Partners

by Carissa Carissa No Comments

Cisco Intersight: Cloud-Based Management for Unified Computing Systems

Kris Linville - Senior Network Consultant Keller SchroederKris Linville
Senior Network Consultant

Cisco Intersight is a Software-as-a-Service (SaaS) platform that provides global management of your Cisco Unified Computing Systems (UCS) and Hyperflex infrastructure from a single interface.  The cloud-based intelligence gathers data from Cisco UCS Manager and the Cisco Integrated Management Controller (CIMC) to learn from hundreds of thousands of devices worldwide.  The data is combined with the Cisco knowledgebase to evolve and become smarter.  Tight integration between Intersight, the knowledge base, and TAC enables proactive system support which significantly reduces the time to issue resolution.  The aggregate information is synthesized and delivered in an actionable format through the Cisco Intersight recommendation engine.

Cisco IntersightCisco Intersight supports the OpenAPI specification and fully-functional Python and PowerShell SDKs.  It also offers a user-customizable dashboard to focus on the information, faults, and tasks that are relevant to them.  The user can then leverage the cross-launch virtual KVM and tunneling capabilities for UCS Manager, UCS Director, CIMC, and HyperFlex Connect for easy access to dive deeper into the individual systems.

The Base edition of Intersight is available for free to all Cisco UCS and Cisco HyperFlex customers running the latest versions of system software.  The Essentials edition license unlocks additional features, such as policy-based configuration with service profiles, firmware management, and the option to run as an on-prem virtual appliance to ensure compliance with data locality or security policies.  The Premier edition license includes entitlement for Cisco UCS Director.

For more information about Cisco Intersight, check out the link below and then contact your Keller Schroeder Select Account Manager a call to discuss how to get Intersight working for you.

DOWNLOAD:  Experience the Power of Cloud-Based Management with Cisco Intersight

by Carissa Carissa No Comments

Keller Schroeder Achieves VMware Master Services Competency in Data Center Virtualization

Vmware Master Services Competency Data Center Virtualization

Keller Schroeder is pleased to announce that we have successfully achieved Data Center Virtualization VMware Master Services Competency. This competency demonstrates that Keller Schroeder is committed to helping organizations accelerate their digital transformations by leveraging their validated services delivery capabilities around advanced VMware technologies.

“VMware is pleased to recognize Keller Schroeder for achieving Data Center Virtualization Master Services Competency. This achievement shows customers that partners like Keller Schroeder are dedicated, invested and have validated expertise in advanced VMware technologies,” said Jenni Flinders, Vice President and Worldwide Channel Chief, VMware. “We value Keller Schroeder as a VMware partner, and appreciate their efforts in achieving this VMware distinction as they work to increase their service delivery capabilities.”

VMware Master Services Competencies are designed to help partners demonstrate customer-centric solutions and technical proficiency, with proven success and expertise in a specialized area of business. These competencies also allow partners to differentiate into five specific solution areas.

VMware partners can achieve VMware Master Services Competencies in:

  • Cloud Management and Automation – Designates expertise in the delivery of VMware Cloud Management and Automation solutions and services with deep understanding and execution of cloud management design principles and methodologies.
  • Data Center Virtualization – Designates expertise in the delivery of VMware vSphere environments and digital infrastructure services with a deep understanding of and execution in Data Center Virtualization design principles and methodologies.
  • Digital Workspace – Designates partner organizational expertise to design, deliver and support the ongoing management of customer apps, data, and virtual desktop solutions whether on-premise or cloud-delivered. Achieving this competency validates partners’ deep understanding and execution on VMware Horizon and VMware Workspace ONE end-user computing solutions.
  • Network Virtualization – Designates expertise in the delivery of VMware NSX environments and services with deployment and optimization of NSX environment capabilities.
  • VMware Cloud on AWS – Designates expertise in the deployment of an integrated cloud solution that delivers an on-demand service enabling customers to run applications across a VMware Cloud Infrastructure environment with access to a broad range of AWS services.

The VMware Partner Network is the framework for collaboration between VMware and its partners, offering a wide range of benefits, training, certifications, and rewards. The VMware Partner Network includes a range of programs to meet the needs of a variety of partner expertise. Read more about VMware Partner Network.

You can download the official press release via this link: Keller Schroeder Achieves VMware Master Services Competency. If you have any questions about this competency, please reach out to our Director of Data Services, Matt Barton at 812-474-6825.

by Mallory Mallory No Comments

LogRhythm to Offer Industry’s First Unlimited Data Plan for SIEM

 

 

 

EVANSVILLE, IN | Wednesday, October 2nd, 2019 – Keller Schroeder is now offering an unlimited data plan for SIEM through its partnership with LogRhythm. While other vendors in the industry have previously claimed to support unlimited data plans, those promises have always come with a catch. LogRhythm is changing that with the industry’s first true unlimited data plan for its NextGen SIEM platform.

The reality is that big data volumes are growing exponentially. To stay within budget, CISOs are being forced to make difficult and risky decisions about which data they choose to protect—and not protect. LogRhythm introduced its unlimited data plan precisely because it believes CISOs shouldn’t be forced to restrict the amount of the data and what they protect. Not only does LogRhythm’s unlimited data plan allow CISOs to free themselves of these restrictions, it also lets them do so at a predictable price point, thus greatly lowering the risk of unprotected data. With the LogRhythm True Unlimited Data Plan, customers can have peace of mind knowing that they can add additional data sources to achieve complete visibility, implement new use cases, and scale as they grow — no tiers, fine print, or contract surprises.

“With unprotected data responsible for 3.2 billion breached records annually, LogRhythm’s model means our customers no longer have to sacrifice security because of cost,” said Corey Ainscough. “The unlimited data plan for LogRhythm’s XDR Stack makes it easy for organizations to get the appropriate level of security they need at a single consistent cost, no matter how much data they have in their environment. This offering represents a tremendous step forward in the fight against cyber threats.” Organizations that select LogRhythm will pay one price—and only one price—for their entire contract, enabling them to protect all their data, users, and systems, even if those numbers increase throughout the year, and even if their deployment architecture changes.

“2019 is set to be the worst year ever for data breaches, but how many of this year’s incidents could have been prevented if organizations had the ability to ingest and protect all of their data?” said Mark Logan, CEO, LogRhythm. “That’s why we created the industry’s first truly unlimited data plan for SIEM. With LogRhythm, CISOs no longer have to sacrifice security because of cost. Instead, they can now monitor and protect all their data while still staying well within their budget.”

The LogRhythm NextGen SIEM Platform combines patented machine-based analytics, user and entity behavior analytics (UEBA), network detection and response (NDR), and security orchestration, automation, and response (SOAR) in a single, unified architecture, delivered from the cloud or as an on-prem solution. The platform strengthens the maturity of security operations by better aligning a customer’s technology, team, and processes.

About LogRhythm
LogRhythm is a world leader in NextGen SIEM, empowering thousands of enterprises on six continents to measurably reduce cyber and operational risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines advanced security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) in a single end-to-end solution. LogRhythm’s technology serves as the foundation for the world’s most modern enterprise security operations centers (SOCs), helping customers successfully secure their cloud, physical, and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm NextGen SIEM Platform has won countless customer and industry accolades. For more information, visit logrhythm.com.

If you have any further questions, please reach out to Corey Ainscough.

Corey Ainscough- Keller Schroeder Leadership Team Corey Ainscough
Director, Information Security
(812) 474-6825
cainscough@kellerschroeder.com

by Carissa Carissa No Comments

Save the Date – 2019 Technology Vendor Summit

Technology Vendor Summit Logo

Our second largest event is coming back in 2019! Mark your calendars for our second annual Technology Vendor Summit on April 10th, 2019 from 8:00 AM – 4:00 PM (CST) at the Old National Events Plaza in Evansville. Further details will be coming to your inbox soon.

As with last year’s event, you can expect the area’s largest gathering of technology vendor partners, high-quality key note speakers, informative breakout sessions, your opportunity to network and collaborate with fellow IT professionals, and a chance for you to help us give back to our community.

Technology Vendor Summit
Wednesday, April 10th, 2019
Old National Events Plaza
8:00 AM – 4:00 PM

If you would like to hear from clients who attended last year’s event, take a look at this video:
2018 Technology Vendor Summit | From a Client’s Point of View

Photos and a list of vendor partners who helped make last year’s event such a success can be viewed here:
2018 Technology Vendor Summit

If you loved last year’s event and want to go ahead and register, you can sign up here:
Register for the 2019 Event

Additional details will be online soon, stay tuned!
by Carissa Carissa No Comments

Veeam Office 365 Backup version 2

Matt Barton Keller Schroeder Engineer

Matt Barton  – [Senior Consultant]

Do you have control of your Office 365 data? Do you have access to all the items you need? The knee-jerk reaction is typically, “Of course I do,” or “Microsoft takes care of it all.” But if you really think about it — are you sure? Microsoft takes care of quite a bit, and provides a great service for their customers. However, Microsoft’s primary focus is on managing the Office 365 infrastructure and maintaining uptime to your users. They are empowering YOU with the responsibility of your data. The misconception that Microsoft fully backs up your data on your behalf is quite common, and without a shift in mindset, could have damaging repercussions when this responsibility is left unattended. Ultimately, you need to ensure you have access to, and control over, your Exchange Online, SharePoint Online and OneDrive for Business data.

The misunderstanding falls between Microsoft’s perceived responsibility and the user’s actual responsibility of protection and long-term retention of their Office 365 data. The backup and recoverability that Microsoft provides and what users assume they are getting are often different. Meaning, aside from the standard precautions Office 365 has in place, you may need to re-assess the level of control you have of your data and how much access you truly have to it.

Microsoft Office 365 offers geo redundancy, which is often mistaken for backup. Backup takes place when a historical copy of data is made and then stored in another location. However, it is even more important that you have direct access to and control over that backup. So if data is lost, accidentally deleted or maliciously attacked, for example — you can quickly recover. Geo redundancy, on the other hand, protects against site or hardware failure, so if there is an infrastructure crash or outage, your users will remain productive and often oblivious to these underlying issues.

6 reasons why backing up Office 365 is critical:

  1. Accidental Deletion
  2. Retention policy gaps and confusion
  3. Internal security threats
  4. External security threats
  5. Legal and compliance requirements
  6. Managing hybrid deployments

Go ahead and take a closer look. There are security gaps you may not have been aware of before. You already made a smart business decision by deploying Microsoft Office 365, now find a backup solution that offers you both complete access and complete control of your Office 365 data and avoid the unnecessary risks of data loss. To learn more, reach out to your Keller Schroeder Select Account Manager.

by Carissa Carissa No Comments

End of General Support for VMware vSphere 5.5

Chris Haynes - Keller Schroeder Senior Systems EngineerChris Haynes  – [Senior Systems Consultant]

The End of General Support date for vSphere 5.5 is September 19, 2018.  VMware just released the newest version of VMware called vSphere 6.7, which means the oldest supported vSphere version of 5.5 will fall off the support list and vSphere 6.0 will now become the oldest supported version.

Vmware Vsphere 5.5 End of General Support

To maintain the full level of support and subscription services, VMware recommends upgrading to the current stable vSphere 6.5 Update 1 version, or to the newer 6.7 version once it is compatible with your environment. VMware has extended general support for vSphere 6.5 to a full five years from its release date, which means general support for vSphere 6.5 will end on November 15, 2021. For more information on the benefits of upgrading and how to upgrade, visit the VMware vSphere Upgrade Center:

https://www.vmware.com/products/vsphere/upgrade-center.html

If you would like assistance in moving to a newer version of vSphere, Keller Schroeder’s System Engineers provide a comprehensive service to upgrade your virtual infrastructure. The service includes recommendations, planning, pre-upgrade remediation, the actual upgrade itself, and post upgrade testing & validation. For more information contact your Keller Schroeder Account Manager.

by Carissa Carissa No Comments

Cisco Umbrella: First Line of Defense

Tyler Carlisle - Keller Schroeder Network ConsultantTyler Carlisle  – [Network Consultant]

How do you protect your users when they are off your corporate network, outside the boundaries of your perimeter security solution? Do they use a VPN? Are you sure? A recent Gartner study predicted that as much as 25% of corporate data traffic will bypass perimeter security. How can you guarantee that your users are secure? Cisco Umbrella can provide the answer.

Cisco Umbrella First Line of Defense

Cisco acquired OpenDNS in 2015 and rebranded its enterprise security products to Cisco Umbrella. Cisco Umbrella is a cloud-based Secure Internet Gateway that protects your users wherever they access the internet, whether on or off the corporate network, and on or off the VPN. Its DNS-based architecture and IP layer enforcement provide a first line of defense against threats, such as malware, ransomware, and C2 callbacks.

Cisco Umbrella Security

 

Cisco Umbrella provides the same protection to all devices on the corporate network, including IoT and mobile devices, by simply forwarding external DNS traffic to the Umbrella servers. Best of all, it provides all this protection with zero additional latency, 100% uptime, and it can be deployed in as little as 30 minutes.

 

If you would like more information on Cisco Umbrella, visit www.kellerschroeder.com/umbrella to download our “At A Glance” information sheet or request to be added to our upcoming webinar distribution list.  You can also contact your Keller Schroeder Select Account Manager today to start your free trial of Cisco Umbrella.

by Carissa Carissa No Comments

Baramundi Management Suite

Chance Webster – [Systems Engineer]

There are often tasks in IT departments that tend to create a lot of legwork and require significant time and effort to complete.  Reconciling hardware and software inventories, patching servers and PCs, mitigating security risks or misconfigurations, and deploying software quickly to many PCs or servers in a short amount of time are challenges that every IT department faces.  Baramundi Management Suite helps resolve many time-consuming tasks that you may have in your organization.

Baramundi Logo

With Baramundi Management Suite, hardware and software inventories can be automated, which reduces the manual overhead of collecting inventory information.  Inventories can then be broken out by static groups or groups based on specific attributes such as operating system versions or available disk space.  Inventory information can also be obtained from SNMP capable devices such as switches, routers, firewalls, and printers to reduce the overhead even further.

Security and vulnerabilities are also easier to manage using Baramundi Management Suite.  By providing vulnerability information in a consolidated way, it allows prioritization of these fixes either per machine or per specific vulnerability.  Baramundi Management Suite provides a platform which can be used to replace your WSUS deployment and provide you with a managed, up to date catalog of third party updates to help keep these applications updated.  In addition, a compliance management module is available to allow you to scan for any new vulnerabilities after your patch deployment is complete.

Baramundi Management Suite

Software deployment throughout the organization using Baramundi Management Suite is a snap.  If you are using a pre-packaged Microsoft Installer or other executable package, you can easily create a package to deploy that software with just a few mouse clicks.  If, however, the software requires some customization during the install, you can use the Baramundi Automation Studio to step through the installation as you normally would, recording each step along the way, to create your deployment package.  Once completed, you will be able to deploy even the most difficult applications quickly and easily.

Baramundi Management Suite is one of many systems management platforms.  What makes it stand out among the likes of SCCM, Altiris, and other systems management platform is the ease of use.  You can achieve tasks in minutes that have taken hours, if not days, to accomplish before.  Baramundi Management Suite also allows you to definitively see, in real-time, that action has been taken for a particular task.  Baramundi Management Suite is systems management in real time.

To learn how Baramundi can help resolve many of the time-consuming tasks you may have in your organization, please reach out to your Keller Schroeder Select Account Manager.

by Carissa Carissa No Comments

Carbon Black Defense Endpoint Security

Paul Miller Keller Schroeder Senior EngineerPaul Miller – [Senior Systems Engineer]

The world of endpoint security is a very crowded market right now, making it difficult to discern what makes one solution better than another. We at Keller Schroeder found ourselves hunting for answers in this market space last summer, and underwent an evaluation of the top ten solutions on the market. After this extensive research, we ended up establishing a new partnership with Carbon Black.

Carbon Black Logo

Carbon Black Defense brings a robust set of features to the table. Their entire technique for endpoint defense relies on detecting malicious software and stopping execution before damage is done.  As a cloud-based solution, Carbon Black monitors all processes running on your endpoint, scores them based on malicious tactics, techniques, and procedures (ram scraping, bad execution methods, self-elevation), and then stops the execution of processes that are found to be up to no good. This happens in real-time, and utilizes a very light agent (0-1% CPU) on the endpoints.

Carbon Black Predictive Security Cloud

The console provides kill chain insight like no other product on the market, and other advanced threat protection options.  From the console it is simple (a couple of clicks… really), to look at a threat’s kill chain, and blacklist the offending process from running again anywhere in your enterprise.  Management overhead for most environments are estimated at around 1-2 hours a week under normal conditions, making it light on administration overhead as well.

If you have a renewal in the future for your endpoint security products, and would like to take a look at CB Defense, please get in touch with your Keller Schroeder Select Account Manager. We would enjoy providing you a demo to show you why this product stands out in this very crowded field.

 

by Carissa Carissa No Comments

What is Visual Studio Team Services and How Does It Differ From TFS?

Carrie Rudolph Microsoft Business Unit DirectorCarrie Rudolph – [Microsoft Business Unit Director]

Best practices say that any custom development team should use a source control tool for versioning and collaboration.  Microsoft’s historical source control tool has been Team Foundation Server (TFS), released in 2006 and still a leader in source control today.   Visual Studio Team Services (VSTS) is the online version of Team Foundation Server (TFS), and while these two tools have many similarities there are a few differences as well.

Microsoft Visual StudioBoth provide an integrated and collaborative development environment that provides tools for version control, planning, and work tracking. They both offer much more than source control they are application development lifecycle management tools. TFS is an on premise installation with a SQL Server backend.   Previously known as Visual Studio Online, VSTS is a cloud service backed by Microsoft’s cloud platform, Azure.  For TFS, you typically connect to an intranet server and authenticate using Windows Authentication and Active Directory.  This authentication is normally transparent and most users do not realize it’s even occurring.  With VSTS you are connecting over the public internet, and you authenticate with a Microsoft account or using Microsoft Azure Active Directory.

Microsoft Visual Studio Screen ShotThere are several advantages to using VSTS instead of TFS.  Since VSTS is a cloud hosted service there is nothing for you to install or maintain.  You can eliminate cost of servers, time to install, update, and backup the software, patches, and OS. VSTS ensures that you will immediately be able to utilize the latest and greatest features and functionality.    With the online access to VSTS, the need for developers to connect via VPN to access source code is eliminated.  This can be a big benefit for development teams spread out over several locations.  VSTS can also host GIT projects as well as traditional team foundation projects, which allows you to manage all of your source code in one place and eliminate the need for multiple services. Lastly, VSTS also includes a marketplace with hundreds of available plugins, from Slack Integration, to Code Search, and Trello; there is an ever growing list of plugins available for free at the click of a button.

VSTS is free to those individuals with Visual Studio memberships.   A small team (up to five users) can access Basic features free of charge, and for larger teams, there is a per user monthly fee.  An unlimited number of project Stakeholders can also be added for free; they can view and edit work items but not manage code.

Microsoft Visual Studio Screen ShotThere are several options for migrating from TFS to VSTS.  Projects can be added to VSTS one at a time, in which case previous version history will be lost.  Projects and their related history can be migrated directly from TFS 2017 to VSTS using the TFS Database Import Service from Microsoft. . Finally, you can use a public API, but please know that many of these will not move all of your TFS artifacts and their history. If you have added customizations to TFS, these may cause errors that must be resolved prior to migrating to VSTS.  In some cases, customizations may be lost.

If you are looking to reduce time and cost related to hosting TFS and increase your team’s accessibility to source code, you will definitely want to consider Visual Studio Team Services. Contact your Select Account Manager to learn how Keller Schroeder can help.

Top