Uncategorized

Blog, Cloud, Cloud Hosting, IT Solutions, Technology, Uncategorized

It’s Halloween! Beware of Zombies!


No Comments

Well, it’s Halloween, so I thought it apt to draw attention to a blight of our modern age – Zombies! To be more precise: Zombie VMs!!

These modern terrors lurk, silently, in our data centres, consuming brains (aka CPU resource and RAM); with no clear purpose. At least, not a purpose that anybody can remember. They’re the product (or is it the cause?) of sprawl; long forgotten virtual machines, created for a particular purpose, but no longer used.

So what? You may, or may not be thinking. Arguably, in an on-prem deployment; they only consume power and minimal compute resource. There’s still a cost associated with them, but that’s also reasonably minimal. The other concern is that, being ‘forgotten’, they may present a security risk due to out-of-date applications and operating systems.
So here’s the main point: In a Public Cloud environment (e.g. Azure or AWS); Zombie VMs are also directly consuming your money. That’s definitely worse than them consuming your brains. The money lost to them could have been spent elsewhere; to increase profits, or to invest in more profitable activities.

What can you do about this horror? Run for the hills? Hide in a cupboard? No, the answer is to tackle them head on, otherwise they’ll spread as time goes by, making your problems worse. That’s where Cetus’ instrato can help you.

We call the solution: ‘Hybrid Cloud Orchestration’. It allows us to deliver a service that optimises your virtual machine estate; whether it be on-prem, in a co-lo, or on a hyper-scaler platform. Our service monitors your VM estate: to identify sprawl, and to automatically move your VMs to the most cost-effective location, or service provider instance. More importantly: our service pays for itself: both in the first instance, and on an ongoing basis.

To hear more about how we can help you to fight back against the Zombie threat, whilst saving a significant amount of money in the process: why not give us a call? We can conduct a free assessment that will demonstrate the potential savings that are awaiting you. There you go then: some good news on Halloween – not everything needs to be a horror story.

Speak to an expert

 

Blog, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized, VMware

VMworld 2018 Keynote


No Comments

So here we are at VMworld 2018 in Barcelona for VMware’s 20th anniversary and the 10th annual VMworld in Europe. With just under 12,000 attendees, the relevance and importance of the VMware strategy in helping businesses of all sizes grow and transform is clear to see everywhere you go. Pat Gelsinger took to the stage to layout his views and VMware’s strategy highlights for the coming years. For those that have not made it to VMworld before, the main keynote is quite high level and is followed by a number of ‘showcase’ keynotes that focus on the core areas of the VMware portfolio such as Security, Hybrid Cloud and EUC etc.

Pat showed how VMware has constantly driven to help businesses bridge gaps between innovation silos and highlighted three key ‘acts’ in the VMware history:
1. Server virtualisation
2. BYO/EUC
3. Networking
The message that organisations need to deliver both profit, as well as look after its people was clear; a fully engaged workforce will lead to innovation and transformation, which will lead to a more profitable business.

Technology should be a force for good in the world and that is what VMware is driving for in everything it does (The Mercy Ships case study was very powerful). Pat spoke about four tech superpowers in the world today (Cloud, Mobile, AI/ML, and Edge/IoT) and how each of them reinforces and drives the others. VMware sees the application as a network that requires an end-to-end platform to enable it. The VMware vision image below has been consistent across four core strategies for a number of years now;
• Modernise Datacenter
• Integrate Public Cloud
• Empower Digital Workspaces
• Transform Networking and Security
The ability for an organisation to deploy hybrid cloud and digital workspace solutions that are integrated from a single vendor drives simplification and reduces costs.

vmworld 1.jpg

At Cetus our mission is to help our customers deliver on their strategic mission by delivering hybrid cloud and secure digital workspace solutions, we believe that every organisation must embrace technology as a force for change and transformation. The VMware portfolio from vSphere to NSX onto Workspace One and out to Vmware on AWS means we can deliver on our mission from a single integrated technology stack.

There were a wealth of announcements in the keynotes, and while I’m not going to try and cover them all here, I just wanted to pick a few highlights.

Security
Pat talked about how the security solutions we deploy today are broken, as bolt-on options that are chasing a bad situation without a fundamental shift in protection levels. This is shown by record spending on security solutions, and also a record number of breaches.

VMware started to address this with NSX, moving the security enforcement from the North/South boundaries to cover the bulk of East/West traffic, and as such the micro-segmentation market emerged. While this takes security to a new level, it is still based on set policies and known interactions between services within the datacenter. VMware is taking this to the next level with the introduction of vSphere Platinum Edition that integrates the app defence solution into the vSphere licence. The combination of AppDefense and NSX allows VMware to deliver what it has now coined ‘Adaptive Segmentation’, allowing admins to deliver a step change in the security paradigm. The Adaptive Segmentation concept follows three key steps:
• Learn
• Lock
• Adapt

Rather than chasing after threats, AppDefense learns an application’s intended state and behaviour, then monitors for changes to this state that indicates a threat. When a threat is detected, AppDefense can automatically respond. Leveraging this known ‘good state’ allows policy to lock down the datacenter (NSX offering network-level automation) and then adapt as needed to changes in state. This deep integration allows for a shift in the overall security paradigm.

The focus on security across the VMware portfolio is really beginning to shine and deliver real value for customers.

Any Cloud
All businesses are on a journey to a hybrid/multi-cloud world and the need to automate and secure this transformation is key. VMware is innovating in both the datacentre and EUC spaces to ensure this journey is seamless, secure and cost-effective for all.

In the datacenter space, the need for a seamless path to and from cloud/on-premises is the key to allowing an organisation to unlock the power of its investment in infrastructure services. The ability to deploy to either on-premises or cloud and move between them seamlessly as costs and needs evolve ensures IT can meet businesses’ needs at all times. This needs to be enabled via a ruthless drive for automation, which the announcements of VMware Cloud Foundation 3.5 addresses by ensuring that enterprise IT teams can deploy private cloud with the same management and automation as cloud. Cloud Foundation underpins the hybrid cloud, both on-premises and as part of VMware on AWS- truly enabling this seamless hybrid cloud. With new VMware on AWS regions opening over the next 6-9 months, the reach will be truly global. Checkout my follow up blog from the datacenter showcase keynote for more details.

The message was clear that the future of cloud infrastructure will be hybrid and that VMware has delivered a true end-to-end solution. The acquisition and integration of Cloud Health extends this capability by providing a cloud operations platform that allows customers to understand costs and compliance across multiple clouds.

Any App
The Workspace One solution has been the stable leader in the MDM space for many years and over the last couple has evolved into a complete UEM (unified endpoint management) solution that supports mobile, Mac, Windows and Chrome end points. Providing users a simple, consistent and secure access method for all applications and data on any device, while ensuring that IT retain control of the full lifecycle of the devices. One big announcement was a joint partnership with OKTA to extend the Workspace One Identity Management solution and provide full user/device lifecycle management and automation. IT can now truly step away from the job of deploying endpoints, allowing technology to provide a simple user-driven workflow.

Enhancements to the Workspace One solution continues to demonstrate this market-leading position. Look out for my follow up blog from the EUC showcase keynote covering items Like Workspace One Intelligence and what COPE stands for.

So this ran on a bit longer that I expected; lots to talk about in what was actually a rather uneventful keynote by VMware’s standards. Most of this due to them splitting out 6 ‘showcase’ keynotes over the two days that focus deeper into the entire proposition. If you want to keep up-to-date with what’s going on with VMware, make sure to keep an eye on our events page where we regularly share workshops and webinars to keep you in the know!

Register for the webinar

Blog, Citrix, IT Solutions, Technology, Uncategorized

How a Secure Digital Workspace Solution will Simplify Your IT


No Comments

A lot has changed since we were children. Children no longer spend all day outside harassing the neighbours and it’s not the norm for cars to stall halfway up every hill. You can book a train ticket on your phone, order a takeaway online and find your way around a foreign city without having to buy a map or ask for directions in the wrong language. In fact, there’s an entire industry of young people whose sole jobs are to create videos, write blog posts and take Instagram photos for their thousands, sometimes millions, of online followers. And these influencers make your entire month’s rent just by posting one sponsored photo. How crazy is that?

The idea of ‘work’ has changed just as much. When we were children, our parents (usually our fathers, because that’s how it was back then) would come home late from a 12-hour shift, exhausted and with frayed nerves, having spent the day in a grey room the size of a teacup doing nothing of particular note. And that’s if they were lucky; sometimes those 12 hours were overnight, so your mother would send you out to play into the freezing rain to give him a few hours of undisturbed sleep during the day before it started all over again. And that’s just how it was, day in, day out; barely making ends meet until they turned 60 and got to retire.

For the most part, that’s not the case anymore, thank god. Work is no longer a tedious, mind-numbing 12 hours; we’ve got robots for that! The idea of ‘work’ has moved from what we go to, to what we actually do. Realistically, what do you need to get done that absolutely can’t be accomplished in your pjs, on the couch, watching Jeremy Kyle reruns? Not a whole lot. And then there are those who can’t stand being in one place for more than a meeting, flitting from one building to another, one city to another, one country to another. And it’s (mostly) thanks to digital workspaces. IT has always been designed to make life that bit easier. From the humble eat-your-finger rotary phone and the computer the size of a closet, to Google Maps and Uber; IT brings with it an improvement- even if that’s ordering a McDonalds through your Deliveroo app instead of on the computer. Unless, of course, we’re talking about the iPhone; nothing really changes year in, year out, aside from how many functions you can squeeze into a jack, and how much more screen space there is for you to break when you drop the damn thing trying to charge it while listening to Spotify. Digital workspaces, such as Citrix Workspace, play into this idea of increased simplicity, ultimately reducing the challenges that have been known to cause issues for all those involved. IT management becomes far simpler for the IT teams, while delivering a better experience for your end user.

Work securely, even on the go
It takes more than sitting in an office to make the world around us tick. But with that freedom comes a security risk that no IT department wants to face. It’s in the name; a secure digital workspace solution is, well, secure. Users are able to access their apps, data and desktops securely from wherever their ‘office’ happens to be that day- be it a McDonalds, a petrol station or their sofa (wifi not included). And since the workspace is device-transferrable, you can trust that they’ll be safe, regardless of whether they’re using a company-supplied laptop or their own device. And that security also translates to any network.

For the IT department, it allows users to do their thing without having to manually intrude in their working days, while you manage and monitor what they do through one control panel. With a single sign-on, the secure digital perimeter will follow your users wherever they are, giving you the peace of mind of contextual access that guarantees that they won’t be accessing what they shouldn’t. Because unified endpoint management comes built-in, a lot of the usual day-to-day management can be done automatically, such as the actions that are to be taken when a user violates certain rules. It basically gives you powers of god, from wherever you happen to be working. Remote wiping a device? Setting it to out-of-compliance? Revoking the device? Sending a notification to a user to correct an issue? You have the power.

Control the risk for your user
Shadow IT is an issue that has exploded in the workplace in recent years. While we have been lucky to experience so much new and amazing software to make our daily tasks faster and easier, often it proves to be too complex for the end user. Instead of making use of these monitored, regulated technologies, users are migrating to free, unsecured software (such as Dropbox or Google Drive), essentially creating an even bigger problem that what you had in the first place. And the worst part is, your IT team probably doesn’t even know about them. Is it that surprising that users are the number one reason for a security breach in an organisation? Hardly.

A good digital workspace solution will have a better, easy-to navigate file-sharing system. Let’s face it, a lot of users aren’t the most technical, and don’t want to spend half an hour trying to share a document with Stacy from HR who sits two doors down. You’d be faster to print it and send via paper plane. At Cetus, we usually set our customers up with Citrix ShareFile. It’s super easy to upload your documents for easy backup (don’t you know how important it is?) and share with other users. Store, share and sync your documents quickly across all of your devices to collaborate with colleagues and customers alike. I particularly like being able to upload a document and be able to share it with someone externally, all by using a link. And it’s just as easy to give the access some parameters; requiring the other person to supply their email to view it, or only give them a certain window to access the documents.

And since security is incorporated into the very DNA of Citrix Workspace, IT will always remain in control. Use closed-loop analytics to track user behaviour and automatically implement security protocols, giving your users all of the flexibility to work effortlessly, while being sure that everything is safe.

Access your data, wherever
With all of this cloud business being so new, a lot of organisations are trying to leverage as best they can while still working in a largely-oblivious environment. As with all things that are brilliant and new, it can take a while to get your head around all the fabulous features of cloud. As a result, it’s not unusual to go searching across your hard drives, clouds, network drives and other solutions for one single document, before giving up and Skyping the person next to you in shame and asking if they’ve seen it recently. It’s a bit of a nightmare, the amount of times you have to ask the person beside you for a document on a daily basis counts as a conversation and it’s impossible to manage everything. Welcome to the world of cloud!

Make sure to find a secure digital workspace solution that allows a simplified access to your files, creating a seamless sync across all of your apps, cloud providers, devices, company servers and content management systems already in place.
Since organisations are all different, it’s important that your digital workspace solution molds itself to you. Your storage needs and requirements will vary from other organisations and industries. Whether you have to host your data on premises for regulatory reasons, or on the cloud, with a digital workspace you have the option to flex to suit the needs of your organisation through one workspace.

Make it easy with single sign-on
Possibly one of the best features of a digital workspace is single sign-on. Because it brings together your apps, data, services and all of your devices regardless of clouds and data centres, you no longer have to worry about managing multiple security protocols. Sign in once with your organisation credentials and you have full access to everything.

Your secure digital workspace solution should work for you, by increasing flexibility, visibility and managements of everything, making everyone happy from the end user to your IT team. As a Citrix Platinum Partner, we have the expertise to bring you the best that Citrix has to offer. Have a chat with our friendly specialists to see what we can do to give you all of the benefits a secure digital workspace solution has to offer, so that you can start working smarter.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Cloud, IT Solutions, Security, Technology, Uncategorized

Application Testing in the Cloud


No Comments

If you’ve been keeping up with the hype, you’ve probably been looking into deploying a cloud of some form in your organisation. Be it public, private or hybrid cloud, the possibilities that they come with are endless and revolutionary. I’m sure you’ve heard all of those buzzwords before, building the idea of ‘the cloud’ into an amazing, it’ll-fix-any-problem-you’ve-ever-had-and-more! miracle that’s more of a unicorn than anything else. But you might have discovered that it’s not all sunshine and rainbows when it comes to cloud. Application testing has become one of the little bugbears that people forget- or choose to ignore- when putting together a cloud strategy. When you roll out anything new, it’s important that it’s a success- your bottom line could very well depend on it. And without regular testing you don’t even know what you’re throwing out into the world.

Several years ago, virtualisation became a new focus for IT departments. This new ideology of sharing computing resources across multiple operating systems increased productivity through reduced costs and increased scalability and easy administration. This fabulous new way of running IT infrastructure observed the evolution of virtualisation of cloud in the form of cloud computing. It paved the way for the dream of ‘Everything as a Service’, essentially creating a foundation for many of the technological advances we have today (but for some reason I still can’t get a delivery from the McDonalds a mile away, so there are clearly more worldly advances yet to be achieved).

Cloud testing is the actual testing of the resources on demand; think hardware, software etc. Testing is crucial for the health of your IT environment, especially when it comes to your cloud offerings, ensuring that it not only meets functional requirements, but also non-functional. Securing and managing performance of your applications is essential regardless of where they are; in the cloud or on-premises. It’s not the case of testing an application when it first gets deployed and never needing to bother with it again; the status of applications can change over time.

There are so many benefits for cloud testing that are easily obvious when you experience them. The normal testing approach is to invest in the adequate hardware and software infrastructure needed to carry out the testing. Since the environment supplied to the testing team very rarely matches that of the user, testing applications in the cloud can alleviate the issue of rapidly-changing requirements, allowing the tester to easily replicate the user environment and find defects early in the cycle. Migrating apps to the cloud can also reduce the cost of infrastructure licence renewal, as the organisation doesn’t have to purchase the infrastructure that won’t all be in use at the same time. With the end user environment in the cloud, it’s a simple enough task for an IT department to customise the testing environment match. This customisation reduces the cost and time of regular testing. The testing team can easily perform load and performance testing scenarios in various permutations and combinations.

But, as with everything, there are downfalls. I hate to have to list them, but here we are. By relying on and using the cloud as infrastructure, we do face a few hiccups. But nothing too scary, I promise. Security is one; user privacy needs to be protected, while also allowing the necessary protections that hold up to standards. The security of applications that run in the cloud and security testing techniques also need to be addressed by organisations when it comes to cloud infrastructure. The performance of an application in the cloud is another significant issue that regularly gets overlooked. How are we to know if an application works the same way, especially when hosted in a private cloud? The application itself will be shared amongst plenty of users, so that could cause a delay, especially if bandwidth isn’t good enough for testing. It’s surprising that in certain instances, the particular configurations of a user can be that complex that they just simply aren’t supported by that cloud provider. I don’t get it either. Bottom line, that can make it that much more difficult to emulate a user environment. The last little issue is that of integration testing. It’s easy enough to test the network, database, servers, and whatever else needs to be done. The tester already won’t have control over the underlying environment, but on top of that they’ll have to essentially guess how it would behave. If there are interactions between two components, the tester can only anticipate risks, such as crashes, network breakdown, or your server going on a sudden holiday.

Ensuring the maintenance and performance of your applications in your chosen cloud is crucial for your organisation. Where a lot of people would just love to ignore the finicky bits of testing, here at Cetus we like to dot the Is and cross the Ts, and that includes your testing. Our experts are specialists in application testing and making sure that everything works just right. If testing of your applications is something you’d like to master, make sure to have a chat with one of our experts who will show you first-hand the benefits, while eliminating as many downfalls as possible.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, IT Solutions, News, Security, Technology, Uncategorized

When 2019 Comes


No Comments

It was the mid-nineties, ‘IT’ was the new ‘data processing’, and we’d started using a new gadget called a ‘modem’ to connect our business to the outside world. They were exciting times; technology was changing how we communicated; and we could access technical information at any time. So … I decided that it was time to enlighten my team with a broad-thinking; almost visionary statement: “this Internet thing is really cool … but it’s just for techies”.

In hindsight; it ‘might’ be argued that my statement was, perhaps, a little bit short of ‘visionary’. In fairness; my comment was based on the, then, limited capabilities of CompuServe; which was nothing more than a chat group and download site for technical documents.

And so, with my ability to predict the future firmly and clearly established; it’s time for me to get to the topic of this blog: Top Predictions for 2019. As we, Cetus, look forward to the year ahead; we’re keenly aware that a number of technological drivers will affect the nature of our business. Here’s a few of the key drivers that we are gearing up for 2019:

1. The Internet. I’d better address this one – the Internet will continue to be quite popular in 2019. There, that’s that one put to bed.

2. Windows Desktops. Once the direct target of our VDI marketing efforts (due to its total cost of ownership and unpredictable user experience); the ability of Windows 10, in particular, to deliver a well-managed user environment has put Windows 10 back on the ascendancy.

3. Hybrid-Cloud. It’s been around for quite some time now, and many solutions providers are saying that it’s the future apparently. We beg to differ. Hybrid-Cloud is the ‘now’. You need look no further than Office 365 and SalesForce to see that we have been hybridising our clouds for quite some time now. 2019, however, will see the adoption of IaaS and PaaS, from the likes of Microsoft Azure and AWS, increasingly be the first choice of organisations across all sectors, public and private. 2019 will continue to favour solution providers who recognise that the resulting complexity is a feature not a failure of hybrid cloud; and who provide solutions that embrace and mitigate the complexity, rather than amplify it.

4. SD-WAN. Strongly related to the increasing adoption of the hybrid-cloud model; Software Defined WANs will see significant growth due to their ability to provide: increased resilience, lower price point and better performance over traditional WAN deployment methodologies.

5. Gen-V Security. Also referred to as Next Generation Security – the ability to deploy advanced threat protection that integrates boundary protection, endpoint protection and community threat intelligence is becoming a business necessity, rather than a nicety. Throw in Analytics and Micro-segmentation and you’ll soon realise that technology is providing a robust response to today’s multi-threat cyber security environment.

6. Virtual Workspaces. You might think that this is just the latest marketing term for VDI. We see it rather differently. Virtual Workspaces encompass more than just the desktop; we deliver a workspace that sees the desktop as merely a means to an end; namely a way of accessing applications and data. A Virtual Workspace now, more than ever, must be mindful of the desire of organisations and users to access their workspace using any device; from any location and at any time.

7. Automation. Our principle partners; Citrix, Microsoft and VMware all recognise that the increasing complexity of today’s IT environments require a more open approach to integration. This manifests itself as an increasing focus on cross IT element automation; relieving the IT function of large swathes of BAU activities, allowing them to focus on business innovation.

The above are all encapsulated by our 2019 Solutions Portfolio. By working closely with our primary vendor partners; we are able to draw down their strategic visions, and to combine these with over 17 years of delivering Secure Application and Data Delivery Platform solutions. The result is that we now have hundreds of customers who count on us to help guide them through turbulent times; who see us an extension of their IT teams; and with whom we have the genuine pleasure of travelling into 2019 as partners.

To hear more about how we can help your organisation get ready for the challenges of 2019; why not keep an eye out on our events page to hear all about our upcoming Citrix events?

Speak to an expert

Blog, Cetus Solutions, IT Solutions, Technology, Uncategorized

Who Would Prefer Digital Workspaces, Cats or Dogs?


No Comments

When it comes to blog post topics, I usually ask our Business Development Director, Paul Kiveal for topics to squirrel away and write about. Sorry to burst your bubble, but the fabulous ‘Hybrid Cloud Orchestration’ and ‘Is The Password Dead?’ posts weren’t my ideas. This week though, I caught him at the worst time, while he was in a strange mood (or sick of my constant craving for topics), and he gave me the worst title; ‘Who Would Prefer Digital Workspaces, Cats or Dogs?’. I’m not going to lie, it’s going to be a challenge. I’ve already asked a handful of people with zero IT knowledge for advice and they all gave me different answers, so I’m on my own with this one.

Originally, I thought cats would prefer digital workspaces. And it’s not because I’m a cat person (sorry). I just have no problem imagining a hipster Maine Coon- we’ll call him Salem- with his fur tied up, sitting in a café sipping huge bowls of the blackest coffee (or milk?), working away on his laptop. Why would he want to spend the day in the office, getting swiped by all the other cats for no reason whatsoever? God only knows, he wouldn’t be able to concentrate with all that purring. And every two minutes there’d be a flurry and a yelp as one of them forgot where they were and attacked their mouse. So, because Salem’s a very busy hipster cat, off he’d pop, with his laptop and catnip in his satchel to the closest Costa. A bit of quiet to get one step ahead. And let’s not forget the toasted tuna baguette for lunch.

Dogs however, they’re the ones who would love digital workspaces. Can you imagine telling a golden lab about how their work life would change? Let’s set the scene; some fancy, all white laboratory, not unlike the setting for James Bond’s Q. You stand in a white, unbuttoned lab coat, clipboard in hand, while Scooby sits at your feet, tail wagging.
“Access your applications and data no matter where you are in the world.” “Oh yeah, yeah, I like it, that sounds good!”
You lower your head to look at him over the rim of your glasses. “Seamless user experience; easily transition between your laptop, iPad, and mobile.” “Yeah, yeah?!”
“Optimise your productivity by meeting your business objectives while you work from home, in the office or on the go.” “Oh boy, that’s just amazing, isn’t that amazing?”
At this point he’d lose control and wipe the desk behind him of electronics with his over-enthusiastic tail. That’s another reason why dogs would prefer digital workspaces; can you imagine how many devices they’d break? A moment of excitement and their iPad would be history. And if you tossed them their mobile from across the room it would be crushed between their teeth. But with a seamless user experience, all of their data and applications would be in the cloud, so it would be a simple sign-on to whatever other device you’d have on-hand and they’d be on their merry way.

But, going a bit deeper into all this theoretical stuff, if you had an IT department full of cats, they’d love digital workspaces too. You’d have to move them from their cosy spot on top of the warm servers first though. All you need to create your own kitty IT department is a closet of Mac laptops, those small ones that fit in handbags. Cats don’t take up much space, they have tiny paws perfect for tiny laptops, and they get distracted by Windows. With increased agility, even the laziest tabby could easily deliver and manage a connected workspace to any canine user, regardless of what device they’ve just been given to replace their broken one, over any network. And they’d make the higher ups very happy with the reduced costs in managing complexity of the infrastructure. And since we can all imagine Salem being the Data Protection Officer in an organisation, complete with shirt and teeny, tiny tie, he’d love the secure corporate data feature. With so many files and applications flying around the ‘net, the risk of a security breach is high. But with that security feature, those kitties would be able to deliver their services without compromising security.

So, I can only conclude that, regardless of whether your furry friend is a cat or a dog, they’ll love digital workspaces for their own reasons. Pop Salem in the IT closet on your way up to the office, or link Scooby with the latest gadgets that will keep him connected with customers and the rest of the office while he’s out and about. If you fancy hearing more about what digital workspaces can do to improve your users or IT department (regardless if they happen to be human or otherwise), have a chat with one of our animal-friendly experts. Or just show them photos of your pets, they’d love that as well!

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Check Point, Cloud, IT Solutions, Security, Technology, Uncategorized

The Cyber Security Threats You Need to Plan for in 2019


No Comments

It’s that time of year again; time to be weary of scary things jumping out on your screen when you’re least expecting it, of monsters following you into your dreams and escaping from your [data] closet. I’m referring, of course, to National Cyber Security Month, the month to take extra care when it comes to protecting your organisation from cyber-gremlins. And I’m sure you’ve been hearing about it non-stop for the last three weeks; participating in the office games, including ‘bobbing for malware’, ‘pin the data on the phishing attempt’ and ‘pass the ransomware’. All party classics. Regardless, it’s an important issue that gets pushed to the side all too often throughout the year. So now is the time to make that extra bit of effort to make sure that you’re protected should the Big Bad Cyber-attack knock on your door (or make you realise just how badly your straw house was lacking).

To switch things up a bit, I thought it would be clever to start thinking about what lies ahead, when the dark, cold nights and endless Christmas parties make way for snow in April. Now is a good time to start planning for 2019, and what the cyber landscape might look like next year. I’ve dusted off my crystal ball and called upon the spirit of Google to tell me exactly what cyber security threats we’re most likely to hear about next year. So buckle up, take notes, and be prepared to impress your boss with your savvy goal-setting ambitions. You’re welcome in advance.

It seems like the world spent the entirety of 2018 running around trying to put out phishing fires. Unless you live under a rock, or are lucky enough to spend your days on a wifi-less beach, you can’t have missed the crazy number of phishing attacks that were publicised. Every second cyber security article had details of attacks and startling statistics (76% of businesses reported being a victim of an attack in 2018 so far). Alas, while phishing has been around since 1980, it has just been ramping up in popularity and severity over the last year or so. When it comes to internal threats, it’s by far the easiest way to get access to sensitive information. According to a Verizon report, 30% of phishing attacks get opened by American users, with 12% of those targeted by the emails clicking on the infected links or attachments. The element of human error makes it that much more appealing. Unfortunately, the only solution to phishing (for the time being anyway) is to train your users to be extra vigilant when opening emails from external sources, and make sure your spam filters are extra strong.

Here’s an interesting (albeit worrying) one; your new smartphone being compromised before it even gets in your hands. Malware is another one of those evil little buggers that can really cause trouble if you’re not very careful. Like phishing, it’s becoming a prevalent part of the internet landscape that users have to be wary about, kind of like not playing in traffic and eating your vegetables. In a society where being always-on is a necessity, mobile phones have become replacements for desktop computers. Think about it, what do you store or have access to on your laptop that you don’t on your phone? The data your phone collects on a daily basis is a very attractive target for cybercriminals. But the modern cybercriminal doesn’t have to stand on a street corner and ‘accidentally’ bump against you to steal your mobile, and ergo your data. Apps are an easy hands-free way to bypass security measures and cause trouble without even clicking on a malicious link. There have even been reports of smartphones leaving the factory floor with malware built in! This malware, called Cosiloon, can send users to download dodgy apps that they didn’t intend on accessing. The app is passive, only visible to the user in the settings section, but then connects with a website to grab the payloads that hackers want to install on the phone.

Speaking of phones, surprise, surprise; cryptocurrency is going to continue to be a massive deal in 2019. And since it is, the dollar signs in the eyes of hackers are getting even bigger. Cryptomining was a new trend for 2018, but without a doubt will gain traction during the next year. Uber-clever cybercriminals infect machines to commandeer their CPU power and steal Bitcoin. What we will most likely see in 2019 is the rise of cryptomining through mobile devices. Since cybercriminals need the infected device to be running to access the processing power, it only makes sense for them to move onto always-on mobile devices. Clever, huh? Many hackers simply create useful and legitimate apps, such as calculators, music videos or voice recording technology, and then embed a script that allows the cryptomining plugin to work silently in the background (don’t start getting any ideas). Since the nature of mobile is to simply make everything so damn complicated and finicky, you probably wouldn’t even notice the extra tab on your browser. The only thing that would indicate that you were a potential victim would be the quick-draining battery. But let’s face it, how often would you attribute awful battery life to a hacker, rather than just having an older phone? “You’d need terrible mobile security!” you might guffaw, pitying the idiot commoner that wouldn’t think of protecting their mobile devices (oops, that would be me). Alas, cryptomining doesn’t technically compromise the security of the device, as it doesn’t bypass security systems or install any rogue software. If you think you’re being clever by installing app-only or endpoint-based security solutions, you won’t be the one laughing (I don’t feel so bad then).

CheckPoint’s SandBlast Mobile is one fabulous piece of software that can and will protect your mobile devices. It protects users from threats to the OS, apps and network, and boasts the industry’s highest threat catch rate. Zero-day malware, using a software vulnerability for which there isn’t any available fix or defence at the moment, is being created and released onto unsuspecting victims every day. SandBlast Mobile blocks zero-day malware (I think it’s magic, actually), and prevents phishing on your apps. If you’re worried about infected devices accessing corporate data, it will intuitively block the device, while also blocking infected devices from sending on sensitive data to botnets. Possibly the most innovative feature of SandBlast Mobile is how it mitigates threats without having to rely on a management platform, which means that you’re protected even when you might not be on the ball (mobile attacks can also happen after late nights- you can’t have Spidey senses all the time!). Regardless of what you do or access on your mobile, if you work from your phone- even if it’s just to reply to emails- SandBlast Mobile is the all-encompassing solution for you. Well then, we can pretty much strike off two of those potential 2019 issues with just one technology!

We’re all for embracing the future here at Cetus. There is so much to look forward to, and so many awesome new technologies- both malicious and not- that will come about, regardless of how well you try to prepare. Working with CheckPoint, we feel reassured that our cyber security is covered, regardless of time, place or device. If you’re interested in what our experts have to say about all the cool things that CheckPoint offer, you can have a chat with them with here. And don’t forget to tell us what you think; what will 2019 have to offer by way of cyber security threats?

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, IT Solutions, Security, Technology, Uncategorized

Improving your Network Security; it Doesn’t Have to be a Scary Business


No Comments

It’s finally October! Time for the quintessential Pumpkin Spice Latté from Starbucks, complaining about the sudden early evenings and frantic last-minute costume shopping for the office Halloween party. It also happens to be International Cyber Security Month; a friendly reminder to take extra care when it comes to your cyber security, lest a cyber-Dracula should invade and exsanguinate you of all of your rich, iron-filled data. Here at Cetus, we’re always up for a bit of spooky fun, but when it comes to security we’re serious. This week, in honour of Anti-Malware,-Ransomware,-Phishing,-And-All-Things-Evil Month (it’s original title wasn’t quite catchy enough), I’m going to try and make improving your network security a little bit more fun. I’m only 125 words in, so there can be no promises.

Along with an effective cyber security policy, creating a plan in the case of a cyber-attack, using micro-segmentation to minimise the damage of said cyber-attack, making sure that you have ample backups in place to maintain your business after a cyber-attack, and many, many more stress-inducing topics for you to worry about, making sure your network security is up to scratch is also crucial for your business. (If you’re looking at that list and wondering what on earth you’ve been missing, they all link to delightfully hilarious posts that will alleviate all of your fears.) Your network is the glue that holds the entirety of your organisation together. Or, in this instance, it’s the stitching that holds the body parts of your Frankenstein Monster of an organisation in place. Ever try sharing a digital document with Stacy from HR in the next building without a network? It would be faster to train a carrier pigeon to knock on her window- but that wouldn’t be without the risk of interception. Or practise morse code- unless Stacy is on the other side of the building. If you’re lucky enough to be by a window directly across from her, there’s always the option of folding up a paper airplane or, my favourite, using a tin can telephone. And those are all well and good, but what about if Stacy’s office is in another country- or continent? An ultra-sophisticated, time-locked carrier pigeon is the only way to go. Unless you have a secure network, that is.

But ‘pub tonight?’ emails aren’t the only things your network adds to your business (though it might be one of the most important ones). Think of all of the many files that are stored on your organisation’s shared network drive, and all of the instances you need to access one. Last-minute edits to the document that your sleepy, unsupervised intern prepared for your board meeting? Holiday request form? I guarantee you, you pop in there at least once a day to spend half an hour looking for a document someone else created. Without your network, you’d be a building of USBs wandering around the office. Your extremely helpful Outlook calendar that allows you to own the time of your colleagues (but also allows them to rule over yours) is thanks to your secure network, too. Want to work in a café/building site/park bench (near a Wi-Fi source; it’s not that magical)/car park? Feel free to use whatever open Wi-Fi network you want without the worry of a cyber-creep stealing all of your organisation’s secrets. And a lack of network security cost UK small businesses a collective, but nevertheless horrific, £11bn in 2016. So, how do you take care of your Frankenstein Monster?

If your network is Frankenstein Monster’s stitching, then a healthy network security policy is the age-defying, pollution-barrier moisturiser that keeps everything supple. A clear, simple and comprehensive network policy makes everything work smoothly. All it takes is a written document that outlines user policies; who is allowed to access the network, what privileges and limitations do they have, etc. There’s no point letting just anyone who happens to be working for the organisation into every file; unless you’re sending her paper airplanes, Stacy from HR shouldn’t be included in the notes of the main board meeting. A good risk assessment test, identifying important data sets and creating a disaster recovery plan is all that is needed to make sure your network security policy is ready to go! It’s also a good idea to organise drills within your IT department to make sure that the new implementations have been well received by your users, and to identify if they need further training.

A lot of organisations do well to make sure that their network is safe, by investing in the most expensive, most sophisticated and most snazzy infrastructure to keep the outside out. However, where they fail is usually keeping the ‘snazzy’ up to date. We already know that loopholes from unpatched networks can cause some serious security breaches (WannaCry, anyone?), so it’s crucial that your IT department acts on whatever updates may come about. If, for example, Frankenstein’s Monster were to lose a finger or nose, you wouldn’t leave it be, right? So, patch, patch, patch. Speaking of, bad passwords are like skin erosion. Let that fester and it won’t take long until the bad outside germs (cyber threats, in this example) pierce through and infect the entire body. In the age of Gen-V cyber-attacks, it’s important that your password policy is up to the security demands of your organisation. Maybe think about multi-factor authentication? I’ve already written loads on that, but to make it brief, think about making passwords expire every 60 to 90 days, just to be safe.

It’s time to don your favourite lab coat and get into your Dr Frankenstein head space, because now we’re talking about auditing and mapping. Place your monster on the slab and open him up! Know everything about your entire network’s infrastructure; what servers, printers, computers, devices and users are connected? How to they connect, and how do they maintain their connectivity throughout the network? Look for vulnerabilities that could end up causing you trouble in the long run. Keep an eye out for ways you could improve security, performance and reliability. Basically, see if you can replace a few weakened patches of skin with some robust tin and give it a zap to bring it to life.

Last but not least, Dr Frankenstein would hardly have created his monster without making sure he had plenty of backup arms and legs, just in case. And neither should you. Chances are, a hacker will find their way into your system. Which sounds a whole lot less scary if you’ve already read all about micro-segmentation and you’re compartmentalising your network. Regardless, it would be best to make sure you’ll never be caught out if it were to happen. As always, we’ve got you sorted, since we always take backup seriously.

IT’S ALIVE! Now that we have all of that sorted (that wasn’t as torturous as you’d thought, was it?), we’d love to hear what you think. Is Frankenstein’s Monster the best monster comparison of your network? Have you suddenly realised that maybe you need to take another quick look into your security? Have a Halloweeny chat with our experts to see what we can do for you, and decide what you’re going to dress up as this year.

Speak to an expert

Speaking of, I’ve finally decided on my costume for the office party; Cyber-Dracula. Sorted.

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Citrix, IT Solutions, News, Technology, Uncategorized

IPEXPO 2018: A Newbie’s Perspective


2 Comments

As part of the marketing department, I’m privy to a lot of the cool and interesting things we at Cetus get ourselves into. From Christmas parties to our workshops, and everything in between, I hear of all the things we do- sometimes I can’t sleep from the excitement (though that could be from the coffee I’m drip-fed in the office). So when I popped into an IPEXPO organising meeting last month I didn’t think too much of it. IPEXPO is a utopia for all things IT solutions, cloud solutions, cyber security…. If it has something to do with running the IT in your organisation, there will be a company there with more experience and knowledge than you could possibly need. We’ve been exhibiting at IPEXPO since 2011, so it’s something that I’d heard about since I started at Cetus in February. I piped up with the mandatory odd line to justify my presence while I practiced my ‘I’m-totally-contributing-to-this-conversation’ face as I fell into standby mode. That was, until Mike English, our Managing Director, mentioned something about blogs. That rebooted me up real fast. It was with shock, horror, and a tiny bit of excitement that my name was etched on the list to go to the event.

That excitement faded away completely as I stood in the middle of Euston Station. My first ever time in London (I’m a poor girl hauled out of the Irish countryside) and I was not prepared for it. People, everywhere. They swarmed around me, dragging behind suitcases and children alike, totally oblivious of the commotion that was ripping through my mind. I very nearly pulled a sickie there and then, but for the fact that I’d already let the Marketing Head know that I was on the train into London. Bugger. But Euston wasn’t even the worst part. It was dragging myself and five kilos of ‘just in case’ pages of collateral all the way to the ExCeL convention centre on the edge of the city. And I was going to have to use the transportation of nightmares that makes men cry, brakes souls and causes couples to break; The Tube. To be honest, the worst was just finding my way around King’s Cross as I tried to figure out where to buy a ticket, and what constituted the difference between the train and the Tube entrances. I was a human Sim character for about 20 minutes, wandering around in circles trying to figure out why I was there and how to get out.

Two hours*, a packed Tube and a cheerful Twirl bar later, I found myself at ExCeL. It’s a marvellous, imposing building, shoved at what feels like the other end of the world. If I thought Euston station was bad, I was in for a bigger shock. The convention space was packed with nerds as far as the eye could see. And the place was incredible. Flashing lights, red carpets- I felt like I was in Hollywood. The elaborate stands were stocked full of toothy smiles, chocolates, pens, and enough collateral to build the DLR line all the way back to Euston. And the room was massive.

I waded through the throng of matching t-shirts and rucksacks, trying to find my way to the Citrix Partner Zone to find our stand. We were delighted to be displaying alongside Citrix again this year, especially with the introduction of our new instrato brand. With instrato, we work with Citrix and Microsoft Azure to revolutionise the journey to the cloud. We were even more excited to introduce our new project to the thousands of delegates that were in attendance, getting to chat with them and see how instrato could make their cloud journey simpler. And when I finally rocked up to the stand, it was clear that it was catching the eye of plenty of people. Thank god the girls had all bought matching blouses in Cetus purple, it made them so much easier to spot in the crowd that had manifested.

This year, we were especially excited to have a speaker at the event. In April, we won the highly fought-after Lewisham and Greenwich NHS tender. It’s a big deal for us at Cetus, one of the most prestigious projects we’ve ever taken on. Six months later and we’ve well and truly sunk our teeth into it. With healthcare IT hugely under-reported on, it made sense to introduce the instrato project in the theatre. Thankfully, I had made it just in time for our speaker slot, held in the App Virtualisation & Mobile Workspaces Theatre, which was just behind our stand. As always, our Business Development Director, Paul Kiveal, gave a brief introduction to Cetus and instrato, as relaxed and well-spoken in front of the packed theatre as he is during team meetings. As much as Paul could have detailed what benefits and improvements we are delivering to the NHS, he handed the reins over to Justin Beardsmore, Chief Technology Officer for the Lewisham and Greenwich Trust, who was more than happy to talk in depth about the project and why the Trust chose to work with us. Impeccably dressed, he stood at the top of the lecture theatre watching the chairs getting filled up as delegates made their way in.

An experienced senior technology leader, Justin captivated the audience with the situation of the NHS and what we are doing to improve the lives of not only the working staff, but also the patients that rely on the service. Justin went into detail about the community NHS staff, those incredible people who work remotely to provide a top-tier healthcare service to patients who aren’t able, or don’t need, to attend hospital. As you can imagine, the paperwork and procedures that has to be completed for each patient, regardless of location, can really pile up, so an innovative solution has to be sought.

It was a quick and captivating 30 minutes, and it was a delight to see delegates coming up to Paul and Justin after the lecture for their know-how and suggestions for their own projects. Our stand was swamped directly after the lecture as well, whispers of our successful lecture having spread around the convention, and everyone wanted to find out more about our exciting Citrix-Azure-instrato partnership. Essentially a human lump of a paperweight at the stand, I decided against striking up conversations with delegates and scaring them away with my limited IT knowledge. I played ‘undercover blogger’ and wandered around the convention, popping into cybersecurity lectures and avoiding eye contact with everyone I met (god forbid I get kicked out for being too stupid).

Alas, it was only too soon before I got the dreaded ‘let’s go make our way to the Tube :)’ text and had to say goodbye to the ExCeL centre. Weary that our beds were still another six hours away, we piled into the Tube (why on earth is it so short?) along with hundreds of other delegates who decided rush hour was the prime time to leave before they came back again the next day to do it all over again.

Did you go to IPEXPO this year? We hope you managed to pop by our stand for a chat (I swear, everyone else is extremely intelligent and knowledgeable in IT) and found out more about instrato and what exciting projects we have planned. If you didn’t make it to London, or just didn’t have the chance to come say hi, we still have the same experts (minus Justin, I’m afraid) on-hand to talk through your upcoming projects, and they’re easily available here. As for us, we’re going back to the drawing board to start planning for next year, can’t wait to see you there.

Speak to an expert

*It took me two hours because I can’t read CityMapper and I refuse to ask for directions. It should only take 30 to 40 minutes.

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Citrix, Microsoft, News, Press Release, Uncategorized

Citrix Platinum Partner, Cetus Solutions, to Showcase New Brand at IPEXPO 2018


No Comments

Citrix Platinum Partner, Cetus Solutions, will be showcasing, instrato, its Hybrid Cloud Solution stack at this year’s IP Expo.

Officially launched in July of this year, instrato focuses on delivering high-quality cloud deployments for organisations that are looking to move to the cloud as part of their digital transformation strategy.

Cetus Solutions is one of the UK’s leading Citrix Platinum partners and multiple award winners with over 17-years’ experience in delivering tailored solutions to customers.

As one of only three partners who hold all four esteemed Citrix Specialisations – A Citrix worldwide recognised standard achieved by only the technical elite – Cetus design and deliver Secure Application and Data Delivery Platforms embracing Citrix’s Networking and Digital Cloud Workspace solutions.

instrato brings together Cetus’ experience and successful business outcomes in building hybrid cloud infrastructure solutions.

This experience, while not born in the cloud, was born from unparalleled solution experience and industry knowledge. instrato delivers one of the most prominent and proven hybrid cloud solutions for Citrix and Microsoft Azure platforms.

Cetus has exhibited at IP Expo since 2012, and as an established Citrix partner will be exhibiting this year in the Citrix Partner Zone on stand K26, demonstrating the company’s experience and knowledge in Citrix’s Workspace, Networking and Analytic solutions.

Plus, Cetus’ customer, Lewisham and Greenwich NHS Trust, will be speaking at the event on 3rd October at 13:40 in the App Virtualisation & Mobile Workspaces theatre. Justin Beardsmore, the Trust’s CIO, will be explaining why L&G NHS Trust chose to work with Cetus to deploy over 6,000Citrix virtual workspaces on Microsoft Azure as part of its modern workspace strategy.

For more information on this release, please contact Colleen O’Brien: 0161 848 4315