Xiologix – Your Local VMware Experts 

By | Virtualization | No Comments

Christopher Kusek VMware Awards

No matter where you are in your cloud journey, know that Xiologix is your local resource for superior VMware expertise and service.

  • Holistic Approach – Xiologix looks at your business needs in their entirety and provides a holistic solution to cover all. Rather than simply delivering the technology, we custom-configure it for your environment.
  • Unmatched Expertise – by partnering with Xiologix, your company enjoys valued knowledge and expertise provided to you by local and highly-qualified Xiologix engineers.
  • Easy Renewals – No need to track renewal dates or request quotes. Xiologix tracks renewal dates and generates quotes 90-120 days ahead of due date.
  • Co-Terming Options – Our experienced warranty support team can co-term software renewals to simplify your contract management. Xiologix can coordinate all of your VMware support contracts, even if they were purchased elsewhere.

Read More

Cybersecurity in an Internet Minute

By | Security | No Comments

2017 InternetThe Internet of Things (IoT) and mobile devices have made life easier—and a little less secure. Yet the convenience of on-the-go computing and interconnectivity of devices comes at a cost; risk.

According to a recent Symantec Internet Security Threat Report, there are 25 connected devices per 100 people in the U.S. While this might seem like a lot, the number of connected ‘things’ is projected to grow to 8.4 billion in 2017 alone.

This IoT and mobile explosion has contributed to the exponential growth of the cybersecurity market. More than 25 percent of the world’s population stays connected to their friends, family and world through Facebook each month.

That’s an incredible number of selfies and baby pictures being shared potentially though corporate devices and networks. It also widens the threat landscape and demands that social media outlets from Twitter to YouTube implement stronger security controls as threats evolve. Read More


How Does the C-Suite View Cybersecurity?

By | Security | No Comments

Traditionally all things technology have been exclusively limited to the IT department in most organizations. Due to the increased number of security breaches and the latest ransomware attacks, though, technology has brought cybersecurity front-of-mind for the C-suite.

Despite the vulnerabilities technology invites with today’s ever-changing threat landscape, there is consensus among top executives that technology presents more opportunities for business growth. According to the report from management consulting firm, A.T. Kearney, 2017 Views from the C-Suite, global executives’ top concern this year is the convergence the government’s regulation of technology and cybersecurity.

A complex proposition presenting businesses with myriad opportunities and challenges, technology has become a top priority in the C-Suite. Here are key takeaways from the A.T. Kearney report that C-Suite executives need to consider as they pursue effective ways to overcome the challenges and capitalize on the opportunities.
Read More

Why Top Healthcare Institutions are Moving Toward Integrated Security Solutions

By | Security | No Comments

According to a report posted by the Office of the National Coordinator for Health Information Technology, 87 percent of office-based physicians had adopted some form of electronic health record (EHR) as of 2015. This is more than double the 42 percent that had done so when data was collected in 2008. Along with an increase in EHR adoption, we have also witnessed a global healthcare revolution in data collection and research. Access to such data improves the care and quality of life of those individuals …

Read More…

9-Point SMB Guide for Expanding into the Cloud

By | Security, Virtualization | No Comments

SMB GuideIn a year, 80% of all IT budgets will be committed to cloud solutions.

With the need to reduce IT costs while increasing flexibility and scalability, this shouldn’t come as a shock.

The rise of hybrid clouds has served to increase this adoption. Organizations can now benefit from the control and security of a private cloud hosted on their own network and enjoy the cost management and extended services that come with public clouds offered by third-parties.

However, while expanding into the cloud has become increasingly more beneficial and necessary for SMBs, it has also become more challenging.

Here are 9 factors to consider when evaluating hybrid public and private cloud solutions: Read More

vSphere High Performance Cookbook bu Kevin Elder and Christopher Kusek

New Book Release – vSphere High Performance Cookbook

By | Virtualization, Xiologix in the News | No Comments

We are excited to announce the release of Kevin Elder and Christopher Kusek’s new book, vSphere High Performance Cookbook!

vSphere High Performance Cookbook bu Kevin Elder and Christopher KusekXiologix engineer, Kevin Elder, and Xiologix CTO, Christopher Kusek, have teamed up as author’s in their latest book: vSphere High Performance Cookbook!

vSphere is a mission-critical piece of software for many business. It is a complex tool, and incorrect design and deployment can create performance-related issues that can negatively affect the business. This book is focused on solving these problems as well as providing best practices and performance-enhancing techniques. This edition is fully updated to include all the new features in version 6.5 as well as the latest tools and techniques to keep vSphere performing at its best.

This book starts with interesting recipes, such as the interaction of vSphere 6.5 components with physical layers such as CPU, memory, and networking. Then we focus on DRS, resource control design, and vSphere cluster design. Next, you’ll learn about storage performance design and how it works with VMware vSphere 6.5. Moving on, you will learn about the two types of vCenter installation and the benefits of each. Lastly, the book covers performance tools that help you get the most out of your vSphere installation.

By the end of this book, you will be able to identify, diagnose, and troubleshoot operational faults and critical performance issues in vSphere 6.5. Read More

The Dark Web – Dark Side of the Internet

By | Security | No Comments

We have heard of the Dark Web but what actually is it? What happens there? 

As this great graphic from CartwrightKing Solicitors explains, “The Dark Web is the hidden side of the internet. Although a public space, special access and software is required to reach its hidden depths. It also forms part of the larger Deep Web which is not indexed by search engines such as Google.”

Take a look and learn more about:

-The Structure of the Internet
-Who is on the Dark Web
-Personal Data for Sale
-A Timeline
-Facts and Figures
-What is Being Done about the Dark Web
-Ways to Stay Safe Online Read More

How Vulnerable Are You To Ransomware?

By | Security | No Comments

ransomwareSecurity analysts predict an increase in both the number and size of cyberattacks in 2017. Based on the sheer scale of the recent WannaCry attacks (200,000 systems across 150 countries), testing systems for vulnerabilities is no longer a hypothetical. It’s a must. So is testing employees’ mastery of cybersecurity lessons learned from cyber threat awareness training.

The Logic in the Testing Process

A substantial contributing factor to the success of cyberattacks is organizations’ failure to test employees’ knowledge of good cyber hygiene and how to recognize and report suspicious online activity. Potentially compounding the problem is insufficient testing of security systems already in place.

Human intervention is important but often happens too late. Regular system tests using a variety of tools eliminate any potential threats before they’ve had a chance to spread. Read More