Xiologix Employee Completes Avalanche Rescue Course

By | Xiologix in the Community | No Comments

Senior Systems Engineer, Abe Covello, completed the Companion Rescue course up at Mt. Hood which included structured rescue scenarios in:

  • Companion rescue
  • Scene assessment
  • Beacon use
  • Probing
  • Recovery of victims not wearing beacons
  • Common mistakes in avalanche rescue
  • Single and multiple beacon search techniques
  • First aid and emergency response in avalanche rescues

This is another example of how Xiologix employees care.   We are proud of our employees’ continued involvement in their local communities.

Still Running Citrix XenApp v6.5? The Clock Is Ticking

By | Cloud Computing, Virtualization | No Comments

citrix xenapp deadlineCitrix XenApp v6.5 hit EOL June 30, 2018

Citrix XenApp v6.5 was a great, stable product release. XenApp v6.5 on Windows Server 2008R2 has been the workhorse for lots of organizations for a long time. But it’s time to move on. If you’re still running XenApp v6.5 you need to know a few things. First, it hit “End of Maintenance” a month ago (December 31, 2017). That means there will be no more product upgrades or updates released, and that means that it will be a security risk to continue running it, and that risk will increase every day. Second, it will hit “End of Life” on June 30, 2018, and that’s not very far away. At that point, you will be pretty much on your own. There may still be some support information available in the support forums or documentation library, but that information will no longer be updated. And there will be no product support from Citrix, unless you’re willing to pay a lot of money for it. So what are your options? Read More

How E-Rate is Connecting Students to the Internet

By | K-12, Wireless | No Comments

E-Rate Survey

Extreme Networks conducted a survey of K-12 IT Managers and Educators seeking to learn about their knowledge and use of E-rate.  Not surprisingly, the survey found that lack of awareness is the biggest reason that school districts did not take advantage of the E-rate program. Take a look at Extreme Network’s Infographic detailing how E-Rate is being used. Questions?  Learn more about how Xiologix can help you to make the most of your E-rate dollars! Read More

Christopher Kusek named as a Cisco Champion 2018!

By | Xiologix in the News | No Comments

ciscochampionCK18Xiologix’ CTO Christopher Kusek was notified on January 19, 2018 that he had been selected as a 2018 Cisco Champion.

Cisco Champions is a global group of highly influential IT technical experts who enjoy sharing their knowledge, expertise, and thoughts across the social web and with Cisco. The Cisco Champions program encompasses people with interests across Cisco’s technology portfolio, including Data Center, IoT, Enterprise Networks, Collaboration, and Security.

This is Christopher’s 3rd consecutive year to hold this honor.

Why Hackers Hack

By | Security | No Comments

WHY HACKERS HACK

One does not need to look very hard for news of recent cyber attacks. As 2017 numbers come into focus, the problem is continuing to grow.  According to the ITRC Breach Report 2017 breaches increased at about 21% over 2016.   Most of the breaches fell into the Business sector followed by the medical/healthcare sector.  Some big names were involved such as Equifax,  Yahoo, Verizon and more. But notably, over 50% of cyber attacks are aimed at small -mid-sized business that don’t make the national headlines.

Check out the Real Time Threat Map to get a visual on current threat activity.

While the actual numbers are still be tallied, let’s take a look Raconteur’s infographic on what motives cyber attacks. Why do hackers hack? Who is behind the data breaches?

why hackers hack
Courtesy of: Visual Capitalist

Citrix Cloud – Never Upgrade Your Citrix Infrastructure Again

By | Cloud Computing, Virtualization | No Comments
citrix cloud

Citrix Cloud

If you’re still running XenApp v6.5, you know you need to develop a migration plan. XenApp v6.5 hits “End of Maintenance” – after which there will be no further code maintenance – at the end of calendar year 2017, and End of Life on June 30, 2018. So if you don’t have a migration plan in place, you don’t have a lot of time to develop one. Furthermore, if you’ve been tracking the evolution of the XenApp and XenDesktop products, you’ve probably noticed that new releases are coming more frequently these days as new and enhanced functionality is added to the products. That’s both good news and bad news: good news because the products are getting better and better, bad news because upgrading your Citrix infrastructure can involve a significant work effort. It is not unusual for a XenApp or XenDesktop infrastructure upgrade to take 100 to 120 hours of work effort on the part of your own IT team, if you have the skill set in-house to do it, or on the part of your Citrix consulting partner if you don’t. Read More

Three Questions to Ask about Identity Management

By | Security, SIEM | No Comments

Identity ManagementSome years ago, we knew RSA as the company that made those key fob tokens for dual-factor authentication. Indeed, they were pioneers in the multi-factor authentication space, and to my knowledge, no one has ever found a way to successfully beat their SecurID token-based authentication. But RSA is so much more than that these days. Even the venerable SecurID product has grown into a powerful and flexible Identity Management solution.

Unfortunately, “powerful and flexible” can sometimes translate into “I’m not sure where to start with this.” So here are three questions that may help you get on the right track: Read More

Cylance Just May Be the Tool You’ve Been Waiting For

By | Security, Uncategorized | No Comments
ransomware

The cyberwar over who will control your PC and the data on it has been dragging on for literally decades, with no end in sight. Malware is big business. It isn’t about just wreaking havoc for the heck of it anymore – it’s about monetization: incorporating your system into a botnet that can then be rented out on the Dark Web, stealing your identity and sensitive financial information, or encrypting your data and holding it for ransom. This latter version, so-called “ransomware,” rakes in tens of millions of dollars annually from its victims, and, as we’ve stated previously, has proven to be one of the most challenging forms of malware to protect against. Read More

Veeam and Cloud Replication

Veeam and Cloud Replication – Better Together

By | Backup and Recovery | No Comments
Sid Herron

Sid Herron

Veeam and Cloud Replication

If you’re using Veeam to back up your virtualized server environment, congratulations! You’re using one of the best products on the market for enabling the “always on” enterprise. But what are you doing for disaster recovery? Do you have an automated process for getting a copy of your most critical data out of the building, and a way to run critical applications somewhere else if your data center is destroyed or rendered inoperable by fire, flood, or other disaster? Read More