Cloud

by Carissa Carissa No Comments

Keller Schroeder Cloud Readiness Assessment

 

Matt Barton  – [Director, Data Center Services]

Quick quiz: How many of the following Cloud related terms can you define?

IaaS, PaaS, SaaS, DRaaS, BaaS, HPC, AI, BI, Cloud Native, Private, Hybrid, Public, Hyperscale, Serverless, Burstable, Elastic, CDN, EC2, Containers, Objects, Multi-tenancy, Microservices, CSP, SLA, IoT, VPC, AWS, and Azure.

Confused?  You’re not alone.  The cloud market in 2019 is a mash-up of thousands of vendors and tens of thousands of applications.  From Cloud Native, to ‘Cloudwashed’ re-branded on-premises applications, there is no shortage of solutions for any problem facing your business.  Deciding what to migrate, when, and to which cloud provider are all important decisions.  Monthly costs and a predictable budget are not necessarily a sure thing, either.

Thankfully, Keller Schroeder can help!  Using the recently launched Microsoft Azure Migrate product, Keller Schroeder can help simplifying key technical decisions surrounding migrating apps to the cloud:

  • Assess whether your on-premises machines are suitable for running in Azure.
  • Get size recommendations for Azure VMs based on the performance history of on-premises VMs.
  • Get estimated costs for running on-premises machines in Azure.
  • Visualize dependencies of on-premises machines to create groups of machines that you will assess and migrate together.

Azure Migrate, combined with Service Map gather information about all TCP-connected processes on the server where they’re installed and details about the inbound and outbound connections for each process.  This prevents migrating dependent apps on different servers, racking up potential additional bandwidth charges.

In addition, data collected from Azure Migrate can be used to determine if a local SQL server should migrate to an individual SQL VM (costly) or to SQL as a Service (much cheaper).

Azure Migrate automatically suggests VM sizing based on ACTUAL on-prem performance requirements; no need to manually adjust the sizing of those VMs you KNOW are oversized.  Consistent costs and a fixed budget are possible by starting with properly sized Azure resources:

Azure Migrate is quickly & easily deployed into most VMware environments, and support for physical servers is due out soon.  Reach out to your Account Manager for more information!

by Carissa Carissa No Comments

Cisco Meraki : Easy to Deploy Cloud-Based & Infrastructure Solutions

Keller Schroeder IT Engineer Mike SanfordMike Sanford – [Wireless Consultant]

Do you need to be able to bring a remote office up quickly without an on-site visit?  Do you want one place to monitor wired and wireless connectivity?  Are you looking for a cloud-based solution that can provide wireless access points, switches, firewalls as well as video cameras?  If you can answer “Yes” to any of those questions, Cisco Meraki has a solution for you.

MCisco Meraki Logoeraki was founded in 2006, gaining interest as a cloud provider of wireless services.  In 2012, it was purchased by Cisco and has since branched out into the other areas of IT infrastructure mentioned above.  Their focus is providing technology that is easy to deploy and manage.  Keller Schroeder has successfully deployed most of these Meraki hardware solutions, with the exception of the video camera solution which was released in the last quarter of 2016.

Cisco Meraki DashboardWhen connected to an internet ready network, Meraki devices “phone home” and are immediately configurable from the web based Meraki Dashboard.  The Dashboard offers a single pane of glass to configure devices as well as monitor devices for up/down time and keep an eye on end user traffic.  The Dashboard provides the ability to adjust allowed bandwidth utilization and whitelist or blacklist web traffic, giving you the ability to maximize your infrastructure and internet performance.  Traffic for each piece of hardware, network and end user device is tracked and displayed in easy to view, drill-down graphs.  Information such as user, total amount and percentage of usage, applications and sites visited are available.  This information can then be used to quickly throttle bandwidth hogs, or to limit internet access by type of site or by specific site.

Meraki also offers an Enterprise Mobility Management (EMM) solution called Systems Manager.  With Systems Manager, applications and network policy can be deployed to mobile and desktop devices.  Once the easy on-boarding process is complete, a device can be monitored for location, security posture and software inventory.  The devices can also be protected by enforcing encryption policies, network access control and there is a remote enterprise wipe feature.

To learn more about our cloud solutions including Meraki, or to ask about how Keller Schroeder can perform a wireless assessment of your environment, give us a call at 812-474-6825 or contact your Keller Schroeder Select Account Manager.

by Carissa Carissa No Comments

Aperture Provides a Glimpse into the Cloud

Jeff Starling[Senior Networking Consultant]

KS Aperture ImageThe use of SaaS (Software as a Service) applications continue to gain popularity as a cost-effective way to provide office automation and data-sharing in today’s business environment.  SaaS services are often described to fall into 2 categories:

  • Sanctioned (allowed and supported by the company),
  • Unsanctioned (utilized by the end user with no control by the IT department).

Palo Alto Networks firewalls can control the access of most unsanctioned SaaS applications through the use of the built-in App-ID function.  But SaaS applications use infrastructure and networks that are not owned by the company.  So how does a security-conscious IT department protect their sanctioned SaaS applications from malware and data loss?

They use the Aperture service by Palo Alto Networks.

Aperture is a cloud-based security solution from Palo Alto Networks designed to protect SaaS applications.  It provides full reporting of daily activities of users and data, and supports a granular access control mechanism to eliminate data exposure and risks.  This service integrates with Palo Alto Network’s WildFire Threat Intelligence database to block known malware, as well as, to identify and block unknown malware.  This level of protection can be accomplished with no change to the local user.  There is no agent to install, and since it is a cloud-based solution, there is nothing to install on the network.

Aperture currently supports the following SaaS applications:KS Aperture Process

  • Box
  • Office 365-One Drive/SharePoint
  • Sales Force
  • Google Drive
  • Github
  • Dropbox
  • Yammer

Contact your Keller Schroeder Account Manager for more information on Aperture and other Palo Alto Networks products.

 

by Carissa Carissa No Comments

Azure Rights Management Service from Microsoft

Microsoft Azure

Chance Webster – [Systems Engineer]

We have all seen stories on the news about company information being accidentally disclosed because of employee error or stolen during a breach of a company’s security infrastructure.  In many cases, company’s data is critical and confidential, and protecting this vital asset is a high priority.  The problem that organizations often face is protecting the company’s data within a budget that adequately aligns with the risk of data loss.

 

While there are many solutions available, Microsoft has developed a strong solution with the Azure Rights Management Service which natively integrates with many applications already in use within the business.  The Azure Rights Management Service is a cloud based Rights Management platform that provides a holistic approach to protecting your information within the Office 365 platform.  This service allows information owners to maintain access controls over the data that is being sent via email, stored on portable media, or even within the organization.  In addition, Azure Rights Management can be configured to provide notifications, either on-demand or by using a Rights Management template, that the data has been accessed by authorized users or that unauthorized access has been attempted.  Additionally, as part of the Azure Rights Management Premium service, this same protection can be extended to your on-premise Exchange, SharePoint, and File servers without a need for additional infrastructure that typically requires significant effort to implement and maintain.

 

Azure Rights Management Devices

An additional feature of the Azure Rights Management service is the Office 365 Message Encryption service.  This service provides an easy to use email encryption platform that requires very little setup and integrates with your existing email infrastructure.  Internal users can easily encrypt emails without a need for cumbersome setup time or need to exchange email certificates with a recipient in order to send an encrypted message.  Recipients of messages encrypted by the Office 365 Message Encryption service will find it easy to use and without a need for any additional setup.

 

The Azure Rights Management service is included in the Office 365 E3 and E4 plans or available for separate purchase for use with other Office 365 plans.  For on-premise infrastructure or for additional features such as tracking of RMS protected documents, Azure Rights Management Premium is available for separate purchase or as part of the Enterprise Mobility Suite or Enterprise Cloud Suite.

 

For more detailed information on Azure Rights Management Service and how it may help with protection of your organization’s data, contact your Keller Schroeder Account Manager.

 

 

 

by Carissa Carissa No Comments

TechSpot Recap : VMware-Kaspersky “Avengers: Age of Ultron” Premiere

Carissa Montgomery, Marketing & Communications CoordinatorStandee

 

On Friday May 1st, VMware and Kaspersky Lab joined Keller Schroeder in treating a group of our clients and their guests to a private showing of “The Avengers: Age of Ultron” at Showplace Cinemas.

Before the movie began, attendees and Keller Schroeder employee-owners listened to presentations from VMware and Kaspersky Lab featuring the latest from their technologies.

DezAfter beginning with an overview, VMware Healthcare Systems Engineer Max Abelardo discussed what was new with the vSphere 6 server virtualization platform, end-user computing using VMware, and the vRealize cloud management platform.

Chris Streeks, Systems MaxEngineer with Kaspersky Lab, then explained how clients could secure their virtual environments with Kaspersky. His talk centered around handling virtual endpoint security at scale and methods of virtualized protection.

AudienceAttendees also had the chance to win prizes. Matthew Yeley from MSWARS Research walked away with an Avengers-themed prize pack. David King with P&I Supply won our grand prize, a $100 VISA gift card.

For more information regarding the VMware, Kaspersky, or our upcoming events, please contact your Keller Schroeder Account Manager.

by Carissa Carissa No Comments

TechSpot Recap : Cisco Intercloud & Peak 10 Disaster Recovery

Carissa Montgomery, Marketing & Communications Coordinator

Steve Kevin Cisco
The kickoff to our 2015 TechSpot series of lunch-and-learn events took place on Thursday, February 26th. The event was also the first held at our new TechSpot location, ITT Technical Institute in Newburgh, IN. The informative session featured presentations from our vendor partners Cisco and Peak 10.

Cisco Systems Engineer Kevin Flook discussed the company’s Intercloud Fabric, a highly secure, open, and flexible solution that gives users complete freedom in workload placement based on business needs.
Kevin’s presentation included details such as Cisco’s Intercloud Kevin PresentingFabric vision, an overview of its architecture, and case studies highlighting the technology’s true business value.

John and Mike Peak 10
Attendees also had the opportunity to hear from Mike Meyer, Systems Engineer from Peak 10. Mike discussed the latest in Peak 10’s Disaster Recovery. Topics featured in Mike’s presentation included Business Continuity versus Disaster Recovery, a Disaster Recovery plan using the Cisco PPDIOO Chart, challenges associated with traditional disaster recovery implementations, and cloud-based disaster recovery using Peak 10’s Mike PresentingDRaaS.

Clients were also treated to a free lunch, a free gift, and the opportunity to win great prizes. Becky Hills from Ivy Tech, Allen Tate from the Ohio Township Public Library System, and Cathy Finch from Raben Tire all took home Amazon Fire Sticks. Abram Devonshire from Flanders Electric won our Grand Prize, a $100 VISA Gift Card.

 

by Carissa Carissa No Comments

Why Nimble Storage?

Basic RGBChris Haynes [Sr. Systems Consultant]

 

Are your storage costs getting out of control? Do you need more storage performance, but think you can’t afford it? Are you contemplating that support renewal vs. a storage refresh decision? Well, then you need to consider Nimble Storage.

So how is Nimble Storage different from all the other storage providers? Nimble designed their solution from the ground up, to take advantage of using SSDs as cache in combination with traditional spinning disks to provide the most efficient hybrid solution at the lowest price/performance combo available in a storage solution today.

Nimble developed their patented Operating System called Cache Accelerated Sequential Layout (CASL) to cache “hot” data on SSDs in real time, allowing it to respond to read requests much faster than any of its competitor’s “bolted-on” flash technology. CASL also allows for some of the lowest-latency writes too, by collecting random writes and compressing and writing them to disk sequentially.

Nimble Storage didn’t stop with just a low-cost, high-performance system either. They packed their storage solution with all the advanced features one would expect in a next-generation storage solution, including inline compression, block level difference snapshots, zero copy clones, data replication, one-click upgrades with no downtime, and much more, all included at no extra cost. No a la carte pricing like some other storage vendors have.

On top of all this, they provide one of the easiest and most intuitive management interfaces, with all the capacity and performance data you need at your fingertips, and a convenient plug-in for VMware vCenter or Microsoft Hyper-V, so you don’t have to leave your hypervisor to create, resize, & monitor your datastores.

What else? Nimble Storage also provides a proactive support site called InfoSight, which is a cloud-based portal that collects data from your storage solution every five minutes, and presents historical capacity and performance reports, trending and wellness reports, and hardware upgrade recommendations, along with lots of other information. You can manage support tickets here as well, and if you have to call Support, the person who answers the phone will be able to help you immediately, never asking you to collect logs to send to them. Support will already have all the data they need to help you.

Will it scale? Absolutely. You can scale up on the fly with hot swappable controllers, SSDs, and HDDs and scale out by clustering multiple Nimble Storage units together for even the largest environments. All systems are highly available dual controller solutions with high-performance SSDs and RAID-6 triple parity disk arrays for the HDDs for maximum redundancy and performance.

Nimble Storage was named “Storage Vendor of the Year” in 2014 by CRN and has had quicker growth than any other storage vendor to date. All sound too good to be true? Do your own research. Ask around. Then give Keller Schroeder a call. We’ll answer any other questions you have about Nimble storage, provide references, and can schedule a demo with you. We can even arrange to have a demo unit installed at your site. Give Nimble Storage a look. You’ll be glad you did.

Contact your Account Manager at Keller Schroeder for more information about these products and how they might benefit your organization.

 

Top