NSX Basics - Creating firewall rules to control RDP Access

NSX Basics - Creating firewall rules to control RDP Access

In this video demonstration I will configure the Distributed Firewall (DFW) to permit access to RDP only for a group of virtual machines. Using dynamic security groups within NSX manger allows new virtual machines meeting the criteria to be automatically protected when they are provisioned.

Read More

The great 'Spy' chip scandal

The great 'Spy' chip scandal

In the news currently is a potentially far-reaching scandal centred around the addition of a tiny surveillance chip into certain Supermicro server motherboards. Bloomberg Businessweek has broken a story blowing the whistle on a ‘secret’ FBI investigation that’s been running for a couple of years and implications that similar discoveries made but not publicised by both Apple and Amazon in 2015 led both companies to cease trading with SuperMicro and allegedly remove SuperMicro hardware from their datacentres.

Read More

NSX Basics - Creating a Firewall Rule to Block Ping Traffic

NSX Basics - Creating a Firewall Rule to Block Ping Traffic

In this video I will use security groups created in a previous demonstration to create a simple rule to block ping from a group of virtual machines.

Read More

NSX Basics – Creating Security Groups

NSX Basics – Creating Security Groups

In this video I will walk through creating 3 type of security groups that can be used alongside the distributed firewall (DFW) to protect virtual machines.  

Read More

Are you setting yourself up to fail?

Are you setting yourself up to fail?

In today’s industry, an IT disaster recovery plan is essential.  It is not only essential to protect a business from catastrophic failure, but it is expected by customers, necessary against our competition and required by data protection regulations. 

Read More

Speculative Execution and Side Channels Attacks

Speculative Execution and Side Channels Attacks

A few weeks back Intel have disclosed details of new vulnerabilities that effect their current and past CPU ranges from at least 2009 up to their latest – so, it would seem, most Intel CPUs in living memory!

Read More

BizTech Brief Season: 2 - Episode: 1

BizTech Brief Season: 2 - Episode: 1

I am back!! Whilst I have been very busy recently with VMUG, my blogging has taken a back seat, but what better time to pick this back up than in the lead up to the busiest time of year, kicking off with VMworld 2018 in Vegas?!

Read More

Useful Dell OS9 Commands and their Cisco equivalent

Useful Dell OS9 Commands and their Cisco equivalent

This blog gives you some of the useful CLI commands on Dell’s OS9 (S & Z series) switch OS and how they compare to the Cisco IOS commands that people might be more familiar with.

Read More

Migrating a Windows vCenter Server to 6.5 Appliance – Part 1

Migrating a Windows vCenter Server to 6.5 Appliance – Part 1

I’ve had many discussions with our customers about the benefits of migrating to the vCenter Appliance so I’m using this opportunity to put into practice what I preach.

Read More

Rethink the way you manage your users desktops

Rethink the way you manage your users desktops

The time has come, If you are managing your users desktops in the same way as you were 5-10 years ago, you've got it very wrong! You no longer own the device or host application the user is using but it's still YOUR responsibility!!

Read More

Azure File Sync launches

Azure File Sync launches

While Microsoft might deem file shares to be old fashioned and prefer you to use SharePoint online, most businesses still use file shares to a greater or lesser extent.

Being able to replicate the files to Azure and back down to other sites is the aim of the newly-launched Azure File Sync.

Read More

Start with why

Start with why

All too often technical conversations start with the what (What technology!) and forget about the why or the how. I think this can also be true of the tasks we undertake on a regular basis as well. We are too quick to get on, get it sorted, complete the task and don't actually stop and think why am I doing this. 

Read More

[VIDEO] Barracuda's Sentinel Demo

[VIDEO] Barracuda's Sentinel Demo

In this video, Barry Coombs and Steve Peake discuss and demonstrate the Barracuda platform of Sentinels. Sentinels is an additional layer to your email security platform that uses AI and machine learning of your emails to understand when an email could be a threat, even without a malicious link or attachment. This video shows the simple platform and demonstrates the clear message your user will receive when Sentinels detects a possibly suspicious email.

Read More

[VIDEO] Cloud to cloud backup platform demo

[VIDEO] Cloud to cloud backup platform demo

In this video, Barry Coombs and Steve Peake discuss and demo the Barracuda cloud to cloud backup platform and discuss how the platform makes the task of backing up your data within Office 365 easy understand and do. 

Read More

[VIDEO] Defence against your doppelganger

[VIDEO] Defence against your doppelganger

With cyber attacks becoming more targeted and intelligent than before, your email security may not be able to detect the underlying threat within an email. In this video, Barry Coombs and Steven Peake discuss how Barracuda's Sentinel and Phishline products can help your business be more secure and help your users detect potential threats.

Read More

[VIDEO] I don't need to backup Office 365...Do I?

[VIDEO] I don't need to backup Office 365...Do I?

Many people are under the impression that Office 365 automatically backs up your data, however this is false. In this video, Barry Coombs and Steven Peake discuss why it is critical to your business to backup your data within Office 365 and how Barracuda make this task an easy and painless process. 

Read More

[VIDEO] What on earth is a WAF?

[VIDEO] What on earth is a WAF?

In this video, Barry Coombs of ComputerWorld and Steven Peake of Barracuda broach the subject that many people are asking 'what a Web Application Firewall?' Barry and Steven also discuss how Barracuda have made it easier for organisations to adopt a WAF with their WAF-as-a-service technology with Office 365. 

Read More

GravityZone Basic End-point protection mechanisms

GravityZone Basic End-point protection mechanisms

Following on from my previous blog post I wanted to explore in a little more detail precisely how GravityZone protects the end-points it is installed upon.

Read More

What you missed at Define Tomorrow - Business Technology Experience Day

What you missed at Define Tomorrow - Business Technology Experience Day

For those that missed our Define Tomorrow event in June 2018, this webinar summarises the event in under 1 hour.

Read More

VMware UEM Troubleshooting

VMware UEM Troubleshooting

UEM has pretty decent in-built logging which can and should be used to initially troubleshoot both slow logon and application launch times.  As it crops up for me relatively frequently I thought I would do a video running through some of the processes I use.

Read More