Partners

by Mallory Mallory No Comments

LogRhythm to Offer Industry’s First Unlimited Data Plan for SIEM

 

 

 

EVANSVILLE, IN | Wednesday, October 2nd, 2019 – Keller Schroeder is now offering an unlimited data plan for SIEM through its partnership with LogRhythm. While other vendors in the industry have previously claimed to support unlimited data plans, those promises have always come with a catch. LogRhythm is changing that with the industry’s first true unlimited data plan for its NextGen SIEM platform.

The reality is that big data volumes are growing exponentially. To stay within budget, CISOs are being forced to make difficult and risky decisions about which data they choose to protect—and not protect. LogRhythm introduced its unlimited data plan precisely because it believes CISOs shouldn’t be forced to restrict the amount of the data and what they protect. Not only does LogRhythm’s unlimited data plan allow CISOs to free themselves of these restrictions, it also lets them do so at a predictable price point, thus greatly lowering the risk of unprotected data. With the LogRhythm True Unlimited Data Plan, customers can have peace of mind knowing that they can add additional data sources to achieve complete visibility, implement new use cases, and scale as they grow — no tiers, fine print, or contract surprises.

“With unprotected data responsible for 3.2 billion breached records annually, LogRhythm’s model means our customers no longer have to sacrifice security because of cost,” said Corey Ainscough. “The unlimited data plan for LogRhythm’s XDR Stack makes it easy for organizations to get the appropriate level of security they need at a single consistent cost, no matter how much data they have in their environment. This offering represents a tremendous step forward in the fight against cyber threats.” Organizations that select LogRhythm will pay one price—and only one price—for their entire contract, enabling them to protect all their data, users, and systems, even if those numbers increase throughout the year, and even if their deployment architecture changes.

“2019 is set to be the worst year ever for data breaches, but how many of this year’s incidents could have been prevented if organizations had the ability to ingest and protect all of their data?” said Mark Logan, CEO, LogRhythm. “That’s why we created the industry’s first truly unlimited data plan for SIEM. With LogRhythm, CISOs no longer have to sacrifice security because of cost. Instead, they can now monitor and protect all their data while still staying well within their budget.”

The LogRhythm NextGen SIEM Platform combines patented machine-based analytics, user and entity behavior analytics (UEBA), network detection and response (NDR), and security orchestration, automation, and response (SOAR) in a single, unified architecture, delivered from the cloud or as an on-prem solution. The platform strengthens the maturity of security operations by better aligning a customer’s technology, team, and processes.

About LogRhythm
LogRhythm is a world leader in NextGen SIEM, empowering thousands of enterprises on six continents to measurably reduce cyber and operational risk by rapidly detecting, responding to and neutralizing damaging cyberthreats. The LogRhythm NextGen SIEM Platform combines advanced security analytics; user and entity behavior analytics (UEBA); network detection and response (NDR); and security orchestration, automation, and response (SOAR) in a single end-to-end solution. LogRhythm’s technology serves as the foundation for the world’s most modern enterprise security operations centers (SOCs), helping customers successfully secure their cloud, physical, and virtual infrastructures for both IT and OT environments. Built for security professionals by security professionals, the LogRhythm NextGen SIEM Platform has won countless customer and industry accolades. For more information, visit logrhythm.com.

If you have any further questions, please reach out to Corey Ainscough.

Corey Ainscough- Keller Schroeder Leadership Team Corey Ainscough
Director, Information Security
(812) 474-6825
cainscough@kellerschroeder.com

by Carissa Carissa No Comments

Save the Date – 2019 Technology Vendor Summit

Technology Vendor Summit Logo

Our second largest event is coming back in 2019! Mark your calendars for our second annual Technology Vendor Summit on April 10th, 2019 from 8:00 AM – 4:00 PM (CST) at the Old National Events Plaza in Evansville. Further details will be coming to your inbox soon.

As with last year’s event, you can expect the area’s largest gathering of technology vendor partners, high-quality key note speakers, informative breakout sessions, your opportunity to network and collaborate with fellow IT professionals, and a chance for you to help us give back to our community.

Technology Vendor Summit
Wednesday, April 10th, 2019
Old National Events Plaza
8:00 AM – 4:00 PM

If you would like to hear from clients who attended last year’s event, take a look at this video:
2018 Technology Vendor Summit | From a Client’s Point of View

Photos and a list of vendor partners who helped make last year’s event such a success can be viewed here:
2018 Technology Vendor Summit

If you loved last year’s event and want to go ahead and register, you can sign up here:
Register for the 2019 Event

Additional details will be online soon, stay tuned!
by Carissa Carissa No Comments

Veeam Office 365 Backup version 2

Matt Barton Keller Schroeder Engineer

Matt Barton  – [Senior Consultant]

Do you have control of your Office 365 data? Do you have access to all the items you need? The knee-jerk reaction is typically, “Of course I do,” or “Microsoft takes care of it all.” But if you really think about it — are you sure? Microsoft takes care of quite a bit, and provides a great service for their customers. However, Microsoft’s primary focus is on managing the Office 365 infrastructure and maintaining uptime to your users. They are empowering YOU with the responsibility of your data. The misconception that Microsoft fully backs up your data on your behalf is quite common, and without a shift in mindset, could have damaging repercussions when this responsibility is left unattended. Ultimately, you need to ensure you have access to, and control over, your Exchange Online, SharePoint Online and OneDrive for Business data.

The misunderstanding falls between Microsoft’s perceived responsibility and the user’s actual responsibility of protection and long-term retention of their Office 365 data. The backup and recoverability that Microsoft provides and what users assume they are getting are often different. Meaning, aside from the standard precautions Office 365 has in place, you may need to re-assess the level of control you have of your data and how much access you truly have to it.

Microsoft Office 365 offers geo redundancy, which is often mistaken for backup. Backup takes place when a historical copy of data is made and then stored in another location. However, it is even more important that you have direct access to and control over that backup. So if data is lost, accidentally deleted or maliciously attacked, for example — you can quickly recover. Geo redundancy, on the other hand, protects against site or hardware failure, so if there is an infrastructure crash or outage, your users will remain productive and often oblivious to these underlying issues.

6 reasons why backing up Office 365 is critical:

  1. Accidental Deletion
  2. Retention policy gaps and confusion
  3. Internal security threats
  4. External security threats
  5. Legal and compliance requirements
  6. Managing hybrid deployments

Go ahead and take a closer look. There are security gaps you may not have been aware of before. You already made a smart business decision by deploying Microsoft Office 365, now find a backup solution that offers you both complete access and complete control of your Office 365 data and avoid the unnecessary risks of data loss. To learn more, reach out to your Keller Schroeder Select Account Manager.

by Carissa Carissa No Comments

End of General Support for VMware vSphere 5.5

Chris Haynes - Keller Schroeder Senior Systems EngineerChris Haynes  – [Senior Systems Consultant]

The End of General Support date for vSphere 5.5 is September 19, 2018.  VMware just released the newest version of VMware called vSphere 6.7, which means the oldest supported vSphere version of 5.5 will fall off the support list and vSphere 6.0 will now become the oldest supported version.

Vmware Vsphere 5.5 End of General Support

To maintain the full level of support and subscription services, VMware recommends upgrading to the current stable vSphere 6.5 Update 1 version, or to the newer 6.7 version once it is compatible with your environment. VMware has extended general support for vSphere 6.5 to a full five years from its release date, which means general support for vSphere 6.5 will end on November 15, 2021. For more information on the benefits of upgrading and how to upgrade, visit the VMware vSphere Upgrade Center:

https://www.vmware.com/products/vsphere/upgrade-center.html

If you would like assistance in moving to a newer version of vSphere, Keller Schroeder’s System Engineers provide a comprehensive service to upgrade your virtual infrastructure. The service includes recommendations, planning, pre-upgrade remediation, the actual upgrade itself, and post upgrade testing & validation. For more information contact your Keller Schroeder Account Manager.

by Carissa Carissa No Comments

Cisco Umbrella: First Line of Defense

Tyler Carlisle - Keller Schroeder Network ConsultantTyler Carlisle  – [Network Consultant]

How do you protect your users when they are off your corporate network, outside the boundaries of your perimeter security solution? Do they use a VPN? Are you sure? A recent Gartner study predicted that as much as 25% of corporate data traffic will bypass perimeter security. How can you guarantee that your users are secure? Cisco Umbrella can provide the answer.

Cisco Umbrella First Line of Defense

Cisco acquired OpenDNS in 2015 and rebranded its enterprise security products to Cisco Umbrella. Cisco Umbrella is a cloud-based Secure Internet Gateway that protects your users wherever they access the internet, whether on or off the corporate network, and on or off the VPN. Its DNS-based architecture and IP layer enforcement provide a first line of defense against threats, such as malware, ransomware, and C2 callbacks.

Cisco Umbrella Security

 

Cisco Umbrella provides the same protection to all devices on the corporate network, including IoT and mobile devices, by simply forwarding external DNS traffic to the Umbrella servers. Best of all, it provides all this protection with zero additional latency, 100% uptime, and it can be deployed in as little as 30 minutes.

 

If you would like more information on Cisco Umbrella, visit www.kellerschroeder.com/umbrella to download our “At A Glance” information sheet or request to be added to our upcoming webinar distribution list.  You can also contact your Keller Schroeder Select Account Manager today to start your free trial of Cisco Umbrella.

by Carissa Carissa No Comments

Baramundi Management Suite

Chance Webster – [Systems Engineer]

There are often tasks in IT departments that tend to create a lot of legwork and require significant time and effort to complete.  Reconciling hardware and software inventories, patching servers and PCs, mitigating security risks or misconfigurations, and deploying software quickly to many PCs or servers in a short amount of time are challenges that every IT department faces.  Baramundi Management Suite helps resolve many time-consuming tasks that you may have in your organization.

Baramundi Logo

With Baramundi Management Suite, hardware and software inventories can be automated, which reduces the manual overhead of collecting inventory information.  Inventories can then be broken out by static groups or groups based on specific attributes such as operating system versions or available disk space.  Inventory information can also be obtained from SNMP capable devices such as switches, routers, firewalls, and printers to reduce the overhead even further.

Security and vulnerabilities are also easier to manage using Baramundi Management Suite.  By providing vulnerability information in a consolidated way, it allows prioritization of these fixes either per machine or per specific vulnerability.  Baramundi Management Suite provides a platform which can be used to replace your WSUS deployment and provide you with a managed, up to date catalog of third party updates to help keep these applications updated.  In addition, a compliance management module is available to allow you to scan for any new vulnerabilities after your patch deployment is complete.

Baramundi Management Suite

Software deployment throughout the organization using Baramundi Management Suite is a snap.  If you are using a pre-packaged Microsoft Installer or other executable package, you can easily create a package to deploy that software with just a few mouse clicks.  If, however, the software requires some customization during the install, you can use the Baramundi Automation Studio to step through the installation as you normally would, recording each step along the way, to create your deployment package.  Once completed, you will be able to deploy even the most difficult applications quickly and easily.

Baramundi Management Suite is one of many systems management platforms.  What makes it stand out among the likes of SCCM, Altiris, and other systems management platform is the ease of use.  You can achieve tasks in minutes that have taken hours, if not days, to accomplish before.  Baramundi Management Suite also allows you to definitively see, in real-time, that action has been taken for a particular task.  Baramundi Management Suite is systems management in real time.

To learn how Baramundi can help resolve many of the time-consuming tasks you may have in your organization, please reach out to your Keller Schroeder Select Account Manager.

by Carissa Carissa No Comments

Carbon Black Defense Endpoint Security

Paul Miller Keller Schroeder Senior EngineerPaul Miller – [Senior Systems Engineer]

The world of endpoint security is a very crowded market right now, making it difficult to discern what makes one solution better than another. We at Keller Schroeder found ourselves hunting for answers in this market space last summer, and underwent an evaluation of the top ten solutions on the market. After this extensive research, we ended up establishing a new partnership with Carbon Black.

Carbon Black Logo

Carbon Black Defense brings a robust set of features to the table. Their entire technique for endpoint defense relies on detecting malicious software and stopping execution before damage is done.  As a cloud-based solution, Carbon Black monitors all processes running on your endpoint, scores them based on malicious tactics, techniques, and procedures (ram scraping, bad execution methods, self-elevation), and then stops the execution of processes that are found to be up to no good. This happens in real-time, and utilizes a very light agent (0-1% CPU) on the endpoints.

Carbon Black Predictive Security Cloud

The console provides kill chain insight like no other product on the market, and other advanced threat protection options.  From the console it is simple (a couple of clicks… really), to look at a threat’s kill chain, and blacklist the offending process from running again anywhere in your enterprise.  Management overhead for most environments are estimated at around 1-2 hours a week under normal conditions, making it light on administration overhead as well.

If you have a renewal in the future for your endpoint security products, and would like to take a look at CB Defense, please get in touch with your Keller Schroeder Select Account Manager. We would enjoy providing you a demo to show you why this product stands out in this very crowded field.

 

by Carissa Carissa No Comments

What is Visual Studio Team Services and How Does It Differ From TFS?

Carrie Rudolph Microsoft Business Unit DirectorCarrie Rudolph – [Microsoft Business Unit Director]

Best practices say that any custom development team should use a source control tool for versioning and collaboration.  Microsoft’s historical source control tool has been Team Foundation Server (TFS), released in 2006 and still a leader in source control today.   Visual Studio Team Services (VSTS) is the online version of Team Foundation Server (TFS), and while these two tools have many similarities there are a few differences as well.

Microsoft Visual StudioBoth provide an integrated and collaborative development environment that provides tools for version control, planning, and work tracking. They both offer much more than source control they are application development lifecycle management tools. TFS is an on premise installation with a SQL Server backend.   Previously known as Visual Studio Online, VSTS is a cloud service backed by Microsoft’s cloud platform, Azure.  For TFS, you typically connect to an intranet server and authenticate using Windows Authentication and Active Directory.  This authentication is normally transparent and most users do not realize it’s even occurring.  With VSTS you are connecting over the public internet, and you authenticate with a Microsoft account or using Microsoft Azure Active Directory.

Microsoft Visual Studio Screen ShotThere are several advantages to using VSTS instead of TFS.  Since VSTS is a cloud hosted service there is nothing for you to install or maintain.  You can eliminate cost of servers, time to install, update, and backup the software, patches, and OS. VSTS ensures that you will immediately be able to utilize the latest and greatest features and functionality.    With the online access to VSTS, the need for developers to connect via VPN to access source code is eliminated.  This can be a big benefit for development teams spread out over several locations.  VSTS can also host GIT projects as well as traditional team foundation projects, which allows you to manage all of your source code in one place and eliminate the need for multiple services. Lastly, VSTS also includes a marketplace with hundreds of available plugins, from Slack Integration, to Code Search, and Trello; there is an ever growing list of plugins available for free at the click of a button.

VSTS is free to those individuals with Visual Studio memberships.   A small team (up to five users) can access Basic features free of charge, and for larger teams, there is a per user monthly fee.  An unlimited number of project Stakeholders can also be added for free; they can view and edit work items but not manage code.

Microsoft Visual Studio Screen ShotThere are several options for migrating from TFS to VSTS.  Projects can be added to VSTS one at a time, in which case previous version history will be lost.  Projects and their related history can be migrated directly from TFS 2017 to VSTS using the TFS Database Import Service from Microsoft. . Finally, you can use a public API, but please know that many of these will not move all of your TFS artifacts and their history. If you have added customizations to TFS, these may cause errors that must be resolved prior to migrating to VSTS.  In some cases, customizations may be lost.

If you are looking to reduce time and cost related to hosting TFS and increase your team’s accessibility to source code, you will definitely want to consider Visual Studio Team Services. Contact your Select Account Manager to learn how Keller Schroeder can help.

by Carissa Carissa No Comments

CLIENT SUCCESS: Improved Experience For Employees And Customers with Cisco

In partnership with  Tech Data, Keller Schroeder was able to obtain a series of case studies depicting recent client experiences with our team and Cisco technologies. Keep reading to learn how Keller Schroeder helped Jasper Chair Company improve their employees’ and customers’ experiences with an upgrade to the company’s IT network and security infrastructure with Cisco network and VOIP technology.

The Challenge

Jasper Chair Company LogoJasper Chair’s IT network and phone systems were outdated and systems were disjointed. In fact, it was starting to affect the workforce and it was slowing down production. Jasper Chair needed to find an IT company to help them build a roadmap to overhaul their existing IT infrastructure and replace it with faster, better performing technology that would enable them to offer an improved experience to their employees and customers.“Offering better technology that works together well is an essential backbone of any successful business. We knew we needed to heavily invest in new technology infrastructure, and we were looking for a trusted provider to help us build a strategy and a roadmap to gain a competitive advantage with the new technology,” explains Chad Barth, Vice President at Jasper Chair Company.

The Solution

Great Strategy and IT Roadmap for the Future  –    Jasper Chair needed to build a cohesive IT network and completely overhaul its existing phone system. Jasper Chair reached out to its IT manager, who then referred the company to Keller Schroeder. When Jasper Chair hired Keller Schroeder, their engineers and account managers were able to hit the ground running. The Keller Schroeder team listened to Jasper Chair’s concerns, they took time to understand the company’s technology wish list, and fully learn the current IT landscape. “We have really put our faith in Keller Schroeder, and they successfully laid out a plan to help us build the IT infrastructure we needed to be successful. We are confident in the technology selected because we chose Cisco,” adds Barth. Keller Schroeder created a roadmap and added in security solutions that would meet the IT needs of Jasper Chair. This new infrastructure included Cisco VoIP phone system, a server, Cisco Adaptive Security Application (ASA), and a new network. “Most importantly, Keller Schroeder helped us choose the best Cisco security products to protect our company from ransomware or cyberattacks.”

Benefits

High-Performing, Driven, and Organized – Throughout the project, Keller Schroeder was organized, attentive, and thoughtful about meeting Jasper Chair’s needs. The Keller Schroeder team led the charge in effectively managing the projects, and the company worked well with the Jasper Chair IT team.

“What most stood out to us with Keller Schroeder was their people. They were great to work with. They are all so effective and driven, and you can definitely tell that they love their job and the work they are doing” – Chad Barth, Vice President at Jasper Chair

Cisco LogoKeller Schroeder’s extensive knowledge about the Cisco products and solutions provided Jasper Chair with a guarantee the final solution would be high functioning and reliable. “They were cohesive with our IT systems, they integrated the projects well, and their engineers worked with the network team to ensure everything was working well together.” Managing the budget efficiently is a large part of successfully seeing the project through. Jasper Chair’s headquarters is located about an hour away from Keller Schroeder’s office, so the company took the time to conduct video conferencing sessions as much as possible to help control the costs. Barth says, “Keller Schroeder really put us first. Once they had the IT infrastructure in place, they really worked with us on the budget by accommodating us remotely.”

Thorough Support

Building and installing a new network and VOIP phone system can be complicated. Throughout the process, Keller Schroeder provided Jasper Chair with end-to-end support. From planning and purchasing and all the way to installation, Keller Schroeder was organized and set expectations for Jasper Chair to ensure the project’s success. “Keller Schroeder brought so many good ideas to the table, and we depend on them for that. They not only helped us build our new network and VOIP phone system, but they also gave us a plan for the future,” says Barth.

Results

Carefully Vetted, Secure Solutions – When building an expansive IT network, it is important to make sure all the products and solutions work together well. It is also important to ensure the best products are used to meet the business needs of the customer. Keller Schroeder carefully vetted the products and provided a cohesive ecosystem to help Jasper Chair’s business thrive. Barth adds, “With Keller Schroeder’s guidance, we decided to go primarily with Cisco products to build our IT network, VOIP phone system, and data center. Their solutions are reliable and secure. Protecting our data is a high priority.” Like many companies, Jasper Chair had been a target of malicious cyber-attacks. Now that they have Keller Schroeder on their side building reliable IT infrastructure with Cisco solutions and security, Jasper Chair has not had any further issues.

Happy Employees, Satisfied Customers – Prior to their engagement with Keller Schroeder, Jasper Chair’s employees had experienced a slow network and other technical issues that were distracting from their day-to-day tasks. Now, with the new system in place, employees are happy and more productive. “Keller Schroeder provided us with incredible service and they helped us find exactly what we were looking for. They have done a fantastic job with our current projects, and now they are already working on taking us through the next phase.”

Throughout the projects, Keller Schroeder worked to exceed Jasper Chair’s expectations and accomplish all their project goals and objectives. “They did everything we asked them to do, while exceeding our expectations on all levels. We don’t get as many complaints from employees anymore because things are working effectively.”

“The team at Keller Schroeder went the distance with us and has taken care of everything. Their commitment to our success was really felt by all of the employees at Jasper Chair.” — Chad Barth, Vice President at Jasper Chair Company

Exceeded Expectations – Keller Schroeder prides itself on going the distance to satisfy its customers. They don’t just meet the customer’s needs, but it exceeds them on all levels. Throughout the projects, Keller Schroeder was attentive to Jasper Chair’s needs and thoughtful about providing them the best customer service in the industry. “We look for consistency and trust and believe that slow and steady wins the race. For me, the most important factor for any business partnership is reliability, consistency, trustworthiness. We want reliable performance on a steady basis. Barth explains, “Keller Schroeder offered us the performance, quality, and expert knowledge we were looking for from an experienced and professional IT service provider. They were able to help us with all of our IT needs and build a roadmap for the future.”

For more information about how Keller Schroeder can assist your organization with Cisco technology, please contact your Select Account Manager.

by Carissa Carissa No Comments

Office 2007 Retirement Is Coming!

Systems Engineer Chance WebsterChance Webster – [Systems Engineer]

On October 10, 2017, Microsoft will officially retire all editions of Office 2007.  What does this mean for you?  Microsoft will no longer offer updates or provide free or paid support for the Office 2007 family of products.  If you have not upgraded the Office suite for one or more of your PCs, this would be the perfect time to consider a more recent version of Microsoft Office.

Microsoft Office 2007 LogoOne reason to upgrade is that newer versions of Microsoft platforms such as Exchange and SharePoint will not interact with the Office 2007 platform.  Also, newer versions of Office do not interact properly or at all with older, unsupported platforms.  For example, Outlook 2016 does not work with Exchange 2007 – which is 3 versions lower in the Office family.  Likewise, Outlook 2007 does not connect to either Exchange 2016 or Exchange Online.  Both of these concerns could add more unplanned costs when planning for an on-premises Exchange or SharePoint upgrade project.

Microsoft Word 2007 IconAnother reason to upgrade is based on Microsoft’s policy change concerning Office 365 and Microsoft Office in the future.  The good news is this policy change does not fully take effect until October 13, 2020, so there is time to consider your upgrade options related to your on-premises infrastructure or any cloud initiatives.   For more detail, please see this policy change here: https://blogs.office.com/en-us/2017/04/20/office-365-proplus-updates/.

The following are alternatives to consider:

  1. Do nothing. This option is NOT recommended.  There are several exploitable vulnerabilities that rely on unpatched versions of Microsoft Office products.  Due to no additional patches being developed for Office 2007 after October 2017, continuing use of Office 2007 products would create a security risk for your organization.
  2. Purchase new Office licenses. This can be achieved via direct purchase through many resources, however this option provides only the current version of Office.  The Software Assurance option would need to be purchased via a Volume License agreement to provide you with future versions of Office at no charge.
  3. Purchase an Office 365 subscription. Office 365 suites that include Office licensing provide an array of benefits.  Not only would you get Office licensing for users licensed under a supported suite, you would also be able to take advantage of hosted platforms for Exchange, SharePoint, and Skype for Business.  This can provide a significant cost savings for your organization and reduce the technical burden often added when these technologies are deployed.

For more information about how Keller Schroeder can assist your organization with migrating to Office 365, please contact your Select Account Manager.

Top