<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Certain nonfederal organizations need to be compliant with the requirements laid out in NIST SP 800-171 by this deadline. Learn more

NIST Compliance - Are You Ready? 00 : 00 : 00 : 00

Information technology blog, cybersecurity blog

Kelser Blog

The Kelser Blog covers technology and business topics such as Cybersecurity, IT Lifecycle Management, Modern Data Center, Workforce Enablement, and more.

Matt Kozloski

Matt is the VP, Professional Services at Kelser as well as former leader of the CT VMUG. VCDX # 194, CISSP # 526947.

Blog Feature

Modern Data Center

Infinidat's InfiniBox 4.0: Is All-Flash Just a Flash in the Pan?

By: Matt Kozloski
December 5th, 2017

Infinidat has recently released version 4.0 of it's InfiniBox software, the brains behind its speedy, massive, hybrid flash/hard-disk storage arrays. What’s the big deal? A hybrid storage array that meets or beats all-flash arrays on all their traditional strong points, at the cost you’d expect from inexpensive spinning-disk arrays, plus seven nines reliability and super-fast synchronous data replication so that no data is ever at risk of being lost. As more companies discover the benefits of InfiniBox, the notion that all-flash arrays are suitable for high-performance storage may prove to be just another flash in the pan.

Read More

Share

Blog Feature

Cybersecurity

Overwhelmed or Annoyed by Cybersecurity? Cybersecurity-as-a-Service May Be for You

By: Matt Kozloski
November 2nd, 2017

Now that National Cyber Security Awareness Month has come to a close, we think it’s a good time to talk about what to actually do about cybersecurity. After all, awareness without action isn’t much use! Before we dive in, however, let’s talk about some thought patterns we often see that prevent companies from taking effective action on cybersecurity.

Read More

Share

Cybersecurity eBook Cover Image

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Modern Data Center | Executive Consulting

HPE 3PAR: The Smartest Storage System is Getting Even Smarter

By: Matt Kozloski
October 23rd, 2017

With Hewlett Packard Enterprise's recent announcement that it will soon be bringing the ground-breaking InfoSight technology to its 3PAR StoreServe, the value of HPE's recent acquisition of Nimble Software is more clear than ever. The move means InfoSight will soon be available across a full portfolio of HPE data solutions: from systems for small businesses all the way up to the largest enterprises. This makes HPE’s storage portfolio the most complete in the industry. Since InfoSight learns by analyzing data from its installed base, it's about to get a whole lot smarter.

Read More

Share

Blog Feature

Cybersecurity | Disaster Recovery

Learn From Equifax's Most Recent Security Breach

By: Matt Kozloski
October 5th, 2017

Equifax made some serious mishaps lately, both technically and incident response. What’s really disturbing:  while this is the largest, this is not an isolated incident. We won’t cover the details here, since there are plenty of sources where you can find information about the breach, its consequences, and what has happened after that. What we will cover is some thoughts around what we can all learn from the events leading up to, during, and after the breach.  At Kelser, we don’t want any company to fall victim to the same incident and aftermath that Equifax did.  We match our recommendations to our clients’ business objectives, establishing a comprehensive and multi-layered strategy to manage risk before, during and after a cybersecurity incident.

Read More

Share

Blog Feature

Executive Consulting | BCDRaaS

How to Make Sure You Have Disaster-Ready Data Backups

By: Matt Kozloski
September 25th, 2017

Backing up your data is a necessity. There are simply too many ways in which data can be lost, ransomed, or compromised in some way. Your original information can get deleted - by accident or on purpose. Your system or network can fail. A hurricane or tornado can strike.   That’s why you have another copy safe and sound. It’s why you also have a disaster recovery plan in place to make sure your data is safe. You do have a disaster recovery plan, right?

Read More

Share

Blog Feature

Cybersecurity

Secure IT Asset Disposition: How to Keep Your Data Safe

By: Matt Kozloski
August 17th, 2017

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Read More

Share