Blog

Contact

x

Blog

Jan 10, 2018  |  Author :   | 1 Comment

CIO Review’s ‘Companies of the Year 2016’

Kryptos Technologies has made it on CIOReview’s ‘Companies of the Year 2016’ list for best in IT Remote Infrastructure Management Services (RIMS). CIOReview in conversation with Prasanna Ram, Founder and Chairman of Kryptos Group of Companies finds out the market trends, how organisations can get the best out of a RIMS practice and how to go about choosing the right RIMS Partner. KRYPTOS: GETTING THE MOST OUT OF REMOTE INFRASTRUCTURE MANAGEMENT. CR: How was Kryptos Incepted and how did it…

Jan 10, 2018  |  Author : 

Kryptos cloud care services offering

The sweet deal of #IBM offering $200 free credits to existing SoftLayer customers for BlueMix services is indeed an amazing strategy to emphasize BlueMix and give an honorable exit for SoftLayer as a brand.

Jan 10, 2018  |  Author : 

Kryptos cloud professional services

Kryptos cloud professional services pack readily adds technical and operational support to your organization and also back to your customers

Jan 10, 2018  |  Author : 

Infrastructure monitoring how it impacts your it environment

Majority of us are unawareas to what our major contributors are to home utility consumption costs. Like many, if you ask me today what my tariffs and my consumption rates are for my utilities (Electricity, Gas, Water etc.)I wouldn’t be able to give you an intelligent answer. I feel the burn when I have to pay these bills and that’s when I get interested in finding out more about what I am paying for. Is it that my appliances are…

Jan 10, 2018  |  Author : 

Security management and cloud migration

In coming two years, most of the large companies are planning to migrate to says the new report from migration and disaster recovery provider CloudEndure.

Jan 10, 2018  |  Author : 

Deployment with azure traffic manager

AD FS deployment in Azure provides step-by-step guideline as to how you can deploy a simple AD FS infrastructure for your organization in Azure.

Feb 06, 2018  |  Author : 

Will you recover from the lack of a recovery site

You have a flourishing business that is growing exponentially. Your technical team is prompt, aware & enterprising. And then, *god forbid* your datacentre gets affected. It could be an interruption due to a backup failure, a hardware failure or worse a natural disaster. And your operation comes to a standstill. What do you do? If the first thing to have crossed your mind is the Recovery Site, then, you’re right on track. Recovery Site acts like a secondary data centre…

Feb 06, 2018  |  Author : 

Cloud Expertise not everyone’s cup of tea

Cloud. The magic word for the last couple of years. It has built, shaped, & transformed companies. But, at the same time it has damaged the firms that just didn’t respond fast enough. While small & mid-size enterprises cope with the changes, master the technologies, & also begin consultation on the best practises; the larger enterprises focus on having the first-mover advantage. They are enabling businesses who are embracing new advancements. There is a plethora of opportunities in the cloud…

Feb 06, 2018  |  Author : 

Hybrid Cloud Future of IT

Hybrid Cloud – future of IT? Organizations are changing their way of doing business and the market dynamics demands the support system to accustom to its new business models and for its rapid growth. It is when the organizations started giving importance to their IT infrastructure to support their business goals. When traditional IT infrastructure gave way to cloud people captured the advantages of moving to cloud to enhance, to scale up their business and to achieve their goals faster.…

Feb 06, 2018  |  Author : 

The world held at ransom are you safe

This past Friday we witnessed a coordinated global cyber attack known as WannaCry. It is one of the biggest cyber attacks that we have ever seen impacting over 150 countries and infecting more than 250,000 machines. WannaCry is a type of malicious software (malware) classified as ransomware. It encrypts essential files on your Windows device and requires that you pay a ransom to unlock those files. Our prompt team of experts at Kryptostech were quick to the task. Our domain expertise in cloud…

Feb 06, 2018  |  Author : 

Azure Web Job Scheduling

How to schedule an AZURE web job? At the outset, let us first see what Azure web job is all about its advantages and one of the deployment methodologies. The aim of the web job is to make developing and running the scripts on your website easier. In short, it simplifies the programming task such as image processing, RSS aggregation, file maintenance, queue processing and sending emails. There are three ways by which one can run the program in Azure…

Feb 06, 2018  |  Author : 

Replicate vmware virtual machines to azure

when deciding to Migrate workloads from on-premise VMware platform to Azure. NB : This post also includes the possible actions (when applicable) to make in order to migrate the workloads to the Azure Resource Manager stack (IaaS V2) 1- What are the migration paths There are many migration paths which can be used, but each one have it’s own advantages and disadvantages. The following table shows the different paths that will be discussed in this article: Extend the application roles to Azure Manual…

Feb 06, 2018  |  Author :   | 1 Comment

Do you wish to migrate simple

O365 E-mail migration needs to be approached with accuracy and diligence, failing which can lead to a Pandora’s box of mailbox issues. Organisations try to perform migration services in-house, increasing workload for its valuable people resources who should be delivering on their core competencies. And this results in poor productivity & resource management. Organisations that value their core competencies and pursue them diligently never give their time away trying to manage what can be outsourced, E-mail migration services for example.…

Feb 06, 2018  |  Author :   | 2 Comments

Double take configuration

In today’s IT world, the magical word that drives all businesses is “Zero Downtime”. More than a requisite, it is the key for any organization to deliver exceptional customer experience. With data availability being the key to achieve zero downtime, Double take would be one of the best solutions. Double Take is a data recovery solution for Microsoft windows server to protect the business critical data from loss without downtime. Disaster Recovery plays a vital role in any IT strategy…

Feb 06, 2018  |  Author : 

O365-email-encryption-using-office-365

Here is the step by step guide on how to configure Email Encryption using O365. The content of this article was performed in a test environment and tested to be working as expected. Why Email Encryption? In the Digital era, Emails have become most sophisticated means of communication. Given the current technology, the traditional email system is less secure and it becomes easy to access/read what is being sent by others since most of the email communication happens as clear…