of learning experiences was like drinking from a fire hose.  And founder Michael Dell seemed to be everywhere, whether sitting next to a Jeskell team member at a luncheon, or making himself available at training sessions. Plus, we got up-close exposure to emerging technologies and new customer support offerings.

Read More

Topics: Dell

Jeskell Security Blitz: Security Gap #5 - Long Term Investment

Posted by Joseph Swartz on May 26, 2017 3:37:00 PM

Every security initiative comes with a different set of tools, costs, and benefits.  Some tools are relatively easy to implement and bring a straightforward cost benefit analysis.  IPS devices and endpoint management tools, which still take some planning, are relatively easy to incorporate.  Other tools, however, while simple to install, take time to plan for, configure, and populate.  SIEM systems need to be integrated with other security tools and populated with log and flow sources.  They need to be tuned for efficiency and relevance.  But even those tools have a straightforward integration plan.

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #4 - Not Synching Network and Security Design

Posted by Joseph Swartz on May 25, 2017 4:46:00 PM

Often times, we tend to think of security as an external concern.  We have infrastructure like servers and storage, networks for our communication, and a team for developing our applications.  Oh, and security, that goes on top.  That’s not to say that this approach won’t work.  It will cover many of the security threats.  But will it cover as many security threats as possible and will it do so in a way that supports your business processes?

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #3 - Set and Forget

Posted by Joseph Swartz on May 24, 2017 5:13:00 PM

One of the most common gaps our engineers encounter is post-installation neglect.  Think of the number of security devices in any given network – IPS, firewall, encryption devices, aggregators, SIEM, patch management, malware, access management - to name but a few.  Each one of these gets attention during installation, but then too often languishes, forgotten, unless something breaks.

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #2 - No or Slow Workflow Plan

Posted by Joseph Swartz on May 23, 2017 4:06:00 PM

As threats increase and organizations rely more heavily on IT infrastructure, even a Security Information Event Manager (SIEM) may not be enough.  While a SIEM can tell you what’s happening, it can’t control responses.  Every organization is different, but many mature organizations still use manual processes in order to respond to and remediate incidents.

Read More

Topics: Security

Jeskell Security Blitz: Security Gap #1 - No Common Operating Picture

Posted by Joseph Swartz on May 22, 2017 5:20:07 PM

Continuing in the theme of last week's post on cyber security (read that post here), we will be running a security "blitz" this week. Jeskell security expert Joey Swartz will review the "Top 5 Security Integration Gaps," from Common Operating Picture to Network Design, and more. The purpose of this series is to give you relevant, timely information to help modernize your organization's IT security practices.

Read More

Topics: Security

Some Thoughts on the WannaCrypt Ransomware Attack

Posted by Bruce Brown on May 18, 2017 4:20:26 PM

What Is WannaCrypt?

Read More

Topics: Security