Mobile Workspaces

Blog, Cetus Solutions, Citrix, Cloud, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized

Citrix Summit 2019 from a Citrix Platinum Partner Point of View


No Comments

There are very few events throughout the year that get us super thrilled here at Cetus/instrato. Even fewer that we prepare for months before the actual event (aside from IPEXPO, which is a whole other story). But when it comes to Citrix Summit, held every January, we get very excited.

As a Citrix Platinum Partner, we stay on top of what’s going on in the Land of Citrix to make sure that we keep things fresh and up-to-date for our customers. And we’re absolutely blessed with two huge events a year to sink our teeth into; Summit and Synergy. We loved Citrix Synergy last May (and my god, we got some exciting updates on Citrix Workspace) and we’re still going on about it in our office. Of course, leaving the wet and windy UK for three days to fly to the US is a major bonus too!

As always, this year’s Summit is being held in Orlando, Florida, from the 7th to 9th of January- what a way to start the new year! Unlike Synergy, which is for customers as well as partners, Summit is only an event for partners, like Cetus, who promote and sell the Citrix Vision. And as always, we’re sending a little group of top Cetusites to go, explore and bring back the very best of Citrix.

The event is three days of inspiration, information and networking to bring the Citrix game to 100. Crazily, we’re expecting over 300 hours of training and hands-on learning, which we’ll be incorporating into all things Citrix when we get home. The event is a great way to build relationships with the biggest and brightest minds of Citrix experts and business leaders. From the opening keynote, which is always one of our favourite moments, to the breakout sessions, having those nagging questions answered at a Round Table, or just getting immersed in the hottest topics in the world of IT solutions in the Citrix Talks panel discussions, it’s going to be a crazy week. It’s events like Summit that inspire us to look to the future and adopt the latest and greatest ways of working.

One of the best things about being a Citrix Platinum Partner is the ability to really consolidate what we learn at Citrix Summit and Synergy into the huge projects that we work on. Having that foundation on which we can build our expertise is priceless, but a fair portrayal of how much we value Citrix itself as our partner. We know that having the title of Citrix Platinum Partner assures us that we’re in the best of hands, which means that our customers are, too.

When it comes to instrato, we work exclusively with Citrix and Microsoft Azure to get the optimal combination for a cloud deployment, so the fact that Microsoft will be attending makes our little cloud-enthused hearts flutter. In fact, cloud and cloud-based applications features heavily in the session previews, further strengthening its position as the future of IT. No doubt those sessions will be popular, including Citrix Talks to discuss cloud transformation projects.

You can be sure that, once we shake the jet lag, we’ll be incorporating all the latest updates and features into the solutions we design. If you want to hear a bit more about what you can expect from Citrix (and Cetus!) in 2019, have a chat with one of our Citrix Platinum Partner experts, and register for the Summit update events we’ll be hosting when we get back. We’ll see you then!

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Citrix, Cloud, IT Solutions, Our Upcoming Events, Technology, Uncategorized

Citrix Summit 2019 For Dummies


No Comments

There are myriads of reasons to go to different conventions throughout the year. The chance to network with the biggest in the industry and get the first look at the latest innovations and methods can be priceless. In fact, a lot of organisations often insist that they do better after having attending key summits, or that they get their new and existing customers reaching out to them for the inside scoop.

In the world of cloud and IT solutions, the annual Citrix Summit is the event of the year. Held in Orlando Florida (so it could essentially become a mini holiday if you plan ahead), it’s where anyone who is anyone in the industry will show face. Not to be mistaken for Citrix Synergy in May, which is for partners like us as well as customers- but just as exciting as Summit. I’ve written plenty about the Citrix Vision for Citrix Workspace this year already. When it comes to fighting for the revered places, it usually comes down to the same three people who get to go, year in year out, with no questions asked. But this year you’ve been chosen. Why? You’re not quite sure, but let’s not ask any questions (it’s very likely that someone is having an extended Christmas skiing holiday this year). Gulp. That means you need to make sure you’re not on the top of your game and not make a fool out of yourself. What’s the weather like in Florida? Is there a particular dress code? Are we allowed to look vendors in the eye? As Cetus are a Citrix Platinum Partner, we’ve been around the block a few times. That is, if the block is a year, and a few times is exactly ten. So, we’ve rubbed what braincells we have to bring you the ultimate guide to survive those three fabulous days at the beginning of January.

Prepare for everything- even the disasters
It’s always best to prepare well ahead of time to make sure that everything runs smoothly. Make sure you know what airport you’re flying to, and how to get to your accommodation. Don’t leave it to someone else on the team, chances are you’ll all rock up on the day and no one will have a clue- leaving you all potentially driving around the city in a dodgy taxi at midnight, starving and tired. We’ve all been there, and it’s not the best way to start the trip!

A few weeks before Summit, have a quick look on Twitter or Google for the hashtag (bonus tip: it’s #CitrixSummit). Another fabulous hashtag, that isn’t exactly reserved for Summit but will also work in this case, is #CitrixPartnerLove. Go crazy, tweet a bit and get involved in conversations on Twitter, hopefully you’ll get the chance to introduce yourself before you even arrive. That’s one less box to tick! Second bonus tip: pack extra underwear.

One of the most convenient ‘features’ of Citrix Summit, and by far the best advice a seasoned Summit-goer would tell you would be to download the Citrix Summit app. It has everything you could possibly need to survive the event including an interactive timetable.

Get your networking hat on
Networking is the name of the game at Summit. It’s an opportunity to meet with plenty of people in a wide range of roles. To be fair, facing a sea of industry leaders can be a pretty daunting experience, but it’s best not to stick to your little group of comrades. Try to arrive earlier on pre-reg day and ‘happen to run into’ someone with the same lanyard and strike up a conversation- what are they most looking forward to? What do they expect to hear about? Where are the ladies? You get the idea.

Conference with participants going to the same seminars and workshops as you. Keep that social media involved as you go, it’ll be a great way to engage in even more conversations, and also serves as a way to show your boss that you didn’t ditch to go to Disney World. It’s great to talk to people from other organisations with more experience than you as well. As a Citrix Platinum Partner, we’re always having a chat with other UK-based companies. Also, big Citrix leaders will be mingling throughout the Summit, so make sure to keep your eyes peeled and prepare a good opening line to catch their attention. “The colour of that suit absolutely compliments the success you’ve had this year” is my favourite example. And most importantly of all, make sure that you say yes to every opportunity that arises!

Evaluate your daily strategy
The main problem with Citrix Summit is that there’s just so much material being squeezed into only three days. You could spend an entire day just making sure that you make the most of every opportunity. Between keynotes, Learning Labs, workshops and the Certification Centre, there’s a whopping 300+ hours of content, training and hands-on learning to get your teeth into. Before heading over to Florida, prepare a potential schedule for every day. Every morning, re-evaluate what you’ve already learned and what sessions could potentially be a reiteration, giving you more time to book in an extra session, Learning Lab or networking opportunity.

It’s always good to get goals, and it’s no different at Summit. What do you want to achieve from attending? What expert do you want to hear from? Is there an organisation attending that you’ve been looking into lately? Is there a topic that you could just use that extra bit of info on? Make sure to keep these in mind when you’re plodding through the days- it’s important to keep an eye on the bigger picture.

Dealing with post-Summit blues
We absolutely love Citrix Summit. In fact, pretty much anything Citrix-related gets us in a too-excited-to-sleep kind of mood. As a Citrix Platinum Partner, we make sure that we’re on top of what’s new and exciting in the world of Citrix. We want to offer the very best to our customers, both new and existing, keeping them ahead of their competition and helping their growth. That’s why we’re hosting a workshop throughout the country in January to share the knowledge we received at Citrix Summit. Make sure to register today for your spot!

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Citrix, Cloud, IT Solutions, Technology, Uncategorized

The Citrix ‘Virtual Workspace’ Vision: What Have We Achieved?


No Comments

I don’t remember ever not having a computer at home. When my brother and I were little, somewhere in the rolling Irish countryside, that was technology; messing around in Paint for hours, until we were old enough to graduate to Tomb Raider (on keyboard) and whatever game demos my Dad got with his monthly PC Live subscription. If we were allowed to use the printer (that was a rare treat), we’d spend hours in Word making posters for our room, trying out every single option in WordArt and agonising over what colours we’d use- which would have absolutely no significance whatsoever since it printed in black and white exclusively. Then, as early teens, we got second-hand laptops to mess around in PowerPoint (I once did an amazing presentation on the benefits of having an allowance for my rabbit Poppy, graphics and all), and flex our creative writing muscles in Word. Back then, floppy disks were king (I still have some knocking about, storing god only knows what). Hell, I remember being 16 when my Mum bought my Dad a brand-new printer for his birthday; a super cool one that printed in colour and scanned documents and photocopied and printed wirelessly. It was amazing to have all of those features in one small device that was affordable for a modest family. And that was only in 2010!

For most of us, that was the reality until quite recently. Technology was just a cool little add-on, the ability to type out a document instead of writing it by hand, playing two-player videogames using only a single keyboard and mouse, being able to email Granny across the country- regardless of whether she’d remember how to access it or not. It was fun, but it wasn’t particularly useful. The workplace was the exact same (so I’m told); visiting the dusty clock-in machine at 9am, tapping away at an even dustier computer half the size of the desk, emailing people sitting just across from you, and finally kissing the clock-in machine goodbye at 5pm.

Last month was our Cetus Summit, a day of celebrating the achievements of the year just gone and anticipating how we can be even bigger and better in the year ahead. As part of the morning presentations, we had several vendors come and talk to us. One of those vendors was Citrix. For half an hour, they analysed a Citrix video from way back in 2001 that predicted the power and capabilities of a future workspace (if you want, you can find it here). It’s crazy to think that in 2001 we were still so behind on lots of techie features and gadgets that we couldn’t possibly imagine working without now. Anyway, since I’m betting you weren’t at that presentation, I’ve decided to do a bit of an analysis myself of Citrix Workspaces 2001 vs 2018 this week.

In the current future that Citrix had imagined (does that even make sense?), things are very 90s. Someone clearly didn’t get the memo about the segways, ripped jeans and I’d say fannypacks are the only thing from the 90s that we’d still see today (and they’re still a crime against fashion). Honestly, of all the changes since 2001, not wearing those god-awful suits is probably the best advancement. That and the awful Mercedes he drives- I swear, it’s the kind of car a drug kingpin would drive in the mid-90s. The scene is set; our protagonist, Jim, is evidently a high-flying business man, with a fancy office and no doubt an assistant. It’s the end of a workday and he’s particularly chirpy, but it’s not a Friday, so it must be a relaxed week at the office. Apparently it’s his anniversary as well, so that could be a contributing factor.

Telling no one in particular that he’s leaving work early (probably that assistant), he grabs his fancy PalmPilot-looking device and walks away, while his workspace gets transferred from his PC. Accessing your desktop via whatever device you choose is something that almost comes automatically in a virtual workspace in 2018. Indeed, Citrix Workspace makes it incredibly easy to access all of your apps, data and desktop, regardless of what kind of device. Move between your PC, home laptop, mobile or tablet, all thanks to your workspace. Getting into that God-awful Mercedes, our chirpy Jim is safety-first and pops his PalmPilot-mobile hybrid into its hands-free holder. Ever security-conscious, he accesses his device by using a fingerprint scanner. I’ve already covered multi-factor authentication (and how I feel about fingerprint scanners), and it’s no surprise that the Citrix vision of the future included biometric sign-on.

In any organisation, the ability for secure content collaboration is crucial. Jim clearly works for a huge multi-national company. On his way home, he gets a call from a colleague on the other side of the country. Some hiccup in a big deal means that he needs to try and make things happen before he can go for dinner. To fix the issue and speed the deal along, he needs to organise a conference call with colleagues in Seattle and Tokyo. Using his Citrix Workspace, he can securely call these different locations, while presenting and collaborating on documents in real time. It’s easy enough to transfer the conference call from Jim’s phone to his huge monitor- just the case of pointing his PalmPilot-thing at the screen and hey presto. I’m sure in 2001, this would have been a bizarre concept. Who would be too lazy to just turn the thing on? Nowadays, we don’t have the time to faff around with logins and transferring conference calls. With Citrix Workspace, this is a nifty little feature that’s sure to wow any newbies starting out, or even the CIO of a high-stakes partner. Honestly, try it out, you’d look terribly high-tech. Eventually Sharon, in Denver, fizzles in to add her expertise. Apparently she doesn’t have the same security clearances as the other three (is it the accent?), so Jim sets her a more limited visibility she has of the documents being collaborated on. This is also a pretty common feature of Citrix Workspace, but it covers far more than just a conference call. From a single network point, your IT department has access to, and can manage, every one of your users. That gives them the flexibility to automatically grant every user with unique levels of clearance depending on their job necessities. Sharon in HR doesn’t really need to know what’s going on in boardroom meetings, now does she?

During the conference call, they get interrupted by a failure. Now, here’s where Citrix were a tad bit off in their predictions for today’s technology. In the video, Jim can hear his colleagues as they question the foreboding ‘Switching to backup data centre’ flickering on the screen for a moment or two, before the rather more cheerful ‘Backup now active’ signals the return of the call. It’s not the case now that a failure would cut the call instantly until the WAN came back to life- thanks to SD-WAN, a failure of any kind would not even be noticed, simply switching to the secondary system component. In today’s workspace, Jim and his colleagues wouldn’t be the wiser, with zero stalling, pausing or loss of quality to signal the switch.

A lot was covered in that short seven-minute video. But it’s clear that in 2001 Citrix had a vision. It was a vision of revolutionising the workspace to make it bigger and better than ever before (and keep ill-fitting suits in fashion). And it’s a vision that continues to look to the future in order to start making advances towards it now. Here at Cetus, we’re big believers in the Citrix vision. So much so that we’re one of the few Citrix Platinum Partners in the UK. We believe that Citrix is the future of the workplace, and we want to work with you to unlock those possibilities. Our experts are Citrix-centric, so click over here to have a chat and see what Citrix Workspace can do for you.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized, VMware

VMworld 2018 Keynote


No Comments

So here we are at VMworld 2018 in Barcelona for VMware’s 20th anniversary and the 10th annual VMworld in Europe. With just under 12,000 attendees, the relevance and importance of the VMware strategy in helping businesses of all sizes grow and transform is clear to see everywhere you go. Pat Gelsinger took to the stage to layout his views and VMware’s strategy highlights for the coming years. For those that have not made it to VMworld before, the main keynote is quite high level and is followed by a number of ‘showcase’ keynotes that focus on the core areas of the VMware portfolio such as Security, Hybrid Cloud and EUC etc.

Pat showed how VMware has constantly driven to help businesses bridge gaps between innovation silos and highlighted three key ‘acts’ in the VMware history:
1. Server virtualisation
2. BYO/EUC
3. Networking
The message that organisations need to deliver both profit, as well as look after its people was clear; a fully engaged workforce will lead to innovation and transformation, which will lead to a more profitable business.

Technology should be a force for good in the world and that is what VMware is driving for in everything it does (The Mercy Ships case study was very powerful). Pat spoke about four tech superpowers in the world today (Cloud, Mobile, AI/ML, and Edge/IoT) and how each of them reinforces and drives the others. VMware sees the application as a network that requires an end-to-end platform to enable it. The VMware vision image below has been consistent across four core strategies for a number of years now;
• Modernise Datacenter
• Integrate Public Cloud
• Empower Digital Workspaces
• Transform Networking and Security
The ability for an organisation to deploy hybrid cloud and digital workspace solutions that are integrated from a single vendor drives simplification and reduces costs.

vmworld 1.jpg

At Cetus our mission is to help our customers deliver on their strategic mission by delivering hybrid cloud and secure digital workspace solutions, we believe that every organisation must embrace technology as a force for change and transformation. The VMware portfolio from vSphere to NSX onto Workspace One and out to Vmware on AWS means we can deliver on our mission from a single integrated technology stack.

There were a wealth of announcements in the keynotes, and while I’m not going to try and cover them all here, I just wanted to pick a few highlights.

Security
Pat talked about how the security solutions we deploy today are broken, as bolt-on options that are chasing a bad situation without a fundamental shift in protection levels. This is shown by record spending on security solutions, and also a record number of breaches.

VMware started to address this with NSX, moving the security enforcement from the North/South boundaries to cover the bulk of East/West traffic, and as such the micro-segmentation market emerged. While this takes security to a new level, it is still based on set policies and known interactions between services within the datacenter. VMware is taking this to the next level with the introduction of vSphere Platinum Edition that integrates the app defence solution into the vSphere licence. The combination of AppDefense and NSX allows VMware to deliver what it has now coined ‘Adaptive Segmentation’, allowing admins to deliver a step change in the security paradigm. The Adaptive Segmentation concept follows three key steps:
• Learn
• Lock
• Adapt

Rather than chasing after threats, AppDefense learns an application’s intended state and behaviour, then monitors for changes to this state that indicates a threat. When a threat is detected, AppDefense can automatically respond. Leveraging this known ‘good state’ allows policy to lock down the datacenter (NSX offering network-level automation) and then adapt as needed to changes in state. This deep integration allows for a shift in the overall security paradigm.

The focus on security across the VMware portfolio is really beginning to shine and deliver real value for customers.

Any Cloud
All businesses are on a journey to a hybrid/multi-cloud world and the need to automate and secure this transformation is key. VMware is innovating in both the datacentre and EUC spaces to ensure this journey is seamless, secure and cost-effective for all.

In the datacenter space, the need for a seamless path to and from cloud/on-premises is the key to allowing an organisation to unlock the power of its investment in infrastructure services. The ability to deploy to either on-premises or cloud and move between them seamlessly as costs and needs evolve ensures IT can meet businesses’ needs at all times. This needs to be enabled via a ruthless drive for automation, which the announcements of VMware Cloud Foundation 3.5 addresses by ensuring that enterprise IT teams can deploy private cloud with the same management and automation as cloud. Cloud Foundation underpins the hybrid cloud, both on-premises and as part of VMware on AWS- truly enabling this seamless hybrid cloud. With new VMware on AWS regions opening over the next 6-9 months, the reach will be truly global. Checkout my follow up blog from the datacenter showcase keynote for more details.

The message was clear that the future of cloud infrastructure will be hybrid and that VMware has delivered a true end-to-end solution. The acquisition and integration of Cloud Health extends this capability by providing a cloud operations platform that allows customers to understand costs and compliance across multiple clouds.

Any App
The Workspace One solution has been the stable leader in the MDM space for many years and over the last couple has evolved into a complete UEM (unified endpoint management) solution that supports mobile, Mac, Windows and Chrome end points. Providing users a simple, consistent and secure access method for all applications and data on any device, while ensuring that IT retain control of the full lifecycle of the devices. One big announcement was a joint partnership with OKTA to extend the Workspace One Identity Management solution and provide full user/device lifecycle management and automation. IT can now truly step away from the job of deploying endpoints, allowing technology to provide a simple user-driven workflow.

Enhancements to the Workspace One solution continues to demonstrate this market-leading position. Look out for my follow up blog from the EUC showcase keynote covering items Like Workspace One Intelligence and what COPE stands for.

So this ran on a bit longer that I expected; lots to talk about in what was actually a rather uneventful keynote by VMware’s standards. Most of this due to them splitting out 6 ‘showcase’ keynotes over the two days that focus deeper into the entire proposition. Stay tuned for follow up posts from more sessions. In the meantime, we’re delighted to announce a free webinar on the key takeaways from VMworld that I’ll be hosting. Register here to get all the highlights from VMware and what to expect in 2019.

Register for the webinar

Blog, Citrix, IT Solutions, Technology, Uncategorized

How a Secure Digital Workspace Solution will Simplify Your IT


No Comments

A lot has changed since we were children. Children no longer spend all day outside harassing the neighbours and it’s not the norm for cars to stall halfway up every hill. You can book a train ticket on your phone, order a takeaway online and find your way around a foreign city without having to buy a map or ask for directions in the wrong language. In fact, there’s an entire industry of young people whose sole jobs are to create videos, write blog posts and take Instagram photos for their thousands, sometimes millions, of online followers. And these influencers make your entire month’s rent just by posting one sponsored photo. How crazy is that?

The idea of ‘work’ has changed just as much. When we were children, our parents (usually our fathers, because that’s how it was back then) would come home late from a 12-hour shift, exhausted and with frayed nerves, having spent the day in a grey room the size of a teacup doing nothing of particular note. And that’s if they were lucky; sometimes those 12 hours were overnight, so your mother would send you out to play into the freezing rain to give him a few hours of undisturbed sleep during the day before it started all over again. And that’s just how it was, day in, day out; barely making ends meet until they turned 60 and got to retire.

For the most part, that’s not the case anymore, thank god. Work is no longer a tedious, mind-numbing 12 hours; we’ve got robots for that! The idea of ‘work’ has moved from what we go to, to what we actually do. Realistically, what do you need to get done that absolutely can’t be accomplished in your pjs, on the couch, watching Jeremy Kyle reruns? Not a whole lot. And then there are those who can’t stand being in one place for more than a meeting, flitting from one building to another, one city to another, one country to another. And it’s (mostly) thanks to digital workspaces. IT has always been designed to make life that bit easier. From the humble eat-your-finger rotary phone and the computer the size of a closet, to Google Maps and Uber; IT brings with it an improvement- even if that’s ordering a McDonalds through your Deliveroo app instead of on the computer. Unless, of course, we’re talking about the iPhone; nothing really changes year in, year out, aside from how many functions you can squeeze into a jack, and how much more screen space there is for you to break when you drop the damn thing trying to charge it while listening to Spotify. Digital workspaces, such as Citrix Workspace, play into this idea of increased simplicity, ultimately reducing the challenges that have been known to cause issues for all those involved. IT management becomes far simpler for the IT teams, while delivering a better experience for your end user.

Work securely, even on the go
It takes more than sitting in an office to make the world around us tick. But with that freedom comes a security risk that no IT department wants to face. It’s in the name; a secure digital workspace solution is, well, secure. Users are able to access their apps, data and desktops securely from wherever their ‘office’ happens to be that day- be it a McDonalds, a petrol station or their sofa (wifi not included). And since the workspace is device-transferrable, you can trust that they’ll be safe, regardless of whether they’re using a company-supplied laptop or their own device. And that security also translates to any network.

For the IT department, it allows users to do their thing without having to manually intrude in their working days, while you manage and monitor what they do through one control panel. With a single sign-on, the secure digital perimeter will follow your users wherever they are, giving you the peace of mind of contextual access that guarantees that they won’t be accessing what they shouldn’t. Because unified endpoint management comes built-in, a lot of the usual day-to-day management can be done automatically, such as the actions that are to be taken when a user violates certain rules. It basically gives you powers of god, from wherever you happen to be working. Remote wiping a device? Setting it to out-of-compliance? Revoking the device? Sending a notification to a user to correct an issue? You have the power.

Control the risk for your user
Shadow IT is an issue that has exploded in the workplace in recent years. While we have been lucky to experience so much new and amazing software to make our daily tasks faster and easier, often it proves to be too complex for the end user. Instead of making use of these monitored, regulated technologies, users are migrating to free, unsecured software (such as Dropbox or Google Drive), essentially creating an even bigger problem that what you had in the first place. And the worst part is, your IT team probably doesn’t even know about them. Is it that surprising that users are the number one reason for a security breach in an organisation? Hardly.

A good digital workspace solution will have a better, easy-to navigate file-sharing system. Let’s face it, a lot of users aren’t the most technical, and don’t want to spend half an hour trying to share a document with Stacy from HR who sits two doors down. You’d be faster to print it and send via paper plane. At Cetus, we usually set our customers up with Citrix ShareFile. It’s super easy to upload your documents for easy backup (don’t you know how important it is?) and share with other users. Store, share and sync your documents quickly across all of your devices to collaborate with colleagues and customers alike. I particularly like being able to upload a document and be able to share it with someone externally, all by using a link. And it’s just as easy to give the access some parameters; requiring the other person to supply their email to view it, or only give them a certain window to access the documents.

And since security is incorporated into the very DNA of Citrix Workspace, IT will always remain in control. Use closed-loop analytics to track user behaviour and automatically implement security protocols, giving your users all of the flexibility to work effortlessly, while being sure that everything is safe.

Access your data, wherever
With all of this cloud business being so new, a lot of organisations are trying to leverage as best they can while still working in a largely-oblivious environment. As with all things that are brilliant and new, it can take a while to get your head around all the fabulous features of cloud. As a result, it’s not unusual to go searching across your hard drives, clouds, network drives and other solutions for one single document, before giving up and Skyping the person next to you in shame and asking if they’ve seen it recently. It’s a bit of a nightmare, the amount of times you have to ask the person beside you for a document on a daily basis counts as a conversation and it’s impossible to manage everything. Welcome to the world of cloud!

Make sure to find a secure digital workspace solution that allows a simplified access to your files, creating a seamless sync across all of your apps, cloud providers, devices, company servers and content management systems already in place.
Since organisations are all different, it’s important that your digital workspace solution molds itself to you. Your storage needs and requirements will vary from other organisations and industries. Whether you have to host your data on premises for regulatory reasons, or on the cloud, with a digital workspace you have the option to flex to suit the needs of your organisation through one workspace.

Make it easy with single sign-on
Possibly one of the best features of a digital workspace is single sign-on. Because it brings together your apps, data, services and all of your devices regardless of clouds and data centres, you no longer have to worry about managing multiple security protocols. Sign in once with your organisation credentials and you have full access to everything.

Your secure digital workspace solution should work for you, by increasing flexibility, visibility and managements of everything, making everyone happy from the end user to your IT team. As a Citrix Platinum Partner, we have the expertise to bring you the best that Citrix has to offer. Have a chat with our friendly specialists to see what we can do to give you all of the benefits a secure digital workspace solution has to offer, so that you can start working smarter.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, IT Solutions, Technology, Uncategorized

Who Would Prefer Digital Workspaces, Cats or Dogs?


No Comments

When it comes to blog post topics, I usually ask our Business Development Director, Paul Kiveal for topics to squirrel away and write about. Sorry to burst your bubble, but the fabulous ‘Hybrid Cloud Orchestration’ and ‘Is The Password Dead?’ posts weren’t my ideas. This week though, I caught him at the worst time, while he was in a strange mood (or sick of my constant craving for topics), and he gave me the worst title; ‘Who Would Prefer Digital Workspaces, Cats or Dogs?’. I’m not going to lie, it’s going to be a challenge. I’ve already asked a handful of people with zero IT knowledge for advice and they all gave me different answers, so I’m on my own with this one.

Originally, I thought cats would prefer digital workspaces. And it’s not because I’m a cat person (sorry). I just have no problem imagining a hipster Maine Coon- we’ll call him Salem- with his fur tied up, sitting in a café sipping huge bowls of the blackest coffee (or milk?), working away on his laptop. Why would he want to spend the day in the office, getting swiped by all the other cats for no reason whatsoever? God only knows, he wouldn’t be able to concentrate with all that purring. And every two minutes there’d be a flurry and a yelp as one of them forgot where they were and attacked their mouse. So, because Salem’s a very busy hipster cat, off he’d pop, with his laptop and catnip in his satchel to the closest Costa. A bit of quiet to get one step ahead. And let’s not forget the toasted tuna baguette for lunch.

Dogs however, they’re the ones who would love digital workspaces. Can you imagine telling a golden lab about how their work life would change? Let’s set the scene; some fancy, all white laboratory, not unlike the setting for James Bond’s Q. You stand in a white, unbuttoned lab coat, clipboard in hand, while Scooby sits at your feet, tail wagging.
“Access your applications and data no matter where you are in the world.” “Oh yeah, yeah, I like it, that sounds good!”
You lower your head to look at him over the rim of your glasses. “Seamless user experience; easily transition between your laptop, iPad, and mobile.” “Yeah, yeah?!”
“Optimise your productivity by meeting your business objectives while you work from home, in the office or on the go.” “Oh boy, that’s just amazing, isn’t that amazing?”
At this point he’d lose control and wipe the desk behind him of electronics with his over-enthusiastic tail. That’s another reason why dogs would prefer digital workspaces; can you imagine how many devices they’d break? A moment of excitement and their iPad would be history. And if you tossed them their mobile from across the room it would be crushed between their teeth. But with a seamless user experience, all of their data and applications would be in the cloud, so it would be a simple sign-on to whatever other device you’d have on-hand and they’d be on their merry way.

But, going a bit deeper into all this theoretical stuff, if you had an IT department full of cats, they’d love digital workspaces too. You’d have to move them from their cosy spot on top of the warm servers first though. All you need to create your own kitty IT department is a closet of Mac laptops, those small ones that fit in handbags. Cats don’t take up much space, they have tiny paws perfect for tiny laptops, and they get distracted by Windows. With increased agility, even the laziest tabby could easily deliver and manage a connected workspace to any canine user, regardless of what device they’ve just been given to replace their broken one, over any network. And they’d make the higher ups very happy with the reduced costs in managing complexity of the infrastructure. And since we can all imagine Salem being the Data Protection Officer in an organisation, complete with shirt and teeny, tiny tie, he’d love the secure corporate data feature. With so many files and applications flying around the ‘net, the risk of a security breach is high. But with that security feature, those kitties would be able to deliver their services without compromising security.

So, I can only conclude that, regardless of whether your furry friend is a cat or a dog, they’ll love digital workspaces for their own reasons. Pop Salem in the IT closet on your way up to the office, or link Scooby with the latest gadgets that will keep him connected with customers and the rest of the office while he’s out and about. If you fancy hearing more about what digital workspaces can do to improve your users or IT department (regardless if they happen to be human or otherwise), have a chat with one of our animal-friendly experts. Or just show them photos of your pets, they’d love that as well!

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, GDPR, Security, Technology, Uncategorized

Is The Password Dead?


2 Comments

My boyfriend was amazing me last weekend when he showed me how he could unlock his brand-new Google Pixel 2 using just his voice. I was seriously impressed until he laughed and showed me the index scanner on the back that actually unlocked it. To be honest, it’s a perfectly useless piece of hardware since I know his pin code anyway. Which isn’t much of a win- I just get full access to the albums upon albums of stupid memes that he stores for later consumption.

These days, it seems as though you’d need to live and work in the Pentagon to keep your data safe. And even then, you’d probably be safer by having a photographic memory and never writing or typing anything. Ever. For the entirety of your life- and chances are, you’ve ballsed that one up already, right? If not, there you go, cyber security problem solved. You can tell that annoying antivirus update pop-up reminder where to stick it because you JUST DON’T NEED IT. However, if you don’t have the privilege of a) living in the Pentagon or b) having a photographic memory, then keeping your data safe can be a smidge harder (and I’m betting that’s most of us). Back in the old days of computers and the internet, simple passwords were enough to keep sensitive data safe. Nowadays, the opportunities for cyber criminals to exploit this information are too good for these less-than-moral people to miss out on.

But, as with the Google Pixel 2, we’re quickly catching on to the fact that a simple password or pin number isn’t enough, especially when it comes to our accounts online. According to password management company Dashlane, a single email address can be registered to a whopping 130 passwords. This tells us that some people either have too much time on their hands or a terrible memory, or both. Let’s be honest, when we have a password that we can remember, has a capital letter, a special character AND contains more than eight letters, we all use the same one for the random things around the web. Deliveroo, Amazon, Tesco Delivery; so many things are online now and they all require an account. And it’s not much better in the workplace. ‘For security purposes’, passwords get changed every three months or so at work, but it’s just a case of using a particular word and going up the number line each time we get that annoying notification. I am definitely guilty of this (I wait until the absolute last minute to message around to all of our IT support techies to get it changed. So they all end up knowing my new password. I like to call it ‘herd immunity’). And 42% of workers admit to sharing their passwords with co-workers. So, in the age of GRPR and a heightened awareness of cybercrime, we have to ask ourselves; is the password dead?

A recent Verizon report states that two thirds of data breaches are caused by stolen passwords or misused credentials. So basically human error. And it’s not like we can remove that problem until AI progresses enough to create robots that can do the work for us- wouldn’t that be convenient? Maybe robots are the answer, but not in the short term.

Passwords are a lot like mayonnaise. You wouldn’t consume it on its own (or at least not more than a tablespoonful or two straight from the jar at a time), but it’s a nice little addition to a dish. So what would be the ‘piece de resistance’? We have biometrics that are starting to become popular. Even I managed to fall into the ‘high tech’ phenomenon of having a thumb scanner on my ancient iPhone. And how many times has NatWest bothered me about getting their banking app? “It’s so much safer!” they say. “I don’t trust mobile devices!” I scream back. “WE’VE NEVER HAD A SECURITY BREACH!” they holler. “I WILL NOT BELIEVE IT!” I finish. I’m paraphrasing, of course, the conversation I had with my, considerably older, banking agent. Shocked that a twenty-something would have so little faith in technology, he took out his fancy phone to show me. Needless to say, I won that argument. As it was, it took me a while to get into the idea of biometrics. Realistically, all it takes is some criminal genius to sever your finger to access your bank account. I don’t know about you, but having someone steal my money after stealing my thumb is, quite literally, adding insult to injury.

So what about removing the password altogether? I’m not suggesting we scrap the whole thing, of course. But multi-factor authentication has become something of interest recently. Microsoft shocked the world in May when they announced in a blog post that they were trying to rid the world of passwords for good. Promising a future where end users will never have to deal with passwords while also vowing that user credentials will never be ‘cracked, breached or phished’ seems too good to be true. But apparently, with 47 million users worldwide, Windows Hello is very much a thing. And it only needs one authentication method; facial recognition (luckily, you’re slightly less likely of having your face severed), fingerprint or retina scan. If you are absolutely adamant that fingerprint scan is the way you want to go, you can buy a tiny little USB device to plug into your laptop, a bit like the connection bit of a wireless keyboard. I’ve said it before, but starting my day like Tom Cruise in Minority Report sounds pretty cool. I might just start getting out of bed at the first alarm every morning. My ultimate favourite feature of Windows Hello is Dynamic Lock. It’s a fancy name for something pretty simple; essentially, your computer detects when you’re out of reach and automatically locks itself. And by ‘you’, I mean your phone. So you’ll never have to worry about fire drills, emergency pee breaks, or having your laptop stolen out of the window by sleuths with fishing rods. True peace of mind.

What makes Windows Hello so secure? If you use facial or fingerprint recognition, Microsoft does not transfer the raw data over the internet. So that’s already a huge chunk of potential Mission Impossible criminals who won’t be able to make latex copies to break in. Apparently, Microsoft doesn’t even store the raw data, creating a digital abstraction instead that can only be interpreted with a machine. And what user information does get transferred across the internet gets encrypted to almost-Pentagon standards. And all you need is the Windows 10 Anniversary Update- easy!

So, what do you think? Will you be chucking that little black notebook full of usernames and passwords? (Maybe burn it instead) Or will you insist on keeping the same password you’ve used since you had to put your social media profiles on private? Either way, you might be interested in hearing what our experts can do for you.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Citrix, IT Solutions, Security, Technology, Uncategorized

When a User Leaves


No Comments

(Potential) door slamming, cardboard boxing, silent goodbyes; it can be a bit dramatic when an employee leaves the business. Even on good, moving-on-to-better-things terms, it can take its toll. Writing up job descriptions, endless interviews, the empty desk. There’s lots to do when the ex-employee closes the door. And that’s all well and good, but what about the IT side of things? It’s not simply a case of handing over a laptop and starting anew. Without realising it, you would be watching not only a good friend walk out the door, but a security breach too. A walking, talking security breach. Imagine the nightmare. With BYOD becoming more and more popular, you don’t know what devices they were using to work or what data they have stored where. Let’s be honest, if it wasn’t a stressful situation before, the recent enforcement of GDPR has only made it worse. And it’s not like you can ask them to take out all of their devices and go through all of their files, contacts and photos. The desk would be covered in personal and company phones and laptops, USBs, the company iPad and the slightly sicky, sort-of cracked personal iPad that has every indication of a child being given it to play with during a moment of parental weakness. There would be drama for the water cooler. Or, as we call it in the UK; the Hallway Stop n’ Chat. So, what should be done when a user leaves?

Regardless of how an employee leaves, they’re going to walk away with something. Whether it’s your business practices, how you like your coffee, or behind what book Lorna hides her chocolate, something’s going to go. In this scenario, it’s a case of looking at what’s sensitive and what’s not (Lorna needs a hiding place rota regardless). Back in the day, people would slip files into their briefcases and quickly waltz out the door, whereas nowadays it’s quick and easy just to copy a digital file, and none will be the wiser.

Before there’s even chats about Having Been Here Too Damn Long or the more popular I’ve Wasted My 20s At This Desk, it’s best to prepare for the worst. And even more so if you have, or are thinking of establishing, a BYOD policy at work. Start with an extensive, written BYOD policy. Sounds easy, but I promise you that it’s not.

Treat it more like a software development project- compile ‘what if’ scenarios. Include some ‘beta testing’; a period of time to review real-life situations before handing in the final copy. A few things to consider, since there is 100% going to be the office eejit that will take the mickey; ‘acceptable business use’ is just as important as the limits of ‘acceptable personal use’- you just know some yob is going to be playing Candy Crush if they find even the tiniest loophole. Decide what kind of apps you don’t mind being downloaded, and what apps you most certainly do. What company resources (think email, calendars and so on) is acceptable to have access to on a personal device? Obviously, harassing people on company time on a company device is a no-no, just make sure everyone else knows. Same goes with texting or emailing while driving. Sounds obvious, but you’d be surprised how much it isn’t to some people. Think security; what security requirements are needed before being allowed to connect to company networks? What happens of the device is lost or stolen? At this point, you may as well bookmark this post to come back to after doing the above. I’ll wait. Now that you have your policy defined – how do you enforce it? We use Citrix XenMobile and Citrix ShareFile to provide a centralised, single point of management for our mobile devices.

Right, with that niggly bit out of the way, let’s look at monitoring. Not the breach-of-privacy looking-over-shoulders kind of monitoring that will definitely end in tears and a lawsuit, monitoring where your data is going. That sounds much less dramatic. It is time for your IT department to shine. Set up shared company file servers for starters. There are plenty on the market, but I can say from experience that Citrix Sharefile is the best one (that’s mostly because it’s so simple even I can use it). With these file servers, make sure to set up protocols, such as who can access what files and how. With ease, IT can now monitor who is accessing those files and when. Likewise, copying anything from the company server onto a company or personal device is logged. Local devices are cool, until they’re riddled with company data. A big help in not letting too much data get downloaded is knowing the ins and outs of the applications and services that your users use. What kind of liberties do these apps allow? A central repository that can be monitored is a really good idea, adding a layer of security to company networks.

According to a report from Osterman Research, 67% of organisations don’t know if they can detect whether an employee is still accessing corporate resources. Think that’s bad? A whopping 76% can’t tell if a third party (like a contractor) has stopped working on their organisation’s systems and data. If that’s not scaring you, the thought of the fine for breaching GDPR because of some eejit who sees their chance and takes it should. But I’m not here to panic you (only a little, or you wouldn’t be reading all the way to the bottom). Like all well-established organisations, Cetus has had its fair share of employees leave for one reason or another (although thankfully far lower than the average tech company). Thankfully, we’re a team of experts that know exactly how to deal with it. If you haven’t sorted out some policies to prevent your sensitive data from walking out the door, make sure to have a chat with one of our experts. They’re only a phone call away and they’re sure to help you eliminate some of that stress.

We’ve helped hundreds of organisations to implement their mobility strategies and we’d love to share our experiences with you. We can provide everything to get you started from Business Case analysis (at no cost) to high level designs and implementation…

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Cloud, IT Solutions, Our Upcoming Events, Technology, Uncategorized

Hybrid Cloud Orchestration pt 1: How it Works


4 Comments

What?
You’d be scratching your head with all the fancy terms in the techie world. There are terms for everything you could think of; and plenty more that, quite frankly, you wouldn’t. In today’s episode of ‘Enhancing Your Vocabulary to Look More Knowledgeable in Front of Your Boss’, we’re talking about the fun that is Hybrid Cloud Orchestration. What is it? We’re about to find out. Do you need to know? Probably not, but we may as well discuss it so you can use it as extravagant conversation filler during meetings.

In ‘Explain Like I’m Five’ terms, hybrid cloud orchestration is cloud enablement. Imagine a hill, on which there is a flock of sheep. They’re all wandering about like the happy fluffy things they are. One will die, another will wander over for the greener grass from another hill and join the flock. To anyone wandering around the countryside on a nice Sunday walk, they won’t see anything wrong. Sheep, check. Hill, check. Everything’s hunky-dory. To the shepherd though, it’s all panic systems go. The sheep are everywhere, they’re dying off, new ones are joining the flock and none of them are tagged. It’s a disaster. What the shepherd needs is a field, a couple of fences. Something small, contained and organised. In this story, in case you haven’t figured it out, the sheep are applications like Office 365, the hill walkers are the user and the poor, panicked shepherd is the IT department.

Essentially, cloud orchestration is organising all of your applications and data- whether they’re on premises, in Azure, in a separate Salesforce application or Office 365 cloud by themselves- and make them easier to manage. End users won’t notice any difference, but IT departments will basically spend the rest of their careers on an in-office holiday. Hooray! That being said, it doesn’t mean that your IT department will become defunct. While it is estimated that by 2020 the typical SMB organisation will have deployed over 75% of their business applications to SaaS, in-house IT will need to evolve to cope with a largely SaaS-based application estate. At the moment, your organisation is working on an average of 17 SaaS applications, but by 2020 you’re going to be looking at 20. That’s 20 SaaS applications that need to be set up, protected from unauthorised access and use, along with all the other day-to-day administration bits that go along with them. Sounds like a handful, doesn’t it? But with cloud orchestration, poof, and the problem disappears. Your IT department can resume discussing their theories on reprogramming people and how much they hate sunlight. Sorted.

Yes, but how does it work?
Good question, because who would take my word on the ability to just eliminate work like magic? We’re big fans of Citrix here at Cetus and instrato, and we’re even bigger fans of their industry-leading NetScaler ADC that we use to make cloud orchestration possible. It doesn’t matter what kind of mess you’ve made of your hybrid cloud architecture; with this deployment and our amazing team of solution architects, we can create a simple Software Defined Network (SDN) architecture that sorts it all out.
Single sign on. Simple, effective and what end users dream about. No need to faff about with forty different passwords that all go out of date at different times of the month; just one easy-to-remember sign on and now half the day isn’t wasted by everyone involved by constantly requesting new passwords.

MFA. I hate acronyms, but I like this one. Multi-factor authentication. No, it’s not the same as single sign on. It’s close enough, just with few more steps; something you know (i.e. your password), something you have (your smartphone, one-time passcode etc.) and something you are (your fingerprint, retina scan or voice recognition- how futuristic is that? Imagine starting your day like you’re in Minority Report).

Mobility management is essentially the behind-the-scenes of ‘mobile workspaces’. It’s the glue that connects the mobile end user to the in-house IT team, helping to get the right balance between actual mobility and freedom, and the security to allow that freedom. Users expect to be able to work from anywhere on any device, but this can be a real headache for the IT department, especially if there’s a BYOD culture in the office. Mobility management solutions help to reduce the amount of administration that’s required, along with improving security without needing to go through each and every device that the user intends to work with.

Automated hybrid cloud provisioning sounds way too complicated for something so simple. It’s basically an automation that manages the cost effectiveness of the cloud deployment. Imagine a workload on Azure. The automated hybrid cloud provisioning can intelligently monitor the workload, and automatically move it on-prem if it can see that it would be cheaper or faster. See, simples.

As this took far longer than I thought, and there’s just so much more to say about hybrid cloud orchestration, be on the lookout for a part two, where I’ll fill you in on orchestration and hyperconvergence. Does that not sound like the best fun?

Expect to hear more of hybrid cloud orchestration, it’s definitely going to become a big thing. The challenges associated with it don’t negate the usefulness of orchestration, and if you’re looking at- or already have- cloud it’s something you should seriously consider to help ease your organisation’s automation. Luckily, we’re experts when it comes to all things cloud, so these challenges are minor blips.

If you want to learn more, come to our Citrix and Microsoft Azure workshop this September to see how it can help you conquer the power of hybrid cloud.

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

Blog, Citrix, Cloud, Continuum, IT Solutions, Security, Uncategorized

Top Trends in Digital Transformation for Your Business


No Comments

The tech world is fascinating. We’re always on our toes, trying to figure out how to use the latest innovation that’s been rolled out office-wide. We’re lightyears ahead of where we were only ten years ago. With that, it’s so easy to fall behind in what’s going on in the world of tech and all the great improvements that come with it. Hell, just go on a two-week holiday and you’ll come back to 2,000 urgent emails and a brand-new content collaboration system that eclipses the old one. There are new ways of doing everything, so god forbid you don’t pay attention. The trends in digital transformation change quickly, but these are the main ones your business needs to keep up with to stay ahead.

Cloud and hybrid cloud are taking over
It’s a bit like opening a tin of chocolates to yourself; you just can’t stop the outpouring of those delicious chocolates wrapped up in colour just constantly getting plucked out of the tin. There’s been a huge movement towards cloud in recent years. Everyone and their mother loves cloud and just can’t get enough of it. Business-wise, improving your IT infrastructure to respond to change just makes sense. With the exponential creation of data becoming an issue that has to be considered early rather than in hindsight, digital transformation surrounding cloud brings with it numerous benefits. Organisations love the dexterity of scalability; never needing to worry about what they have but knowing that there will always be room to grow or decrease depending on needs. Of all the cloud options, hybrid cloud is by far most popular, almost indispensable for most organisations, big or small. The ability to have that little bit more control over your data with on-prem data centres is the best first step into the wonderful world of cloud.

Importance of user experience
User experience will always be a major factor in digital transformation for businesses. It goes without saying that when your employees are happy, the higher productivity rises. And that’s what we all want, right? But user experience goes beyond just having coffee and chocolate digestives available downstairs. So what about the other niggly techy bits? Cloud sprawl can be a massive problem for businesses. Chunks of data here, there and those few spots you least expect it can quickly become a problem. We’ve (read: I have) already discussed how cloud sprawl can irritate your users enough for them to abandon your well-established IT infrastructure and turn to the world of shadow IT. A good IT solution will go above and beyond what the user wants and needs. Think of the basics; an email platform, a file-sharing platform, the ever-popular instant messaging app that allows your users to make quick work of small issues. The necessities, basically. Then think of what your users will want to ensure the smooth running of their work day. Now amalgamate and watch the productivity rise!

Remote workforce
We’ve heard it a million times before. Mobile workspace, digital workspace, modern workspace – whatever you want to call the ability to work from anywhere that isn’t the office – it’s the future of work. What’s new? Shockingly, there is more excitement around every corner in the tech world (I did say that it’s fascinating). The latest updates to Citrix Workspace were unveiled in May’s Citrix Synergy. It encompasses all of the usual things that you’d expect from a digital workspace; ultra-secure security, ultra-fast one-sign-in-works-for-them-all authentication, ultra-easy access to any of your files from any of your devices, clouds, networks. All that fun stuff. But the fun just doesn’t stop there. From collating collections of your favourite apps for quick sharing, universal search and – my favourite – using any screen as a presentation screen (no matter how big) just by using a QR code. I swear, it’s magic. And it really makes a difference.

Cyber security priority
WannaCry really wasn’t that long ago, but, even over a year later after the devastating attack, 66% of IT security pros have admitted that they haven’t improved their patch management systems. The biggest issue facing organisations when it comes to cyber security is the lack of progress and drive to be ahead of cyber threats. Terrifyingly, WannaCry was a Gen V-level cyber-attack. It’s terrifying because not only has tech advanced so quickly in so little time (the firewall is the cure for Gen II cyber threats), the majority of businesses are way behind. According to Check Point’s Cyber Security Generations Survey from March 2018, only 10% of IT security professionals are at Gen IV and, worse still, only 3% are at Gen V. If that doesn’t scare you, not much will. So it’s pretty clear; stepping up the digital transformation of your organisation is for absolutely nothing if you ignore the cyber security part of it because then you’re opening yourself up to more attacks. It doesn’t matter how careful you are, how much garlic you hang by the window or how much you trust that Starbucks Wi-Fi, there’s only one way to make sure that you’re protected.

Back up all of the things
Again, it’s one of those things that we hear over and over; backup is important. If there’s a fire; fire up (pun intended) your backup system. If there’s a flood; fire up your backup system. Attack of the tin-eating frogs; fire up your backup system. Backup is a major part of the digital transformation because it’s often overlooked. Everything is up and running and perfect and you just couldn’t imagine anything going wrong. There’s really no point in sorting out your backup after disaster strikes. And in this day and age, there’s no excuse – there are so many different types of backup and replication that can be used for disaster recovery. Here at Cetus, we favour replication – it’s the future of backup – and we proudly suggest our very own Continuum.

Digital transformation should be a top three priority for every organisation that wants to keep up and ahead of the curve. If any of the above sound too difficult for you, or if you need a bit of a refresh on any of them, why not have a quick chat with one of our experts to see what we can do for you? In the meantime, it’s worth looking into our
free business challenge consultation to help you navigate your business challenges, while here in the office we argue about the best tin of chocolate (it’s obviously Roses).

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.