Security

Blog, Cloud, Cloud Hosting, IT Solutions, Technology, Uncategorized, VMware

Workspace ONE: Everything You Need In A Workspace


No Comments

There has been quite a lot of excitement surrounding VMware’s Workspace ONE since its announcement in February 2016. The modern version of VMware’s 2016 Workspace Suite; Workspace ONE integrates identity management and EMM, modernising end user computing. With regular updates, the platform continues to excite users across the globe; truly revolutionising the flexible ‘any app, any device’ vision that runs the mobile workspace reform.

Workspace ONE is a secure enterprise platform that delivers and manages any app on any mobile device; that integrates identity management, real-time application delivery and enterprise mobility management. It accelerates how workspace services can be delivered, while engaging digital employees, reducing the threat of data leakage and modernising traditional IT operations for the mobile cloud era. And with yet more announcements as recently as November during VMworld in Barcelona, here are the reasons why Workspace ONE really is everything you need in a modern workspace.

Embrace your inner SaaS
Workspace ONE allows organisations to embrace SaaS and mobile apps while supporting existing enterprise applications (think of your legacy systems), and all securely.

Productivity is the name of the game
The best way for your users to be productive is to provide them the tools that give them the freedom to work, while maintaining the right data security and compliance; which Workspace ONE delivers.

Adopting Windows 10
Windows 10 is taking over the enterprise space and, with Workspace ONE, the accelerated adoption of the platform by using the same modern management framework designed for mobile devices.

Authentication that adapts
With adaptive conditional access; ensure the right level of security for each individual user based on authentication strength, data sensitivity, user location and device posture.

Cyber security with a difference
A huge issue for organisations is the users’ disregard for individual responsibility towards cyber security. Workspace ONE delivers improved security and employee engagement, incorporating next-generation automation and insight.

Improved user experience
The new Workspace ONE hub is truly user-centric, streamlining onboarding and user experience across all platforms.

And all delivered as a service
To speed up app transformation, Workspace ONE delivers virtual applications and desktops as a service.

By adopting VMware’s Workspace ONE platform, join the future of work today and combine an excellent user experience with the ease of management for any IT team. Have a chat with our Workspace ONE-centric VMware experts to get you started.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cloud, Cloud Hosting, IT Solutions, Security, Technology, Uncategorized

How to Prevent Cloud Security Threats


No Comments

The end of winter is always a little grim, especially around the UK. The trees are bare, it gets dark way too early, the two-minute dash to the car threatens a soaking and the prospect of sitting outside with a cold beer/cocktail after a long day of work is surprisingly not tempting at all. I hate to be the harbinger of bad news, but it could get worse. Imagine coming in one morning, wind-swept and dripping, to the news that overnight your cloud was victim to a cyber-crime? At that point a cold beer in the snow seems like the best remedy for the situation. Despite everything, the internet isn’t as safe as you’d think, with devious no-gooders lurking around every corner, eager to take advantage of any vulnerability to make a quick buck. It’s especially important when your organisation is connected to the cloud, where your data is internet-facing instead of nicely locked up in an on-prem data centre. It doesn’t mean you should go out and raid Curry’s PC World for enough data storage to build a makeshift data closet though. Here are a few tips to keep your cloud secure, while enabling the innovation, data access and flexibility that you wanted in the first place.

We’re all in this together
The beauty of the network is that it’s all inter-linked. That’s how you can collaborate so easily, and throw your data and apps onto the cloud to access them whenever, wherever. Just remember, every ‘point of entry’ can be the weakest link, so it’s important to educate everyone in your organisation on how to protect themselves to protect the wider network community. It’s important to involve your entire organisation, making them aware that cyber security is just as much their responsibility as it is yours. Unfortunately, the biggest percentage of criminal infiltration comes down to users accidentally letting the cyber criminal in, usually through phishing or malware attempts. Phishing is a bigger threat to your organisation than ransomware is, and it all comes through malicious emails that get acted on. In this super quick blog post, I’ve already covered how to reduce the risk of getting on the phisherman’s hook. Also, it’s important to set up a (non-judgemental) plan for any user who feels that they might have been compromised, without them having to resort to throwing their laptop out of the window. Then you can be sure that they won’t be throwing out hardware willy-nilly, or sweeping incidents under the rug that could cause you harm in the long run.

Secure your data backup plan (just in case)
Data loss is a serious worry, always. Thankfully, in the case of cloud, this worry is slightly less. By storing your data in the cloud, it’s super simple to link your network to a backup storage solution to make sure that whatever happens you’ll be secure. We think that backups are so important that we’ve created a whole extra branch to Cetus; the Continuum Service. I’ve already touched on the 21st century’s answer to tape backup (it’s replication, by the way), and that’s what we offer with Continuum. It’s a full infrastructure recovery, and not just your data- making sure that your underlying server and desktop infrastructure is a-ok to get your business back on its feet in record time. It’s testing, on a regular basis, automatically verifying the integrity of each virtual backup server on its way to cloud, so that you know if something happens there’ll be minimal disruption. It’s a fully-managed service that allows your peace of mind knowing that we have a whole team on the situation, 24 hours a day. It’s a holistic backup and recovery solution that provides local file and VM restoration.

Who has access?
You can build the strongest walls around your building, adopt the most up-to-date firewall and screen every little thing that enters your network, but sometimes it’s important to be weary of the trojan horse plodding through your hallways every day. And by trojan horse, I mean an employee that could be stealing, irresponsibly sharing, or compromising your data. As an IT department, it’s important to assess who has access to what. There is absolutely no reason for Sharon in HR to be able to view or edit financial records, and what on earth could she be doing popping in twice a week at 3am? Establish access controls so that you can manage risk, tying user identities- even external ones- to back-end directories.

It’s important to put security measures in place that will ensure that your data and apps are protected. Why not embrace the latest technologies and adopt a smartphone access control system that will allow you to manage users and assign door access from anywhere?

Encryption and passwords are key
Your cloud can be quite vulnerable. Sitting up there, without the safety of your watchful eye, anything could be happening. It’s a bit like a spaceman floating in the big black expanse that is space, tethered to the International Space Station. He is protected by nothing more than his spacesuit, which shields him from the general elements, but there’s only so much you can do if he gets hit by a meteor. What he needs is an extra layer of bubble wrap and diamond outer shell. In the case of your cloud, this would look less rigidly cosy and more like good passwords and encryption.

In this example, we’re going to look at your spaceman’s bubble wrap; your password. Files in your cloud are zipped and protected with passwords, so it’s important that you choose a strong one. Having a unique password for your cloud is a must- if a hacker gains entry, they would have access to a huge amount of your data so it’s crucial that you keep it as safe as possible. Look into multi-factor authentication (which I’ve already discussed in detail in this post), adding an extra level of protection that you can control with fingerprint and retina biometrics.

If passwords are your spaceman’s bubble wrap, then encryption is his diamond shell, and it’s crucial. Cloud encryption allows your data and apps to be transformed by encryption, shooting up to the cloud securely before being stored. Encrypt at your network’s edge, ensuring that the data gets protected before it even leaves your network. But make sure to keep the encryption and deciphering keys stored away from where you store your data!

So, before you cobble together a makeshift data centre in a panic to protect your information, take a look at the level of security your cloud solution allows. The integrity of your cloud is vital for the health of your business; protecting your data and the access to it should be a priority for IT teams. Contact our Cetus experts to see how we can provide the ultimate protection for your cloud environment.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, IT Solutions, Security, Technology, Uncategorized

The New Hero of Cyber Security; Zero Trust


No Comments

The ability to work from anywhere, on any device, has quickly become one of the greatest developments in the workspace of all time. It’s not an exaggeration either. In the UK, 4.2 million people were working from home in 2015. In fact, between 2012 and 2016, the mobile workforce increased by 12.35%, and that percentage is growing exponentially year on year. It’s widely predicted that by 2020, half of the UK workforce will no longer be plonked in an office all day. That means that it’s time to invest in nice shoes and/or new pj bottoms. And while that’s an amazing turn of events, it will cause some significant security concerns for everyone concerned. With so much of your workforce wandering the plains of the UK, your network is no longer secure by actual brick and mortar perimeter.

Today’s increasingly decentralised enterprises have become a bit of a headache for IT, who now have to keep you secure even when you’re not potentially clicking on some dodgy email phishing links. Zero trust has evolved to answer the issue. Back when cybercrime was still all the way at Gen III, most organisations assumed that their security protection was robust enough to keep them safe. Those few who did err on the side of caution deployed security operations centres or other cyber monitoring solutions, but for the most part IT departments assumed that anything inside the perimeter was safe. Oh, but those were far simpler times.

By working on the assumption that any resource in the network might be compromised, zero trust puts monitoring solutions in place so that you have the power to take remedial action if it’s needed. With this new solution, no one service or server is considered more secure than the next. It’s basically a data-centric network design that puts micro-perimeters around specific data or assets, giving you the flexibility to apply more-granular rules can be enforced. It solves the ‘flat network’ problem of hackers infiltrating your network and scurrying around undetected. With the right guidance (you’re welcome in advance) and a little bit of know-how, it only takes a couple of steps to get started with zero trust.

Identifying your sensitive data is the obvious first step. It sounds like an easy way to start the process, but it’s a little more challenging than you’d think. You can’t possibly protect data that you can’t see or know about. You need to know where your employees store their data, exactly who uses it, how sensitive it is and how they, your partners and customers use it. Without knowing all of this, you’re putting your data and your organisation at risk. And you can’t exactly start investing in security controls until you know what it is you’re actually trying to protect. When you have a better idea of what you’re dealing with, it’s time to classify it all. I suggest procuring the help of your most organised member of staff before moving onto mapping your data.

To understand how you’re going to employ zero trust, and therefore micro-segmenting specific sensitive data, you need to know how it flows across your network as well as between users and resources. This is a fun (probably not) exercise to have with your stakeholders, such as application and network architects, to fully understand how they approach information. To give yourself a bit of a springboard, security teams should streamline their flow diagrams by leveraging existing models. A zero trust network is based on how transactions flow across a network, and how users and applications access data. Optimising the flow to make it simpler, and start identifying where micro-perimeters will be placed and segmented with physical or virtual appliances. In a network where the compute environment is physical, the segmentation gateway will usually be physical as well, whereas a virtualised compute environment will deploy a virtual segmentation gateway.

Micro-segmentation is the name of the game after you determine the optimum traffic flow, by determining how to enforce access control and inspection policies at the segmentation gateway. The point of zero trust is to enforce identity rights, so that you can control who has the privileges to access specific data, so it’s important to know exactly which users need to access what data. You need to know more than the source address, port and protocol for zero trust to work, since security teams need to understand the user identity as well as the application to establish access rights. Having created your ecosystem, it’s important to ‘Big Brother’ it to identify malicious activity and areas of improvement. There’s no point only logging traffic if it comes from the internet- god only knows what kind of infectious diseases your network could contract from a wild-spirited USB. With your shiny new zero trust network, the segmentation gateway can send all of the data flowing through it, which includes traffic destined for both internal and external network segments, straight to a security analytics tool that inspects it properly.

Now that you’re the proud owner of a zero trust network, you can rest easy knowing that your network is being monitored effectively. Here at Cetus, we believe that building the best architecture is just as important as keeping it safe. We’re experts in all things datacentre and cloud, so make sure to have a chat with one of our specialists who can help you through all of your security challenges. And while you’re at it, book yourself in for our complimentary security posture review to identify where your organisation is being exposed to the nasty things that lurk on the outside of your perimeter.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Citrix, Cloud, Cloud Hosting, IT Solutions, Our Upcoming Events, Security, Technology, Uncategorized

Five Signs You’re Ready to Embrace Cloud


No Comments

Unless you’ve been spending the best part of the last decade on a remote island devoid of human contact, chances are that you’ve heard a lot about this ‘cloud’ malarkey. And it’s a difficult one; there is just so much information out there, and it doesn’t always overlap. Even in your organisation, there can be significantly polar opinions on what’s best for your situation. In one ear, you have an IT specialist whispering “It’s the best thing since the Nokia 3310” and another one in your other ear muttering “It’ll take years to adopt, if we can even afford it”.

And both angel and devil in this scenario (decide which is which yourself) are right. Cloud is the best thing since the introduction of the Nokia 3310 redefined the use of the word ‘brick’, catapulting the world of on-the-go tech into a whole new revolution (even if that was just being able to play Snake at the bus stop). Sadly, we are constantly sold the idea of a plug-n-play service that will make a significant difference to your workforce. The thing is, it’s not the rainbows, unicorns and fluffy bunnies that we were promised. When it comes to cloud adoption, the focus is usually on going fully-SaaS almost overnight, which just isn’t really possible for long-established organisations. But it’s not all doom and gloom; if you pick the right IT solutions provider your dreams can become a reality, and deliver everything you expect. Still not sure if it’s for you? Here are five signs that you are ready to embrace cloud;

You’re adopting the new ‘mobile workforce’
Your business is growing and you’re employing more than ever. The millennial workforce has grown up with a significant experience in emerging tech, and they don’t know what life is like without it. The brightest graduates just out of uni are used to having their mobiles, tablets and laptops on the go. Let’s face it, they’re the generation that have mastered paying attention to multiple screens at once, all while walking, eating and doing whatever.

The problem is, they don’t want to be in an office all day. While the older generation are stuck in traffic three miles from the office, your mobile employees are already on their second coffee of the day, just finished replying to their emails and ready to get some real work done. Likewise, they’re more than happy to jump in the car, train or plane and join a conference, exhibition, workshop or a customer’s site and make sure they get all their work done on the spot. Gone are the days when your workforce would have to sacrifice a day to get the train to the other part of the country for an event, completely unavailable for anything else.

Work is no longer the be-all and end-all of a person’s life- living is. The modern workforce is picky. They no longer have the loyalty of generations before, sticking with one company until they retire. They want the best, and that includes the possibility of a more flexible work-life balance. So being able to work from anywhere, anytime makes far better sense. And that’s where the cloud comes in, allowing your employees to log in to their corporate virtual desktops from whatever device they happen to have on hand, regardless of where they are.

It’s time for a refresh
All tech, no matter how advanced it might seem, has it’s sell-by date. It’s a fact that a lot of organisations are quickly coming to realise. Chances are, this is the first time you’re looking at putting your servers in the cloud. Why not just replace your whole infrastructure like for like and be done with it? You’d forget how many bits of hardware makes up your IT closet, and how much of an investment it is just to keep the lights on in your data centre.

Now, it’s not as easy as clicking your fingers and just connecting everything to the cloud. There are plenty of reasons why it’s not feasible immediately; being chained to your legacy system, not having the internet connection to safely rely on cloud…. But don’t despair, there is a way to create an infrastructure so that it grows and evolves with your organisation and the latest trends in technology. Say goodbye to aging infrastructure, out-of-date applications and those constant reminders to get the latest version of your software. Poof! All of a sudden it’s a thing of the past.

It’s time to think about disaster recovery
Your organisation is built on a foundation of data. Whether that be customer lists, orders, customer data, the random PowerPoint presentation for the upcoming Directors’ meeting- you get the idea. If you couldn’t power up your laptop in the morning every employee in the company would essentially be a very expensive seat warmer. Disasters do happen, and if you can scoff that you haven’t experienced any yet, then you’re living on borrowed time. A single server fault could erase years of vital information in less than a second.

It’s even more scary when the facts state that the cost of an hour of downtime can cost from £6,100 to £534,000- and that includes small businesses too. Multiply that by the average time it takes to recover; 18 and a half hours. Could your business survive such a dramatic loss of productivity and reputation? 

By adopting the cloud and moving your data across, the majority of your disaster recovery planning is done. You can be safe knowing that your good solution provider will ensure that your data is being continuously backed up, testing the virtual backup server daily. When you do face your disaster, it’s reassuring to know that it’s simply a case of downloading the latest backups of your files and getting back down to business.

You’re growing, but you don’t know how to deal with it
Every organisation wants to expand. It’s the sign of success, of how a moment of entrepreneurship can turn into an achievement, and with every new person starting with you is an extra person who believes in your company and your message. But with every rapid expansion brings its own unique growing pains, and your organisation is no different. It’s only so easy to outgrow your physical infrastructure and network, leading to a loss of productivity. Which is exactly what you were trying to avoid in the first place, right?

Here’s another great way that cloud can make a difference. You obviously see a bright future for your organisation; full of targets being met, goals being blown right out of the water, the need for bigger offices, glittering awards nights and interviews from business newspapers on how you made it (may as well think as big as you can get, right?).

With your data, virtual servers and all of your storage in the cloud, it’s an easy fix to make your infrastructure flex with your needs. Instead of having to buy more servers and bandwidth, it’s a straightforward case of just renting a bit more of the cloud. And if you don’t need it later on, it’s quick and painless to reduce the size of what you need. As a certain meercat likes to say; “Seeemples!”

You want to beef up your data security
There are so many threats to your organisation. You always have to take care that your customer data collection and storage meets GDPR regulations, stay vigilant of potential Gen V cyberattacks, make sure that your ex-employee didn’t walk out with your company projects, there are plenty of things that could possibly go wrong. Not only do these really mess up your day, in only the politest of terms, but they could really cause you harm in the long run, too.

By running your organisation in the cloud, a significant portion of the manual processes that can lead to issues can be avoided. With automated backups, you can be sure that you’ll never have to run around patching up forgotten vulnerabilities and bugs. Having your data on the cloud makes it easier to see what your users are accessing, effectively abolishing the possibility of a user with a nefarious agenda sneaking around behind your back.

Every so often, you’ll change the door code to the office. That’s to secure your building from ex-employees who, let’s face it, have no business popping in anymore. It’s the same principle with your data. Chances are, you haven’t done anything to give them a reason to want revenge, but since they have no business rummaging around your secure files you want to make sure that they can’t. And that’s a simple thing to do with cloud, giving you the over-arching control over your users, without impeaching their self-governance.

Looking at a cloud adoption from afar can make the whole thing seem like an impossible task. When it comes to moving everything from on-premises to the cloud smoothly, while also keeping your business up and running with no disruptions, it’s akin to having your cake and eating it. At Cetus, we’ve been doing this for a while, and we’ve built a team of experts that has coordinated many a cloud project from start to finish. We’ve partnered up with Citrix and Microsoft Azure, the experts in cloud, to design, build and manage your cloud deployments. Speaking of Citrix, our Cetus experts will be attending the partner-only Summit event. We’re expecting to hear plenty about cloud migration and reducing IT costs, and we’ll be talking about it for the rest of the year so make sure to keep an eye out on our events page to hear all about our upcoming Citrix events! In the meantime, our experts are always on-hand to answer any question you might have (especially if it’s cloud-based!)

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Check Point, IT Solutions, Security, Technology, Uncategorized

Here Phishy, Phishy, Phishy….


3 Comments

A couple of weeks ago, there was a mandatory ‘here’s how to help keep the company from falling prey to cyber attacks’ lecture at Cetus. We all trooped downstairs, cramming into one of our board rooms, mugs clinking and teas sloshing. One of the lovely ladies from Barclays came in to give us a word of warning- or forty- on how to spot nefarious activity and not fall prey to a scam. By the end of it we were all ready to delete our Facebook, Twitter and Instagram accounts, never use an ATM, and I seriously started questioning my role within social media. It was quite the terrifying afternoon. Between social engineering, ransomware and phishing, it’s a miracle we all aren’t in debt from scammers. But the most terrifying aspect was learning just how prevalent phishing attacks are.

Big ransomware scams make the news constantly- splashed across the news, Sharon from HR standing at the water cooler to share the details in whispers to anyone who passes by- but phishing is the bigger threat here. In reality, a ransomware attack usually only demands several hundreds of pounds from the organisation it invades, while a phishing scam generally scams thousands of pounds from the victim. Not only that, but it’s easier for the cyber criminal to carry out a phishing attack. Now that I’ve given you something short of a heart attack (sorry), let’s turn this around shall we? Here are a few key ways of keeping you off the phisherman’s hook.

Beware of the sender
It doesn’t really matter whether it’s personal or corporate, receiving an email either makes you want to go on an extended holiday or celebrate. At work you’re usually too busy opening and replying in record time to get on with the mountain of tasks that grows with every email. It’s fair to say that you don’t always check who the sender is. I mean, we’re all weary of any Arabian Prince trying to get into contact, but aside from that we’re pretty chill for the most part. If they’ve gone to the trouble of finding your email address (I still can’t figure out how people manage to find me) then chances are they really need to chat, right?

Depending on how much of a nightmare you are in life, you probably won’t know the hacker. So before you jump into your emerging pile of unopened emails, take a quick look. If you suddenly get an email from someone you don’t speak to regularly on the topic of something that you don’t normally think about, be slightly weary. Check the sender’s address- does it look a bit weird? Is there a random ‘0’ instead of an ‘O’? Could that ‘i’ actually be Vietnamese character ‘ỉ’? Is there an extra letter or number in the address that shouldn’t be there? If you see one of these little tricks, bonus points for your great eyesight, and definitely get the email checked out.

‘I get scammed with a little help from my friends’
Did the email check out, but you’re still not 100% sure if you need to detonate your computer immediately to avoid any viruses escaping through the network? Take a quick look at the list of people that received the email. Do you know them? Is it a strange group, ie the sales group being added one name at a time instead of the group link? The cyber criminal might be targeting a large number of people in your organisation, so if you see people on the list that you wouldn’t normally be in contact with, or from a department that has nothing to do with yours, be extra careful.

Bit of a dodgy subject line
Aside from Sharon’s bi-monthly suggestion for drinks in the pub across the way after work on a Monday night, you should really only be getting emails that directly relate to your job function. That is, unless you’re in marketing- we seem to get our noses into plenty of unrelated jobs. If you’re getting emails about things that you know you’re not privy to or they make absolutely no sense to you, don’t open it. If it’s not spam, it’ll be malware. If you do happen to open it (oopsie), check if the email is a reply to one that you didn’t send. Does the message match the subject line? A misalignment of the two should send up an army of red flags. Also, while we all have the office oddball that likes to reply to emails at 3am, is it normal to be receiving this email from this sender at this particular hour?

Attachments and hyperlinks of doom
We’ve all opened random attachments or clicked on hyperlinks that we weren’t quite sure about and sighed with relief when it was just a video of cats acting strangely. We know we shouldn’t, but that curiosity can’t be helped. Besides, it could be important, or cats, after all. A few things to check before you right click; did you expect the attachment? Is it a common file type that you would normally receive? Does it have a weird name, or strange symbols in the file name? If you answer yes to these, maybe don’t open it. It’s quite likely to be malicious.

Not quite what you were expecting?
If you receive an email that contains unsettling, startling or urgent content that requires immediate action on your part, it’s most likely a phishing attack. There have been so many of these popping up recently, panicking the nation. At the moment, a common scam is an email from your bank claiming that your account has been hacked and you need to login straightaway, or even move the rest of your funds to another account. For the Netflix lovers among you, there have also been emails being received saying that billing information needs to be updated. Don’t fall for it. If the email includes a link to login or change account details, be extra weary. Don’t use links, web addresses or phone numbers.

Keeping yourself protected from any cyber crime can be a scary business, but even more so when it’s something you could very well unwillingly stumble into. It takes more than trusting your spam filter to keep yourself safe, having a strong cyber security solution is crucial. We work very closely with Check Point to craft solutions that stand tall against phishing, ransomware bots and all kind of nasties, using their SandBlast advanced endpoint threat prevention. Have a chat with our experts to see how we can whisk some cyber security into your perfect infrastructure solution so that it’s one less thing you need to worry about.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Citrix, Cloud, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized

Citrix Summit 2019 from a Citrix Platinum Partner Point of View


1 Comment

There are very few events throughout the year that get us super thrilled here at Cetus/instrato. Even fewer that we prepare for months before the actual event (aside from IPEXPO, which is a whole other story). But when it comes to Citrix Summit, held every January, we get very excited.

As a Citrix Platinum Partner, we stay on top of what’s going on in the Land of Citrix to make sure that we keep things fresh and up-to-date for our customers. And we’re absolutely blessed with two huge events a year to sink our teeth into; Summit and Synergy. We loved Citrix Synergy last May (and my god, we got some exciting updates on Citrix Workspace) and we’re still going on about it in our office. Of course, leaving the wet and windy UK for three days to fly to the US is a major bonus too!

As always, this year’s Summit is being held in Orlando, Florida, from the 7th to 9th of January- what a way to start the new year! Unlike Synergy, which is for customers as well as partners, Summit is only an event for partners, like Cetus, who promote and sell the Citrix Vision. And as always, we’re sending a little group of top Cetusites to go, explore and bring back the very best of Citrix.

The event is three days of inspiration, information and networking to bring the Citrix game to 100. Crazily, we’re expecting over 300 hours of training and hands-on learning, which we’ll be incorporating into all things Citrix when we get home. The event is a great way to build relationships with the biggest and brightest minds of Citrix experts and business leaders. From the opening keynote, which is always one of our favourite moments, to the breakout sessions, having those nagging questions answered at a Round Table, or just getting immersed in the hottest topics in the world of IT solutions in the Citrix Talks panel discussions, it’s going to be a crazy week. It’s events like Summit that inspire us to look to the future and adopt the latest and greatest ways of working.

One of the best things about being a Citrix Platinum Partner is the ability to really consolidate what we learn at Citrix Summit and Synergy into the huge projects that we work on. Having that foundation on which we can build our expertise is priceless, but a fair portrayal of how much we value Citrix itself as our partner. We know that having the title of Citrix Platinum Partner assures us that we’re in the best of hands, which means that our customers are, too.

When it comes to instrato, we work exclusively with Citrix and Microsoft Azure to get the optimal combination for a cloud deployment, so the fact that Microsoft will be attending makes our little cloud-enthused hearts flutter. In fact, cloud and cloud-based applications features heavily in the session previews, further strengthening its position as the future of IT. No doubt those sessions will be popular, including Citrix Talks to discuss cloud transformation projects.

You can be sure that, once we shake the jet lag, we’ll be incorporating all the latest updates and features into the solutions we design. If you want to hear a bit more about what you can expect from Citrix (and Cetus!) in 2019, have a chat with one of our Citrix Platinum Partner experts.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cetus Solutions, Check Point, IT Solutions, Security, Technology, Uncategorized

Skyscraper: When Cyber Security Goes Wrong


No Comments

It was one of the biggest blockbusters of the summer. Dwayne Johnson’s Skyscraper thriller grossed $304.1 million during the hottest summer in living memory. Honestly, it probably would have made more, but for the fact that half of the UK population was sitting in any available patch of sun with a beer in their hands. I was one of those people, although with fruity cocktails instead. That was when I wasn’t in the office writing witty blog posts on Citrix Workspace, of course. Alas, while I had every intention on going to see the film, I never got around to it. So it was my pleasure, two Saturdays before Christmas, to snuggle in my pjs and pop it on (I lead the most exciting life when I’m not in the office). Well. While it’s action-packed with an interesting futuristic spin, I couldn’t help but spend the whole movie pointing out, sadly to no one in particular (I’m going to have to get a cat), all the various cyber security blunders that Johnson’s character made. Not one to waste my breath, or a good writing idea, I’m going to lay it all out in this blog post so that you can giggle along with me. Before we go any further though, there may be a spoiler or two, you have been warned.

In a nutshell, Johnson plays ex-FBI hostage-negotiator-turned-private-security-expert Will Sawyer, who gets called to Hong Kong in order to assess the security of the world’s tallest skyscraper. The Pearl, 225 stories and a whopping 1,100 metres tall, needs an inspection of the upper residential half before it can be opened to tenants. Since we are, after all, living through the ‘IOT for all of the things!’ revolution, no matter how mundane the appliance, it’s no surprise that the Pearl was built with tech in mind. It’s basically a giant computer, full of safety features and automations that make living and working there slightly more exciting than your average building. We saw absolutely zero evidence of it, but I’m still sure the lights turn on and off by clapping your hands. Anywho, we see Sawyer being given a tablet that controls the entirety of the 225 floors and shooed out of the door to go inspect the offsite security centre that controls the skyscraper. The tablet, obviously, isn’t in his possession for long, as it gets robbed by a group of terrorists who succeed in burning down the $200 billion structure with it. The sad part is, if the IT department had deployed a better cyber security solution, it could all have been avoided. Typical.

Who needs an effective authentication method, am I right?! This was mistake number one. For some incomprehensible reason, the only way of unlocking the tablet that controls the entirety of the building is via facial recognition. That’s it. Sure, in cinematographical terms this looks the best. It’s impressive and futuristic, suave and savvy. It’s every nerd’s dream. And facial recognition as part of multi-factor authentication is really effective. In the blink of an eye, it can analyse billions of tiny little markers on your face to unlock your device. But who on earth would think that it would be enough? For god’s sake, just signing into my Facebook requires my password, mother’s maiden name, list of my three favourite chocolate bars (in order) and the promise of my firstborn. Truth be told, facial recognition alone was irresponsible, and about as effective of protecting all that important data as using ‘1234567’ as a password. Hell, put a photo of Sawyer in front of the camera and that would probably fool it. There are so many effective ways to authenticate identity (I wrote an entire post on it). Why not have a secondary form of authentication, like having a password activate on Sawyer’s smartphone? That would have been clever.

Mistake number two; not informing the IT department of the breach. Err, this should have been the first point of call when Sawyer’s tablet got robbed. Instead, being the idiot that he is, he threw caution to the wind and went running off to save his family. Just one minute on the phone to IT and they could have stopped the disaster that was about to unfold. A good cyber security solution would have removed access to the tablet in a couple of clicks, rendering the terrorists’ efforts moot. In fact, it would have taken no time at all to wipe the data clean from the device, essentially turning it into an expensive, albeit sleek-looking, paperweight. It does echo a current issue facing organisations in terms of cyber security; the majority of security breaches come from employees who, inadvertently or not, allow the threat to infiltrate the network. This can happen from clicking on a dodgy link in an email (it’s sadly not a video of cats acting strangely)- in fact, phishing attacks are more prevalent and more likely to scam large sums of money from an organisation. Realistically, in this situation, Sawyer seriously neglected his responsibility to inform the IT department. While he undoubtedly performed some incredible gymnastics and it was thoroughly enjoyable to watch, I would have loved to hear his rationale when all was said and done. I doubt he’d be hired to assess the security of a paper bag after that!

The moral of this story is, and I’m sure it’s what director Rawson Marshall Thurber wanted to portray; don’t let your organisation become the Pearl and burn down to the ground- make sure your cyber security solution ticks all the boxes. We work closely with Check Point to incorporate secure technology into our solutions, effectively avoiding the risks that we saw Sawyer facing in the film, and many more besides. Have a chat with our cyber security solution experts here at Cetus, and in the meantime book yourself in for one of our complimentary security posture reviews!

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Citrix, Cloud, IT Solutions, Technology, Uncategorized

The Citrix ‘Virtual Workspace’ Vision: What Have We Achieved?


No Comments

I don’t remember ever not having a computer at home. When my brother and I were little, somewhere in the rolling Irish countryside, that was technology; messing around in Paint for hours, until we were old enough to graduate to Tomb Raider (on keyboard) and whatever game demos my Dad got with his monthly PC Live subscription. If we were allowed to use the printer (that was a rare treat), we’d spend hours in Word making posters for our room, trying out every single option in WordArt and agonising over what colours we’d use- which would have absolutely no significance whatsoever since it printed in black and white exclusively. Then, as early teens, we got second-hand laptops to mess around in PowerPoint (I once did an amazing presentation on the benefits of having an allowance for my rabbit Poppy, graphics and all), and flex our creative writing muscles in Word. Back then, floppy disks were king (I still have some knocking about, storing god only knows what). Hell, I remember being 16 when my Mum bought my Dad a brand-new printer for his birthday; a super cool one that printed in colour and scanned documents and photocopied and printed wirelessly. It was amazing to have all of those features in one small device that was affordable for a modest family. And that was only in 2010!

For most of us, that was the reality until quite recently. Technology was just a cool little add-on, the ability to type out a document instead of writing it by hand, playing two-player videogames using only a single keyboard and mouse, being able to email Granny across the country- regardless of whether she’d remember how to access it or not. It was fun, but it wasn’t particularly useful. The workplace was the exact same (so I’m told); visiting the dusty clock-in machine at 9am, tapping away at an even dustier computer half the size of the desk, emailing people sitting just across from you, and finally kissing the clock-in machine goodbye at 5pm.

Last month was our Cetus Summit, a day of celebrating the achievements of the year just gone and anticipating how we can be even bigger and better in the year ahead. As part of the morning presentations, we had several vendors come and talk to us. One of those vendors was Citrix. For half an hour, they analysed a Citrix video from way back in 2001 that predicted the power and capabilities of a future workspace (if you want, you can find it here). It’s crazy to think that in 2001 we were still so behind on lots of techie features and gadgets that we couldn’t possibly imagine working without now. Anyway, since I’m betting you weren’t at that presentation, I’ve decided to do a bit of an analysis myself of Citrix Workspaces 2001 vs 2018 this week.

In the current future that Citrix had imagined (does that even make sense?), things are very 90s. Someone clearly didn’t get the memo about the segways, ripped jeans and I’d say fannypacks are the only thing from the 90s that we’d still see today (and they’re still a crime against fashion). Honestly, of all the changes since 2001, not wearing those god-awful suits is probably the best advancement. That and the awful Mercedes he drives- I swear, it’s the kind of car a drug kingpin would drive in the mid-90s. The scene is set; our protagonist, Jim, is evidently a high-flying business man, with a fancy office and no doubt an assistant. It’s the end of a workday and he’s particularly chirpy, but it’s not a Friday, so it must be a relaxed week at the office. Apparently it’s his anniversary as well, so that could be a contributing factor.

Telling no one in particular that he’s leaving work early (probably that assistant), he grabs his fancy PalmPilot-looking device and walks away, while his workspace gets transferred from his PC. Accessing your desktop via whatever device you choose is something that almost comes automatically in a virtual workspace in 2018. Indeed, Citrix Workspace makes it incredibly easy to access all of your apps, data and desktop, regardless of what kind of device. Move between your PC, home laptop, mobile or tablet, all thanks to your workspace. Getting into that God-awful Mercedes, our chirpy Jim is safety-first and pops his PalmPilot-mobile hybrid into its hands-free holder. Ever security-conscious, he accesses his device by using a fingerprint scanner. I’ve already covered multi-factor authentication (and how I feel about fingerprint scanners), and it’s no surprise that the Citrix vision of the future included biometric sign-on.

In any organisation, the ability for secure content collaboration is crucial. Jim clearly works for a huge multi-national company. On his way home, he gets a call from a colleague on the other side of the country. Some hiccup in a big deal means that he needs to try and make things happen before he can go for dinner. To fix the issue and speed the deal along, he needs to organise a conference call with colleagues in Seattle and Tokyo. Using his Citrix Workspace, he can securely call these different locations, while presenting and collaborating on documents in real time. It’s easy enough to transfer the conference call from Jim’s phone to his huge monitor- just the case of pointing his PalmPilot-thing at the screen and hey presto. I’m sure in 2001, this would have been a bizarre concept. Who would be too lazy to just turn the thing on? Nowadays, we don’t have the time to faff around with logins and transferring conference calls. With Citrix Workspace, this is a nifty little feature that’s sure to wow any newbies starting out, or even the CIO of a high-stakes partner. Honestly, try it out, you’d look terribly high-tech. Eventually Sharon, in Denver, fizzles in to add her expertise. Apparently she doesn’t have the same security clearances as the other three (is it the accent?), so Jim sets her a more limited visibility she has of the documents being collaborated on. This is also a pretty common feature of Citrix Workspace, but it covers far more than just a conference call. From a single network point, your IT department has access to, and can manage, every one of your users. That gives them the flexibility to automatically grant every user with unique levels of clearance depending on their job necessities. Sharon in HR doesn’t really need to know what’s going on in boardroom meetings, now does she?

During the conference call, they get interrupted by a failure. Now, here’s where Citrix were a tad bit off in their predictions for today’s technology. In the video, Jim can hear his colleagues as they question the foreboding ‘Switching to backup data centre’ flickering on the screen for a moment or two, before the rather more cheerful ‘Backup now active’ signals the return of the call. It’s not the case now that a failure would cut the call instantly until the WAN came back to life- thanks to SD-WAN, a failure of any kind would not even be noticed, simply switching to the secondary system component. In today’s workspace, Jim and his colleagues wouldn’t be the wiser, with zero stalling, pausing or loss of quality to signal the switch.

A lot was covered in that short seven-minute video. But it’s clear that in 2001 Citrix had a vision. It was a vision of revolutionising the workspace to make it bigger and better than ever before (and keep ill-fitting suits in fashion). And it’s a vision that continues to look to the future in order to start making advances towards it now. Here at Cetus, we’re big believers in the Citrix vision. So much so that we’re one of the few Citrix Platinum Partners in the UK. We believe that Citrix is the future of the workplace, and we want to work with you to unlock those possibilities. Our experts are Citrix-centric, so click over here to have a chat and see what Citrix Workspace can do for you.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.

 

Blog, Cloud Hosting, IT Solutions, News, Our Upcoming Events, Technology, Uncategorized, VMware

VMworld 2018 Keynote


No Comments

So here we are at VMworld 2018 in Barcelona for VMware’s 20th anniversary and the 10th annual VMworld in Europe. With just under 12,000 attendees, the relevance and importance of the VMware strategy in helping businesses of all sizes grow and transform is clear to see everywhere you go. Pat Gelsinger took to the stage to layout his views and VMware’s strategy highlights for the coming years. For those that have not made it to VMworld before, the main keynote is quite high level and is followed by a number of ‘showcase’ keynotes that focus on the core areas of the VMware portfolio such as Security, Hybrid Cloud and EUC etc.

Pat showed how VMware has constantly driven to help businesses bridge gaps between innovation silos and highlighted three key ‘acts’ in the VMware history:
1. Server virtualisation
2. BYO/EUC
3. Networking
The message that organisations need to deliver both profit, as well as look after its people was clear; a fully engaged workforce will lead to innovation and transformation, which will lead to a more profitable business.

Technology should be a force for good in the world and that is what VMware is driving for in everything it does (The Mercy Ships case study was very powerful). Pat spoke about four tech superpowers in the world today (Cloud, Mobile, AI/ML, and Edge/IoT) and how each of them reinforces and drives the others. VMware sees the application as a network that requires an end-to-end platform to enable it. The VMware vision image below has been consistent across four core strategies for a number of years now;
• Modernise Datacenter
• Integrate Public Cloud
• Empower Digital Workspaces
• Transform Networking and Security
The ability for an organisation to deploy hybrid cloud and digital workspace solutions that are integrated from a single vendor drives simplification and reduces costs.

vmworld 1.jpg

At Cetus our mission is to help our customers deliver on their strategic mission by delivering hybrid cloud and secure digital workspace solutions, we believe that every organisation must embrace technology as a force for change and transformation. The VMware portfolio from vSphere to NSX onto Workspace One and out to Vmware on AWS means we can deliver on our mission from a single integrated technology stack.

There were a wealth of announcements in the keynotes, and while I’m not going to try and cover them all here, I just wanted to pick a few highlights.

Security
Pat talked about how the security solutions we deploy today are broken, as bolt-on options that are chasing a bad situation without a fundamental shift in protection levels. This is shown by record spending on security solutions, and also a record number of breaches.

VMware started to address this with NSX, moving the security enforcement from the North/South boundaries to cover the bulk of East/West traffic, and as such the micro-segmentation market emerged. While this takes security to a new level, it is still based on set policies and known interactions between services within the datacenter. VMware is taking this to the next level with the introduction of vSphere Platinum Edition that integrates the app defence solution into the vSphere licence. The combination of AppDefense and NSX allows VMware to deliver what it has now coined ‘Adaptive Segmentation’, allowing admins to deliver a step change in the security paradigm. The Adaptive Segmentation concept follows three key steps:
• Learn
• Lock
• Adapt

Rather than chasing after threats, AppDefense learns an application’s intended state and behaviour, then monitors for changes to this state that indicates a threat. When a threat is detected, AppDefense can automatically respond. Leveraging this known ‘good state’ allows policy to lock down the datacenter (NSX offering network-level automation) and then adapt as needed to changes in state. This deep integration allows for a shift in the overall security paradigm.

The focus on security across the VMware portfolio is really beginning to shine and deliver real value for customers.

Any Cloud
All businesses are on a journey to a hybrid/multi-cloud world and the need to automate and secure this transformation is key. VMware is innovating in both the datacentre and EUC spaces to ensure this journey is seamless, secure and cost-effective for all.

In the datacenter space, the need for a seamless path to and from cloud/on-premises is the key to allowing an organisation to unlock the power of its investment in infrastructure services. The ability to deploy to either on-premises or cloud and move between them seamlessly as costs and needs evolve ensures IT can meet businesses’ needs at all times. This needs to be enabled via a ruthless drive for automation, which the announcements of VMware Cloud Foundation 3.5 addresses by ensuring that enterprise IT teams can deploy private cloud with the same management and automation as cloud. Cloud Foundation underpins the hybrid cloud, both on-premises and as part of VMware on AWS- truly enabling this seamless hybrid cloud. With new VMware on AWS regions opening over the next 6-9 months, the reach will be truly global. Checkout my follow up blog from the datacenter showcase keynote for more details.

The message was clear that the future of cloud infrastructure will be hybrid and that VMware has delivered a true end-to-end solution. The acquisition and integration of Cloud Health extends this capability by providing a cloud operations platform that allows customers to understand costs and compliance across multiple clouds.

Any App
The Workspace One solution has been the stable leader in the MDM space for many years and over the last couple has evolved into a complete UEM (unified endpoint management) solution that supports mobile, Mac, Windows and Chrome end points. Providing users a simple, consistent and secure access method for all applications and data on any device, while ensuring that IT retain control of the full lifecycle of the devices. One big announcement was a joint partnership with OKTA to extend the Workspace One Identity Management solution and provide full user/device lifecycle management and automation. IT can now truly step away from the job of deploying endpoints, allowing technology to provide a simple user-driven workflow.

Enhancements to the Workspace One solution continues to demonstrate this market-leading position. Look out for my follow up blog from the EUC showcase keynote covering items Like Workspace One Intelligence and what COPE stands for.

So this ran on a bit longer that I expected; lots to talk about in what was actually a rather uneventful keynote by VMware’s standards. Most of this due to them splitting out 6 ‘showcase’ keynotes over the two days that focus deeper into the entire proposition. If you want to keep up-to-date with what’s going on with VMware, make sure to keep an eye on our events page where we regularly share workshops and webinars to keep you in the know!

Register for the webinar

Blog, Cetus Solutions, Cloud, IT Solutions, Security, Technology, Uncategorized

Application Testing in the Cloud


No Comments

If you’ve been keeping up with the hype, you’ve probably been looking into deploying a cloud of some form in your organisation. Be it public, private or hybrid cloud, the possibilities that they come with are endless and revolutionary. I’m sure you’ve heard all of those buzzwords before, building the idea of ‘the cloud’ into an amazing, it’ll-fix-any-problem-you’ve-ever-had-and-more! miracle that’s more of a unicorn than anything else. But you might have discovered that it’s not all sunshine and rainbows when it comes to cloud. Application testing has become one of the little bugbears that people forget- or choose to ignore- when putting together a cloud strategy. When you roll out anything new, it’s important that it’s a success- your bottom line could very well depend on it. And without regular testing you don’t even know what you’re throwing out into the world.

Several years ago, virtualisation became a new focus for IT departments. This new ideology of sharing computing resources across multiple operating systems increased productivity through reduced costs and increased scalability and easy administration. This fabulous new way of running IT infrastructure observed the evolution of virtualisation of cloud in the form of cloud computing. It paved the way for the dream of ‘Everything as a Service’, essentially creating a foundation for many of the technological advances we have today (but for some reason I still can’t get a delivery from the McDonalds a mile away, so there are clearly more worldly advances yet to be achieved).

Cloud testing is the actual testing of the resources on demand; think hardware, software etc. Testing is crucial for the health of your IT environment, especially when it comes to your cloud offerings, ensuring that it not only meets functional requirements, but also non-functional. Securing and managing performance of your applications is essential regardless of where they are; in the cloud or on-premises. It’s not the case of testing an application when it first gets deployed and never needing to bother with it again; the status of applications can change over time.

There are so many benefits for cloud testing that are easily obvious when you experience them. The normal testing approach is to invest in the adequate hardware and software infrastructure needed to carry out the testing. Since the environment supplied to the testing team very rarely matches that of the user, testing applications in the cloud can alleviate the issue of rapidly-changing requirements, allowing the tester to easily replicate the user environment and find defects early in the cycle. Migrating apps to the cloud can also reduce the cost of infrastructure licence renewal, as the organisation doesn’t have to purchase the infrastructure that won’t all be in use at the same time. With the end user environment in the cloud, it’s a simple enough task for an IT department to customise the testing environment match. This customisation reduces the cost and time of regular testing. The testing team can easily perform load and performance testing scenarios in various permutations and combinations.

But, as with everything, there are downfalls. I hate to have to list them, but here we are. By relying on and using the cloud as infrastructure, we do face a few hiccups. But nothing too scary, I promise. Security is one; user privacy needs to be protected, while also allowing the necessary protections that hold up to standards. The security of applications that run in the cloud and security testing techniques also need to be addressed by organisations when it comes to cloud infrastructure. The performance of an application in the cloud is another significant issue that regularly gets overlooked. How are we to know if an application works the same way, especially when hosted in a private cloud? The application itself will be shared amongst plenty of users, so that could cause a delay, especially if bandwidth isn’t good enough for testing. It’s surprising that in certain instances, the particular configurations of a user can be that complex that they just simply aren’t supported by that cloud provider. I don’t get it either. Bottom line, that can make it that much more difficult to emulate a user environment. The last little issue is that of integration testing. It’s easy enough to test the network, database, servers, and whatever else needs to be done. The tester already won’t have control over the underlying environment, but on top of that they’ll have to essentially guess how it would behave. If there are interactions between two components, the tester can only anticipate risks, such as crashes, network breakdown, or your server going on a sudden holiday.

Ensuring the maintenance and performance of your applications in your chosen cloud is crucial for your organisation. Where a lot of people would just love to ignore the finicky bits of testing, here at Cetus we like to dot the Is and cross the Ts, and that includes your testing. Our experts are specialists in application testing and making sure that everything works just right. If testing of your applications is something you’d like to master, make sure to have a chat with one of our experts who will show you first-hand the benefits, while eliminating as many downfalls as possible.

Speak to an expert

Directors-9619Missy Beaudelot – Digital Marketing Executive
With a background in journalism and an interest in all things tech, Missy keeps our social media in check while monitoring our websites and developing our digital presence.