Thrive is currently ranked among the top 100 IT Managed Service Providers globally. Our Mission is to become the most respected and referred technology solutions firm serving mid-market, enterprise, and emerging customers in the Northeast United States.
1-866-205-2810

info@thrivenetworks.com

836 North Street Building 300, Suite 3201 Tewksbury, MA 01876

Top
 

Blog

Read the latest tech briefs, insights, expertise, and news from the Thrive team.

Inside Microsoft’s Sleeping Giant Part 2 of 4

In part 1 of this series, I detailed some of the background and terminology around Azure Active Directory which among items functions powers Office365.  I recently heard some feedback that some of the large SSO providers are having trouble competing with Azure AD’s Premium suite simply due to the large install base of Office365.  At last count, we understand that the number of active users is well over 100 million.  The understanding is that while Azure AD may not be able to go toe-to-toe with the larger SSO vendors on features, the pre-existing installs and existing Microsoft relationships is what is winning deals.

Thrive Named to CRN’s 2017 Solution Provider 500 List

CRN®, a brand of The Channel Company, has named Thrive to its 2017 Solution Provider 500 list. The Solution Provider 500 is CRN’s annual ranking of the largest technology integrators, solution providers and IT consultants in North America by revenue.

The Solution Provider 500 is CRN’s predominant channel partner award list, serving as the industry standard for recognition of the most successful solution provider companies in the channel since 1995. This year, for the first time since 2010, the complete list will be published on CRN.com, making it readily available to vendors seeking out top solution providers to partner with.

DDoS Attacks and Mitigation

A distributed denial-of-service (DDoS) attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. According to Verizon’s 2017 Data Breach Investigations Report (DBIR) 98% of all DDoS attacks are targeted at large organizations and while of the least lucky organizations that deal with a constant barrage all year, most of these attacks stop after a few days.

How low are you willing to CybeRTO and CybeRPO? Part 1 of 3

When it comes to security and a business continiuty plan there are two things companies care about the most, CybeRTO (Sigh Ber To) and CybeRPO(Sigh Ber Po). For people who are not in the IT world this might sound a bit like a foreigen language. RPO and RTO are very common in the IT world and are a pretty simple thing to understand once it has been broken down for you.

5 Things to Look for When Choosing a New IT Service Provider

There is no question that technology today is always changing at a rapid pace. When you are running a business it can get pretty stressful when you are trying to grow the business and stay on top of the necessary technology at the same time. Thankfully, there are plenty of options that can help take some stress off your shoulders. One of the most popular helpful options is outsourcing to an IT service provider. Looking for the right provider can be a pretty daunting task, how are you supposed to trust someone to keep your business’s technology running? Here are the top 5 things you should look for in a service provider that will help ease your mind.

Should we Ban Crypto?

With the recent terror attacks in the UK and the very real chance of more terror attacks to come, everyone is looking for a way to make this stop.  One of the ways to do this is the ban cryptography.  Another, is to allow cryptography, but give the government a special key to unlock it.  Both of these methods would allow all communication to be seen by the government, stopping the terrorists from communicating secretly. Many people see this as the software solution to the terrorist problem.

So, You Think You Want SQL AlwaysOn Availability Groups?

When it comes to SQL Server high availability (HA) there are myriad options to choose from. Some have been around since the turn of the century, but there is a newer option, introduced in SQL 2012, that has been so hyped as to eclipse all the others: AlwaysOn Availability Groups (AGs). I recall the launch event and subsequent keynotes and sessions that touted it as even better than the greatest thing since sliced bread. But, as much as it does solve some erstwhile unsolved use case requirements, following the bread analogy, you will only get the sliced and toasty goodness if you have a master baker, Ginsu-certified slicers, and at least one beefeater on hand to test the bread at regular intervals. This may be absurd hyperbole, and is certainly an absurd analogy, but it’s worth considering the difficulty and expense of configuring SQL AGs.

Primer on Containers

Containers are one of the biggest trends in both cloud and enterprise environments. So, what is a container exactly? At a very basic level it is a self-contained object that has all the files and configurations to run an application or workload. Many containers can run side by side on the same virtualization host running different apps but are completely separated from each other. Think of them as a mini operating system with only the absolute minimum required to do its job.

A Look Back on the Google Phishing Attack

A massive and unusually sophisticated phishing campaign took place a few weeks ago targeting users of Google’s Gmail service. I wanted to look back and provide some thoughts on the attack and provide some tips so you can be prepared for the next attack.

The attack began around 4 pm on May 3rd as Gmail users received an email with an invite to a Google Doc that appeared to be from a person they would know. Attempting to access the Doc would direct the user to authorize a fake Google app that was hosted on an actual Google page. Once the app was authorized, the attacker would then draw from the user’s contacts to send the offending email to even more people.

3-2-1- Backup!

You may have heard about a 3-2-1 Backup rule before. It is considered a best practice method at a minimum for protecting your business’s data. It boils down to having three copies of your data; the original and two or more backups. The two backups should be on two different types of storage and one copy must be offsite.  An example of this setup could be a snapshot on a SAN, a backup to a NAS and then sync that backup to a third party or a second office.