<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=352585001801011&amp;ev=PageView&amp;noscript=1">

Information technology blog, cybersecurity blog

Kelser Blog, Media, and News

All the latest Kelser news, media appearances, event recaps, press releases, and articles covering topics such as cybersecurity, business continuity, disaster recovery, networking and managed services, in one convenient place.

Blog Feature

IT Lifecycle Management | Managed Services

By: George W Kudelchuk III
January 9th, 2019

Software used to be such an adventure. Your company would buy a new program and then essentially be on your own to install it and learn how to use it. It might work out great, or it might be a frustrating fiasco. You bought it—it’s your problem now. Wisely, software companies have largely switched to a software-as-a-service model in which customers pay a recurring fee for use of software that is maintained and supported with customer service. Hardware is undergoing a similar transition with desktop-as-a-service, also known as device-as-a-service, or DaaS. Desktop-as-a-service shifts technology hardware from a capital expense to an operating cost. Rather than buying new computers and other technology in one large, up-front expense and then burdening your IT department with the massive task of setting them all up and maintaining them, a technology partner or managed service provider (MSP) will manage the assets for the entire lifespan.

Blog Feature

Cybersecurity | IT Lifecycle Management | Networking | Business Continuity | Disaster Recovery | Managed Services

By: Brian Mulligan
October 23rd, 2018

What Are Managed Services? Managed services are the IT operations, functions, and processes that an organization chooses to outsource to a third-party external managed services provider (MSP). The organization signs a contract with the MSP known as the service level agreement (SLA) that outlines the MSP’s roles and responsibilities when monitoring and managing your IT services.

Cybersecurity-Cover-01

Improving Your Cybersecurity Posture Isn't as Hard as it Sounds

Start improving your cybersecurity posture now with this ebook, free when you subscribe to our blog.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Kelser
August 29th, 2018

IT hardware, like cars, are depreciating assets. As soon as you drive them off the proverbial lot, they begin to lose value. The reason for this depreciation is twofold: the product will eventually wear down, and newer models will be released with greater specs. Keeping this in mind, how often should you refresh your IT assets? To understand the answer to this question, let’s look at the IT-asset lifecycle management. 

Blog Feature

IT Lifecycle Management | Managed Services

By: Kelser
April 18th, 2018

As technology continues to play a vital role in the success of businesses today, developing an IT roadmap is very important. It helps you to identify all the critical issues in your organization, giving you an edge over your competitors. However, small firms may not be economically stable to maintain fully dedicated IT departments like their large counterparts do. That is mainly due to the time, money, and dedication required.

Blog Feature

Cybersecurity | IT Lifecycle Management | Managed Services

By: Matt Kozloski
August 17th, 2017

As technology relentlessly pushes forward, you and your organization will undoubtedly need to upgrade your hardware. However, you can’t simply forget about your old hardware while reaping the benefits of replacing it with the latest and greatest. You should be excited about the upgrade, but how will you transfer data from your old equipment to the new? How will you erase data from the original hardware?

Blog Feature

Cybersecurity | IT Lifecycle Management | News | Events

By: Adam Stahl
May 12th, 2016

HARTFORD – Kelser, HP Inc., and Intel educated guests about security threats to their mobile workforces and how to protect against those threats during a lunch and learn at VIVO Seasonal Trattoria.

Blog Feature

IT Lifecycle Management

By: Kelser
February 24th, 2016

With the proliferation of devices in the workplace, IT asset management is turning from a 'nice-to-have' to a 'must-have' concept. It’s no longer acceptable from a high-level IT perspective to have a smattering of devices without knowing relevant, critical information about them such as how old devices are, what components they use, what they cost (then and now), their effect on network security, and their expiry date.

Blog Feature

Cybersecurity | IT Lifecycle Management | Executive Consulting | Workforce Enablement

By: Kelser
December 23rd, 2015

iPads, tablets, and other ‘smart’ devices are well known as popular entertainment mechanisms. But considering how distracting these devices can be, should your company allow and encourage their use?