<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Kelser

By actively listening to the client, Kelser has consistently met the needs of its client base for over 30 years. Through attentive observation of the changing industry, Kelser is able to react quickly to provide the best service and solutions available. Thanks to the dedication of our professional staff, this agility has advanced us as leaders in our industry.

Blog Feature

Cybersecurity | Modern Data Center | IT Lifecycle Management

By: Kelser
December 07, 2015

There is a fairly serious bug, in vSphere 6.0, which can make backup data corrupt and prevent you from restoring data. This issue is specifically targeted at those (most) who use CBT (change block tracking) to take efficient image-based backups of their environment. If you need any assistance with applying or testing these patches and/or the integrity of your backups, please give your account representative a call. You can also contact us here. The VMware KB for this article is here: http://kb.vmware.com/kb/2136854

Blog Feature

Cybersecurity

By: Kelser
December 02, 2015

A company’s security network is like a chain in that it’s only as strong as its weakest link. For this reason, a thorough and regular

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

IT Lifecycle Management | Managed Services

By: Kelser
November 11, 2015

Are you planning to change the software your company uses for its day-to-day business? For example, anyone still using Windows Server 2003/R2 should migrate, as Microsoft ended support for it on July 14, 2015 . But perhaps you’re making a voluntary decision for migration based on any number of factors.

Blog Feature

Cybersecurity | Managed Services

By: Kelser
October 28, 2015

If you’re reading this, then you likely already know the dangers of data breaches for companies of all sizes. In 2014, the average cost of an organizational data breach was $5.4M, with each individual compromised record costing between $191 and $201, on average. And that’s not including the immeasurable costs to company integrity, public relations, and future sales. So kudos for researching the topic.

Blog Feature

Modern Data Center | Workforce Enablement

By: Kelser
October 06, 2015

At Kelser, I receive a fair number of inquiries related to VDI (Virtual-Desktop-Infrastructure). VDI is virtualizing the client (usually desktop) component of client-server computing. Using virtualization, your organization further abstracts users from the hardware layer and even OS layers. The use cases for VDI are just as unique as your organization itself.

Blog Feature

Executive Consulting

By: Kelser
September 29, 2015

The flexible payment plans afforded to us by cloud software are tangible and immediate. They empower many SMB companies to get network security-protecting, enterprise-level software that was previously out-of-reach due to prohibitively expensive upfront costs and on-going service level agreements. This has all changed however with the (relatively) new flexibility of cloud software payment plans.

Blog Feature

Cybersecurity

By: Kelser
September 23, 2015

When a breach in your data security occurs, it may not be immediately apparent. The longer the breach goes unnoticed, the greater the damage will be. Breaches, however, are not entirely invisible. There are signs you should be aware of which, when noticed, tip you off to a hole in your security.

Blog Feature

Networking | Managed Services

By: Kelser
September 16, 2015

Open-standards based networking and network security means making a conscious choice to move away from a single-vendor to multi-vendor network. These multi-vendor networks rely on open standards for their interoperability.

Back to Top