Archives 2019

IBM Storwize V5000E Pricing Estimate Calculator

Affordable, with uncompromising performance, and accessible to organizations of all sizes – the IBM Storwize V5000E Series.

Key Features:

  1. Easy Data Mobility
  2. IBM Easy Tier
  3. Advanced Copy Services
  4. Intelligent Support
  5. Compression and Deduplication (V5030E)
  6. 2-Way Clustering (V5030E)

Configure your own IBM Storwize V5000E and get pricing estimates immediately!

Select your desired Hard Disk and/or Flash Drives, a Host Interface Card, the Cache upgrade feature, and/or additional software functionalities.

The pricing provided by this portal is indicative and adequate for budgeting and comparison purposes.

Once you require a formal Quote, feel free to Download Specs and the generated PDF file, along with key details about your Organization (name, address, VAT ID…) and a short description of your requirements and workload. Based on the information provided we will attempt to determine whether the Storwize model V5010E or V5030E would best fit your needs, and will prepare and send you an appropriate formal IBM Project Quotation.

KONFERENCIJA: IBM Flash Storage za male i velike organizacije

Želite povećati performanse i efikasnost sustava, a pritom smanjiti troškove? Drugu godinu za redom pričamo o IBM Flash rješenjima i novitetima u Storage industriji.

Što je novo u Flash svijetu?

Uz objavu brojnih novih modela uređaja iz IBM Storwize i FlashSystem obitelji Flash tehnologija je upravo postala pristupačna i manjim organizacijama. Stoga svakako nemojte propustiti ovaj događaj!

Kome je konferencija namijenjena?

Tematika i sadržaj konferencije su usmjereni prvenstveno ka IT menadžerima i donositeljima ključnih poslovnih odluka u organizacijama.

O čemu ćemo govoriti?

Naglasak će biti na novitetima iz Storage portfelja, tehničkoj usporedbi Flash ponude, a dati ćemo i odgovor na pitanje kako akvizirati Flash Storage te kako izgleda sam proces implementacije.

Flash Storage je dizajniran za ubrzavanje vaše infrastrukture.

Donosimo i studiju slučaja primjene Flash tehnologije iz perspektive korisnika kod kojeg je rješenje uspješno implementirano.

Registrirajte se već danas!

Za konferenciju se možete besplatno registrirati putem linka, a na kojem ćete pronaći i dodatne informacije o samom događaju.

SharePoint Send as Email

3 PRO has released a major update to its SharePoint Send as Email application.

The change is related to the technology platform based on Microsoft Graph, whereas the previous version was based on an Internet Explorer ActiveX component.

It uses Outlook Web App (Webmail) instead of the Outlook Desktop app, and it also supports Chrome, Safari, and other Internet browsers.

The Send As Email application is compatible only with a SharePoint Online + Exchange Online environment (on-prem SharePoint is not supported), and the new version of the application is not available in Office Store (it’s not possible because of the SharePoint Framework exception). From an end-user perspective, the main changes are a new modern UI, the ability to send multiple attachments and to compress them into a .zip file.

You can purchase the solution from the 3 PRO shop.

Product details and installation instructions are available via the link.

For any inquiry, please feel free to contact us.

Beware of Office 365 Phishing Attacks

No matter how hard your organization tries to protect employees and its customers, it is possible for determined individuals to find a way to bypass built-in security protections and steal your account credentials.

Here are two examples:

  • you will get an email with a notification that you have late tasks in the Planner
  • you will receive an email containing a link to a SharePoint document which is similar to standard SharePoint invitation

If you click on the link, a fake portal.office.com login page will appear.

What to do if your Office 365 account was hacked?

  • contact your IT support immediately
  • reset your password
  • remove mailbox delegates
  • disable mail forwarding rules
  • remove the global mail forwarding property
  • enable Multi-Factor authentication
  • set a complex password
  • enable mailbox auditing
  • deliver Audit Logs to the admin to review

Follow these steps to prevent phishing attacks

  1. Educate your colleagues about the dangers and the warning signs of phishing attacks.
  2. Do not click on a suspicious link from unknown email addresses/senders.
  3. Do not input your Office 365 account credentials into suspicious forms, or when a connection to a website is not secure.
  4. Always try to use two-factor authentication.
  5. Purchase and enable Advanced Threat Protection.

Use Advanced Threat Protection from the Security & Compliance Center

Advanced Threat Protection has a set of machine learning models with detection algorithms that can mitigate a very high percentage of phishing attacks. It is available in the Office 365 E5 plan, but you can also purchase it as an add-on to your existing Plans.