Category Archives: NetEnrich Marketing

Cyber security professionals wary of increasing Ransomware attacks

Increasing cyber attacks on large and midsize companies are causing sleepless nights for cyber security professionals. Sensitive corporate and customer data should never be compromised and leads to irreparable damage to organizations.

The latest victim to face such a debilitating attack is San Francisco Municipal Transportation Agency (SFMTA), which was hit by a ransomware attack recently, causing fare station terminals to carry the message, “You are hacked. ALL Data Encrypted.” The San Francisco Examiner reported that riders of SFMTA’s Municipal Rail or “Muni” system were greeted with handmade “Out of Service” and “Metro Free” signs on station ticket machines. The computer terminals at all Muni locations carried the “hacked” message: “Contact for key (cryptom27@yandex.com).”

It was found that the attacker had compromised thousands of computers at the SFMTA, by scrambling the files on those systems with encryption. The hacker claimed that only a special digital key would decrypt the files and would cost 100 Bitcoins, or approximately USD $73,000.

In an interesting turn of events, Krebs on Security reported that the hacker behind the extortion attempt on SFMTA was also subjected to an attack, revealing details about other victims as well as hints about his identity and location. A security researcher hacked the cryptom27@yandex.com inbox after reading a news article about the SFMTA incident. Evidence later emerged that the hacker had successfully extorted 63 bitcoins (~$45,000) from a U.S.-based manufacturing firm. The attack servers were equipped with several open-source tools to help find and infect new victims. The list of victims shows that the vast majority of organizations victimized by the attacker were manufacturing and construction firms. The attacker has successfully extorted at least $140,000 in Bitcoin from organizations.

This information shows how lucrative ransomware attacks can be, and how often victims are willing to pay, and defend themselves. The SFMTA however never considered paying the ransom. Their existing backup systems allowed them to get most of the affected computers up and running. So having proper and regular backups of your data can save you a lot of money. It’s important to remember that, unsecured backups can also be encrypted by ransomware. So it’s critical to ensure that backups are not connected to the computers and networks they are supporting.

NetEnrich Setup and Management Services for Backup are state-of-the-art setup, monitoring, management, optimization and analytics services. For more information about how DR and backup strategies should be critical part of your operation and how the cloud fits in, contact your cloud service provider. Contact us to find out about local or regional service providers in your area.

Cybersecurity Services: A Framework You Can Count On [Infographic]

Rampant cyber attacks on large and midsize companies are a huge concern. They’re destructive, pervasive and expensive. We’ve come to see that Ecommerce, telco and financial services organizations are the common industry targets, but they’re definitely not alone. It’s important for value-added resellers to invest in the right kind of cybersecurity tools and services, in order to help their clients protect their most important information.

NetEnrich can help companies manage complicated security strategies with our subscription-based cybersecurity offerings. Our cybersecurity framework is comprehensive and includes critical activities like testing complete IT environment with security assessments, detecting challenges and opportunities to deploy managed security services, and strategic consulting to help clients secure their sensitive data and information systems.

The ‘Cybersecurity Services from NetEnrich: A Framework You Can Count On’ infographic below, gives you the highlights.

Cyber Security
At NetEnrich, our cybersecurity services are the cream of the crop. We help enterprise and mid-market companies improve their security posture and implement automated application controls so that data and applications remain secure. Our single-pane-of-glass monitoring and management services can improve your security strategy and put your mind at ease.

For more information about how cybersecurity strategies should be critical part of your operation and how the cloud fits in, contact your cloud service provider. Contact us to find out about local or regional service providers in your area.

NetEnrich featured for providing transformational benefits with outcome-based services in Gartner 2016 Hype Cycle for Infrastructure Services

NetEnrich has been featured alongside BT Global Services, Infosys, and Tata Consultancy Services for providing transformational benefits, with outcome-based services in the recent Gartner Report on Hype Cycle for Infrastructure Services.

The 2016 Hype Cycle for Infrastructure Services provides businesses with a comprehensive time horizon of how infrastructure services are positioned in market hype, service maturity and market penetration, enabling them to review the benefits and opportunities infrastructure services offer against the risks they pose.

This Hype Cycle highlights few critical themes for organizations:

  • Outcome-based service contracting is becoming the expectation — End-user organizations are demanding more business value from service providers.
  • Hybrid architectures will be the primary mode of service delivery — Services such as Hybrid Cloud Computing and Cloud Service Brokerage will become increasingly important to enable buyers to migrate workloads and transform their infrastructure.
  • Smart services will be transformational in nature — Almost all of the Innovation Triggers in the infrastructure service market are related to smart machines and the IoT.
  • Cloud infrastructure services are rapidly maturing — Services such as Cloud Service Brokerage, Hybrid Cloud Computing, Private Cloud Computing and Public Cloud Storage are gaining traction.

“We are witnessing very strong traction in the market for outcome-based services contracting, which meet the increasing needs of our channel partners and their end-clients,” states NetEnrich VP for Product Management and Marketing, Chris Joseph, “With increased costs and complexity, companies are looking for ways to improve effectiveness and be more productive.”

Outcome-based service contracting is defined as contracts based on clearly defined scope and where commercial terms are tethered to user-prescribed outcomes that extend beyond the realm of IT availability and performance. Consequently, when users set the expected outcomes, service providers can go the extra mile to deliver and create value. The contract focuses on the desired outcome of the work to be performed, rather than the manner in which it is done. Service providers decide how they will deliver on customer requirements and so both control and risk shifts towards the service provider.

Gartner states that, regardless of where a particular service resides on the Hype Cycle for Infrastructure Services, organizations must carefully match their IT and operational requirements against the characteristics, benefits and availability of the various service offerings to ensure that, ultimately, their individual business needs are met.

 

Sources:

(1) Gartner’s “Hype Cycle for Infrastructure Services 2016” report, published: 22 July 2016, listing NetEnrich as a sample vendor for outcome-based service contracting.

Disclaimer:

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Top 4 benefits of the Enterprise Command Center

IT managers have a lot on their hands. From managing network performance to keeping tabs on shadow IT, the work of the enterprise engineer is never complete. There are disparate tools that managers can use to see into their organization’s IT infrastructure, but there is such a thing as too many tools.

How do your IT managers deal with network incidents?
How do your IT managers deal with network incidents?

This is where investing in an Enterprise Command Center can be a great way for IT managers to stay on top of their operations. Let’s take a look at the top five benefits of partnering with an ECC:

1. Cut out all the noise

Alert noise within the IT environment is a constant. Network management and performance indicators are important to be aware of, but how much is too much? Organizations receive thousands of alerts every day from a wide range of monitoring tools. Most data center incidents are instigated by human and machine errors, 88 percent of them in fact, according to a survey published by Emerson.

The ECC provides a way to automate alert management. When alert noise is minimized and IT managers can have visibility over their entire environments without distractions, operations teams can work more quickly to resolve any issues that may arise.

Enterprise Command CenterThere are a lot of blinking lights and alert noises in the data center – but are they doing your team any good?

2. Manage shadow IT

Shadow IT is becoming a serious issue within environments across the board. Sometimes, business employees don’t want to wait for tech teams to vet and then deploy the solutions they need. Marketing teams, customer service employees and even top-level executives might search for and start using technologies while the IT department remains unaware, which can lead to security issues and critical flaws in network strength.

For instance, since it’s becoming easy to spin up an instance of the public cloud on the Amazon Cloud Services platform, non-IT employees can simply put in their credit card information and quickly deploy applications, leading to Amazon creep if they don’t decommission the clouds once they’re finished.

With the ECC, teams can more effectively manage shadow IT. This tool gives managers complete visibility into their operations from a single interface, providing them with critical insights into the kinds of unauthorized technologies running on their networks.

3. Improve productivity and cost savings

Network monitoring tools provide the organization with the opportunity to maximize cost savings and increase revenue. According to TechTarget, when teams have advance warning about network incidents, they can increase business value because they can proactively plan for repairing systems before problems turn into downtime.

“A good [network monitoring system] should accelerate incident turnaround and mean time to repair,” the TechTarget article stated. “Suppose [...] that a failed hard drive causes your mail server to crash. Without a NMS, you must diagnose the network, check the server’s health and investigate the email application. With an NMS, you could pinpoint the problem in minutes without disrupting email and the network administrator’s workflow.”

Gartner estimated in 2010 that the cost of unplanned network downtime was $5,600 per minute. In 2013, the Ponemon Institute found that this number had risen dramatically to $7,900 per minute, according to Data Center Knowledge. Now, three years later, it’s safe to assume that the cost of unplanned outages has only continued to increase. Having the tools on hand to negate these events will save businesses in the long and the short term.

4. Foster relationships between IT and business

Aligning the “business” side with the “IT” side of a company can seem like a struggle. Organizations use many different kinds of technology, like cloud-based tools and hyperconverged appliances. But getting IT and business teams to work together to optimize their disparate values can sometimes be difficult.

By taking the entire IT infrastructure and putting it behind one unified single-pane-of-glass monitoring tool, ECC services can complement IT, cloud, DevOps and security teams. This takes some of the burden from these groups and gives them more leeway to perform other critical functions of their jobs – like serving as a strategic partner to the business in question.

“Aligning the ‘business’ side with the ‘IT’ side of a company can seem like a struggle.”

Seeing the ECC in action

Deploying Enterprise Command Center capabilities can bring all these benefits and more to organizations. For instance, the ECC engineers of NetEnrich recently partnered with KAR Auction Services, a $2.7 billion auto auction company that boasts, among all of its services, a comprehensive online business.

By teaming up with NetEnrich and the IT operations management platform provided by Vistara, KAR was able to reduce mean time to resolution by more than 75 percent and decrease staff time by 145 hours per week – meaning their IT engineers were able to fix network issues in record time. Now, instead of spending those 145 hours reacting to infrastructure incidents, these employees can contribute to business growth and revenue opportunities.

Contact the ECC engineers at NetEnrich today for more information about how we can help your IT management team become a trusted partner and active member of the business – not just a back-end operation that reacts to the organization’s needs.

 

 

SOURCE

Uptime Institute, Data Center Knowledge, Gartner

Considerations for Application Migration [Infographic]

A high volume of workloads are moving to public clouds such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud. However, to assess, migrate, and manage workloads on public clouds is a complex task that requires skilled expertise.

Application migration involves overcoming several challenges, such as unexpected costs, interoperability, security gaps and unanticipated application rework, which can create unexpected delays and inefficiencies. To help smooth a frequently bumpy path, organizations need to craft a well-thought-out migration strategy.

The ‘Considerations for Application Migration’ infographic below, gives you the highlights.

application migration infographic

With the overwhelming cost advantages of Azure in public cloud, many solution providers are looking for a simple way to provide their clients’ a cost effective alternative to complex on-premise infrastructure. Many want to migrate their clients’ infrastructure to Azure in a simple and secure way – and yes, in a cost-effective manner too.

With NetEnrich’s Migration Services for Azure, we use best practice methodologies to assess infrastructure and applications, plan and design the migration, and implement a consolidated, flexible, and resilient server environment. Business applications will be migrated to Azure in the easiest way possible with minimal down time. Our certified and experienced engineers will analyze the current infrastructure, understand your business goals and requirements, and then create an appropriate plan for your Azure migration and deployment.

Contact your cloud service provider for more information about how they can help you migrate your applications to public, private or hybrid cloud environments. Contact us to find out about local or regional service providers in your area.

NetEnrich Insights: Companies Brace for New Cyber Attacks as Threats Multiply

An ounce of prevention is better than a pound of cure. Rampant cyber attacks on large and midsize companies are a huge concern. They’re destructive, pervasive and expensive. We’ve seen that Ecommerce, telco and financial services organizations are the most common industry targets, but they’re definitely not alone. In 2015, more than 112 million medical records were compromised in 253 coordinated attacks, and the average consolidated cost of a breach across industries is $4 million per company. In seconds, sensitive corporate and customer data can be compromised, held for ransom or lost forever.

So, what can corporate IT do to safeguard their organizations? Most organizations start with a cyber security readiness plan. According to the NetEnrich 2016 Cyber Attack Readiness survey, 82 percent of companies have a plan in place already. And while half of all respondents said the main goal of their plan was attack prevention, the other 50 percent were focused on some combination of recovery of loss from attacks, organizational response to attacks and continuity of business throughout the attack.

Press Release: NetEnrich 2016 Cyber Attack Readiness Survey
You can take a look at the full survey statistics here.

 

NetEnrich Survey Featured

We are very pleased to announce that the NetEnrich Survey on Cyber Attack Readiness has been featured across major technology news websites, and blogs. Here’s a list of some of the publications, and excerpts from the posts.

Digital Journal

digital_journal

The survey, which ran online in October and included 150 IT professionals, sought to understand companies’ level of preparedness as it pertains to cyber threats and steps they’ve taken to combat potential strikes. The key takeaway was that most companies have a plan for dealing with cyber attacks, and yet at least a third of respondents believe their plan has left key hardware and software systems unprotected.

Read more: http://www.digitaljournal.com/pr/3129782

 

Enterprise Apps Tech

Enterprise-Apps-Tech

More than 40% of companies polled by IT and cloud management provider NetEnrich admit they have been victim to a cyber attack, with stolen or weak passwords the primary cause.

Yet the research, released today which polled 174 respondents over a 24 hour period, also found that for 43% of those polled, attacks could have been prevented with a better policy in place.

More than a quarter (26%) of respondents said that stolen or weak passwords were the most common reason an attack took place, followed by testing and monitoring system failure (21%) and advanced persistent threats (15%). In terms of remediation, 21% said breaches could have been avoided if security policy was better communicated to employees, while another 37% said their company could have used better tools and methods for testing.

Two thirds (66%) of respondents say they use third party consultants or managed security service providers to develop or implement security plans, while 83% say they use cloud-based infrastructure and apps. AlienVault (30%) was the most popular tool used to prevent attacks, closely followed by AirSight (29%), with Splunk (17%) in bronze medal position.

Raju Chekuri, president and CEO at NetEnrich, said that the research data showed ‘half-measures’ and workarounds “will not do” when it comes to enterprise-grade security. “I applaud the 82% of companies in our survey that have cyber attack readiness plans in place but what are the other 18% waiting for?” he said. “Our advice to customers and prospects continues to be: act now, be comprehensive, and be proactive.”

Read more: http://www.appstechnews.com/news/2016/nov/03/it-execs-note-how-many-cyber-attacks-could-have-been-prevented/

 

CSO Online

CSO Online

Another survey, released this morning, showed that 72 percent of organizations have tools in place to defend against advanced persistent threats, 79 percent scan for malware, 52 percent do penetration testing, and 44 percent do cyber forensics. In addition, 66 percent have a cyber security plan that fully covers all on-premise environments and devices, and another 25 percent have partial coverage, while 61 percent fully cover cloud-based environments and devices and 29 percent have partial coverage.

The high percentage of companies who had sophisticated security tools in place was a surprise, said Vikram Chabra, solution architect at NetEnrich, which sponsored the report.

However, lack of expertise remains an issue, he added.

“Despite the fact that we have the finest tools that can defend against advanced persistent threats, we still need qualified security analysts or engineers to look at the incidents thrown out by the tools, comb out false positives, and take actions,” he said.

To help deal with the issue, 66 percent of companies said that they used third-party consultants or managed security service providers to develop or implement their cyber security plans.

Intergration was an issue here as well, Chabra added. “Your security technology vendor isn’t the same as your managed security service provider,” he said. “You’ve got multiple vendors involved — one vendor managing the security, another managing the technology, and there’s a gap there.”

Read more: http://www.csoonline.com/article/3138003/security/flood-of-threat-intelligence-overwhelming-for-many-firms.html

 

BroadwayWorld

 

BroadwayWorld

And whereas once upon a time petty theft was the focus of most cyber attacks, today, cybercrime is big business. The majority of persons responding to NetEnrich’s survey said the average cost to their organizations was between $50,000 and $100,000.

Over 40 percent of companies surveyed by NetEnrich claim to have been the victim of a cyber attack. Stolen or weak passwords were the most common cause (26 percent), followed by testing and monitoring system failure (21 percent) and Advanced Persistent Threats (15 percent). Fourteen percent said the cause of attacks was employee error, and seven percent attributed the issue to lost equipment (laptops, mobile devices, etc.). Furthermore: 43 percent of respondents said attacks could have been prevented with a better cyber security policy; 37 percent said they could have used better tools and methods for testing and monitoring; and 21 percent felt breaches could have been avoided had their companies better communicated security policies to employees.

Read more: http://www.broadwayworld.com/bwwgeeks/article/NetEnrich-Survey-Companies-Brace-for-New-Cyber-Attacks-as-Threats-Multiply-20161103

 

Channelnomics

CHANNELNOMICS

Some 82 percent of 150 IT professionals surveyed in a new NetEnrich cyber security study have a readiness plan in place should they be hit with an attack.

Even with a plan in tow, about one-third of the respondents still believe their plan has left key hardware and software systems unprotected, the vendor said.

In addition, 42 percent claimed to have been victimized by a cyber heist. Stolen or weak passwords was the most common vulnerability, followed by testing and monitoring system failure and advanced persistent threats.

“All the data shows that cyber security must be a top priority for companies and that half-measures and workarounds will not do,” said Raju Chekuri, NetEnrich president and CEO.

Read more: http://www.channelnomics.com/channelnomics-us/news/2476355/todays-channel-rundown-3-november-2016

 

eSecurity Planet

esecurity-planet-it-prosLast fall, a Balabit survey of 381 IT professionals found that 69 percent of respondents said they would bypass security controls and risk a potential security threat to achieve the biggest deal of their life.

Notably, the recent NetEnrich survey also found that 53 percent of respondents see employees, rogue or otherwise, as the greatest source of cyber attacks on companies.

Stolen or weak passwords are seen as the most common cause of cyber attacks at 26 percent, followed by testing and monitoring system failure (21 percent), advanced persistent threats (15 percent), and employee error (14 percent).

“All the data shows that cyber security must be a top priority for companies and that half-measures and workarounds will not do,” NetEnrich president and CEO Raju Chekuri said in a statement.

Read more: http://www.esecurityplanet.com/network-security/43-percent-of-it-pros-say-cyber-attacks-that-hit-their-companies-were-preventable.html

 

IT Business Edge

ITBusinessEdgeThere’s no question that there is a need for solid cybersecurity awareness training. Yet, how effective is it, really? A couple of studies I’ve seen recently make it seem like you can provide all of the cybersecurity education you want, but it won’t make any difference if your employees are ignoring whatever they are taught.

Notably, the recent NetEnrich survey also found that 53 percent of respondents see employees, rogue or otherwise, as the greatest source of cyber attacks on companies.

Read more: http://www.itbusinessedge.com/blogs/data-security/cybersecurity-training-and-policies-are-useless-if-ignored.html

 

SearchITChannel

searchitchannel-news-logo

According to new research published last week by NetEnrich, an IT infrastructure and operations management services provider. NetEnrich collected data for its study in October, polling 150 IT professionals on their companies’ cyber security measures for handling potential strikes. While the study revealed 82% of the companies have a plan for handling attacks, about a third of the surveyed respondents noted critical vulnerabilities in their hardware and software systems

“I always say, ‘Security is not a sprint; it is a marathon,’” said Vikram Chabra, solution architect at NetEnrich, based in San Jose, Calif.

Read more: http://searchitchannel.techtarget.com/blog/Channel-Marker/Study-Cyber-security-measures-widespread-but-vulnerabilities-persist

IT death by a thousand tools

Many CIOs and IT decision-makers spend a lot of time and money on new tools to deploy within their IT environments. From security software to cloud-based data collection tools to backup products, each one of these tools serves a unique purpose for IT in general and for the company as a whole. However, there is a downside to having all of these different tools: Monitoring and management modules typically don’t advance IT in any way. In fact, most of these tools may only serve to add more IT alert and event noise in an already overburdened environment.

“Having too many tools on the IT roster isn’t just annoying, it’s potentially insecure.”

There is such a thing as too many tools in the data center.
There is such a thing as too many tools in the data center.

Problem: Too much IT alert and event noise

The aforementioned monitoring and alert tools are useful in that they help IT see what’s going on at all times in their environments and determine what needs to be taken care of in the proper order. Data center automation has come a long way in recent years, but monitoring still largely falls to dedicated IT professionals.

However, when there are too many tools and too much alert noise, this can have the opposite effect. When IT managers are inundated with all the bells and whistles generated by monitoring solutions, it can become overwhelming, sometimes resulting in unexpected network downtime. A 2015 IDC report found that for the Fortune 1000, the average total cost of unplanned downtime on an annual basis is $1.25 billion to $2.5 billion. In addition, the average cost per hour of downtime is $100,000 – something that companies probably aren’t just throwing around.

It may be enticing to think that the way to prevent downtime is to deploy even more monitoring tools within your environment, including hybrid IT. However, what happens when there are too many tools and too much noise? Downtime is a real issue that can result from data center managers being overwhelmed with all of the supposedly helpful deployments in their environments.

Cybersecurity and APIs

Having too many tools on the IT roster isn’t just annoying, it’s potentially insecure, as well. IT professionals are beginning to realize the disadvantage of deploying so many different kinds of security tools in their environments; having too many various applications to choose from simply isn’t a feasible strategy because the manpower required to manage such an operation isn’t ideal.

“This has become a nagging problem as an enterprise cybersecurity architecture based upon point tools can’t scale and requires way too much operational overhead to maintain,” wrote Network World contributor Jon Oltsik. “Thus, CISOs are moving in another direction – a tightly coupled cybersecurity technology architecture based upon software integration.”

The cybersecurity tool issue is a handy allegory or example for other tools within the IT spectrum and how when there are too many of them, things can get a little confusing.

IT ToolsHaving too many tools in the IT shed is not a good idea.

What’s the solution?

When there are too many chefs in the kitchen, someone is going to get burned. The same goes for IT departments and the myriad tools they need to use to maintain their environments’ security, productivity and networking capabilities. What if there was a way to minimize the number of tools necessary for IT, or at least find a means to see across all tools and technologies with a unified single-pane-of-glass function?

This is where partnering with an Enterprise Command Center (ECC) provider like NetEnrich can prove to be the best thing you do for your IT infrastructure. NetEnrich’s ECC smart machines and engineers can take the IT alert noise within your environment and make it easier for you to monitor your infrastructure – without all the distractions. The ECC can help you automate your alert management along with policy-driven governance across the entire environment, as well.

Contact NetEnrich today for more information about how to cut tech tools and alert noise to a minimum in your IT environment.

 

 

SOURCE

InfoWorld, NetworkWorld

The Importance of Backup and Disaster Recovery [Infographic]

Businesses are experiencing an ongoing deluge of data. The requirement for 24×7 availability of applications, has made cloud backup more important than ever for SMBs. Internal users demand constant access to data, to ensure that processes run smoothly. Line-of business applications require uninterrupted availability and losing corporate data can be disastrous. Downtime can cripple an organization financially, and it affects your client and their customers as well, with the potential result of both lost revenue and a diminished reputation.

Ensuring that your data is backed up is critical to running a business. Network outages and natural disasters can happen anytime and this is why cloud backups and disaster recovery (DR) plans are imperative for business continuity.

Click below to view the ‘Importance of Backup and Disaster Recovery’ infographic, and learn more.

Importance of Backup and Disaster Recovery
Importance of Backup and Disaster Recovery

These facts are the reason for backup and recovery to move from a secondary priority to mission critical, causing a rapid migration of SMBs to Microsoft Azure for backup and disaster recovery. (Azure backs up 6 copies of your data across two separate Azure data centers, which means it can guarantee 99.9% availability of backups). This migration has created a significant demand for the setup and continued management of backup and disaster recovery services on Azure, and a huge opportunity for VARs.

Here is where NetEnrich can help. Our white-labeled Setup and Management Services for Backup for Azure are state-of-the-art setup, monitoring, management, optimization and analytics services. We help you identify what needs to be backed up, when it needs to happen, and how often, in order to satisfy your clients’ backup requirements. Our white-labeled solutions for Azure enable you to migrate, monitor and manage your clients’ backup deployments on Azure. You increase profit margins, and create new revenue streams through a cost efficient solution for data security.

For more information about how DR and backup strategies should be critical part of your operation and how the cloud fits in, contact your cloud service provider. Contact us to find out about local or regional service providers in your area.

Justin Crotty joins NetEnrich as Senior VP and GM for Channel Sales and Marketing

We are thrilled to welcome Justin Crotty, back to NetEnrich as Senior VP & GM for Channel Sales and Marketing. If you didn’t already know, Justin was with NetEnrich 2010 through 2015, after which he left for a brief period to work for MaintenanceNet which was later acquired by Cisco.

Justin Crotty is an industry expert, influential voice and a long-time advocate for managed IT and cloud-based services. He returns to NetEnrich from Cisco where he served as Director of Business Development, leading the partner enablement, product management and platform development functions for Cisco Impact.

Justin Crotty

“NetEnrich is an established and proven brand that can help VARs and IT service providers capitalize on moving customers to the cloud and managing hybrid IT infrastructure effectively to drive business innovation,” says Crotty. “I’m excited to rejoin the company and help the company continue to grow its reputation among VARs and service providers.”

Justin Crotty will focus on strengthening the NetEnrich brand in the channel, driving revenue growth; plugging more VARs into the company’s ecosystem; and capitalizing on emerging opportunities like Azure monitoring and management.

“He’s had a tremendous career, including launching the first managed cloud services business in IT distribution, at Ingram Micro. We’re thrilled to have Justin back on board to lead our channel business, during this time of exciting growth.” says Raju Chekuri, President and CEO at NetEnrich. It’s definitely exciting for the NetEnrich team, with the recent addition of Jonathan White as VP of Channel Sales and Marketing, bringing in-depth knowledge of Microsoft business and cloud technologies and partner strategies.

 

 

Learn more:

Article by ChannelE2E on Justin Crotty returning to NetEnrich.

Full Press Release.

Data breaches highlight importance of effective security strategy

Making sure your data and applications are safe from prying eyes is one of the most important things about managing your IT infrastructure. Whether you run a small business or a large enterprise, customer information and proprietary applications are enticing targets for hackers. Therefore, it’s critical to ensure you’re investing in the right cybersecurity tools to best fit your organization’s needs when it comes to keeping your data and applications safe.

“Organizations that don’t have the proper strategy in place are playing with fire – and may get burned.”

What are the stats?

Cybersecurity is one of the most important undertakings an enterprise needs to deal with. Data breaches come at a high price – one that not everyone is able to pay. According to a recent study conducted by IBM and the Ponemon Institute, the average consolidated cost of a data breach comes out to around $4 million. This shows an increase from 2015′s estimate of $3.8 million, and the average cost incurred for each stolen record also went up from $154 to $158.

For the next two years, the Ponemon study projected the likelihood of a material data breach involving 10,000 lost or stolen records to be 26 percent. This means that organizations need to invest in the right kind of cybersecurity tools and services in order to prevent this kind of attack. Organizations that don’t have the proper strategy in place are playing with fire – and may get burned.

High-profile events happen all the time

Last year, quite a few big-name organizations fell victim to some unfortunate circumstances surrounding data breaches. The U.S. Office of Personnel Management famously lost the confidential data of approximately 21.5 million of its current and former employees last July, along with the fingerprint data of 5.6 million people. The incident drew attention to the seriousness of not having a strict cybersecurity strategy.

Government isn’t the only sector that experienced massive data breaches last year. According to Forbes contributor Dan Munro, 253 health care data breaches of 500 records or more took place in 2015, leading to a total of 112 million health records compromised. The top six breaches, in fact, each affected more than 1 million people. The Health Insurance Portability and Accountability Act of 1996 strives to protect patients against loss, but it may not be as effective as intended.

Most recently, a compromise of LinkedIn passwords and accounts has led to a string of incidents. Organizations within the manufacturing and retail industries have been targeted as a result, along with other verticals. Because the LinkedIn passwords were leaked, hackers have been able to reuse these stolen credentials to access other sites.

“It isn’t clear if the active cases are all related, or if there is more than one attacker or group conducting the raids,” CSO contributor Steve Ragan wrote. “What is clear is that some of the organizations caught-up in this situation are large ones and the only reason they’re in this mess is due to recycled credentials.”

All of these examples point to the fact that organizations – no matter whether they operate within the public sector or private – need to improve their security strategies going forward in 2016.

Cyber security

Hackers are waiting to discover your business’s information.

Partner with the experts

At NetEnrich, our cybersecurity services are the cream of the crop. We help enterprise and mid-market companies improve their security posture and implement automated application controls so that data and applications remain secure. Our single-pane-of-glass monitoring and management services can improve your security strategy and put your mind at ease.

Don't wait until it's too late to invest in cybersecurity tools.
Don’t wait until it’s too late to invest in cybersecurity tools.

Contact NetEnrich today for more information about how we can help keep your data and applications safe from prying eyes.

 

SOURCE

Forbes, CSO