If you paid for Intel vPro technology, you should be using it.

Get more value from your vPro-enabled devices.

As one of the country’s largest solution providers, Zones deploys thousands of mobile devices and PCs powered by high-performance Intel® Core™ processors with vPro™ technology to businesses around the world.

Intel’s vPro technology describes a range of features that enhance the security, manageability, and performance of computers built around high-end Intel Core processors.

But too often, the hardware-enhanced remote manageability and security capabilities that vPro was designed to deliver don’t get activated by IT, leaving a lot of value on the table.

We can help you identify vPro-equipped machines in your fleet and get all the benefits of the features you’ve already paid for. Continue reading

Cloud-Minded. Business Grounded.

The forecast calls for 80 percent of IT to be in the cloud by 2020.

The cloud is going mainstream and delivering on its promises. Companies moving workloads are seeing the cloud as a catalyst for business growth. These companies are innovating freely, reaching out to new markets, and disrupting the status quo.

But with cloud technologies being developed at staggering rates, it’s hard to predict which direction they’re moving. More important for you is planning a cloud strategy that goes along with your business forecast. Continue reading

Who’s the New Grandmaster?

Making the right moves to win the security challenge.

This year marks the 20th anniversary of the final match game between chess champion Garry Kasparov and the IBM supercomputer Deep Blue. The world watched as Kasparov became the first world champion to be defeated in a match by a machine. The loss sparked the debate of “man versus machine” in the digital age.

Fast-forward to the present, and the debate continues. Only now, we’re talking about machine learning too. But this is well-established technology. So, why all the interest? The answer is simple Continue reading

When it comes to cybersecurity, the best offense is a good defense.

Every 40 seconds a company is hit with ransomware, and the WannaCry outbreak is a perfect example. WannaCry demonstrates how ransomware attacks can quickly spread across and cripple environments by exploiting critical vulnerabilities in Windows computers – at least in those not updated with the patch Microsoft issued in March of this year (MS17-010) or the emergency update issued for XP on May 13, 2017.

Of course, running out-of-support operating systems such as XP is risky. But, XP by itself is not the biggest problem. The larger issue is complacency around security updates, operating system updates, and OS upgrades across the infrastructure. Continue reading

The engineered system that’s simple, optimized, and affordable

Oracle Database Appliance

Whether you’re running a small-to-medium sized business or operating a remote or branch location, field office, or clinic, Oracle now has a better way to manage your database: Oracle Database Appliance (ODA).

ODA is a highly-configured, easy-to-deploy, all-in-one package of software, servers, storage, and networking in a single box. It’s optimized to help you run your Oracle Database and applications, with all hardware and software components engineered and supported by Oracle. That means maximum reliability, efficiency, and security. Continue reading

Shaky disaster recovery plan? There’s no excuse anymore.

Everyone knows that a comprehensive disaster recovery plan stands to pay for itself – should you need to use it. But over the years, we’ve seen many businesses fail to make the necessary investments in time and money to create one. Some were lucky. Many were not.

Of course, critical systems for banks, finance, and healthcare had significant redundancies built into their IT architecture. After all, these organizations could afford complex solutions maintained by some of the most talented IT folks in the industry. But many firms simply could not afford or maintain the necessary skills on staff to support a true disaster recovery solution for key applications and IT systems. Continue reading

Cybersecurity trends underway in 2017

The past year has seen seismic changes in the cybersecurity landscape.

They’re forcing IT professionals to rethink and re-strategize their organization’s security. They’re being tasked with ways to better control access to their network, gain a deeper understanding of how vulnerable their network is to threats, and develop a faster, decisive response plan when a threat occurs.

If any of the above resonates with you, you’re not alone. The cybersecurity market is expected to swell to $100 billion dollars by 2019. And now that we’re a quarter of the way through 2017, there’s good reason to be forward-looking and take proactive steps to ensure that security is in your company’s DNA.

Gone are the days when traditional security management approaches of multiple point products, manual change processes, extensive policies and data silos, did the trick. Given the growing complexities of networks and rapid delivery of services and applications, a deep, up-to-date rebooting of how you approach your network security is not only crucial – it’s necessary. Continue reading

Planning for unplanned outages

It takes vigilance to keep the data center up and running

5-23-16_UPS_hero_325x429The Ponemon Institute’s 2016 Cost of Data Center Outages study shows that the cost of unplanned data center outages is rising fast. Sponsored by Emerson Network Power, the report finds that the average cost of a data center outage has increased from $505,502 in 2010 to $740,367 today. That’s a 38 percent rise in just five years!

Other key findings include:

  • Downtime costs for the most data center-dependent businesses are rising faster than average.
  • Maximum downtime costs for 2016 are $2,409,991.
  • Maximum downtime costs increased 32 percent since 2013 and 81 percent since 2010.
  • UPS system failure continues to be the number one cause of unplanned data center outages, accounting for one-quarter of all such events.

Continue reading

Transforming the network from security liability to security asset

security engineer photoTurn your network into security sensor

For years, IT leaders have been doing everything possible to guard the network from security threats. And with good reason. Once infiltrated, the network can be used to propagate threats across everything connected to it.

The industry’s response – in the form of endpoint protection, firewalls, intrusion detection systems, and intrusion prevention systems – banked on the idea that preventing infiltration would keep the network secure.

While protective and preventive measures remain important first lines of defense, the increasing number and variety of zero-day and social engineering threats mean that even the best protection at the edge risks being rendered temporarily ineffective by a skilled intruder, putting the network at risk. Continue reading

Planning a streamlined move to cloud storage

Zones Cloud Solutions and our Advanced Solutions Group make it easy

Cloud-Storage-Blog-graphic-742x388By turning to the cloud for backup and storage, organizations gain rapid and massive scalability at a reduced cost, versus expanding on-premises data center capacity. Cloud storage also offers the advantage of strong protection for data backup, archival and disaster recovery applications.

With your data stored in the cloud, many data center activities are reduced or eliminated. Without the need for manual backups and the associated hardware maintenance and management tasks, your IT staff is free to focus on business-critical tasks, increasing data center efficiency and productivity. And should disaster strike, cloud storage allows IT to restore affected data quickly, enabling your business return to normal operations. Continue reading