Kelser Blog, Media, and News
All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.
Modern Data Center | Executive Consulting
By:
Kelser
January 27, 2016
Keeping up with the whirlwind pace of the technology industry is difficult, to say the least. To help you spot the big trends in IT and cloud computing for 2016 and keep up with data security needs, we've put together a list of what we expect to see this year.
News | Foundation | Press Release
By:
Kelser Press
January 22, 2016
The Kelser Foundation set a new fundraising record by raising $24,800 for the American Lung Association of the Northeast through the foundation’s 2015 Charity Challenge. The annual event was held at the Indian Hill Country Club in Newington, CT. The club graciously welcomed the entire Kelser family including employees, partners, customers and friends to what has become a much anticipated outing.
Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.
Cybersecurity | Managed Services
By:
Kelser
January 20, 2016
Here at Kelser we've seen the same security errors being committed time and time again. In order to help keep companies from making the same mistakes, we put together a list of not only the worst security sins -but also some of the most surprising (and least thought of).
Cybersecurity | Executive Consulting
By:
Kelser
January 08, 2016
Independent security audits, such as a penetration test or vulnerability assessment, serve a critical purpose in an information systems security program. I’ll offer you two distinct perspectives to consider, depending on your role in your organization.
Cybersecurity | Executive Consulting
By:
Kelser
January 06, 2016
All kidding aside, you may or may not be aware of a pending change in how secure sites (think SSL/TLS) are secured. This is the SHA-1 to SHA-2 transition. It’s actually been in the works for a while, and primarily involves upgrading the certificate(s) on your public-facing websites, with more secure certificates. So what is SHA-1 or SHA-2 and why do we need to change?
By:
Kelser
December 30, 2015
Network automation is right up there with automated server provisioning, to accelerate the development and advancement of applications and services. A common example, might be: “There’s a problem in production and I need to clone my production environment to a bubble test environment for rapid testing and resolution.”
Cybersecurity | IT Lifecycle Management | Executive Consulting | Workforce Enablement
By:
Kelser
December 23, 2015
iPads, tablets, and other ‘smart’ devices are well known as popular entertainment mechanisms. But considering how distracting these devices can be, should your company allow and encourage their use?
Modern Data Center | Executive Consulting | Workforce Enablement
By:
Kelser
December 16, 2015
It happens all the time – for all the right reasons, one of our customers is interested in VDI until they see the price. Sticker-shock doesn’t begin to describe the experience one goes through, when looking into traditional VDI for the first time. Many organizations, large and small, understand the operational overhead (i.e. cost) of managing desktops, seeing VDI as a way to both streamline operations and deliver a consistent end-user experience.