Quality IT, Advice, Support and Delivery

Thursday, 14 January 2016

What is Office 365?

What is Office 365:
Office 365 is a Microsoft subscription plan that includes access to Office applications and other productivity services that are enabled over the internet (Cloud Services). These services include Lync web conferencing and Exchange online hosted email for business, and additional online storage with OneDrive. Office 365 is available in business and enterprise tiers, where each tier offers various plans with varying features and functionality.

Business-class Mobile Apps:
With an Office 365 for Business subscription, you get mobile apps that help you get more done from your favourite device while keeping your data secured. Office 365 provides built-in security and tools to manage access across phones and tablets. You can apply device-specific security policies with ease, allowing you to ensure that data is synced and accessible on authorised devices only. Office 365 also allows you to wipe data remotely from selected devices.
Office 365 provides a consistent experience across devices for storing, sharing and updating your Office documents, while keeping content and formatting intact.  With 1TB of cloud storage with OneDrive for business you have plenty of file storage.

Security:
Office 365 is a secure service, designed following the Microsoft Security Development Lifecycle. Microsoft brings together the best practices from two decades of building enterprise software and managing online services, to give you integrated software-as-a-service solution.
Office 365 uses a defence-in-depth approach to provide physical, logical, and data layers of security features and operational best practices. Office 365 gives you enterprise-grade, user and admin controls to further secure your environment.
Additionally Office 365 offers privacy controls, allowing you to configure who in your organisation has access and what they can access.

Up-to-Date:
Office 365 stays up to date, so you’ll always be working with the latest version of your Office applications, without any extra upgrade cost. In addition Office 365 takes care of all the installing, updating and making sure everything stays in sync, so that you can spend your time working. Also, because your files are automatically saved online, you can access, edit and share the latest versions, even on the go.

Business Benefits:
• Anytime, anywhere access to emails, documents, contacts and calendars, on any device.
• Complete offering of solutions, including desktop productivity apps, online portals, e-mail, voice mail, web conferencing and unified messaging.
• Simple to use communication and collaboration with colleagues and partners.
• Integrates seamlessly with Microsoft Office and other Microsoft programs.
• Flexible pricing options that gives you predictability and flexibility for all or part of your organisation.
• Business-class service, including IT admin phone support, financially backed 99.9% uptime guarantee, geo-redundant data centers, disaster recovery, robust security, privacy controls and standards.


For more information about Office 365 and the plans available, or to set up a trial, contact us on 01723 587240.

Monday, 30 November 2015

7 ways to spot a Phishing Email

One of the most common ways to contract a virus or infection on your PC or Laptop is through phishing emails. Typically Phishing emails are designed to look like they are from a well-known and trusted company, usually banks, financial organisations or couriers, in order to trick you into providing sensitive information. 

Here's 7 ways to spot a Phishing Email:

  1. Emails often contain links, phishing emails are likely to contain links with mismatched URLs. In Outlook if you hover your mouse over the top of any URLs this will display the actual hyperlinked address. If the hyperlinked address is different to the address displayed in the email, it is highly likely that the message is fraudulent or malicious.                    
  2. Emails filled with spelling mistakes and poor grammar are likely to be fraudulent. Spelling mistakes are one of the most common signs that an email isn’t legitimate, as legitimate companies would normally have editors who review their marketing emails carefully before sending them out.                
  3. A prompt for personal information should be a warning sign, no matter how legitimate the email may look! Regardless of who you bank with, your bank will never email you to ask for your personal details.                                                                 
  4. A common type of phishing email is one that appears to be from a delivery company with attachments or links portrayed as tracking information. If you are not waiting for a delivery or don’t recognise the details in the email it is safest to just delete it.                                        
  5. Phishing emails often try to trick you into clicking a link by claiming that your account is on hold or that there has been some fraudulent activity that requires your immediate attention. The best thing to do in this case is to delete the email and just log into the account in question, by visiting the appropriate website, and then checking your account status.                                                                                                                                                        
  6. If you get an email saying you have won a contest that you didn’t enter, the chances are that this is a scam. No matter how inviting the prize may look avoid clicking the link and certainly don’t provide any of your personal details.                                                                                                                       
  7. Emails from financial organisations such as; banks, PayPal, eBay etc. will address you by name and so watch out for emails addressed "Dear Valued Customer" as these are likely to be fraudulent.

Thursday, 12 November 2015

Phishing FAQ's

What is Phishing?
Phishing is a type of online identity theft, which typically uses emails and fraudulent websites, in order to steal information such as credit card details, passwords, account details and other personal information. Phishing emails and websites often falsely claim to be an established legitimate enterprise in an attempt to get you to share your private information.

How does phishing work?
Phishing works by pretending to be from a legitimate enterprise, such as banks, or other websites where you may have cash or credit card details stored, with the key aim of acquiring your private information. Criminals can then use the information provided for many types of fraud, such as steal money from your account, open new accounts in your name or to obtain official documents using your identity.

The most common form of phishing is fraudulent emails, prompting the recipient to “confirm your password”, “verify your account” or “confirm your identity”. Such emails are linked to fraudulent websites that are designed to look like those of legitimate enterprises or links that, once clicked, will download a virus or spyware onto your computer without your knowledge.

Can a phishing scam contain official company logos?
The simple answer is YES! Phishing scams almost always try to mimic established legitimate companies, the scam relies on people being tricked into thinking they are actually being contacted by the company. It is relatively simple make a website look like that of a legitimate organisation by mimicking the HTML code or to copy company logos.

How can you protect yourself against identity theft?
There are a number of precautions you can take to avoid becoming a victim of a phishing scam, and here they are:
  • Avoid clicking links in email messages
  • Type website addresses directly into your browser, to ensure you know you are on a legitimate website
  • Avoid entering your personal or financial information in pop-up windows
  • Keep your computer software current with the latest security updates
  • Never give out sensitive information
  • If you are worried about an account, call the company or organisation directly to inquire about it
What should you do if you receive a phishing email?
If you receive an email that you believe to be a phishing email, the best practice is not to respond and to simply delete the email. Alternatively you could report it to the company the email is mimicking in order for them to warn their customers.

What should you do if you think you are a victim of a phishing scam?
There are a number of steps you should take if you believe you have fallen victim to a phishing scam, such as:
  •  Changing your passwords and secure answers for any potentially compromised accounts should be done immediately
  • You may want to contact your bank or financial adviser to alert them to the fact that your accounts may be compromised, this will allow you to put a fraud alert on your accounts
  • Regularly monitor your emails and financial statements so that you can identify any false charges or suspicious activity as soon as it appears
  • Run a full virus scan on your computers, to ensure you don’t have any viruses or spyware that could potentially steal your personal data
Do phishing attacks only happen through email?

While email is the most common form of phishing attack, this is not the only way phishing is carried out.  Another form of phishing attacks is malware, some malware can track how you use your computer and send valuable information to identity thieves. Phishing attacks can also occur through phone calls, texts and instant messages. It is vital that you remain cautious when asked to provide your credentials and other personal information.

Thursday, 29 October 2015

Veeam Availability Suite & Veeam Backup Essentials

What is Veeam Availability Suite?
Veeam Availability Suite provides availability for all applications, by combining the industry leading backup, restore and replication capabilities of Veeam Backup and Replication with the advanced monitoring, reporting and capacity planning functionality of Veeam ONE. Veeam Availability Suite delivers everything you need to reliably protect and manage your VMware vSphere and Microsoft Hyper-V environments.

Veeam Availability Suite Version 9:
Veeam have announced that version 9 of Veeam Availability Suite is to be released soon, offering a number of new features, such as:
·   Veeam Integration with EMC snapshots
·         Fast and secure cloud-based disaster recovery
·         Fast and low impact backups with EMC, NetApp, HP and more.
·         Enterprise-level enhancements for Veeam Explorers
·         Availability for the enterprise
·         Veeam integration with HP StoreOne Catalyst and other backup storage integration
·         Unlimited scale-out backup recovery


Veeam Backup Essentials

What is Veeam Backup Essentials?
Veeam Backup Essentials provides small businesses with a reliable, effortless and affordable enterprise-class backup solution, designed to help businesses remain always-on. Veeam Backup Essentials offers the same functionality as Veeam Availability Suite, but is priced for small businesses.

Veeam Backup Essentials Key Features include:
·       High-speed recovery
·         Data loss avoidance
·         Verified Protection
·         Leveraged Data
·         Complete Visibility


       For more information please contact Practical Networks a Veeam Partner on 01723 587240 or email info@practicalnetworks.co.uk




Thursday, 15 October 2015

Veeam ONE

What is Veeam ONE?
Veeam ONE is a virtual management and optimisation tool, offering monitoring, reporting and capacity planning for VMware vSphere, Microsoft Hyper-V and the Veeam backup infrastructure. It helps enable availability for the modern data center, by providing complete visibility of the IT infrastructure, in order to detect issues before they have an operational impact. Veeam ONE offers an automated, flexible and dynamic way to categorise and group your clusters, hosts, VMs and data stores by criteria such as business unit, department, purpose and SLA. With Veeam ONE business categorisation, you can view and manage your virtual infrastructure based on your organisation’s needs and priorities.

The features:
  • 24x7 real-time performance monitoring and alerting
  • Detailed dashboards with informative drill-downs
  • Monitoring of failover clusters, CSVs and SMB shares
  • Performance and infrastructure analysis
  • Integration with vCloud Director
  •  Documentation and management reporting
  • Predefined and customisable dashboards
  •  Infrastructure assessments
  •  Multi-tenant reporting and monitoring for VMware
  • Custom report builder
  • Automated and on-demand reporting for Veeam Backup & Replication
  • Complete visibility of your entire virtual environment
  • Change tracking
  • Advanced capacity planning

24x7 Real-time monitoring:
Veeam ONE boast real-time, agent free and unattended 24x7 monitoring of your backup and virtual infrastructures, providing you with notifications of backup and performance issues before they negatively impact applications and users.
Veeam ONE monitoring includes functionality such as:
  •  Fast troubleshooting with detailed information designed to help you isolate the root cause and resolve issues quickly.
  • An extensive knowledge base with 200+ preset alarms to ensure you are the first to know when issues are impacting availability.
  • Graphs and charts with additional drill-down data to provide more information, when you need it.

Multi-tenant reporting and monitoring:

Multi-tenant reporting and monitoring for VMware is new to version 8, allowing IT managers to delegate reporting and monitoring to system admins over a limited scope of assigned VMs. Managers will have the ability to pre-build backup reports for the entire team, pre-populating individual dashboards with filtered results.

For more information about Veeam ONE please contact Practical Networks on 01723 587240

Thursday, 1 October 2015

Veeam Backup & Replication

What is Veeam Backup & Replication?
Veeam backup and replication is a backup software, providing VM backup for VMware vSphere and Microsoft Hyper-V virtual environments. Veeam leverages virtualisation, storage and cloud technologies to deliver a recovery time of less than 15minutes for all applications and data.
Veeam backup and replication brings backup and replication together in one single solution to both increase the value of backup and reinvent data protection for virtual environments.

The Features:
The key features of Veeam backup and replication are:
• High-Speed Recovery
• Data Loss Avoidance
• Verified Protection
• Leveraged Data
• Complete Visibility

High-Speed Recovery:
• Instant VM recovery provides recovery of a failed VM in as little as 2 minutes.
• Instant file-level recovery allows you to recover guest OS files and folders.
• Low recovery time objectives for Microsoft Exchange, SharePoint, SQL Server and Active Directory with Veeam Explorer.

Data Loss Avoidance:
• Ultra-fast backup from storage snapshots with leverages storage snapshot capabilities for HP and NetApp.
• 50% faster backups and 10x faster synthetic full backup file creation and transformation with EMC Data Domain Boost integration.
• Veeam Cloud Connect helps you avoid the risk of catastrophic data loss.
• End-to-end encryption to secure your data.
• Improve your offsite recovery with WAN-accelerated replication, replication from backup and 1-click site failover with support for planned failover.
• 2-in-1 Backup and replication, providing near-continuous data protection for any virtualised application.
• Store entire VM backups or individual files on tape, and restore from tape whenever needed.

Verified Protection:
• SureBackup and SureReplica automatically verify the recoverability of every backup and every replica, every time.

Leveraged Data:
• Virtual lab helps you avoid deployment problems by testing and troubleshooting your applications in an isolated, production-like environment without creating any impact on your production infrastructure.

Complete Visibility:
• Veeam Enterprise Manager Web Client allows you to federate multiple backup servers from multiple locations in a single pane of glass without having to log in to the company network, providing centralised management.
•Monitor your backups infrastructure directly from the vSphere Web Client.

For more information about Veeam Backup and Replication or other Veeam products, please contact Practical Networks on 01723 587240 or email: info@practicalnetworks.co.uk

Thursday, 17 September 2015

VMware Horizon 6 and how it can benefit you..

What is Horizon 6?

VMware Horizon 6 leverages the best of Horizon View and extends these benefits beyond VDI, providing end users with on place to securely access all their desktops, applications and online services, from any device. Horizon 6 allows organisations to deliver virtualised or remote desktops and applications through a single virtual desktop infrastructure (VDI) platform and support end users with access to all their desktops and applications through a single unified workspace.

With Horizon 6, VMware have introduced six new key capabilities to help organisations deliver unlimited access to desktops and applications, at lower costs and with better performance. These enhancements help maximize operational efficiency and consolidate control.

The Key Features are:

Applications:
  • Supports end users with robust access to SaaS apps, Web apps, packaged VMware ThinApp apps, RDSG-Hosted apps and Citrix XenApps, through a single unified workspace.
  • Enhanced support for USB drives with RDSH-hosted apps and session-bases desktops for file storage, sharing and collaboration.
  • Support for scanning and imaging devices with virtual desktops and RDSH-hosted applications.
  • Client drive redirection to ensure simple drive mapping to a virtual desktop.
  • Google Chrome client support.
  • Client-free, HTML access to legacy Windows apps across more devices, including Google Chromebooks.
Virtual Networking:
  • VMware NSX with Horizon 6 brings push-button simplicity to VDI Networking. IT administrators can create and change policies for end users within seconds.
  • Policies dynamically follow the end user across devices and locations, without the need for time-consuming network provisioning or security rules. 
  • Organisations can easily scale up or down, and each end user's network security policy will remain intact.
  • Horizon 6 provides a highly extensible platform that integrates with industry leaders in antivirus, malware, intrusion prevention services and next-generation security policies, by extending security policies from the data center to the device.
Graphics:
  • Immersive 3D graphics delivered from the cloud.
  • VMware provides full support for the industry's leading ISV applications, including Siemens, ESRI and Autodesk.
Storage:
  • Horizon 6 leverages optimised VMware Virtual SAN 6.0, ensuring that customers can easily scale out and support up to 4,000 Horizon 6 virtual desktops per cluster.
  • Support for all-flash Virtual SAN ensures end users can enjoy great experience with the best possible TCO.
  • Horizon 6 now supports Virtual Volumes VM-aware storage systems to simplify storage management and policy settings for VDI.
Scalable and Available:
  • Horizon 6 allows organisations to design virtual desktops around a wide range of validated technology partners or leverage hyper-converged infrastructure with VMware EVO:RAIL, to linearly scale out desktops and apps on demand.
  • Applications can be delivered in real time with VMware App Volumes, now integrated with Horizon 6.
  • Organisations can ensure that end users enjoy high availability with continuous access to services, by leveraging the Cloud Pod Architecture available with Horizon 6.

Fed-Ready:
  • Horizon 6 is designed and certified to meet the most demanding compliance regulations, including those of the U.S. Federal Government.
  • Horizon 6 now provides Common Access Card support for simple and secure access to apps and desktops for agencies that require it.
  • Horizon 6 also provides end-to-end support for IPv6 networks for simplified packet processing and address assignments.
Horizon 6 offers improved security, simplified operations and accelerated time-to-value, and is available in three editions, Standard, Advanced and Enterprise. For more information about VMware Horizon 6 or other VMware products please contact Practical Networks, a VMware Partner on 01723 587240.