Will you recover from the lack of a recovery site.

You have a flourishing business that is growing exponentially. Your technical team is prompt, aware & enterprising. And then, *god forbid* your datacentre gets affected.

It could be an interruption due to a backup failure, a hardware failure or worse a natural disaster.

And your operation comes to a standstill.

What do you do?

If the first thing to have crossed your mind is the Recovery Site, then, you’re right on track.

Recovery Site acts like a secondary data centre which is placed on a Different location: either Physical or in Cloud. It has the capacity to run the entire organization during a disaster attack.

While there has been a lot of buzz around recovery sites, it will surprise you to know that according to the latest Symantec’s SMB Disaster Preparedness Survey, only half of the surveyed business organisations had plans in place for the event of a disaster.

In an extremely competitive world it is essential to have the lowest down time for your customers and guarantee security for your data.

But, of all the recovery sites available which one is the most suited for your business?

Do keep in mind you require an efficient yet economical solution.

Enter Microsoft Azure.

Microsoft Azure is a growing collection of integrated cloud services which developers and IT professionals use to build, deploy, and manage applications through the global network of datacenters. With Azure, you get the freedom to build and deploy wherever you want, using the tools, applications, and frameworks of your choice.

Kryptostech  with its years of experience, especially in Azure Cloud suggests Azure recovery site to be in the cloud environments with minimal maintenance cost.

If you are worried about how complicated the process is, well fear not. You can set up your DR site in 3 easy steps:

  • Calculate the price of the DR in cloud environment: https://azure.microsoft.com/en-in/pricing/calculator/
  • Once you arrive at a solution within the Budget you can move forward to buy a subscription from Microsoft.
  • Once the subscription is purchased the implementation of the recovery site will commence.

And this is where we at Kryptostech will pitch in. Our decade of experience in managed service and handling recovery sites for clients results in professionally implementing DR sites in any scenario.  We truly are value-for-money and our client list will testify to that. Check out Kryptostech for more on this.


Here is the step by step guide on how to configure Email Encryption using O365. The content of this article was performed in a test environment and tested to be working as expected.

Why Email Encryption?
In the Digital era, Emails have become most sophisticated means of communication. Given the current technology, the traditional email system is less secure and it becomes easy to access/read what is being sent by others since most of the email communication happens as clear text. For a better and safer email communication, Email encryption is the only recommended solution.
Having said that, Office 365 message encryption is the most reliable and efficient method of email encryption that is available today. With O365, one’s information remains secure and allows users to send and receive encrypted emails. The recipients can be internal or external to one’s organization and can be on any messaging platform.
 The Recipients is ‘only’ expected to have a valid email address, regardless of the backend email system or domain.
 Recipients can access this message on any device (Browser compatibility).

• Setting up Office 365 Message Encryption?
• Set up Azure Rights Management for Office 365 Message Encryption
• Disable IRM templates in OWA and Outlook
• Create Transport Rules to Encrypt Messages

Setting up Office 365 Message Encryption

1. RBAC version should be updated (contact support to verify the current version).
2. Encryption rule (Transport Rule) to be created in the EMC.

Steps to configure:
1. Check the current RBAC version using the following PowerShell command.

Get-OrganizationConfig | fl *rb*

2. As called out earlier, please reach out to Microsoft Support to get the RBAC version updated (if required).
(Microsoft Support usually takes 2-3 business days to get the RBAC version updated)

Pre Update:

 Post Update:

3. Login into O365 admin portal (http://portal.microsoftonline.com)
4. SelectSERVICE SETTINGS on the left pane
5. Go to Rights Management

6. Under RIGHTS MANAGEMENT, click Manageon the right as shown.

7. In the Rights Management page, click Activate

8. A warning window would popup. To confirm activation, click Activate

9. Once activated, we would get a confirmation screen which would show the right management to be activated.

Set up Azure Rights Management for Office 365 Message Encryption
Now that we have the rights management activated, it’s time to setup Azure

1 Login to azure active directory (runas administrator)

2 To connect and import the session, run the following command and Choose Y.
Set-ExecutionPolicy RemoteSigned(Help topic:http://go.microsoft.com/fwlink/?LinkID=135170)

3 Post keying in the credentials, use the following command to Import the session.

$cred = Get-Credential $Session = New-PSSession -ConfigurationName Microsoft.Exchange -ConnectionUri
https://outlook.office365.com/powershell-liveid/ -Credential $cred -Authentication Basic –AllowRedirection
Import-PSSession $Session
4 After importing the session, use the Exchange Management Shell to configure the RMS Online key sharing location in Exchange Online. Use the RMS key sharing URL corresponding to your location.


RMS key sharing location

North America https://sp-rms.na.aadrm.com/TenantManagement/ServicePartner.svc
European Union https://sp-rms.eu.aadrm.com/TenantManagement/ServicePartner.svc
Asia https://sp-rms.ap.aadrm.com/TenantManagement/ServicePartner.svc
South America https://sp-rms.sa.aadrm.com/TenantManagement/ServicePartner.svc
Office 365 for Government
(Government Community Cloud)
https://sp-rms.govus.aadrm.com/TenantManagement/ServicePartner.svc 1

5 In the example below, we have used ASIA location. Before we set, check IRM configuration using the below command.
PS C:\Windows\system32> Get-IRMConfiguration

10. Set up Key location using the below command let.
PS C:\Windows\system32> Set-IRMConfiguration -RMSOnlineKeySharingLocation https://sp-rms.ap.aadrm.com/TenantManagement/ServicePartner.svc

11 Import the Trusted Publishing Domain (TPD) from RMS OnlineImport-RMSTrustedPublishingDomain -RMSOnline -name “RMS Online”

12 Verify successful setup of IRM in Exchange Online
Test-IRMConfiguration –sender user@domain.com

Test results
PS C:\Windows\system32> Test-IRMConfiguration -sender User@domain.com

Disable IRM templates in OWA and Outlook

Now, it’s time to disable IRM templates in the clients as part of the set-up. Run the following commands to disable the client access and enable internal licensing.

1 Set-IRMConfiguration -ClientAccessServerEnabled $false

2 Enable IRM for Office 365 Message Encryption
Set-IRMConfiguration -InternalLicensingEnabled $true

3 Confirm the IRM ConfigurationGet-IRMConfiguration

Create Transport Rules to Encrypt Messages

The following settings are to be performed in the Office 365 admin portal to enable encryption.
1 Open the Office 365 Admin Portal (https://portal.microsoftonline.com)
2 Open Exchange Admin Center

3 Under Mail Flow, click the + and create your transport rule. I have created two simple rules for reference.



4 This sample rule would encrypt anything that is sent external with an attachment larger than 1MB.


5 Save the rule before exiting the window.

6 Now, user can start sending encrypted email. The below samples would show how an encrypted email is being sent.

7 When a user wants to send an encrypted email, the sender is expected to type “Encrypt” in the subject line.

8 At the Recipient’s end, the user would receive the email as below.

9 To view the message content, the recipient is expected to open the attachment in the email.

10 To view the message content, the recipient is expected to open the attachment in the email.

11 The recipient would receive the one-time passcode on a separate email.

12 Continue, once after entering the one-time password. The encrypted email would decrypt and the recipient will be able to see the content of the email.

With this O365 email encryption is complete. It’s a one-time activity. The users are expected to type “encrypt” in the subject line of any email to be encrypted. Encryption as a standard practice will help to protect your information and prevent the unauthorized access. Get in touch with us to know more.

Written by Lakshmanan

Lakshmanan is a Technology Specialist in Kryptos. He is a tech savvy person with deep knowledge in Exchange, Windows & handles office 365 migration at Kryptos. He is a MCITP certificate holder who keeps expanding his knowledge by reading and learning a lot. He spends his free time with his family and loves playing cricket.

Do you wish to migrate simple

O365 E-mail migration needs to be approached with accuracy and diligence, failing which can lead to a Pandora’s box of mailbox issues.

  • Organisations try to perform migration services in-house, increasing workload for its valuable people resources who should be delivering on their core competencies. And this results in poor productivity & resource management.
  • Organisations that value their core competencies and pursue them diligently never give their time away trying to manage what can be outsourced, E-mail migration services for example.
  • O365 migration of mailboxes can become complicated without the right support.

That is why the choice of your Office365 E-mail migration services partner becomes crucial. It is the first giveaway about how smart you are as a business.

Kryptos presents the best O365 e-mail migration services now on a special offer.
We call it

With 12 months of Email management & Support @ Zero Cost

6 Reasons your Microsoft O365 Migration Partner should be Kryptos

Low Costs Increased Efficiency 24/7 Support
Client Testimonials White labelled services Professionalism

This is the difference between ‘working’ and ‘working smart’. We set up your mailboxes, handle your e-mail migration, & customise it for your needs. The MigrateSimple Offer does all of these & more at an attractive price.

We have had multiple successful migrations with this offer and continuing. Our clients are experiencing true ROI and the leverage their businesses can get, by working with us. We are in the last leg of the offer and we want you to take advantage of it.

Talk to our experts for more details.

Enquire Now

Kryptos Microsoft Azure Deployment Architecture

Replicate vmware virtual machines to azure

when deciding to Migrate workloads from on-premise VMware platform to Azure.

NB : This post also includes the possible actions (when applicable) to make in order to migrate the workloads to the Azure Resource Manager stack (IaaS V2)

1- What are the migration paths

There are many migration paths which can be used, but each one have it’s own advantages and disadvantages. The following table shows the different paths that will be discussed in this article:

  • Extend the application roles to Azure
  • Manual upload of the Virtual Machine’s virtual hard disks to Azure
  • Use MVMC (Microsoft Virtual Machine Converter)
  • Use Azure Site Recovery

2- Migration paths description

In this section, the different migration paths presented on 1- What are the migration paths. will be detailed, and the advantages and disadvantages of each one will be presented.

2.1- Extend the application roles to Azure

2.1.1- Description

This this the first path that can be took to migrate workloads to Azure. It depends on the application itself, and it’s not related to the OS underlying stack (Physical, Virtual, VMware or Hyper-V…).

This approach is only possible for application and workloads that supports high Availability or Load Balancing over multiple instances, and usually does not require using third party tools.


Active Directory Domain Services : If you have one domain controller, you can add an additional domain controller to your topology. This way, users or resources using these DCs can authenticate on either the first or the second DC. The migration path will be the following .

  1. Add a second domain controller on Azure
  2. Verify that users, servers and the other resources can successfully authenticate using the domain controller on Azure
  3. Transfer the FSMO roles to the Azure DC
  4. Stop the on-premise DC

–> This way, you migrated the ADDS infrastructure to Azure, in a transparent way, with zero downtime.

The following are the general steps that can be followed for any application that supports extending:

  1. Create 1 or more virtual machines in Azure. These VMs will hold the application roles that will be extended. The OS and VM configuration depends on the application.
  2. Extend the application role to the (or more) virtual machine in Azure
  3. Verify that the new server in Azure is operational and can handle the application services and requests. (A test plan should be run)
  4. Plan a transition step to ‘cut’ the on-premise server. This way, only Azure servers are requesting the application services.

The following ‘services’ can generally support this migration path:


Web services (IIS, Apache…) — The Web services generally support Load Balancing. Extending a Web service farm is usually supported.

The following the Pro and Cons related to this migration path:


  • Does not require resort to third-party tools
  • Zero or near-zero downtime Fast and guaranteed rollback


  • Different extension method for each type application
  • Need specialized people, for each product to be extended
  • Change of the application configuration Not applicable for standalone applications

2.2- Manual upload of the Virtual Machine’s virtual hard disks to Azure

2.2.1- Description

This this the second path that can be took to migrate workloads to Azure. This time, it doesn’t depend on the application.

This approach is applicable for both virtual and physical servers. And may need prerequisites prior to start the migration itself.

The next paragraph describes the different steps to successfully migrate workloads using this method:

Physical servers

  1. The physical server disks should be converted to the VHD format. There are two possible manners to do it :
  2. Use Disk2VHD : This tool can make an online conversion of physical server’s disks to VHD files format. The obtained VHDs are a consistent point-in-time snapshots of the converted volumes. (Only for Windows supported operating systems, Linux operating systems are not supported)
  3. Convert the whole Physical server to a virtual machine. There are two ways to finally obtain the desired VHD format
  4. If your target virtualization stack is VMWare :
  5. You can use VMware vCenter Converter. This tool will allow the P2V (Physical to Virtual) conversion of you physical server to a VMWare virtual machine.
  6. You should convert your VMDK disks to the VHD format. This can be done via several ways :
  • If you have a Hyper-V virtualization platform: You can make a V2V conversion of the VMware virtual machines to Hyper-V virtual machines. That way, you will obtain the desired VHD format. The following blog (Link1, Link2) describes the way to convert VMWare VMs to Hyper-V VMs
  • You can convert directly VMDK virtual hard disks to the VHD format using conversion tools like MVMC (Link1, Link2) or third-party tools like Starwind V2V converter (Link1). But i recommend using MVMC
  1. If your target virtualization stack is Hyper-V : Use MVMC to make a P2V conversion toward a a Hyper-V server (Only for Windows supported operating systems, Linux operating systems are not supported). Choose the VHD format for the disks type.
  2. Upload the machine VHD files to Azure. The best two options to use:
  3. For fixed VHD files format : Use AzCopy
  4. For dynamic or fixed VHD files format : Use Add-AzureVHDpowershell command. Follow this blog to optimize the usage of this tool
  5. Creation of the virtual machine using the uploaded virtual hard disks : Use the Provisioning script to create a virtual machine from an existing virtual hard disk.

Virtual machines

  1. The goal is to obtain the virtual machines disks under VHD format
  2. If your virtualization stack is VMWare: You should convert your VMDK disks to the VHD format. This can be done via several ways :
  3. If you have a Hyper-V virtualization platform: You can make a V2V conversion of the VMware virtual machines to Hyper-V virtual machines. That way, you will obtain the desired VHD format. The following blog (Link1, Link2) describes the way to convert VMWare VMs to Hyper-V VMs
  4. You can convert directly VMDK virtual hard disks to the VHD format using conversion tools like MVMC (Link1, Link2) or third-party tools like Starwind V2V converter (Link1). But i recommend using MVMC
  5. If your virtualization stack is Hyper-V : Hyper-V supports 2 formats : VHD and VHDx
  6. If your virtual machines disks format are VHDx : You should convert the VHDx files to VHD. For that you can the powershell command Convert-VHD
  7. If your virtual machines disks format are VHD : No steps to be done
  8. Upload the machine VHD files to Azure. The best two options to use:
  9. For fixed VHD files format : Use AzCopy
  10. For dynamic or fixed VHD files format : Use Add-AzureVHDpowershell command. Follow this blog to optimize the usage of this tool
  11. Create a virtual machine using the uploaded virtual hard disks : Use the Provisioning script to create a virtual machine from an existing virtual hard disk.

2.2.2- Pro and Cons

The following the Pro and Cons related to this migration path:


  • Does not require a change to the application configuration
  • Does not require application experts
  • Fast and guaranteed rollback, Applicable for standalone workloads


  • May take long time (Conversion + Upload = Hours)
  • Require server downtime (hours)
  • Several prerequisites
  • Manual process, Not supported for all Operating Systems

2.3- Use Microsoft Virtual Machine Converter (MVMC)

2.3.1- Description

This this the third path that can be took to migrate workloads to Azure.

This approach is applicable only for virtual machines residing on supported VMWare hosts (ESX/VSphere/VCenter)

The next paragraph describes the different steps to successfully migrate workloads using this method:

NB : Because the current version of MVMC (3.1) does not support Azure Resource Manager storage containers, extra steps will be conducted to successfully make the migration. These steps will be marked with green color.

  1. Install the MVMC tool on a server which ‘preferably’ belongs to the same network as the VCenter server. The following details the installation prerequisites (Link1). You can download MVMC from the following link (Link2)
  2. Make the following steps as prerequisites to use MVMC to migrate VMWare VMs to Azure. The most important step is to upload a management certificate to Azure (Link1)
  3. Create a classic (V1 Azure Service Management) storage account where the VHDs will be uploaded. This storage account will be used as an intermediate during the migration
  4. There are two options which can be used to convert VMWare virtual machines : Using the MVMC graphical wizard, or use the MVMC cmdlets.
  5. Use the MVMC GUI : Follow this link and follow the steps to connect to a VCenter/ESX server and convert/upload VMware Virtual machine VHDs to the already created storage account in step 3 (VMWare to Azure using MVMC GUI)
  6. Use the MVMC cmdlets : The following document contains a sample script which can be used to convert and migrate VMware virtual machines to Azure. Download the MVMC_cmdlets.doc from the following link (MVMC_cmdlets.doc)
  7. Move the uploaded virtual hard disks from the temporary classic storage account (created on step 3) to the target storage account (ARM) where the virtual machine storage should reside. The move can be easily done via few steps using the Start-AzureStorageBlabCopy Azure powershell command. Use the ‘Initiating an Asynchronous Copy Request (authenticated source)‘ section (Copy VHDs between Azure BLOBs). You should install Azure Powershell as a prerequisite (Downland Azure Powershell)
  8. Create a virtual machine using the uploaded virtual hard disks : Use the Provisioning script to create a virtual machine from an existing virtual hard disk.
  9. Delete the VHDs residing on the classic storage account

NB: MVMC can be used with MAT (Microsoft Automation Toolkit) to make bulk conversion operations. Look the Microsoft Automation Toolkit section on this page (MVMC with MAT)

2.3.2- Pro and Cons

The following table resumes the Pro and Cons related to this migration path:


  • Does not require a change to the application configuration
  • Does not require application experts
  • Fast and guaranteed rollback
  • Applicable for standalone workloads

. Optimal for low scale migration


  • May take long time (Conversion + Upload = Hours)
  • May require server downtime (hours)
  • Extra steps due to lack of ARM storage accounts support
  • Manual process (though can be automated)

. Not optimal for an Enterprise migration path

2.4- Use Azure Site Recovery

2.4.1- Description

This this the fourth path that can be took to migrate workloads to Azure.

This approach is applicable only for virtual machines residing on supported VMWare hosts (ESX/VSphere/VCenter), and for physical servers.

This method is the most complicated method deploy, but once deployed, it will me a one-click solution to easly migrate workloads to Azure.

NB : Azure Site Recovery does not currently support Azure Resource Manager, hence it will not be possible to use it with Azure IaaS V2. In the meanwhile, the same steps are applicable when it will be supported in few months (Mid Q4 2015)

In this description, i will highlight the necessary steps to use Azure Site Recovery as a migration solution from VMWare to Azure (But the same steps apply to Hyper-V/Physical). For a detailed explanation, you can refer the Microsoft official documentation (Migrate VMWare to Azure using Azure Site Recovery) What is ASR and what are its components

ASR is an Azure Service which can be used to migrate/protect different kind of workloads from a source site to a target site. For a complete list of Sources and Targets, visit this page : Azure Site Recovery Overview

The following pictures shows the components involved on a ASR protection/Migration of workloads to Azure.

(Image Credit : Microsoft)

The following components should be used and installed on-premise and on Azure in order to enable workloads protection (Table copied from Migrate VMWare to Azure using Azure Site Recovery) ASR replication mechanism

This section explains how to migrate a VMware virtual machine to Azure using ASR. I will highlight the high level steps, explaining the End to End process:

A- Create the Azure Site Recovery vault

The first step is to create an Azure Site Recovery vault. A vault is just a container which will be targeted later for your replication mechanism. After creating the vault, a storage account (GRS type) will be created, it will store the replicated data.

B- Set up the configuration server component on Azure

The configuration server is a server residing on your Azure subscription. As explained on ‘ What is ASR and what are its components’, the configuration server coordinates communication between protected machines, the process server, and master target servers in Azure. It sets up replication and coordinates recovery in Azure when failover occurs. An standard A3 virtual machine is recommended for this component. This server should added to the already created vault

C- Set up the Master Target component on Azure

Now, an Azure VM should be created to hold the master target role. Disks will be attached to this VM, and each disk will receive data from its analogue disk on-premise. So if you are migrating a VM with N disks, the VM should support at least N+1 data disks (Be aware that the maximum supported data disks per VM is limited by its size and series, look to Azure Virtual Machine Sizes). If the Master Target VM reaches the maximum data disks count, you can add a second Master Target VM or upgrade the current size to a size which support the data disks count (N+1)

D- Set up the Process Server component on-premise

A server must be created on-premises and hold the Process server component. It’s recommended to create the server on the same network than the ESX infrastructure. This server with be registered with the Configuration server. It’s recommended to install VMWare VSphere CLI 5.5.0

E- Check the components server updates

It’s highly recommended to install the last windows updates on the component servers

F- Create protection groups

On the Azure portal, create a protection group and configure the default replication settings. We will add later the virtual machines to be migrated to this protection group. One protection group can include multiple virtual machines.

G- Set up the replication for the virtual machines

For each VMware virtual machine to protect, the Mobility Service agent will be installed. Then, the VM will be added to the protection group already created. The Properties for the target virtual machine in Azure can be configured (Name, IP…)

H- Planned Failover

After the initial replication completes, we can make a planned failover. A failover plan should be created which will include the failover properties (one or more VMs, order…)

NB: A planned failover will cause downtime. In fact, the source machine is stopped, the delta between hard disks is synchronized to have an exact clone of the source machine.

I- Validate migration

Once the virtual machine is running on Azure, verify its connectivity with on-premise.

2.4.3- Pro and Cons

The following table resumes the Pro and Cons related to this migration path:

* The protection of a virtual machine is free for the first 31 days (The Initial replication and failover time will always be less than 31 days), so the ASR service is considered free for a migration path. However, the Master Target and the process server will use Azure compute and storage resources, which will be accounted on the bill.

3- Migration paths comparison

In this final section, i will present a summary comparison table comparing the different migration options discussed in this post.

* Only If the source virtual machines are not under the VHD format

** Depends on the data to be uploaded to Azure and on the outbound bandwidth

4- Which migration path to choose

The following table describes my ‘personal’ recomdantions toward which migration path to choose

* Once the initial replication is completed, you can decide whether or not to failover the virtual machine to Azure. The VM will keep replicating with the on-premise server until you decide to make the failover.

Sample Enterprise Plan

data security services kryptos

The world held at ransom are you safe

This past Friday we witnessed a coordinated global cyber attack known as WannaCry. It is one of the biggest cyber attacks that we have ever seen impacting over 150 countries and infecting more than 250,000 machines. WannaCry is a type of malicious software (malware) classified as ransomware.

It encrypts essential files on your Windows device and requires that you pay a ransom to unlock those files. Our prompt team of experts at Kryptostech were quick to the task. Our domain expertise in cloud managed services ensured we were quickly able to diagnose the issue and provide solutions for the same. Although it primarily focuses on organizational or business networks – as was the case with Wanna Cry – you can do your part to stop the spread of this by doing the following:

  • Apply any Microsoft Windows security patches that Microsoft has sent you. If you are using an older version of Microsoft’s operating systems, such as Windows XP or Windows 8, click here to download emergency security patches from Microsoft.
  • Be careful what you click on. Phishing emails distributed this malware. You should only click on emails that you are sure came from a trusted source.
  • Be sure to back up all your computing devices. Regularly backing up your devices helps you recover your information should your computer become infected with ransomware.

You can learn more about WannaCry here.

Hybrid Cloud Services Kryptos

Hybrid Cloud Future of IT

Hybrid Cloud – future of IT?

Organizations are changing their way of doing business and the market dynamics demands the support system to accustom to its new business models and for its rapid growth. It is when the organizations started giving importance to their IT infrastructure to support their business goals. When traditional IT infrastructure gave way to cloud people captured the advantages of moving to cloud to enhance, to scale up their business and to achieve their goals faster.

Cloud migration era

There is an increasing acceptance and migration to cloud based IT infrastructure by small, medium and larger enterprises because it helps companies to unburden the physical back end architecture and maintenance issues as it will be managed effectively by experts in cloud services. That said, for all its benefits, there is still reluctance prevailing in moving to the cloud due to several reasons like cost control, flexibility, data security etc.

Cloud centric to Hybrid

Organizations who are in the middle way of on premise to cloud migration are looking for new solutions to meet their changing IT needs. The optimal solution would be Hybrid cloud: a combination of public, private and on-premise It infrastructure. Even enterprises are ready to adopt multi clouds option having a hybrid IT system as one of them because it will combine the benefits and help to deliver better outcomes.

“As per Gartner prediction 50 percent of enterprises will have Hybrid clouds by 2017.

The survey by RightScale 2017 State of the Cloud report also backs the former statement by revealing that the percentage of enterprises that have a strategy to use multiple clouds grew to 85 percent with 58 percent planning on the Hybrid “

This proves the acknowledgement of enterprise search for Hybrid cloud adoption to utilize the advantages of both the public & private cloud IT base.

Yes, its true enterprises prefer hybrid infrastructure management,but, why?

There could be many reasons, for each level of enterprises from small to large for seeking cloud migration services, like zero investment in data centres, no maintenance cost, easy to deploy, time factor and more importantly businesses can concentrate on their core and align their IT with their business needs.

Owing to the combination of public, private & on-premise, hybrid ecosystem provides enterprises more control of their data, reduced IT cost, versatility and user friendliness and striking a perfect balance between the cloud and on-premise datacentres thereby increasing the business efficiency.

The changing business needs accelerate the innovation in IT infrastructure. Without doubt Hybrid cloud is one going to be the changing face of the Cloud computing.Top of Form

Bottom of Form

Top of Form


  1. http://www.gartner.com/newsroom/id/2599315
  2. http://www.rightscale.com/blog/cloud-industry-insights/cloud-computing-trends-2017-state-cloud-survey
cloud expertise kryptos

Cloud expertise not everyone s cup of tea

Cloud. The magic word for the last couple of years. It has built, shaped, & transformed companies. But, at the same time it has damaged the firms that just didn’t respond fast enough. While small & mid-size enterprises cope with the changes, master the technologies, & also begin consultation on the best practises; the larger enterprises focus on having the first-mover advantage. They are enabling businesses who are embracing new advancements. There is a plethora of opportunities in the cloud computing space and everybody wants a piece of the pie.

Hence, it was no surprise when Verizon wanted to jump on the cloud bandwagon as well. They began in 2011 with the purchase of CloudSwitch. The growth curve has been upward with the development of Verizon Cloud and acquisition of data centers. But, in 2016 they closed a deal to sell their data centers, and a few days back, IBM has gained ownership of their cloud services unit. The curve simply ceased to exist for the cloud services post that.

While there are many big players in the cloud managed services space, there is no guarantee about their ratio of success. Hence it is crucial to partner with the right firms who specialise in individual services such as infrastructure services, database services or cloud services. It is also important to understand that older organizations need not necessarily have the best expertise in the market.

We at Kryptos have understood this dearth of knowledge in the status quo; we customize our services based on your requirement, providing better cloud managed services. Our team of experts are young & dynamic, much like the cloud services. We have been involved with numerous successful cloud migrations & management services for over a decade. Be it cloud managed services, cloud migration services or cloud backup solutions we have an extensive portfolio to cater to your needs.

For more information, call us at +91 (44) 4391 5153/ 21 or write to us at sales@kryptostech.com

Source: http://www.fiercetelecom.com/telecom/verizon-sells-cloud-services-unit-to-ibm

Infrastructure monitoring how IT impacts your IT environment

Majority of us are unawareas to what our major contributors are to home
utility consumption costs. Like many, if you ask me today what my tariffs and my consumption rates are for my utilities (Electricity, Gas, Water etc.)I wouldn’t be able to give you an intelligent answer. I feel the burn when I have to pay these bills and that’s when I get interested in finding out more about what I am paying for. Is it that my appliances are drawing more than they should, are they healthy, do I need to service them, are my kids using more than they should, and are my provider’s charges higher and many more questions that remained unanswered. This is mostly because they are simply too hard to monitor, document and analyse for me to make an informed decision. It’s easier to just to impose a curfew for the family on their usage without understanding the actual problem itself, leading to a lower quality of life.

When you think about it from an organisations perspective within the context of IT Infrastructure, you’ll find similar pattern where most organisations are unaware how their infrastructure is performing, what are the common points of failure, reasons for those failures, etc. Add Cloud or a Hybrid strategy to the mix and your problems are just multiplied. Even those who boast as being born in the Cloud aren’t exempt from bad decision making, because they don’t have a clue on how they are utilizing their cloud infrastructure and what’s causing their costs to spiral-up. Like any other utility company your cloud providers don’t offer you much assistance in that situation as their revenue most times depends on your ignorance. As cloud providers (both public and private) become more aggressive with their targets on recruiting your organisation into their fraternity, how can you still remain in control of the entire situation to deliver that promise of excellent quality of service to your customers?

The answer is running a proactive monitoring service or working with someone who can monitor your infrastructure to foresee issues to be able to provide a consistent and efficient service to your customers. Having a monitoring service to make an informed decision can have a great impact on the future of your IT environment.

What can be monitoring practice or a service do to help?

  1. Provide an understanding and help with decisions when data is made available on the infrastructures performance.
  2. With prevention of disasters through early detection and preventative planning measures.
  3. With information to fine tune the infrastructure to improve performance with productivity.
  4. Inventory your technology assets (hardware and software) for planning and budgeting for upgrades.
  5. Prevent or reduce losses from unscheduled downtimes that can have a business impact.
CIO Review Companies of the Year 2016 Kryptos

CIO Review’s ‘Companies of the Year 2016’

Kryptos Technologies has made it on CIOReview’s ‘Companies of the Year 2016’ list for best in IT Remote Infrastructure Management Services (RIMS).
CIOReview in conversation with Prasanna Ram, Founder and Chairman of Kryptos Group of Companies finds out the market trends, how organisations can get the best out of a RIMS practice and how to go about choosing the right RIMS Partner.


CR: How was Kryptos Incepted and how did it make it to where it is today?

Prasanna: Kryptos Networks is the first distributor in India to launch the software subscription business for services providers and since have been the market leader with 90 percent market share with large OEMs like Microsoft, VMWare, Citrix, Veeam etc. on their subscription software business from 2006. The company was eventually acquired Crayon Software from Norway. Till date Crayon with the acquisition of Kryptos networks continue to retain the lead on the subscription software distribution business in India. Our learnings from dealing with Service providers on subscription business led to Kryptos Technologies where we extend full remote IT Infrastructure and Cloud support to our Partners and their customers through a white labeled, 24/7, 365 days highly available model on use & pay model

CR: How do you think the Indian market has accepted Remote Infrastructure Management?

Prasanna: Infrastructure management and monitoring services IS the optimal choice when you need find out how your assets are performing to make informed decisions while optimizing your IT environment. Most Business decision makers have now started to realize that their strategic decisions and directions must be based on factual data, rather than just sticking a wet figure up in the wind. Technology has always continued to evolve, but the wiser organizations in India and overseas have started to take more control of their IT’s future which begins with their infrastructure management.

CR: Why is Remote IMS so crucial in India?

Prasanna: Cost reduction — Savings emanated out of RIMS can be in the range Of 40 to 60 percent allowing organizations to focus on their core business and meeting their customer requirements.

Lack of appropriate IT talent in-house — Fitting right talent into every trending new technology is challenging. An outsourced partner can make an entire team available in various technologies at a similar price point of a single person.

Apart from these major factors, we can also consider the growing size of companies and decreasing IT budget is going to be the major driver RIMS. Current IMS spend is expected to be around 12 percent to 20 percent of the total IT budget of the companies.

CR: What according to you are some of the major expectations set by enterprise clients and how do you meet and exceed these demands?

Prasanna: ‘Always-On-Always-available’ having 24/7, 365 days’ availability, is the topmost priority when it comes to running an IMS solution for enterprises. Besides high availability, signs of a professional IMS practice arc their high degree of predictability to proactively eliminate various IT infrastructure operational challenges. IMS Automation is still evolving and it already has become the need of the hour to help enterprises with reactive incidents. The demand from enterprise is proactive intelligence on their mission critical IT investments.

Kryptos adopts a proactive strategy for its clients to always remain ahead of the curve with the right amount of automation and qualified IT lean). Besides managing, we also support our clients design, build and run their IT infrastructure services in an agile manner that allows for better integration with the existing processes and operations. Our Network Operations Centre (NOC) consist of many qualified talents run in diligent shifts to cover 24/7 availability.

CR: How do you ensure high profitability, client attachments and better service levels the RIMS solutions?

Prasanna: RIMS from Kryptos is known in the Industry circles for the following reasons,

Optimizes IT operational costs.
Derisk business by proactively being prepared for IT Infrastructure challenges 24/7, days.
One Slop shop for services ranging from Cloud managed services to Help Desk support.

CR: What are the major differentiating factors that set Kryptos apart with other players in this segment?

Prasanna: We always compete with ourselves to strive to achieve the best and continue to evolve. Most players in the market focusing on management and monitoring in silo tasks, while Kryptos orchestrates all services harmoniously. What sets us apart from others is that we are completely technology agnostic and we look at problems holistically and consider all possible dependencies while resolving issues. We also realize that our is our greatest asset and through them we thrive on making IT simple. Our business model of working with services providers and not competing with them puts us in a favorable position over the others competitors.

Learning from working with service providers, post- acquisition of Kryptos networks in 2014 the team at Kryptos launched Kryptos Technologies with the view to offer Infrastructure management to support service providers globally on their journey

“Kryptos adopts a proactive strategy for its clients to always remain ahead of the curve with the right amount of automation and qualified IT team”.

CR team: How do you anticipate the remote infrastructure management industry to progress in the future?

How has Kryptos braced themselves for this change?Prasanna: Kryptos vision for the future is to support its clients build and manage their IT infrastructure both on premise and in the cloud. The shift from on-premises to cloud is revolutionary and already in motion. In few years a majority of services will be delivered from some Public, Private or Hybrid Cloud. Our part will be to implement, manage and monitor all models and all levels including the crucial security part is humongous. We are geared up as a team to meet all those demands globally.

With more and more enterprise clients are moving to various cloud models, outsourcing support and monitoring services demand are rising year after year. We will be positioning ourselves as preferred technology partner supporting clients to be more productive, by letting them take care of their core business while we manage their IT infrastructure and implementations.