Blog


Our perspective on anything and everything tech-related.

Blog, Citrix, Cloud, Continuum, IT Solutions, Security, Uncategorized

Top Trends in Digital Transformation for Your Business


No Comments

The tech world is fascinating. We’re always on our toes, trying to figure out how to use the latest innovation that’s been rolled out office-wide. We’re lightyears ahead of where we were only ten years ago. With that, it’s so easy to fall behind in what’s going on in the world of tech and all the great improvements that come with it. Hell, just go on a two-week holiday and you’ll come back to 2,000 urgent emails and a brand-new content collaboration system that eclipses the old one. There are new ways of doing everything, so god forbid you don’t pay attention. The trends in digital transformation change quickly, but these are the main ones your business needs to keep up with to stay ahead.

Cloud and hybrid cloud are taking over
It’s a bit like opening a tin of chocolates to yourself; you just can’t stop the outpouring of those delicious chocolates wrapped up in colour just constantly getting plucked out of the tin. There’s been a huge movement towards cloud in recent years. Everyone and their mother loves cloud and just can’t get enough of it. Business-wise, improving your IT infrastructure to respond to change just makes sense. With the exponential creation of data becoming an issue that has to be considered early rather than in hindsight, digital transformation surrounding cloud brings with it numerous benefits. Organisations love the dexterity of scalability; never needing to worry about what they have but knowing that there will always be room to grow or decrease depending on needs. Of all the cloud options, hybrid cloud is by far most popular, almost indispensable for most organisations, big or small. The ability to have that little bit more control over your data with on-prem data centres is the best first step into the wonderful world of cloud.

Importance of user experience
User experience will always be a major factor in digital transformation for businesses. It goes without saying that when your employees are happy, the higher productivity rises. And that’s what we all want, right? But user experience goes beyond just having coffee and chocolate digestives available downstairs. So what about the other niggly techy bits? Cloud sprawl can be a massive problem for businesses. Chunks of data here, there and those few spots you least expect it can quickly become a problem. We’ve (read: I have) already discussed how cloud sprawl can irritate your users enough for them to abandon your well-established IT infrastructure and turn to the world of shadow IT. A good IT solution will go above and beyond what the user wants and needs. Think of the basics; an email platform, a file-sharing platform, the ever-popular instant messaging app that allows your users to make quick work of small issues. The necessities, basically. Then think of what your users will want to ensure the smooth running of their work day. Now amalgamate and watch the productivity rise!

Remote workforce
We’ve heard it a million times before. Mobile workspace, digital workspace, modern workspace – whatever you want to call the ability to work from anywhere that isn’t the office – it’s the future of work. What’s new? Shockingly, there is more excitement around every corner in the tech world (I did say that it’s fascinating). The latest updates to Citrix Workspace were unveiled in May’s Citrix Synergy. It encompasses all of the usual things that you’d expect from a digital workspace; ultra-secure security, ultra-fast one-sign-in-works-for-them-all authentication, ultra-easy access to any of your files from any of your devices, clouds, networks. All that fun stuff. But the fun just doesn’t stop there. From collating collections of your favourite apps for quick sharing, universal search and – my favourite – using any screen as a presentation screen (no matter how big) just by using a QR code. I swear, it’s magic. And it really makes a difference.

Cyber security priority
WannaCry really wasn’t that long ago, but, even over a year later after the devastating attack, 66% of IT security pros have admitted that they haven’t improved their patch management systems. The biggest issue facing organisations when it comes to cyber security is the lack of progress and drive to be ahead of cyber threats. Terrifyingly, WannaCry was a Gen V-level cyber-attack. It’s terrifying because not only has tech advanced so quickly in so little time (the firewall is the cure for Gen II cyber threats), the majority of businesses are way behind. According to Check Point’s Cyber Security Generations Survey from March 2018, only 10% of IT security professionals are at Gen IV and, worse still, only 3% are at Gen V. If that doesn’t scare you, not much will. So it’s pretty clear; stepping up the digital transformation of your organisation is for absolutely nothing if you ignore the cyber security part of it because then you’re opening yourself up to more attacks. It doesn’t matter how careful you are, how much garlic you hang by the window or how much you trust that Starbucks Wi-Fi, there’s only one way to make sure that you’re protected.

Back up all of the things
Again, it’s one of those things that we hear over and over; backup is important. If there’s a fire; fire up (pun intended) your backup system. If there’s a flood; fire up your backup system. Attack of the tin-eating frogs; fire up your backup system. Backup is a major part of the digital transformation because it’s often overlooked. Everything is up and running and perfect and you just couldn’t imagine anything going wrong. There’s really no point in sorting out your backup after disaster strikes. And in this day and age, there’s no excuse – there are so many different types of backup and replication that can be used for disaster recovery. Here at Cetus, we favour replication – it’s the future of backup – and we proudly suggest our very own Continuum.

Digital transformation should be a top three priority for every organisation that wants to keep up and ahead of the curve. If any of the above sound too difficult for you, or if you need a bit of a refresh on any of them, why not have a quick chat with one of our experts to see what we can do for you? In the meantime, it’s worth looking into our
free business challenge consultation to help you navigate your business challenges, while here in the office we argue about the best tin of chocolate (it’s obviously Roses).

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Citrix, Cloud, IT Solutions, Technology, Uncategorized

Citrix Workspace: Why You Can’t Work Without it in 2018


5 Comments

It was the most exciting event in May; Citrix Synergy in Anaheim, California. Whether you were there or not, you were keeping up with the latest updates and newest toys. The opening keynote on May 8th was an event not to be missed. I watched it (ok, only the first hour), you most likely watched it, and we l were all amazed by the keynote. It was impressive even through a screen. If you really were paying attention, you’d have perked up at the impressive update of the Citrix Workspace App by vice president of product marketing Calvin Hsu. This technology is ground breaking. There are so many reasons as to why it’s the forefront of productivity in 2018.

To be honest, at first I wasn’t super-duper impressed. Instant, password-free access to logins from within the app from just one authentication? That’s nothing new. Accessing your files – from your hard drive, the cloud or even your network drive – on any device through the app; we’ve seen that before as well. But those are just the basics; the minimum that you’d expect from a workspace.

With everything we’ve been doing (and by ‘we’, I actually mean the techies that create all the magic technologies) to improve the lives of employees, it seems that we’re just adding more complexity to the problem. And that’s the issue; why bother with something new that has to be learned, that costs more, when you could just go back to the old way? The point of Citrix Workspace is to have all of your techie bits rolled up into one experience. In his demonstration, Calvin uses the example of on-demand television to explain why Citrix Workspace is an innovation. We have Apple TV, Netflix, Hulu and Amazon Prime Video. And while they have the same premise, they don’t all offer the exact same things. And that’s what Citrix Workspace aims to achieve; to collect all of the cool features from other workspaces into just one.

As picky and cynical as I am, I was impressed by a few little tricks from the Citrix Workspace App. Collections of applications seems like one of those things that should have been a thing ages ago. It just makes sense to have everything together that you can locate and share with your users quickly and efficiently. How was universal search not a thing before Citrix Workspace? Again, it’s something that you’d just expect from a high-tech piece of software. Now you can search for your apps, data and your files. How innovative is that? Wanting to open a file from Photoshop in, well, Photoshop? That seems fairly obvious – you’d hardly be able to open the .PSD or .PDD in Windows Photo. But with nothing more than a web browser, Citrix Workspace can cleverly launch Photoshop to access the file through the file capabilities that have been built into the workspace. How rad is that?

And there are more surprises as you move from one device to another. On your mobile, one of my favourite little tricks is the attachments folder. Instead of having to remember what email has the attachment that you need and having to scroll all the way through your recent emails to find it, you can quickly and easily locate it in the attachments folder. Another nifty trick on mobile is the ability to integrate a thread of emails into Slack, essentially creating a new thread on a chat platform that’s easier to follow, read and reply to. But by far, the coolest part of Citrix Workspace on mobile is being able to use any screen as a presentation screen, just by using a QR code and the workspace hub. That’s the future of working on mobile.

At the end of the day, what do your end users want? The Citrix Workspace app is the future of productivity for your organisation. If you would like to speak to one of our experts about Citrix Workspace and find out how you can start improving productivity across your business, contact us today.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, IT Solutions, Technology, Uncategorized

Are You Digital Enough?


No Comments

My excellent colleagues and I recently had a bit of an email debate about our
‘Mobile Workspaces’ proposition. It went something along the lines of:

– Our strategic vendors have moved away from ‘virtual workspaces’ to a much more, erm, modern ‘Modern Workspaces’ or ‘Digital Workspaces’ paradigm; so maybe we should update ours?

Taking each suggestion in turn; my response went something like this:

Modern Workspaces? Well, that just sounds like a new kitchen to me (sorry Microsoft) – or maybe your place of work has one of those cool chairs with no back; you know, the ones where you sort of kneel in the chair and look massively uncomfortable?

Digital Workspaces? Well, ‘digital’ isn’t a particularly new term. In 1897, the Oxford English Dictionary defined digital as “of or pertaining to a finger, or to the fingers”. So it’s not as modern as, say, tweeting or blogging. In modern usage, digital does imply the use of a computer, but that could imply a workplace comprising a desk and a desktop PC – hardy the epitome of a 21st century IT environment.

Digital is also a bit over used in my opinion. Organisations are clamouring to undergo Digital Transformation in order to become a truly Digital Company; Digital Currencies are seeing massive adoption; even the UK Government has a Digital Marketplace – that’s right: the UK Government. What this all means is that organisations and the general population are clamouring to ‘use computers’ – very leading edge I must say.

So, back to my point. Digital doesn’t imply modernity. I honestly believe that ‘Mobile Workspaces’ captures the essence of one of our core propositions. Your working environment allows you to access desktops, applications and documents on any device from any location. This simple principle has allowed hundreds of our clients to free their employees from their desks and to, instead, work from anywhere. As a result they have addressed countless business needs, including: agile working, acquisitions & mergers, property rationalisation, Total Cost of Ownership and Business Continuity. Not bad I reckon.

If you’d like to better understand how, like many of our clients, we can help your organisation to accelerate your path to becoming a Digital Company (through a process of Digital Transformation) using Digital … sorry; ‘Mobile’ Workspaces then have
a chat with one of our experts today. Please note that, unfortunately, we don’t currently accept Digital Currencies – but I’m sure my excellent colleagues will convince me that we should do so very soon.

Speak to an expert

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Our Upcoming Events, Security, VMware

WannaCry: What We’ve Learned One Year On


6 Comments

It felt like the world was held to ransom. All over the globe – an astounding 150 countries in fact -, little red boxes popped up on computer screens, causing dread and havoc. ‘Ooops, your files have been encrypted!’ they read, asking for between $300 and $600 (£230 to £470) in bitcoin for the safe release of the files. On Friday May 12th 2017 nations of the world collectively gasped as these faced the most devastating and widespread cyber security incident at that time. Over 200,000 machines were affected, with the perpetrators scamming over $112,000.

In Britain, the NHS was hit the hardest. The little red WannaCry pop-up appeared at 1pm on the screens of only four trusts, demanding the ransom. By 4pm, when the ‘kill switch’ was accidentally found, it had spread to 16 trusts. The cyber-attack threat was officially ‘stepped down’ by NHS England a week later, but not before the affected reached a staggering 80 out of 236 hospital trusts as well as 603 primary care and affiliate NHS organisations. Public health in the UK was seriously affected, since the ransomware attack resulted in thousands of cancelled appointments, infected systems and the diversion of A&E patients to other hospitals.

In hindsight, and a little bit of digging, it was a disaster waiting to happen. The NHS had been warned as far back as 2014 that their level of cyber security just wouldn’t cut it. With a failure to undertake the most basic of IT security procedures, which included patching and updating software, as well as not putting a strategy in place to properly deal with a cyber security incident, it’s a miracle that it didn’t happen sooner. But it was a huge wake-up call, not only to the NHS but to businesses globally. No longer would cyber security rest on the hopes of a flimsy firewall that hadn’t been updated in several years – this is a real risk, with significant consequences. So, in the year since WannaCry, what exactly have we learned?

It’s horrifying to think that WannaCry was a Gen-V cyber threat, while according to Check Point’s Cyber Security Generations Survey from March 2018, only 10% of IT security professionals are at Gen-IV and, worse still, only 3% are at Gen-V.

According to a recent report by cyber security firm Tanium, most organisations would still be unprepared should another incident like WannaCry happen again. The survey of 500 frontline IT security workers in the UK is shocking; 40% admit that their organisation is even more exposed than last year. Only 31% confessed that their organisation had invested in new security systems since WannaCry. As I stated already slightly higher up, it was basic IT security procedures that were the gateway for WannaCry, yet a staggering 66% of the IT security workers admitted that they still hadn’t improved their patch management process.

The results are definitive; it’s time to start safeguarding against further, potentially more devastating, cyber-attacks.

It’s all about the patching
WannaCry sneaked through a Windows weakness where there was a lack of security. Shockingly, it had been discovered and there had been a patch for the offending loophole two months before the attack. I know having to update is a major pain, but guys, it just needs to be done. WannaCry was a Microsoft Windows ransomware, a software that locked the files by encrypting them. This particular ransomware was particularly nasty because it was network enabled, which allowed it to essentially spread like a virus throughout not only the local network, but the internet as well. What your organisation needs right now is a patch management solution in place to patch for known vulnerabilities as soon as they arise, so that no little malware buggers can infiltrate your systems.

Backup, backup again, and verify
Had your organisation been hit with the WannaCry malware and you’d had all of your data backed up, you’d have been laughing – for the most part. Regardless of encrypting malware potentially hitting you, backups are critical for all things disaster recovery and business continuity. Whether it be tape or cloud (like Cetus Continuum), all of your data needs to be replicated somewhere safe. Regardless of where you store it (and we really do suggest cloud), it should all be encrypted. Security is, after all of this, a priority.

Use all of the threat intelligence and prevention
If you haven’t heard, micro-segmentation is really in right now. Which is really great in the face of cyber security. Life may be like a box of chocolates, but your data centre needs to be more like a hotel and protect itself from east/west traffic. This next point is important; invest in some good threat intelligence and threat security. At the moment, we’re working with Check Point and VMware to highlight how merging Infinity and NSX can create the ideal security solution to protect you.

Figure out where you stand with a security posture review
There are hundreds of ways to fall foul of a cyber-attack in this day and age. With work no longer confined to the office, mobile workspaces have become all the rage – and for good reasons. Being able to work while on the field instead of having to wait to get back to the office, being able to work from home, or just simply being able to sort out an urgent matter when on holiday is revolutionary. And everyone’s trying to get into it. However, using some random Wi-Fi is always a risk. Honestly, you’ve not lived until you stand outside an O2 store trying to rob a second of Wi-Fi to send an email. In the rain. But how secure is that? A security posture review is essential to identify where your security has slipped. And it just so happens that we offer complimentary security posture reviews, where we analyse network traffic to detect a variety of security threats, evaluate end-point security, assess any threats that lurk in your infrastructure as well as other crucial little things. Have a chat with our experts to see where the danger can find a way in.

One thing is for definite; cyber security has never been so important, and making sure that your IT reflects that is the way to protect yourself as much as possible from an attack. It’s important to be proactive in your cyber security, or you’ll be reacting to a security breach instead.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Cloud, IT Solutions, Our Upcoming Events, Technology, Uncategorized

Minimising That Pesky Cloud Sprawl


2 Comments

It’s one of the biggest challenges facing organisations when it comes to virtualisation; cloud sprawl. Unfriendly work portals and slow loading of documents would easily lead a whole department to seek an easier, faster way of sharing files and getting work done. And it’s a nightmare.

Picture this; you’ve just installed a new IT solution to connect the whole company. Now your employees can work from home, from a café, and sort out an urgent matter while on holiday. It’s simple to share large documents between each other. Everything is safe and secure, stored on company servers where you have full control over what data you have, who can access it, and where it goes. Except the whole system is a shambles. It’s not user friendly, employees have to spend minutes waiting to load simple documents, and everyone is just sick of it.

It’s easy for your employees to get caught up in the hype of cloud; once you start thinking about it, why wouldn’t the future be cloud-first? The result; they start storing sensitive files in free ‘cloud systems’; Google Drive, Dropbox and anything else that takes their fancy. It’s a GDPR nightmare.

We are talking about unregulated and unapproved cloud solutions that are used; from CRM to email to marketing automation to document storage. The consequence of these poorly managed, end-user cloud solutions and deployments results in redundant, fractured and inefficient cloud systems – and your IT department has no control over them. It’s an issue, and one that needs attention as soon as possible. So how do you go about minimising that pesky cloud sprawl?

Survey your applications
First of all, it’s crucial that you survey all of the applications and resources that your employees use to do their jobs. There are a lot, from Office 365 to Sharefile to SalesForce, and every other application under the sun. It’s important that these systems are accounted for. Administration access is another factor that needs to be refined. Often, too many employees have administrative access to your applications, making changes without the knowledge or consent of those who manage the whole lot – your IT department. Only a handful of employees should have access, and work closely with IT to approve changes following formal requests for new cloud resources.

Define your administrative role to virtual and cloud resources
Too many administrators are a big issue when it comes to virtual machines and cloud sprawl. Passwords, administration access, big ideas; when there are too many people trying to have their say and work semi-independently on a project, it’s easy to start getting confused. Assign a cloud sprawl manager to keep everything in check by managing the cloud that you have created. We’re talking no more of that crazy clutter that was taking up space in your physical data centre and the costs associated with it will be monitored, too. It’s just that easy.

Just as important is your actual cloud solution. Regardless of whether you’re considering public, private or hybrid, the trick is to avoid pre-packaged, one-size-fits-all cloud solutions. Your business is unique. It’s definitely worth your while to get an IT solution designed on the number of employees in your company and what you actually need out of your cloud solution. At Cetus Solutions, designing, building and supporting secure application and delivery platforms to fit your needs is our speciality.

Speak to one of our experts today to see how we can help you make the most of cloud.

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Security, Uncategorized

What Would You do in the Case of a Cyber Attack?


2 Comments

A cyber attack. You’d get shivers down your spine just thinking about it. As more of our lives- both personal and professional- are being moved online, the threat of a cyber attack increases, and with it the repercussions it would entail. We all have firewalls, anti-virus software, a few bulbs of garlic by the window, all to keep the bad from coming in. But eventually, regardless of what measures you take (most IT professionals would not recommend the garlic), there will be a breach. Speaking in statistics, 83% of businesses believe that the complexity of their organisational structures and IT infrastructure is putting their company at risk. And just think about what you have online; so much of your personal life, and your business. While both are sensitive (though I personally don’t really mind if my chocolate-eating habits become public knowledge), the latter could really affect your business reputation. While we all know that an attack is a real possibility, a lot of businesses haven’t really put much thought into it, and haven’t put a contingency plan in place.
So, what should you do in the case of a dreaded cyber attack?

Don’t panic- find out what happened
First of all, breathe. Until you know exactly what has been hacked into, there’s no point in fearing the worst and losing your cool- you’ll need it going forwards. Now, it’s important to find out what exactly caused the breach, and fast. Speed is a priority, and might just be what saves your reputation. What data has been compromised? How much data has been compromised? It’s also vital to determine whether you’re looking at a malicious attack or a technical glitch.

Secure your systems
Now that you know what exactly you’re dealing with, you need to contain the breach. You might think that the first call of action would be to shut everything down. Push that big red button, sound the alarms, go into lockdown. This may not be the best idea though; the hackers could sense that you’ve cottoned on and that could in turn make it harder to identify the culprits. Using another device, change your passwords and logins- the hackers may have installed software to track and record your movements. Implement a firewall on the affected machine to prevent it from broadcasting outside of your building. If you try and track down the source of the attack it may leave you open to further attacks. This is where good business continuity comes into play; even ten minutes of system downtime can be extremely costly, so switching over to an unaffected back-up can help minimise financial impact. So, does your IT solution include business continuity? Have a chat with our experts at Cetus to alleviate that worry.

Call in your legal army
As soon as you discover a breach, call in your army- of legal defence. If you don’t have a company lawyer, now is definitely the time to get one. There are plenty of legal issues to be considered, including whether or not to inform the regulator. In The UK, we have the Information Commissioners Office (or the ICO, who are spear-heading the GDPR movement in the country). Protecting your organisation from claims of malpractice is paramount. This includes how you will be informing those customers of yours that are affected. Clearly, having legal defence to point you in the right direction is crucial. At this point, it’s important to begin keeping detailed records of everything that happened and your steps to resolving the issue. Everyone who is participating in the incident response needs to keep detailed, ongoing accounts of what steps are being taken and why, as well as any costs incurred as a result of the attack. Things of particular importance to note; all incident-related communications, the identity of the systems, services, accounts, network and data affected by the breach. Don’t forget to record all of the information that is related to the amount and the type of damage that has been inflicted.

Stay alert- it might not be over yet
This is the last thing you want to hear, but realistically, it might not be the end of the nightmare. I know you just want to start putting things back together and start healing, but with the variety of scams at the moment, you might not know what you’ve fallen into. Depending on the nature of your attack, there might be more suitable incident plans to minimise damage. Ransomware attacks are the most common forms of attacks recently, as criminals scare you into paying them for control over your computer. Get in contact with your leading anti-virus firm, they always keep on top of the latest attacks- you might not be the only victim. Just make sure to keep your other devices secure- the hackers are also able to attack tablets and smartphones!

Hearing the word get out
Be prepared- you might be in the press spotlight after the attack. This is another reason why it is so important to work quickly and ensure that you take all the necessary steps to detail what you do to contain the breach and how you work towards minimising the damage. You’ll need to have a tailored statement ready as soon as possible- if you don’t have an internal PR department it would be worth investing in external support. But before the press even start reporting on the story, it is wise to inform your affected- or potentially affected- customers. It’s not a nice prospect, but the sooner your affected customers know that their data was part of the breach, the sooner they can take measures to protect themselves.

Learn from the attack- investigate!
You’ve made it, hopefully with minimum breach and your reputation still standing. But now is not the time to celebrate- it’s time to learn from the incident. Carry out a full investigation, determining how it occurred, its affects and any remedial factors that would prevent it from happening again.

And there we have it. While a cyber attack isn’t on anyone’s wishlist, these are some of the best ways of dealing with the aftermath. Not in the middle of a cyber attack right now? Come talk to one of our experts today to complete a complimentary security posture review, where we will analyse network traffic to detect a variety of security threats including malware infections,
evaluate end-point security with focus on mobile device management,
assess any threats posed within your infrastructure such as east west traffic, and more.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Cloud, Continuum, Technology, Uncategorized

Keeping Up With The Backup Trend


5 Comments

It’s 2018. IT is evolving at the speed of light. Our mobile phones can do just about everything and still fit in the palm of our hands. We’re talking about 5G data and the possibility of never having to think about broadband again. Scientists are predicting holidays on Mars, being able to travel in drones and creating huge underwater cities- that we could live in. So obviously, in our little corner of computing, all things IT solutions are moving at the speed of light, right?

Right! IT solutions are keeping up and ahead of trends and security risks, while creating new and improved ways to work and use our mobile devices- and this is every day. And this includes backups.

Disaster recovery, business continuity, backups; we all know how important it is to have copies of our data ‘just in case’. And the most prolific of those is,- and has been for over sixty years-; the humble tape. But why? Surely, surely, some IT geek out there has come up with something better, cheaper, more reliable- I don’t know, digital? It’s crazy that in a world where Netflix replaces DVDs and Sky, and Spotify replaces cassette/vinyl/CD collections, we can still be storing our entire businesses onto tape en masse. Especially when we have other options to keep things safe; USB, replication, CDs? So why, with all the new advances in tech, are we still using tape?

Tape does have its limitations, there’s no doubt about that. If a file gets corrupt, you’re stuck; any error and your data will be unrecoverable. Tape can be lost; fire and floods will most definitely disagree with them. If you haven’t a good enough backup you could lose a significant amount of data. Hardware failure, poof. Gone. And if you want to be extra safe and store your backup tapes in a separate location, say to avoid losing everything in the case of a building flood or fire, the time it would take to transport all of those servers would be a cost in and of itself.

Thankfully, the future has arrived. The answer to the modern question; replication.

Replication is the copying of an organisation’s data and then moving it between that organisation’s sites. Unlike a tape backup, replication only stores a ‘snapshot’, keeping the most recent copy saved, instead of the file’s history. But, while it is expensive, it is more in tune with business continuity; should your original system go down, it can take only milliseconds (if you’ve a good one) to switch to the second site- even if it’s hundreds of miles away. You shouldn’t even notice the switch. For all businesses, this is a crucial factor; time offline can cost hundreds of thousands, even if only for a few hours.

Continuum is Cetus Solutions’ answer to all things backup. It comprises four distinct but interconnected elements to give you the best experience in backup. A local Veeam backup solution will gather backups and provide you with a local backup and restore repository. A local cloud backup will provide you with the optimum offsite cloud location for the local repository to target. A backup archive provides a long-term, deep archive repository for replicated backups. And finally, hot running provides the ability for the client’s infrastructure to be run in the Cetus Continuum Cloud. It was designed with your business needs in mind, addressing business continuity challenges that you haven’t even thought of yet;

1. Full infrastructure recovery- and not just data.
For every well-defined disaster recovery plan, there is a focus on data. And this is the focus of Continuum; recovering and protecting the underlying server and desktop infrastructure to make sure that your data remains secure and accessible is one of our top priorities after a disaster, just as much as getting your business back on its feet.

2. We test. A lot.
Testing once a year is no good. You know that, we know that. In the face of a disaster, knowing that everything was hunky-dory when we tested it out a year ago just isn’t going to cut it when you’re having issues now. So we automatically verify and check the integrity of each virtual backup server on its way to the cloud. On top of that, we perform a full recovery test on a regular basis to suit your business needs, that way you just know that if something were to happen, we’ll have you back up and running with minimal disruption. That’s true peace of mind.

3. Fully. Managed. Service.
You read that correctly. Cetus Continuum provides you with not only the state-of-the-art technology, but a whole team of IT professionals who are working behind the scenes to make your business float. We’re on hand 24 hours a day to make sure that your replications and backups are completed successfully each day, and initiate the recovery process in the face of a disaster. So you know that we’re behind you at all times, ready and waiting to come save the day. You could almost call us superheroes.

4. A holistic backup and recovery solution.
What we do at Continuum isn’t rocket science, it’s basic sense. Our ‘secret’? We combine a local backup repository with our secure cloud repository. Tah dah! Because we do it this way, Cetus Continuum provides local file and VM restoration- either under your control or ours, whichever suits you best-, restoration from our cloud or full infrastructure and workspace recovery in our cloud.

We do rave and rave about backups at Cetus. We know that while it is such an important part of your IT, it’s one of those niggly bits that you can easily ignore and put on the long finger- until disaster strikes and you kick yourself for not having sorted it out sooner.
So have a quick chat about Continuum with our experts today and step into the 21st century’s answer to backup.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, Check Point, Cloud, IT Solutions, Security, Technology, Uncategorized

Practice Safe Mobility – Protect Your Endpoints


No Comments

It’s not the naughties anymore – the age of consequence-free mobility is over I’m afraid. It’s time to start practicing safe mobility. It’s time to put some endpoint protection on your ‘device’. The result of not doing so exposes your business to risk from threats, data loss, and unauthorised access.

For decades now, endpoint security has been the domain of anti-virus software. This was because Windows endpoints were the primary target, and we all ‘knew’ that they were vulnerable. Many businesses installed AV software on endpoint and moved on to more important matters…

So, what’s changed? Well, I would suggest that things have changed from two perspectives: the ‘use case’ has changed, and the threat environment has changed.
Taking each in turn…

From a use case perspective:
• The age of the virtual desktop seemed to be upon us (at least from Cetus’ perspective) – and then came ‘the well-managed Windows 10 desktop’.

• We’ve been acting like consumers for years now – buying smart phones, tablets and phablets and then wanting to use them for work.

• We’ve also been liberating ‘our’ data – storing it in personal cloud stores like Dropbox and sending it via our personal email accounts in an effort to be more productive
So what’s changed from a threat perspective?

• The days of good ‘old-fashioned’ viruses seemed to disappear when the use of nation state cyber weapons ransomware became an everyday thing (think Wannacry).

• Threats are now specifically targeting mobile devices (think Man-in-the-Middle Attacks. Women-in-the-Middle attacks are also a threat).

• Public cloud services are now part of most corporate strategies (think OneDrive), extending network boundaries into ill-defined, global data centres.

• Increased legislation with regards to the protection of individuals and their personal data (think the GDPR and its somewhat over stated, but none the less terrifying €20m fine).

The above list is by no means exhaustive, and tries to give a flavour of the changing threat landscape. So where am I going with this? Well, the good news is that our friends at Check Point have a solution to your cyber woes. Our cyber security portfolio provides Check Point End Point Security and Security Gateway Appliances that allow us to provide end-to-end security that encompasses your data centre, end points and the Cloud.
Specifically, from an endpoint perspective – Check Point provides data security, network security, threat prevention and a remote access VPN for complete Windows, Mac OS X and mobile device security.

If you’ve been playing fast and loose with your endpoints then we’re here to help. Our free-of-charge Security Posture Review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Award, Blog, Cetus Solutions, IT Solutions, News, Uncategorized, VMware

Going Above and Beyond with VMware


No Comments

It’s been an incredible start to 2018 for Cetus. You may recall a recent blog when we announced that we earned VMware’s highly sought-after competency in Network Virtualisation– now we can proudly declare that we have been recognised as the VMware Rising Star of the Year 2018!

After being nominated and shortlisted earlier on this year, we were holding our collective breaths as a small group of Cetus elite travelled to London beneath sunny skies on the 18th of April. The prestigious VMware awards were presented at the 8th Partner Recognition Dinner in the Amba Hotel in Charing Cross- very fancy altogether.
VMware hosts the annual awards as recognition for those partners in the UK who have gone above and beyond in the field of IT solutions and are key to the growth and success of the major vendor- so of course we’d at least be nominated! That being said, we knew that we’d be up against some very tough competition. But we rose above the other nominees, having proven that Cetus are one of the best in the delivery, service and support to users of VMware solutions.

The Rising Star award recognises Cetus Solutions as a quality provider of VMware, going farther than most to design a bespoke solution to fit your business and be there for you when any problems arise. It guarantees excellent service, from the moment you start researching the answer to your IT problems, all the way through to its the implementation and beyond.

“We are delighted to win the award for Rising Star 2018 at VMware’s prestigious UK&I Partner Recognition Dinner. For us, the award celebrates what has been a fantastic year helping our customers to transform their organisations with market-leading technologies from VMware. The award recognises our continued investment to achieve and maintain the highest levels of technical competency, knowledge and experience across VMware technologies to ensure we deliver first-class solutions, service and support for our customers.” said Claire Gibson, Head of Marketing and Strategic Vendor Alliances, who went to London to collect the award.

“It is a great honour to be recognised by VMware as the Rising Star for 2018 with our focus on the NSX / VSAN solutions. Cetus have been working with VMware since the early days of GSX/ESX Server virtualisation platforms and continue to develop customer solutions based on proven technologies. The award is a great testament to my team’s commitment and this recognition is proudly received,” said Managing Director Mike English.

If you want to work with VMware’s brightest star to solve your IT solution challenges, speak to one of our experts today. Alternatively, our free-of-charge security posture review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Cetus Solutions, IT Solutions, Our Upcoming Events, Security, Uncategorized, VMware

When ‘Traditional’ Approaches to Security Are No Longer Enough…


1 Comment

Security attacks are without doubt increasing in sophistication and frequency. With the average time to detect a breach over 200 days(!) the damage an attack could cause is frightening… Simultaneously, for many organisations their IT infrastructure and networks are becoming increasingly complex – with 83% of businesses believing the complexity of their organisational structures and IT infrastructure is putting their companies at even greater risk for security breaches.

In recent years, the number of high-profile data breaches compromising sensitive information has continued to rise. Although breaches were achieved in different ways, the majority exposed the fundamental weakness of the perimeter-centric network security model: after all, once the perimeter is breached, it is difficult to stop threats from moving laterally (east-west) throughout the data centre. These attacks have proven that investing in perimeter firewalls is insufficient and that more investment is needed to secure east-west (server-to-server) traffic.

One solution is virtualisation. Virtualisation abstracts the underlying infrastructure from the applications running on top of it, giving IT departments full visibility into the data path. Abstracting applications from the infrastructure provides the ideal enforcement point to compartmentalise applications through micro-segmentation of the network. This allows simplified security-policy creation and management. It also helps reduce the overall application infrastructure attack surface and provides the ability to effectively prevent threats from breaching the data centre. Leveraging abstraction in the data centre also protects the infrastructure from any compromise.

In our attempt to help more organisations improve their security posture, we are proud to announce that last year Cetus Solutions earned VMware’s highly sought-after specialist competency in Network Virtualisation. VMware, who pioneered the term software-defined data center (SDDC), awarded Cetus with the accolade after demonstrating technical competency, experience and expertise in delivering NSX solutions.

VMware NSX is the network virtualization and security platform for the software-defined data center. VMware NSX brings security inside the data center with fine grained policies tied to the virtual machine they protect. Essentially, with NSX, IT departments can programmatically create, snapshot, store, move, delete, and restore entire networks with the same point-and-click simplicity and speed of a virtual machine—delivering a level of security, agility, and availability never before feasible with hardware-centric or traditional operational approaches.

Our Managing Director, Mike English, had a few words on the achievement;

“We are delighted to have secured the Network Virtualisation competency from VMware. In the last twelve months, we have seen an uplift in conversations centred around data center security and particularly micro-segmentation. VMware NSX’s capabilities makes this level of protection economically and operationally feasible for the first time for a lot of customers. By gaining this competency, it shows our commitment to helping customers define, deliver and manage their security strategy in line with their business requirements.”

With the threat landscape increasing ‘traditional’ security approaches are failing to effectively secure a modern organisation. Now is the time to revaluate your approach to security. Our free-of-charge security posture review will provide you an opportunity to discuss your endpoint security challenges, as well as your wider cyber security posture with regards to perimeter, data centre and cloud components.

Speak to an expert