What's New

Fpweb.net expands global infrastructure with Frankfurt data center

September 19, 2016

Fpweb.net, a managed cloud computing and security services company based in Fenton, Missouri, has expanded its global infrastructure to include a data center in Frankfurt, Germany.

Fpweb.net adds this European location to its global infrastructure that already includes data centers in London, St. Louis, and Kansas City. All Fpweb.net data centers boast enterprise-grade security that includes physical measures like guarded entry with access cards and biometric registration, as well as cyber protection that is built into the entire network’s security framework.

Fpweb.net’s global infrastructure is highly available, fault tolerant, and scalable. It meets the Tier III Uptime Institute Data Center Standard and SSAE 16 SOC I Type II certification. Each data center includes redundancy in all critical systems, on-site Network Operations Centers (NOCs), backup power generators, advanced fire detection and suppression, temperature-controlled environment, raised anti-static floors, and 100% financially-backed uptime.

The Frankfurt data center lowers latency for European clients with lightning-fast, fiber-optic networking and helps meet regional compliance and data residency requirements.

Please contact Fpweb.net at sales@fpweb.net or 866-780-4678 for more information about its global infrastructure and to discuss simplifying your infrastructure in a dedicated cloud or a hybrid cloud model.


Migrating to SharePoint

September 12, 2016

Migration to SharePoint

Businesses are migrating from Lotus Notes, LiveLink, OpenText, Documentum, and Jive to SharePoint in order to modernize their collaboration platform and save money.

Nine out of 10 of the top performing Intranets are built on SharePoint.  SharePoint 2016 is the preferred collaboration tool for search, CMS, mobile, news, and secure file sharing.

Companies of all sizes are moving to SharePoint for significant cost savings.  SharePoint often costs less than the ongoing maintenance of other software like Lotus Notes, LiveLink, OpenText, Documentum or Jive.

SharePoint Migration Tools
Get the right tools for the job and do your SharePoint migration on-time and on-budget.  Fpweb.net SharePoint migration services uses a blend of the industry’s best SharePoint migration tools from Metalogix, Sharegate, and Avepoint.  With thousands of migrations under our belt since 2003, we’ve found that each tool does something a little better than the others.  Combining them all saves time and headache.  If you bought them separately your cost would exceed $25,000 for just the tools!

SharePoint Migration Plan
You need a man with a SharePoint migration plan.  SharePoint migrations and conversions are often complex and time-consuming.  Without a SharePoint migration plan backed by years of experience and thousands of successful migrations, you are wasting valuable time, money and effort.  Get it done right the first time with Fpweb.net SharePoint migration services.

SharePoint Data Migration
Here is a list of software applications commonly being migrated to SharePoint for better collaboration functionality and cost savings:

  • Lotus Notes to SharePoint migration
  • LiveLink to SharePoint migration
  • OpenText to SharePoint migration
  • Documentum to SharePoint migration
  • Jive to SharePoint migration
  • FileNet to SharePoint migration
  • Confluence to SharePoint migration

And the rest: Eroom, Hummingbird, Exchange public folder, Mediawiki, Quickr, Google, Box, Huddle, Egnyte, Accellion (Sharefile), WatchDox, Syncplicity, Hightail, DropBox, Slack

SharePoint Migration Checklist
We make a custom SharePoint migration checklist for you and make sure each task is completed to our best practice standards and on time.  The list is documented in your Fpweb.net SharePoint migration services State of Work (SOW) so there is no guessing on what will be done, by who, and by when.

SharePoint Migration Services
SharePoint migrations are not easy and probably not your core business.  They are time consuming and demand the right tools, people, processes, and experience.  Get just one of those wrong and your SharePoint migration project will fail.  Go with the pros at Fpweb.net, rest easy, and be the hero!  You’re in good company with thousands of SharePoint migrations and 1.8 billion SharePoint logins managed each and every day since 1999.

Fill out this form, email us at sales@fpweb.net, or call us at 866-780-4678 to get started!


Don’t forget the front desk part of cyber security

September 6, 2016

There is an article in the Summer 2016 issue of Security Smart about a security consultant who was hired to infiltrate a company’s buildings and networks to assess the effectiveness of its security procedures.

He walked in off the street and told the lady at the front desk that there was a ticket put in and asked if they received an email notification that he would be there to do some migration on the network. The undercover security consultant then asked her to log out and allow him to sit down at the desk. He plugged in a key logger, which covertly tracks the keys struck on a keyboard.

Then, he asked her to log back in so that he could pull up a command prompt to test the connectivity. She did and the key logger recorded the password. He told her that because he would have to ask her to do that a few times, he would like her to write down her password, and slid over a Post-it stack to her with a pen, as if that was normal. She wrote down her password and slid it back to him while he clicked around, gained access to network shares and several systems on the network.

The undercover security consultant asked her if she ever works from home and she said that she couldn’t ever get the VPN to connect. He told her that if she could tell him how she is supposed to remotely connect to the network that he could try to reset some things for her while he was there. She did and before long he had another gig of data, domain credentials, an encryption key, and a tutorial about how to connect to the VPN.

The article says “Don’t be gullible. Always double-check an outsider’s story, especially when that person is claiming to need access to company equipment or sensitive information. It’s perfectly OK to take a minute to call and verify someone’s story and/or credentials, whether the person appears legitimate and sympathetic, or impatient and inconvenienced. And never, ever write down your passwords.”


Provide a secure and consistent digital workspace with Secure VDI

August 29, 2016

The previous post here, Meet compliance standards for regulated industries with Secure VDI, explained how Secure Virtual Desktop Infrastructure (VDI) meets the managed access compliances for regulated or  sensitive data industries, such as healthcare and financial organizations.

Building off of that, Secure VDI allows for a dedicated desktop profile on a Terminal Server, meaning the users have the ability to set background images and set shortcuts on the desktop for frequently used applications or files/folders.

The same applies to which applications can be run or installed on these environments. The general practice is to have an agreed upon desktop design or build that includes all of the applications required for the individual user. By design this does not allow the user the  administrative capability to add or remove non approved applications.

In addition to application and desktop customization, firewall controls are also configurable. This often speaks to productivity concerns and overall security.

Given the secure environment in which these virtual instances are created, the ability to easily control what these devices can access on public internet becomes a management feature as well. An example would be to simply limit internet access to specific work related sites, and not allow non work related sites, such as social media and other more recreational driven content. This process combined with multi-factor authentication continues to focus on security.

What sets Fpweb.net apart from the rest when looking to add VDI?

We have engineered this service and application out of necessity. As client access environments continue to expand locally and across the globe, the challenge becomes increasingly more complex to work.  What makes Fpweb.net the leader in this service, is that we have not only developed this solution for client based consumption, but this is something that is used by Fpweb.net and has had an amazing impact on security and productivity.

We are 100% dedicated to improving upon security and ease of access to easily extend and manage workforces, whether they reside under the same roof, or they are halfway around the world.  Our security practices and infrastructure, coupled with our Absolute Support®, is what truly makes an already amazing product even better.

Visit fpweb.net/cyber-security/vdi for more information and to try out a free demo. Fill out this form, or contact the Fpweb.net cyber security specialists at sales@fpweb.net or 866-780-4678 to get Secure VDI set up for your organization.


Meet compliance standards for regulated industries with Secure VDI

August 22, 2016

A previous post, Secure VDI – What it does and why you need it, explains that virtual desktop infrastructure (VDI) is the practice of hosting a desktop operating system within a virtual machine running on a centralized server and that it allows for secure remote computing with the accessibility and ease of use, as if your personal laptop was tucked away safely in a data center.

Picking up where that post left off, another advantage of Secure VDI is that it meets the managed access compliances for regulated or sensitive data industries, such as healthcare and financial organizations.

Secure VDI provides the ability to audit and measure user permissions and functions by utilizing the Active Directory services. User’s logon/logoff times and session duration are still captured by their Active Directory user object, allowing for full audit capability for all user access, dates, and times. These Secure VDI users and groups can be joined to the existing AD environment, or created as new. Both are supported.

This is the key element that is enforced by leveraging unique credentials for each remote user and placing those user objects into specific security groups. This is the same process for providing access to the Secure VDI environment, and the file or folder structure permissions.  Active Directory Group Policies enforce unique logins and access not only by the username and password, but also by multi-factor authentication.

The combination of secure Active directory user groups and multi-factor authentication mitigates the chance of non-authorized access, and/or username and password sharing.  This also speaks to  fraud protection, so the users are able to alert their administrators if there are unauthorized attempts, or if enough logon failures occur the administrator and user are alerted.

Each of the Secure VDI machines are 100% virtual, including the user file and directory structure. Information that is stored during active sessions is 100% deleted upon logging out.  This is enforced by local security policies applied at the server and Active Directory level. This process ensures that any and all data, either gathered as cookies, browser data, or temp files while creating and/or editing documents, are 100% deleted when the user ends their session.  By creating these security rules, you are ensuring that no user will be able to log on to a session and be able to view or edit another user’s content.

We get into how Secure VDI allows for a dedicated desktop profile on a Terminal Server in this recent post, Provide a secure and consistent digital workspace with Secure VDI.

Visit fpweb.net/cyber-security/vdi for more information and to try out a free demo. Fill out this form, or contact the Fpweb.net cyber security specialists at sales@fpweb.net or 866-780-4678 to get Secure VDI set up for your organization.