Sunday, July 31, 2016

JKS Professional Services- MSP
“The Top 10 Benefits of Outsourcing IT through Managed Services”


Immediate benefits can be gained by outsourcing IT services through Managed Services.

1. Control IT Costs
Outsourcing converts fixed IT costs into variable costs and allows you budget effectively. In other words, only pay for what you use when you need it.
2. Reduce Labor Costs
Hiring and training an IT staff can be very expensive, and temporary employees don't always live up to your expectations. Outsourcing lets you focus your human resources where you need them most.
3. Trained, Experienced, Qualified, Certified.
If you’re not IT trained, how do you assure an employee is qualified? Certifications like Microsoft Certified Systems Engineer (MCSE) are important, but so is experience.
4. Qualified doesn’t Equal Experienced
Few problems are new for leading IT service companies, which see related problems multiple times. An in-house IT employee leads an isolated existence no matter how much they train. We'd all rather an experienced doctor; the same is true for IT.
5. Increase Efficiency and Competitiveness
Organizations that try to do all IT Services in-house themselves can have much higher research, development, and implementation time, all of which increase costs and are ultimately passed on to customers.
6. Quickly Implement New Technology
A quality outsourced IT service organization will have the resources to start new projects right away. Handling the same project in-house might involve weeks or months to hire the right people, train them, and provide the support they need. For most implementations, quality IT companies will bring years of experience in the beginning saving time and money.
7. Stay Focused on Your Core Business
Businesses have limited resources, and every manager has limited time and attention. Outsourcing can help your business stay focused on your core business and not get distracted by complex IT decisions.
8. Reduce risk
Every business investment carries a certain amount of risk. Markets, competition, government regulations, financial conditions, and technologies all change very quickly. Outsourcing providers assume and manage much of this risk for you, with specific industry knowledge, especially security and compliance issues. They generally are much better at deciding how to avoid risk in their areas of expertise.
9. Level the Playing Field
Most small businesses can't afford to match the in-house support services that larger companies maintain. Outsourcing can help small companies act "big" by giving them access to the similar technology, and expertise that large companies enjoy. An independent third party managed cost structure and economy of scale can give your company a competitive advantage.
10. Compliance and Security
Is your firewall up to date? Do you have a DMZ installed? Do you audit your Workstations and Servers? Has your company implemented PCI security standards and work to maintain those standards?

Businesses have more ways than ever to prosper by taking many forms of payments such as Credit and Debit Cards, Gift Certificates, E-Checks, Wire Transfers to name a few, but with these forms of transacting also comes the need for due diligence. By outsourcing a qualified MSP who is familiar with PCI Compliance standards, you can rest assured that your company is minimizing the risks associated with maintaining client data, credit card numbers, sensitive competitive information and more.

To learn more, contact JKS at:
msp@jks-systems.com / 860-436-4664
jks-systems.com



Saturday, July 30, 2016

JKS Systems Cyber Security Solutions- Cisco Advanced Malware Protection


Cisco Advanced Malware Protection is the industry's leading malware protection solution.

With a database of over 500 million known files and over 1.5 million new incoming file samples every day, AMP provides not only global threat protection but also extensive visibility during and after a malware attack.

·         Enhanced Threat Defense - Automatic protection against millions of malicious files. Retrospective detection if a file is discovered to be malicious after it enters the network
·         Contextual Visibility - Pivot easily on a particular threat, client, or external threat source. New Security Center provides a quick way to see threat data across multiple sites
·         Rapid Detection - Automatic alerting for retrospective malware detection. Protection against new and emerging threats through the work of Cisco's TALOS team
·         Ease of Management - Enable best-in-class malware protection with just two clicks. Configuration and reporting integrated natively into Cisco Meraki's cloud dashboard


WHY AMP ON MERAKI MX?
The threat landscape is constantly evolving, and it's more important than ever to have a security solution that does more than just block malware. Security experts increasingly agree that deep visibility is crucial to maintaining effective network security.
With AMP, a world class malware database is paired with context-aware monitoring and reporting, retrospective malware analysis, and Threat Grid sandboxing to provide an anti-malware solution that does more than just prevent users from downloading malware – it provides comprehensive security before, during, and after a malware attack.
Best of all, integration into the Cisco Meraki cloud dashboard means it's incredibly easy for Meraki MX customers to configure and monitor AMP, or to move seamlessly back and forth between threat intelligence and network management.

NEW AMP FEATURES
·         Real-time malware blocking
Automatically check downloaded files against the global AMP database in real time and block malicious files before they can pass through the network perimeter. With the new Security Center you get a straightforward summary of threats seen across all of your networks, or drill down into the details of a particular attack or threat.
·         Retrospective malware detection
By maintaining information about files even after they are downloaded, we can report on files that were determined to be malicious after they were downloaded. We even send automatic email alerts informing you that a file downloaded previously on your network has been newly discovered to be malicious so that you can investigate and take action.
·         Threat Grid (coming soon)
Get unmatched protection against emerging threats by sending unknown files to Threat Grid to be executed in a virtual environment. Threat Grid matches actions taken by those files against over 625 behavioral indicators. Even better, Threat Grid's findings are reported to the AMP cloud so that all AMP customers will be protected against newly discovered malware.


For more information, please contact JKS at:
security@jks-systems.com / 860-436-4664
www-jks-systems.com



Friday, July 29, 2016

JKS Systems Infrastructure Solutions- Fiber Optic and Structured Cabling


Hitachi Open System Architecture Solution

Whether you are installing the highest-performing Category copper cabling or fiber optic infrastructure, there are a number of well-known brands available to choose from. What makes one brand a wiser choice than another? Which one offers maximum performance, while also providing the best value?
Open System Architecture (OSA) from Hitachi Cable America (Hitachi) provides world class performance using virtually any combination of Hitachi verified cables with verified connective hardware in the design of the network. The ANSI/TIA-568-C.1 standard specifies the performance requirements of all network components and defines interoperability base-line limits to ensure that combinations of cable with connectivity will meet or exceed the system’s intended application. By employing a Hitachi OSA solution, end users have the freedom to choose from a wide range of quality connectivity products that best meet their specific needs and be confident that the chosen solution will support all applications designed to operate over that solution and be backed by an industry-leading lifetime warranty.


Hitachi Open System Architecture
·         Provides for standards-based verifiable cable performance
·         Enables a range of connectivity options
·         Opens up competitive solution offerings
·         Delivers substantial benefits to the end user

It’s all in the Cable
In virtually all cable based communication links, it is the cable that determines the ultimate performance of that link. It is the cable, not the connectors, that establishes how well the applications that run over it will be supported. This is the reason why many cable manufacturers make different performance levels of Category 6 cable while jack and plug manufacturers make only one jack or plug to mate to them. The desirable headroom that results from the link is provided by the cable. With a growing list of applications for Category 6, many of them critical to a facility’s operation, selecting a quality cable from an established manufacturer is recommended. Additionally, with an increase in counterfeit and unestablished brands flooding the market, protect your investment by sourcing only through trusted distribution channels.

For more information, contact JKS at:

www-jks-systems.com

Thursday, July 28, 2016

JKS Systems – Infrastructure- Data and optical Testing


Fluke Networks- Cable Certification
"Six Reasons It Is More Important Than Ever"

Economic turmoil is shining a bright light on the value of services used by IT departments. Among them are the services used to deploy and maintain enterprise network infrastructure. Infrastructure includes copper and fiber cabling, and it is the foundation of the network. This paper identifies the specific benefits afforded by cable certification and how much it pays back to the network owner.
A souring economy is causing retooling of IT budgets. Cash conservation is an “A” priority for everyone, including managers who must make tough decisions to reduce operating expense and capital outlays. Yet in this process, IT managers should not forget that a healthy network infrastructure is inextricably linked to productivity, service efficiency and expanded services.
A tempting option to reduce IT out-of-pocket expense may be to defer maintenance. While no company defers truly critical maintenance, there are tasks that might be postponed because they exist in a gray area that may be seen as “optional.” Navigating these decisions is not easy but it would be a grave mistake to suspend testing of the foundation of every network: its copper and fiber cabling.

1. Certifying is Less Expensive than Repair
Certifying copper and fiber cabling prevents problems. Certification is insurance against future problems. Without it repairs must be made on a live network or worse, on a network suffering an outage.
Network downtime extracts a painful price in lost revenue, lost productivity, diminished customer service and competitive disadvantage. The Contingency Planning Group performed a study that estimated the cost of an hour of enterprise network downtime between $14,500 and $6,500,000, depending on the industry. The Gartner Group estimated that an hour of downtime costs a less bone-chilling $42,000 per hour, on average.
If an enterprise is challenged to improve its annual uptime from 99.9% to 99.99%, it needs to reduce downtime by eight hours. Using the Gartner Group’s conservative estimate of downtime cost, this saves an enterprise $336,000 annually. How do you get there?
There are many causes of downtime. A Gartner/Dataquest study pointed the finger at human error and application failure 80% of the time. But if the network represents just 20% of the cause, it accounts for $67,000 of the exposure.
Contrast this to the cost of certification. A network with 600 Cat 6 copper lines undergoes certification testing. A realistic assumption is that 5% of the links fail the initial test and must be repaired and retested. Using a modern cable certifier the entire process will take approximately 11 man-hours. At a commercial rate of $65 per hour, the expense is less than $750.
$750 for insurance to achieve $67,000 in savings: even more if the network supports a high-value business operation such as credit card, retail or brokerage transactions. The case is certification is self-evident.
2. Product Warranties Are Limited
A network owner may be tempted to roll the dice in tough times and use a manufacturer’s warranty as a security blanket. This is understandable because most cable and connector manufacturers offer good warranties and they stand behind their products. These manufacturers cannot, though, warranty final installation.
The quality of a cable installation lies largely in the hands of the installers. If installation craftsmanship is poor, even excellent products fail. The failures and the attendant hardships are outside the scope of a hardware warranty, so the network owner and the installer must negotiate remediation.
The only way to assure that installer workmanship meets standards is by certification testing. The only way to assure that best practices are followed is by certification testing. Certification gives the network owner protection against unanticipated costs. When the economics winds blow ill, protection is welcome.
3. Certification and Recertification Will Futureproof the Infrastructure
You might believe that a cable build-out “does what it does” when installed, and never does more. This could be short-sighted. A recertified cabling plant may proved to support higher-speed traffic that is deployed years after the cable is first installed. How important is support for higher speeds? According to a survey of datacenters by the research firm BSRIA, multigigabit technology is now commonplace:
What are the implications of this? Category 6 copper cable was designed to support 1-Gigabit per second data rate. Recent field certification tests indicate that a good deal of the Cat 6 cable used in datacenters complies with the 10GBASE-T standard and can support 10-Gigabit service over short to moderate distances. If you recertify the Cat 6 cable in your datacenter you may find an efficient path to a 10X throughput, avoiding some or all of the cost of replacing cable. Moreover, when demand for IT services rebounds the recertified cable plant is poised to support new equipment and expanded services.
4. Uncertified Cabling = Stranded Capital
It is a fact: recessions churn building tenancy. When a new occupant enters a building the state of its cabling presents a series of questions. How old is it? Does it work? What was it used for? When? A new tenant may view the mass of copper and/or fiber as a mystery, not an asset.
Certifying 200 lines of cabling will cost less than $500 at most commercial rates. Installing 200 new lines of new Cat 6 cable will cost $5,000-$10,000. The choice for the landlord is easy.
Certification is life extension for a cable plant. It is capital saved for building owners and tenants. Lack of certification turns legacy cabling into stranded capital: money spent that cannot be recovered.
5. Reducing Waste is Good Policy
The economic case for extending the life of cables is made in Section 4, but it may not be the worst case. The widely adopted National Electrical Code (NEC 2002) requires the removal of abandoned cable that is not identified for future use. Without certification the cost legacy cable may well include the cost of cable removal, the cost of cable recycling and/or the environmental impact of disposal.
It is sound business policy to maximize use of existing copper and fiber cable. When properly maintained it has a long lifespan. With limited budgets demanding greater efficiency it makes sense to use certification to implement the three canons of environmental management: Reduce, Reuse and Recycle.
6. Buyer Beware
An unsettling trend in the cable industry relates to “no-name” Cat 5, 6, and 6A product. This cable is often made outside the United States and is less expensive than comparable product from major manufactures. Unfortunately, much of this inexpensive cable is made from inferior materials using questionable manufacturing processes.
In 2008 the Communications Cable & Connectivity Association tested nine brands of no-name cables, all of which were rated for use in risers or plenum spaces. Not one met the physical requirements defined in TIA 568-B.2. Only five meet the electrical test requirements defined in TIA 568-B.2 and one met the safety requirements defined by UL 1666 and NFPA 262. How is such poor cable reaching the market? It can because safety agencies perform random tests at the point of manufacture, not in the field. The chasm in the quality process leaves end users exposed to safety and performance risks that are entirely avoidable.
To ensure that there are no costs or risks hidden in inexpensive Cat 5, 6, and 6A cable, enterprises and cable installers should certify cable in accordance with industry standards.

Conclusion
Cabling that is certified has far more value than cabling that is uncertified. The amount of the additional value depends on application and the enterprise. Consider the pitfalls of uncertified cabling. Consider the trade-off between testing and “hoping for the best”. Hope is rarely a good strategy, and in a challenging economy, it is a dangerous one.

To learn more, please contact JKS at:

www-jks-systems.com

Wednesday, July 27, 2016

JKS Infrastructure Solutions- Public Address


Bogen Pro Powered Loud Speakers

Models BP12DSP and BP15DSP Bogen Pro Loudspeakers are portable, 2-way self-powered loudspeakers capable of high sound pressure levels. Their built-in amplifiers and the quality of their transducers offer better performance than any loudspeaker in their range. A specially designed multi-angle cabinet enclosure allows these speakers to be positioned for use in a variety of settings. The low-frequency selector allows the speakers to be quickly configured for any environment, while the direct microphone input allows easy set up for voice reinforcement applications.


Features:
·         Neodymium LF drivers: 12” on BP12DSP, 15” on BP15DSP
·         1-3/4” Voice coil compression driver
·         350-watt Bi-amp configuration: Low 300W RMS (Class D amplifier), High 50W RMS (Class AB amplifier)
·         DSP processing
·         Combo XLR / 1/4” TRS MIC/LINE Input
·         Input sensitivity switch for LINE or MIC
·         Link out on XLRM connector
·         LF EQ Presets (cut/hi-pass filter, flat/no effect, boost/LF shelf)
·         Signal/Clip and Power indicator LEDʼs
·         Main volume control
·         Lightweight
·         High-efficiency
·         Horn coverage: 90 x 45 degrees
·         Wide frequency response
·         Precision tuned by Apogee Sound International Engineering in the U.S.A.
·         Multi-angle, multi-purpose polyethylene cabinet
·         Pole cup for tripod mounting
·         6 Rigging points
·         Listed to UL Standard 60065 for U.S. and Canada
·         FCC Part 15 Class B Compliant
·
For more information, contact JKS at:

jks-systems.com

Tuesday, July 26, 2016

JKS Security Solutions- CCTV-Axis Mid-size systems


Active Security
Protect your mid-size business with a complete, end-to-end security and surveillance solution. At Axis, we offer cameras, software and other products that create a security solution designed for the active operator.
Our solutions are easy to use and install, and they’re designed to work perfectly for schools, retail, manufacturing sites and other mid-size installations. You can either opt for one of our out-of-the-box systems with optimized hardware and software, or build your system using our software together with standard PC and servers.

Out of the box surveillance
An AXIS Camera Station S10 recorder is an out-of-the-box ready video management solution with pre-installed AXIS Camera Station software. AXIS Camera Station is intuitive and easy to use, meaning anyone can operate it to find and export high definition evidence. Combined with Axis network cameras it gives you everything you need to confidently monitor your premises. So it's ready to use straight out of the box.

AXIS Site Designer for easy and reliable system design
AXIS Site Designer makes it easy to design and install your system, the tool provides useful installation documentation as well as possibility to export all configurations to AXIS Camera Station to eliminate installation mistakes. To further safeguard system up-time AXIS Camera Station offers the possibility to verify system performance at installation.

Will it work for you?
Yes. All of our solutions are designed with open IP standards that mean they can easily connect with your existing IT equipment. They’re flexible and scalable, and will work out of the box with your network, routers, screens, computers, tablets and smartphones.

For more information, contact JKS at:
security@jks-systems.com / 860-436-4664
www.jks-systems.com


Monday, July 25, 2016

JKS Cyber Security Solutions - Array Networks Juniper SSL VPN Replacement Program



For customers feeling left in the cold by Juniper's decision to divest its Pulse business unit to private equity firm Siris Capital Group, Array's Juniper Replacement Program provides a means of migrating from a product with an uncertain future to a next-generation solution from a company dedicated to the SSL VPN and secure access market.

·         Free Hardware-
Scalable hardware capable of replacing any size Juniper SA or MAG platform
                       
·         Free Software-
Industry-leading feature functionality that meets or exceeds Junos Pulse

·         Free User Licenses-
100 concurrent user licenses included      
              
·         Discounted Support-
Simply purchase a 3-year Array gold support contract at a 30% discount


Between now and September 30, 2016, trade in your Juniper SSL VPN and receive free hardware, software and concurrent user licenses from Array Networks. Your only out-of-pocket is the purchase of a 3-year gold support contract at a 30% discount. Applicable to all Juniper SA, MAG and Pulse product lines.

For More information, contact JKS at:
security@jks-systems.com  / 860-436-4664


Sunday, July 24, 2016

JKS Office Security

Millions of dollars are lost every year to theft, damage, and fraudulent personal injury claims from both customers and employees. Investing in a security system provides a phenomenal ROI for your company and provides peace of mind for you, allowing you to focus on your principal business.
Commercial security systems are used to provide protection against burglary, intruders, and property damage, etc. Your business is vulnerable to break-ins and possible property damage any time it is left unattended, such as evenings and weekends. A security alarm can prevent possible break-ins and notify the proper authorities quickly if a break-in does occur.


The installation of a security system should be seen as an investment in your company, as opposed to an expense. There are numerous benefits to a security system, including:

  • Reduction in fraudulent claims: Companies lose money to fraudulent claims (staged slip-and-fall accidents, workplace injuries caused by employee negligence, etc.) from employees and business patrons alike. Lawsuits for these claims can cost a business exorbitant amounts of money for a single event. Security cameras reduce this by providing video evidence of the occurrences. Also, when people are aware they are being recorded, they are far less likely to commit the crime of fraud.
  • Reduction in thefts: Internal or external thefts happen in all industries, especially those with retail outlets. Shoplifting and employee theft are costly. Theft is greatly reduced in areas where people know there are cameras to watch them. Alarms can prevent burglaries, protect your business from vandalism, and notify the proper authorities if a crime is occurring.
  • Reduction in insurance premiums: Insurance premiums are calculated based upon the risk level associated with the business type. Because businesses with a security system installed present a lower risk of theft and vandalism, insurance companies often charge a smaller amount for premiums.
  • Ensure only authorized personnel have admittance: Security systems with card access ensure that only authorized personnel are admitted to the property or specific area of a building. This allows companies to account for the whereabouts of employees and prevent the entry of outsiders.
  •  24/7 surveillance and security: Security systems protect your business 24 hours a day, all year long without the need to pay security personnel. Cameras are unwavering and unflinching and give you peace of mind that your business is protected at all times.
  •  Early detection warning systems can notify people of impending danger such as a structure fire. In the event of a natural disaster, clear directions can be given to the inhabitants of the building via a loud speaker.  


·         In the event a crime does occur, CCTV cameras can provide evidence to the proper authorities for a quick resolution to the case. They provide the best eye-witness evidence to a crime and ensure the perpetrators are quickly apprehended and property is returned.
Too often, security is a last-minute thought or is overlooked until something occurs. Security systems should be implemented to prevent danger to employees, damage to property, and loss of assets. JKS can help you analyze your risk level and design a system to fit the needs of your company.

For more information, contact:
860-436-4664

jks-systems.com

Saturday, July 23, 2016

JKS Security Solutions- KABA PowerPlex 2000 Access Control



PowerPlex Locks are self-powered electronic locks that do not require batteries or other power sources. The lock generates its own power with every turn of the lever, making it the most efficient and versatile electronic lockset available with virtually no maintenance costs. And, PowerPlex Locks require no wiring to or through the door, eliminating the risk of damage from pinched wires that can result in costly callbacks.



Features

  • PIN Access
  • Electronic Self-Powered Pushbutton Lock
  • Charge Lasts up to 10 Weeks
  • 100 Access Codes
  • 1,000 Audit Events
  • Patented PowerStar™ Technology
  • Cylindrical, Mortise, and Exit Trim
  • ANSI/BHMA Grade 1 Certified
PowerStar™ Technology
Kaba’s patented PowerStar™ technology supplies power for all electronic lock functions including programming users at the keypad without ever having to change batteries. Once the first digit of a valid code is entered to “wake up” the lock, the remainder of the code can be entered and access is granted. A full charge of the built-in super capacitors will last up to 10 weeks with no activity at the lock.
 
To learn more, please contact JKS at:
Jks-systems.com

Friday, July 22, 2016

JKS Infrastructure Solutions- Emerson UPS Battery Backup

The cost of denial of service (DoS) attacks against data centers.

DoS attacks occur when a criminal prevents legitimate users from accessing information or services. By targeting a company’s computers and its network connection an attacker can cause costly disruptions to operations and damage to its reputation and trustworthiness. We believe a better understanding of the cost of cyber crime and the consequences of DoS attacks helps organizations to determine the appropriate amount of investment and resources needed to address these threats.
  
Have high data center redundancy

We know with a UPS, redundancy matters. N+1 is good, 2N is better and 2N+1 is best practice. Whether it’s UPS redundancy in the event of an attack targeting the infrastructure or a full data center redundancy in the event of an attack targeting a specific facility, redundancy is critical factor in preventing DoS outages.

Emerson Network Power shares best practices and solutions to equip customers against DoS attacks:

Plan ahead, and have a strong command and control governance structure
Reinforce access control by limiting people who have access to the network and changing credentials frequently. Ensure security measures are in place to detect when someone or something out of the ordinary is trying to find a way into the network.
Have high data center redundancy

Incorporate redundancy measures with the UPS. N+1 is good, 2N is better and 2N+1 is a best practice. Whether it’s UPS redundancy in the event of an attack targeting the infrastructure or full data center redundancy in the event of an attack targeting a specific facility, redundancy is a critical factor in preventing DoS outages.

Use network visibility and intelligence to ensure early threat awareness
Data centers have evolved into elaborate ecosystems, with networks connected to everything and across systems. Managing security amid network complexity requires visibility across the network to enable IT managers to predict and prevent problems. Failing to do so would create vulnerable access points for hackers to attack.

Secure your IT infrastructure with back-up servers
Redundancy measures for servers can be put in place to ensure critical availability of the network. A server with the same computing capacity can be kept offline and activated in case of DoS outages or excessive traffic at the primary server and can continue operations while the network is down.
The following are key takeaways regarding the costs and consequences of DoS attacks: 


·   DoS attacks can be costly. Our research shows a wide variation or range in the cost of DoS attacks, from a low of $14,000 to a high of $2.35 million per incident. 
·         The cost of DoS is trending upward. The average cost of a DoS attack in 2011 was $187,506 and this increased to $255,470 in 2015. The average cost has been trending upward over time (i.e., 31 percent increase over five years). 
·   Our benchmark sample reveals that 49 percent of DoS attacks caused a total or partial data center outage. Thirty-two percent of organizations experienced a partial outage (i.e., one or more servers or racks were impaired) and 17 percent experienced a total unplanned outage.  § We examined six preventive control characteristics that show differences between the outage and non-outage groups. We found companies that withstand DoS attacks (non-outage group) are more likely to have a command and control governance structure, high data center redundancy, network intelligence tools, advance threat intelligence, well defined incident response plans and enterprise deployment of anti-DoS tools. 
·   The cost of DoS is related to the existence of data center outages. An attack that causes total outage results in an average DoS cost of $610,300. In contrast, DoS attacks that do not result in outages yield an average cost of only $36,800. 
·   DoS attacks are more costly than other categories of cyberattacks, such as malicious insiders, malicious code and web-based attacks. 
·         Recovery and detection activities represent more than half of the total internal cost of a DoS attack. Revenue losses and disruption to normal operations represent 53 percent of the average external cost consequence of a DoS attack. 
·   Average DoS costs vary by industry. Organizations in financial services, technology and software, utilities and energy and communications industries experience the highest average DoS costs. In contrast, public sector, services, hospitality and research industry sectors experience a much lower average cost.

To learn more, please contact JKS at:
Jks-systems.com



Thursday, July 21, 2016

JKS Security Solutions- Back Up- Datto Alto 2


Datto ALTO 2 is the only continuity solution designed specifically for small business. Using image-based backup and a hybrid cloud model, ALTO 2 delivers enterprise-grade functionality at a small business price.


·       
  Dramatically Reduce Downtime - Datto’s hybrid cloud technology dramatically reduces downtime by saving backups both locally and in the cloud. This gives users greater protection for their systems and data through advanced bandwidth management, local restoration, and full cloud data copies.

· Eliminate Broken Backup Chains - With Datto’s proprietary Inverse Chain Technology, you can recover faster. Recovery isn’t delayed by the need to apply incremental backups to your last full backup file. Datto has already done it for you, and because of this, you’re also free to delete your oldest backup files to free up space.

· Stop Guessing About Backup Integrity - Datto’s Screenshot Backup Verification gives you visual proof that your data has been successfully backed up. You’ll receive a screenshot verification, giving you the confirmation that backups are without errors or data corruption.

· Protect Your Entire Organization - Datto's entire ALTO family gives you the absolute best in business continuity to protect both your Windows and Linux environments. Our broad operating system support gives you the peace of mind in knowing your entire organization's data is protected.

· Enterprise Grade, but Priced for Small Business - Small businesses currently dependent on consumer-oriented, file-level backups now have a clear, compelling and cost-effective alternative with ALTO 2.

· Small, but Mighty - The extremely compact Micro PC form factor means ALTO 2 can live right on the desktop, attached to the back of a monitor, or anywhere else on the LAN.

For more information, please contact:
860-436-4664 / security@jks-systems.com
Jks-systems.com



Wednesday, July 20, 2016

JKS Data Solutions – Wireless Network – Cisco Aironet 1560 Series


 Outdoor access points to extend the quality and robustness of Wi-Fi inside your office, outside!
Cisco Aironet 1562E and 1562PS Access Points come with flexible antenna ports that are software configurable for either single-band or dual-band antennas.
For service providers, the Aironet 1560 is ideal for deployments in urban environments where outdoor Wi-Fi hotspot coverage must be balanced with strict architectural and aesthetic requirements.
With the highest Wi-Fi performance ever to date, Aironet 1560 Series access points allow a higher data rate and freer flowing wireless data traffic with wider channels.


·         Improved Performance for Multiple Client Devices- These 802.11ac Wave 2 access points use multiuser, multiple input, multiple output (MU-MIMO) technology. This allows different data streams to all flow at once from the access point to multiple 802.11ac Wave 2-supported devices. Now, multiple Wave 2 devices can connect at the same time getting the information they need quicker.
·         5-GHz Support-The Cisco Aironet 1560 Series Access Points doubles the scale of 5-GHz mobile devices and raises the performance of high-density environments.
·         Cisco Flexible Antenna Port Technology-This technology allows the same antenna ports to be used either for dual-band antennas to reduce footprint, or for single-band antennas to optimize radio coverage.
·         Mobility Express-Cisco Mobility Express is a deployment solution designed to bring enterprise-class wireless access to small and medium-sized networks. Easy to set up and maintain, Mobility Express does not use a physical controller and still includes Cisco's advanced features.
·         Cisco High Density Experience (HDX)-Cisco High Density Experience (HDX) comes standard, giving the 1560 Series top-of-the-line network efficiency over a large number of wireless clients. HDX uses customized chipsets to target the needs of high-density networks. It is built with best-in-class RF architecture. This gives you a better user experience for high-performance applications.

Where do you start?
  • The 1562I access point is outfitted with an internal antenna
  • The 1562E includes an external antenna
  • The 1562D comes with an internal directional antenna 
  • The 1562PS operates on a dedicated 4.9-GHz public safety band


No matter which access point you choose, all Aironet 1560 Series Access Points are 802.11ac Wave 2-compliant. You gain increased bandwidth to cover:
·         More devices entering your wireless network
·         Uninterrupted video use in all forms
·         Unwavering 24-hour connection to Internet-of-Things (IoT) devices

To learn more, please contact JKS at:
860-436-4664/ data@jks-systems.com
Jks-systems.com