Author Archive

Choosing the Right Security Equipment for Your Network

Choosing the Right Security Equipment for Your Network | January 31st, 2019

Network security is crucial for businesses of any size. Cyber threats are continually evolving, and cybercriminals are always looking for new ways to infiltrate networks. In 2017, organizations publicly disclosed 1,579 data breaches, 44.7 percent more than in 2016. In addition to several high-profile cybersecurity incidents, cybercriminals are increasingly attacking small and medium-sized businesses. Despite this, 77 percent of respondents in a recent survey of IT professionals said their organizations don’t have a formal cyber incident response plan in place.

In today’s environment, organizations of all types and sizes need to take steps to protect their networks and have plans for how they’ll respond if an incident occurs. Choosing the right business network security equipment is a vital part of this.

Data Breach Stats

Conducting a Network Security Audit

A practical first step in the process of choosing this equipment is performing a network security audit — a comprehensive review of your cybersecurity technologies, practices and threats. This assessment will help you to establish a security baseline to assess your performance against, ensure that regulations and practices are followed and develop an ongoing security strategy. It will also help you find any areas where your security may be weak. You can then choose tools that address those needs.

You might decide to do either an external or internal audit. With an external review, you get the benefit of an unbiased, outside perspective from an experienced professional. Some regulations may require an external audit — cost is a primary barrier to conducting external reviews. Internal audits are easier to perform and less expensive but can fall prey to bias or lack of perspective. You may wish to do an external audit every year with internal audits throughout the year.

You can break your network security audit down into five steps:

  1. Define the Scope of the Audit: First, you need to determine what the examination will include. For example, you need to decide whether to review managed or non-managed devices or both.
  2. Define the Threats: Next, list the potential threats your organization faces. This list might include malware, phishing, inadvertent insiders and natural disasters.
  3. Prioritize According to Risk: Then, calculate the risk of each threat. Some factors that may influence this include past incidents at your organization, the trends in your industry and cybersecurity in general and the sensitivity of the information you handle.
  4. Assess the Current Security Conditions: By this point, you should start to have an understanding of where your organization stands cybersecurity-wise regarding the items identified in the scope of the audit.
  5. Decide on Steps to Reduce Risks: Next, you will determine what steps to take to address the risks affecting your organization. These actions might include improving network monitoring, updating software, educating employees and installing new equipment. Your plan should incorporate ongoing assessment of your network security.

Types of Security Equipment

Choosing the right network security solutions for your organization can be a challenging part of the audit process. To help with that, here’s an overview of 14 of the most common types of equipment, as well as how they may be able to help your organization.

1. Anti-Malware Tools

Anti-malware products help to identify, block and remove malicious software, commonly referred to as malware. This malicious software includes viruses, ransomware, spyware, worms and Trojans. Top-performing anti-malware tools can remove malware that may already be in the system and fix any damage it may have caused in addition to scanning for malware and stop them from infiltrating a network in the first place.

Anti-malware products come in the form of software that can install on individual devices, a gateway server or a dedicated network appliance. It can also be hosted either locally or in the cloud. These tools may identify malware by comparing its code to that of known malware. They may also use behavior-based detection, which involves identifying malware based on its behaviors and characteristics. If it attempts to perform an unauthorized or abnormal, the anti-malware tool will remove it. Some anti-malware programs use sandboxing, a technique in which the system tests the software in an isolated environment to determine whether it’s safe to introduce it to the rest of the network.

2. Intrusion Detection and Prevention Systems

Intrusion detection and prevention systems, or IDS and IPS, scan network traffic to block attacks. They use a database of known signatures to detect malware. Whereas anti-malware programs scan individual files, IDS and IPS scan network packets. They can detect malware, policy violations and other types of attacks. It can come as hardware or software.

IDS and IPS perform different functions. IDS passively monitors the network and detects and classifies potential threats. IPS can perform these tasks but can also prevent attacks. Some IPS can also track suspicious files across the network to prevent it from spreading. In some configurations, an IPS will identify a malicious packer before it enters the system. In others, it receives a copy of the packet after it arrives at its destination. Some of the challenges associated with using IPS are its relatively high cost and the potential to block legitimate traffic if the system is misconfigured.

3. Firewalls

Firewall Security

Firewalls create a barrier between the internal network and outside networks, such as the Internet. They monitor incoming and outgoing traffic and determine whether to allow that traffic through or block it using a pre-defined set of rules. Firewalls can either hardware or software.

There are several types of firewalls:

  • Packet-Filtering Firewalls: These compare each packet it receives to a set of pre-determined criteria and blocks them if it perceives them as a potential threat. This is the original type of firewall.
  • Circuit-Level Gateways: These systems monitor TCP handshakes, a method of creating a connection that requires the client and server to exchange acknowledgment packets before beginning data communication. They use this handshake to determine whether a session is legitimate.
  • Stateful Inspection Firewalls: These firewalls assess each packet and also check whether it is part of an approved TCP handshake.
  • Application-Level Gateways: These gateways perform filtering at the application level and combine aspects of packet filtering and circuit-level gateways. They are also referred to as proxy firewalls.
  • Next-Generation Firewalls: Next-generation firewalls are part of a broad category of advanced firewalls. They may combine aspects of stateful inspection, packet inspection and deep packet inspection, which looks into the data of the packet rather than just the header.

4. Network Access Control Products

Network access control (NAC) solutions help to ensure that users follow security policies and keep out potential attackers. They can identify non-compliant devices and block them from accessing the network. They can also control the amount of data that individual users have access to, or place non-compliant devices in a quarantined part of the network.

NAC products enable network managers to monitor the devices that are connected to or attempting to connect to a network. It also allows for the management of guest access. The use of NAC solutions has become more important due to the increased prevalence of bring-your-own-device (BYOD) policies and the internet of things (IoT).

5. Security Information and Event Management Products

Security Information and Event Management, or SIEM, software tracks activity from multiple sources across the network. This gives the information they need to identify and respond to threats. A SIEM program can detect variations from normal operations and take action accordingly. If it picks up on a potential issue, it might send an alert, log additional information and direct other security programs to stop the suspicious activity.

A SIEM system may be rules-based or use a statistical correlation engine to detect anomalies. Some use artificial intelligence to improve over time their ability to identify suspicious activity. SIEM software has two main benefits. It gives cybersecurity an overview of network activity and helps to detect and take action against suspicious activity.

6. Mobile Device Management Software

In 2016, 71 percent of employees spent more than two hours per week accessing company information on mobile devices. Some companies have BYOD policies, while other employers provide company-owned devices, but either way, the prevalence of using mobile devices at work is growing.

Having higher numbers of mobile devices on a company’s networks increases security risks, and mobile device management (MDM) solutions can help with this. MDM software allows for remote monitoring and control of mobile device access to the network. It also enables security staff to remotely control security configurations, enforce policies and push patches out to mobile devices.

7. Application Security Products

Security should be a central integration in the design and use of any software. Application security refers to the hardware, software and processes companies use to protect their applications, whether they’re hosted on-site or in the cloud. Applications security tools include products that identify and fix flaws in application design, scan applications for potential threats and defect against application-layer attacks.

Some examples of application security products include application firewalls, routers that prevent the IP address of a computer from displaying on the internet and biometric authentication systems. Many applications also have security measures built into them, and you can help protect applications through processes such as creating security profiles for all applications.

8. Authentication and Authorization Technologies

Authorization Technologies

Authentication tools enable the identification of individual users, while authorization tools manage users’ permissions to complete tasks. These two technologies often work together to enhance security.

Authentication may require the user to put in a username and password, scan a card or undergo biometric identification through methods such as fingerprint scanning, voice recognition or retina scans. Authentication may also involve the server giving the client a certificate that verifies its identity. Directory-based services like Active Directory authenticate users and use authorization rules to control their access permissions. Other technologies use methods such as digital certificates and public key infrastructure solutions. The Simple Network Management Protocol (SNMP) also provides additional security.

9. Data Loss Prevention Technologies

Organizations that handle sensitive data need to prevent it from falling into the wrong hands. Data loss prevention (DLP) tools can help with this. These technologies are designed to prevent sensitive information from leaving the organization’s network, whether purposely or accidentally, via email, instant message, file transfers, website forms and even printing. DLP technologies use rules to spot sensitive information and abnormal transfers of data.

10. Email Security Appliances

Email is a leading security threat, and all organizations that use email should take steps to protect it. Unsecured email systems can lead to vulnerability to phishing, viruses, identity theft and hacking. Security software and technology, as well as established security practices and policies, can help protect an organization from email-related threats. Some email software comes with integrated security measures. Email security tools can be hosted on-premise or in the cloud.

Email security appliances may be able to detect and block fraudulent senders and prevent attackers from using your domain. They may also provide protection from any malware that may be included in an email, including files that become malicious after staying dormant for some time.

11. Web Security Solutions

Lots of threats are hidden across the internet, even on otherwise legitimate websites. Web security solutions can block risky sites and other web-based threats, as well as test unknown sites before letting users link to them. They may also monitor network activity, detect web-based threats and repair damage caused by them. Web security tools also allow staff to monitor and control what’s happening on an organization’s network. It can help in enforcing policies for web use.

12. Virtual Private Networks

VPN Virtual Private Network Security

Virtual private networks, or VPNs, are an essential security measure if you have branch offices or remote workers who need to access company applications and resources. VPNs are encrypted connections from a device to a network, or between two networks, that takes place over the internet. They ensure that data can be securely transmitted and prevent unauthorized individuals from eavesdropping on your traffic. VPNs use authentication technology to verify the identity of a user. They may also ensure that a device meets security requirements before allowing it to connect.

13. Behavioral Analytics Tools

Behavioral analytics tools establish a baseline of normal activity across the network and then monitor for activity that’s out of the ordinary. If they detect an anomaly, they can send an alert to security staff who can take action to stop the attack. These types of tools may use artificial intelligence to uncover abnormal activity. Behavioral analytics tools are useful for detecting attacks that may have slipped past preventative measures.

14. All-in-One Network Security Hardware Appliances

Some security equipment combines multiple features into one device. These types of devices are sometimes called network security hardware appliances. These tools act as an all-in-one security gate and may perform the functions of a network firewall, VPN and router. It works to prevent threats from entering your network and can alert you if an attempted attack occurs.

There are various types of these all-in-one devices. One example is the Cisco Adaptive Security Appliance 5500 series, which provides next-generation firewall security and VPN functionality. The Juniper NetScreen-5GT includes a next-generation firewall, VPN capabilities and integrated malware protection.

Security Products and Services From Worldwide Supply and Worldwide Services

 

At Worldwide Supply and Worldwide Services, we have an extensive inventory of products, including many security products from top brands. We offer new, used and refurbished equipment and can save you as much as 80 percent on purchasing form OEMs. We also provide same-day and next-day delivery to many cities around the world.

In addition, we provide managed IT services including third-party maintenance, network monitoring and lifecycle management. To explore our inventory of security products, browse our products page. You can also contact us for help find the right product for you.

read more

When You Should Use a Third-Party Maintenance Provider | January 03rd, 2019

All equipment breaks — it’s just a matter of time. What’s most important when that happens is how soon you’ll be back up and running. Your choice of maintenance providers and repair services can mean the difference between keeping your network going strong or having to wait, delay and refund customers.

It can be difficult to understand when to use third-party maintenance providers in these mission-critical situations. We’d like to provide you with five main things to consider about your big maintenance decision.

1. Supporting Every Piece

One of the best reasons for choosing when to use third-party maintenance is when your network uses equipment from different providers. A TPM can provide service on equipment from multiple OEMs and even more product families under a single contract.

Having one source for your maintenance and emergency repair support means you only need to have one contract, regardless of what needs service. When a TPM is your sole provider, you can save significant time when your network goes down, and it can speed up repairs to get top-line equipment back in the field.

Third-party service providers also have more experience with different OEM equipment. Their expertise ensures the technician can address your product and its larger role in your network. For instance, our support team can best advise repairs or replacements for your Oracle gear based on what’s deployed in your back office, remote sites and on-premise installs.

Knowing when to use a TPM can dramatically speed up your recovery with comprehensive support.

2. Saving Money

You already know that third-party equipment providers can help you save significantly on the items you purchase. Turning to that same company to provide your service and maintenance can continue those savings.

Your equipment provider typically offers a comprehensive warranty on the goods you buy. For instance, Worldwide Services provides a lifetime warranty on each piece of new or refurbished equipment we sell. Relying on that warranty, instead of purchasing a warranty or service through an OEM, ensures you’re getting the most out of your investment.

The main concern for costs with a TPM is whether you’re using unauthorized or unlicensed hardware and software. Ask your TPM about the products they sell and the support they offer. Always request documentation around licensing, too. One of the biggest questions around when to use a third-party maintenance provider is if you can trust them. It is perfectly reasonable to ask a TPM to back up that trust.

3. Prioritizing Availability

Large OEMs have large maintenance and service departments filled with multiple layers of managers and complex hierarchies. Every request for support is raised up the flagpole higher and higher, until it’s finally approved. For your network and mission-critical components, this might take too long.

TPMs specialize in availability. It’s how they earn their living with support, plus it’s how they ensure they have the right products people need. To meet these needs, TPMs have teams that can quickly be deployed to service or replace customer components. The faster a TPM can get to you and make that repair, the sooner they get paid or have a new piece of equipment to sell to someone else.

TPMs prioritize speed to maximize customer satisfaction as well.

4. Extending Equipment Life

Equipment in your network can be dozens of years old. Some pieces might even be beyond their end-of-service and end-of-life dates. When equipment reaches those dates, traditional OEMs limit or halt the service and maintenance they provide.

If you’re looking at older equipment you need to keep to run your networking, consider a TPM. These providers are often able to keep your equipment in prime condition, extending its life. TPMs aren’t trying to get you to replace equipment with the newest model. TPMs want to help you maintain your network however is best for you.

5. Improving Costs Versus OEMs

In our experience, OEM support costs and contracts tend to rise in price after your initial term, sometimes as short as a few months. In other words, the costs go up when you’ll actually need maintenance or service. You don’t have a chance to negotiate this either.

Working with a TPM gives you a chance to have costs set for the full contract or warranty period. Plus, most offer packages designed to reduce your costs or are willing to discuss specific coverage and pricing options to fit your budget. An OEM is large and has standard contracts to streamline the process on their end. What’s most important, however, is getting things right on your end.

Think about your biggest concern. Is it price, replacements or innovation? How does an OEM’s rigid structure support these ideals? What would make it more appealing to you?

The right TPM can help you answer those questions and tailor a package to suit your needs based on those answers. Worldwide Services does just that for the more than 14,000 businesses we partner with each year. It’s the main reason they come back time and again.

Contact us for a free consultation to see why it might be the right option for you.

read more

How Your Business Can Reduce Network Equipment Maintenance Costs | December 04th, 2018

Network Equipment Maintenance Costs

IT managers spend ample time choosing network equipment that best suits their companies’ needs, but often make less-than-optimal decisions about the most cost-effective strategy to save money on network maintenance costs. However, the job doesn’t end with selecting and installing the equipment. Understanding which maintenance and support contracts to purchase, aligning their payments with other contracts, planning for the machine’s projected lifespan and taking advantage of new technology are only a few aspects of how you can reduce network equipment maintenance costs.

Network equipment maintenance is necessary to make sure your investments in equipment last as long as possible and keep your tools operating at the highest efficiency levels. Every internal and external device within a network plays a role in ensuring data is accessible, and all facets of the system are functioning properly. Without a properly working network, strategic decisions become more volatile and unpredictable. There are several ways to increase network availability, reduce maintenance costs and make your business run much more cost-effectively.

Review Projections to Reduce Costs

IT professionals should always keep thorough documentation of the inventory and map of the network. Doing so allows you to assess each network component, and assign it an appropriate maintenance service level. Implementing a good network strategy will make it easier to create and meet measurable goals while optimizing network design, making the wisest investments for necessary equipment and gaining maintenance contracts.

Conduct network growth projections two to five years in advance. Doing so will save you time by not having to establish different subnet designations each time you make a change to the network, and you can also find areas where you can save money by reviewing how critical each component is to the business. After deciding which elements are the most vital, IT professionals can better plan for network performance and alternative support options, and further improve hardware, maintenance and support.

Analyze Current Maintenance and Support Contracts

Analyze Current Maintenance

When reviewing existing maintenance and support contracts, the first step in measuring their effectiveness is to rank them in order of their importance. The more critical the device is to the business, the higher the service level it requires. Gear more toward the bottom of the list may not need any maintenance. When considering the application of maintenance and support in your networking software and hardware, here are some things to consider:

  • Importance equipment has to the business
  • Risk of having lower-level service
  • Impact equipment failure would have on the business

For example, if a workgroup switch goes down and affects a dozen or so employees, it won’t be too detrimental to the company’s well-being, and the workers will likely be happy to have a bit of a break in their day. However, if a core router goes down and impacts many functions and individuals working throughout a network, significant problems could arise for the company.

Keeping spares on hand is a great idea, combined with spares management contracts for your equipment that will replace a faulty part upon its failure. Instate a sparing policy to determine the minimum total cost of investment and load curtailment costs, while classifying spares and failure rates. Using a sparing method can optimize your substation components to maintain network uptime and save your business money by helping you know what spare materials you have on hand and how best to use them.

OEM contracts have also earned a reputation for tacking on certain perks that aren’t necessary to gain access to a service or offering you may need. By bundling services, they appear to be offering more value, but in reality, they are just creating unnecessary coverage and substantially increasing the cost.

Maintenance contracts often include guarantees for replacements or repair if you have an issue with any parts. Frequently, the agreement encompasses more than just this benefit, and regularly releases software updates that keep routers and firewalls running optimally. IT managers often overlook these updates, so make a point to check equipment for software updates.

Worldwide Services customers save as much as 50 to 90 percent on network equipment preventive maintenance with NetGuard. NetGuard is Worldwide Services’ third-party maintenance program that allows IT professionals to add and manage any support contract. If you order a replacement, it will arrive within 24 hours, and come with expert-level technical assistance.

Extend Equipment Life

Extend Equipment Life

Once a piece of equipment is more than 10 years old, it is likely time to consider a replacement. When searching for equipment to purchase, always be mindful of limited lifetime warranties many manufacturers offer. These types of warranties are best for less critical parts of your network, and come packaged with technical support and hardware replacement. In addition to the benefit of not having to worry about your equipment failing prematurely, you also can save on support and maintenance costs. When deciding the best maintenance service level to purchase, a few elements should be at the forefront of your decision:

  • Type of equipment
  • Age of equipment
  • Importance equipment has to the business

IT managers often choose the same level of service for all their equipment to save time and maintain uniformity among contracts. However, this isn’t the best practice, since it typically results in wasteful expenditures that would have been preventable with a little more research and time during the selection process.

Original equipment manufacturers, or OEMs, get IT managers to spend extra money by building in a need for equipment replacements, or double-covering existing equipment. A strategy they use is to issue an “end-of-life” notice on equipment that may be at the end of its shelf life, but is still performing perfectly. Taking the OEM’s word for the equipment needing a replacement leads many customers to make new purchases unnecessarily.

Proper Management of Maintenance Contracts

Networks are always changing, with new parts coming in simultaneously as older parts are getting repurposed and swapped to other machines, or in some cases, discarded. While there’s such a vast variety of devices on different contracts from separate vendors and expiration dates, managing contracts and keeping track of equipment can be incredibly stressful and time-consuming.

Most IT professionals who deal with these challenges in their line of work use basic methods of contract management that may do a proficient job at keeping track of your assets, but ensuring with complete certainty your inventory is not causing any problems due to coverage gaps can allow you to create an even more successful maintenance strategy.

Aligning your contracts to terminate simultaneously can make for an easier renewal process going forward. Consolidating various maintenance contracts to tailor to your business’ needs, instead of a deal that spans multiple years or locks you in indefinitely, is a lousy option as opposed to a more flexible monthly plan. Avoiding automatic renewal clauses is good practice, because although these contracts ensure you’ll never lack coverage, they keep you locked into the same coverage and price plan, potentially prohibiting you from getting their best rate. By planning when your contracts will renew, you can enjoy increased network availability and reduced maintenance costs.

A good practice is to lock in your annual rate for three to five years ahead of time. Negotiating a set rate ahead of time will save you time annually because you won’t need to renegotiate budgets, which simplifies planning. You can use the time you saved to look further ahead in your business plan and figure out the best method of attack once the predetermined time you set your annual rates expires.

Be sure your contracts explicitly state a clear understanding of requirements, so no party involved can plead ignorance to fulfilling it. Any network maintenance contract should describe which services the agreement covers, what it does not, the role of both the OEM and the client within the deal, timeframes of service and specific procedures for resolving issues.

Many inventory and contract management tools have systems in place to help maintain your network equipment and develop better strategies without the added stress. If your network uses more than 1,000 devices, it is even more important to use third-party software to organize your inventory maintenance and renewal processes.

Consider Hybrid Support Services

Hybrid Support Services

Hybrid support services — the combination of internal and external services using both internal and public clouds to support a business outcome — are a growing trend that is transforming the role of information technology. These services are best for the following:

  • Connecting several clouds
  • Identifying and classifying data
  • Implementing a more service-oriented architecture

Cloud computing comes with advantages and disadvantages. It offers significantly lower overhead through the transfer of services to cloud providers in exchange for a more volatile and dynamic market than traditional IT computing environments.

It may be a good idea to use cloud computing for less critical IT services like projects in the development phase or testing applications. There’s little risk in experimenting with hybrid support services in situations that prove less detrimental if anything were to go wrong.

When handling critical data and essential applications, several drawbacks make IT organizations more reluctant to embrace cloud services fully. Common issues include:

  • Failure to meet security requirements
  • Failure to integrate with enterprise management
  • Hosting critical applications is not guaranteed

Combating these issues is where hybrid IT architecture can come into play. By using both the external cloud and internal methods, IT organizations can offer their customers the speed, price and capacity of the cloud while keeping the security the organization requires for its most critical components.

Be a Savvy Shopper

Limited research leads IT decision makers to succumb to marketing tactics, or arrive at a costly decision when there is a better one at a more affordable price right around the corner. Take ample time when choosing equipment and contracts, and always be sure to get quotes from multiple vendors to drastically cut costs from your IT budget.

Shopping around allows you to become more familiar with the market and make more sensible decisions on what a reasonable price is for the sort of coverage you are looking for. Also, be wary of deals that seem to be a steal, because you have very likely overlooked details in the fine print.

Once a potential vendor has informed you of their rate, make sure that is the best price they are willing to offer. Rates are always negotiable, and the vendor is likely to reduce their costs if they know it’s the difference between landing you as a customer or not. It never hurts to ask, even if you have to be assertive in your negotiations.

Third-party hardware maintenance providers are also excellent for finding coverage very similar to more expensive competitors while paying a fraction of the price. Compared to OEMs, third-party providers also generally operate more freely, allowing them to grant you more flexibility in a plan. Their business also usually follows fewer protocols compared to a large manufacturer, so they can tailor a plan specifically to you. It is important to research a third-party company to ensure you are not sacrificing quality, but most of the time, manufacturers use third-party providers on their own accord to handle maintenance coverages.

A used product is also an option if you are not looking to invest in brand-new equipment. Considering purchasing a secondhand device isn’t a bad suggestion if its function is less critical to your business. If a used product is significantly less expensive than its brand-new counterpart, a little research into the item to determine if it has any faults, or its projected lifespan, could prove to be cost-effective if it operates just as well as a new part.

Companies such as Worldwide Services provide millions of products that are available online and for immediate delivery. Worldwide Services offers 24/7 technical support, certified engineers for configuration support and system design and spare and repair services, all to the highest international standard. If you believe a third-party hardware maintenance company may not offer the same security in your purchases compared to a name brand, this is untrue for many smaller, reputable dealers. Worldwide Services provides a lifetime warranty, and we give value to our customers by offering information and assistance on our company blog that has industry-specific insights into the IT world you can use to optimize your career. You can also contact us directly here for any questions you may have.

Understanding the Market

Understanding the Market

Saving on network maintenance costs ultimately comes down to allocating your time and resources to the right actions. Projecting the rate of growth within your network, setting a standard for equipment and contracts years ahead, reviewing ongoing contracts’ efficiency and relevance to your business’ success, choosing the correct warranty for your equipment and exercising wise shopping practices are at the forefront of importance for how your business can reduce network equipment maintenance costs.

Contact Us

read more

2 Ways You Can Save Money with Third Party Maintenance | August 09th, 2018

2 Ways You Can Save Money With 3rd Party Maintenance
Can third-party maintenance services really save you money? Accenture, a leading worldwide business consulting firm, reported numerous saving opportunities, as a result of utilizing third party maintenance services for their network maintenance needs.

Companies can experience significant savings if they are willing to consider third-party maintenance options to optimize their IT cost structure, and the added benefit of possibly improving their global coverage.

Let’s highlight two ways your IT department can enjoy the same benefits from third-party maintenance (TPM) providers:

  • Extended coverage on products no longer supported by OEMs
  • Reduced IT maintenance and network costs without compromising quality

Continue reading to learn how you can start saving 50% to 80% simply by making the shift from your Original Equipment Manufacturer (OEM) to TPM service providers.

Why shift from OEM services to TPM providers?

OEM’s are seen as the best option for IT maintenance services primarily because they are the manufacturers of these products and devices. OEM’s also have highly skilled and knowledgeable service engineers who are experts in troubleshooting hardware and network problems. So why are businesses making the shift from OEM’s to third-party maintenance services?

The demand for maximum value on hardware investment

It all began with the era called “end of support life (EOSL).” When these OEM’s ended their services and discontinued providing parts for certain product models as a strategy to compel their customers to upgrade, IT organizations looked for a more economical option. They sought a solution that could help them extend the life of their hardware investment — TPM providers.

TPM’s response to EOSL: The power to say “NO”

While OEM’s are putting an end to the service of outdated products, TPM providers breathed hope into these devices. They extended the coverage on products no longer supported by the OEM. Thus, rather than saying “YES” to the demand of OEM providers for them to purchase a new product model, businesses were able to say “NO.”

With this, third-party maintenance providers gave the power to decide, back to these companies. As a result, they are able to:

  • Keep their current hardware infrastructure
  • Maximize the value of their hardware investment
  • Save on IT maintenance costs

NetGuard Maintenance Plan, the third party maintenance service offered by Worldwide Supply, is the top alternative to OEM’s network maintenance today. Learn more about the difference between OEM and TPM.

TPM and the disenchantment with the OEM’s service (CISCO)

Another reason for the shift from OEM to TPM is the level of service provided by these OEM’s. For decades, many thought of OEM’s as the best maintenance provider for their piece of hardware. It’s the brand name they carry, so they must be the best. Highly unknown is that many of these OEM’s are actually outsourcing their service delivery to other service providers.

CISCO, the number one provider of network equipment and flexible networking solutions, outsources their CISCO network service, CISCO maintenance, and CISCO router troubleshooting services.

Yes! This may come as a surprise, but the Level 1 and Level 2 support are often performed by CISCO partners and not CISCO themselves. The only time it is handled by an OEM is when the service has been escalated to a Level 3 request.

Why is this?

OEM’s reward their partners for the minimal use of OEM engineering resources. Therefore, these partners do their best to handle your service request at their level without escalating it to CISCO, even when it is clearly needed. This escalation process serves as a barrier, and, as a result, you end up waiting for hours before your concern is properly dealt with.

That is, however, never the case with TPMs. There are no artificial access barriers and all of the service requests are treated as a priority and are handled without undue delay.

Now it makes sense, right?

OEM providers are seeking help from third-party maintenance service providers to lower their operational costs at your expense. So why continue to pay more when you can directly hire the services of a TPM provider?

Now is the perfect time to make the shift. Start your savings today, especially with the following numerous benefits Worldwide Supply has to offer:

  • Equipment substitutions with a 24-hour support line
  • Impressive response time with 4-hour onsite service
  • Single portal service for all your maintenance agreements and plans
  • Vast troubleshooting capabilities support with over 100 past and present product lines, including 400 global service and sparing centers in 79 countries

Deciding to outsource to a third party maintenance service provider for the first time can seem like a big endeavor. However, the savings can be substantial and possibly include other benefits such as flexible SLAs and inventory management services.

read more

How Third-Party Maintenance Providers Help Your Business Make Better Decisions | July 05th, 2018

As a business owner, you know what an increasingly important role technology plays in your company’s success. Businesses of all sizes rely on network technologies to accomplish their most important functions. The day when a business could afford to ignore the Internet, smartphones or social media is far behind us.

You also keep a close eye on the bottom line, and you are more than aware of how expensive upgrading and maintaining your technology can be. You would like to spend more of your company’s budget on your network technology services, but that isn’t always possible.

For many businesses, big or small, the question they face increasingly is choosing between original equipment manufacturers (OEMs) or third-party maintenance (TPM) providers to maintain and service their networks. It’s an important question because how you make this decision will affect your upgrade schedule, your regular maintenance schedule, your ability to solve network problems quickly and efficiently and your company’s bottom line.

OEMs Versus TPMs

At first glance, choosing an OEM seems like a straightforward choice. If money is not a concern, then an OEM’s support team offers detailed knowledge and maintenance experience for the network solution you have chosen from them. An OEM will also offer you advice on when to upgrade your network.

Another apparent advantage to choosing an OEM is that they look to be reasonably priced when you first work with them. This reasonably priced model often lasts for the first few months of your contract with an OEM.

However, these apparent advantages can often vanish before you utilize the benefits.

OEMs’ support contracts tend to rise in price after those first few months. During those initial months, you may not even use the service. You’re more likely to need it as your equipment ages, and when prices are higher.

While OEMs would like for you to use their products for all your networking needs, the reality is most companies work with more than one OEM. You might contract with one company for your network security, another for your routers and switches and a third for your LAN equipment. That’s a lot of potentially high-priced maintenance contracts to keep on the books.

Then there’s the question of upgrading your technology. OEMs manufacture hardware, and it’s in their best interests for you to continue upgrading that hardware on their schedule. But most companies don’t need to upgrade as often as OEMs suggest. And not every piece of equipment needs to be upgraded at the same time. Top IT analyst firms, like Gartner and Forrester, have driven this point home recently in their research.

This is why TPMs are playing an increasingly important role in companies’ business decisions.

  • TPMs typically don’t make their own hardware. They are all about service. As a result, they can offer a much better price on a maintenance service plan.
  • Because you likely use products from various OEMs, using OEMs for service requires multiple contracts. A good TPM will be able to provide third-party network management and maintenance for all your hardware at a much lower price than you would pay for a separate contract with each OEM.
  • Companies once avoided TPMs because they were worried that they only had access to low-quality replacement parts. But that is not the case anymore. TPMs now have access to many of the same replacement parts that OEMs do. In fact, some OEMs use TPMs to get their replacement parts because they are less hindered by bureaucracy and other delays.

How to Make Better Business Decisions With TPMs

The growing importance of third-party maintenance providers means that businesses can make better and smarter decisions about the technologies they use. Previously, companies were only able to use solutions offered by OEMs. This meant they had no choice but to pay maintenance fees for all of the components of their network and upgrade them on the OEMs’ schedule. This business model did not give companies choice.

The emergence of TPMs means that companies now have a freedom that did not exist in the past.

  • Companies are no longer tied to OEMs for maintenance or upgrades.
  • Companies can now move at their own speed and make decisions that better reflect their needs.
  • Companies that work with TPMs, whether they hire them to support their entire network or select parts of it, report considerable cost savings.

Advantages of Third-Party Network Maintenance

Research shows that there are at least two conditions that should prompt you to explore using TPMs instead of OEMs.

  • Upgrading regularly is not a major concern. If you’re using technology that is two or three releases behind the most current one but is providing the services that you need, then using a TPM for maintenance makes a lot of sense.
  • Your software needs are all set for several years. If you know you’re not going to need new software for five to 10 years, then why commit yourself to an expensive OEM maintenance contract? Once again this is a situation where working with a TPM makes a lot of sense.

When you decide to use third-party maintenance providers for your business, you are giving your business several key advantages.

  • Save money: All businesses want to be successful and offer their customers and clients memorable service and products. At the same time, you need to keep an eye on your bottom line. Using a TPM is one way that you can do this. When TPMs customize and streamline your maintenance plans, you can reduce costs by 50 percent or more in many cases.
  • Be more efficient and flexible: Companies tend to use equipment from several different OEMs. This happens because of cost factors or because your IT staff prefers using a particular vendor for a particular need. Regardless, this can be expensive and can potentially cause problems. If some part of your network experiences problems, but you’re not sure from where the problem originates, you can spend a lot of time talking with a variety of OEM customer service people while you try to pinpoint the exact issue. Working with the TPM eliminates these issues because TPMs can service all the components of your network.
  • Innovate strategically: In the past when a business worked only with an OEM and a piece of hardware reached its end-of-life (EOL), the OEM encouraged you to replace that piece and many other pieces of the network to stay “current.” TPMs changed all that. When you work with a TPM, you can innovate strategically and selectively. It enables you to replace one piece of your network when it is needed and leave other pieces that are functioning well alone. TPMs enable you to innovate on your schedule and save money at the same time.
  • Keep your equipment in service for longer: If you already know you don’t need to upgrade regularly and you’re all set for your software needs for several years, why agree to an upgrade schedule determined by an outside provider? If your equipment is working well and services all your needs, there is no reason that you cannot keep using it for an extended lifespan. TPMs aren’t interested in selling you new hardware, only in keeping the hardware you have in good operating condition.
  • Find a maintenance plan that fits your business: OEMs lack flexibility. They charge a flat rate for specific services. If your problem falls outside the boundaries of those services, you will pay extra. Or, on the flipside of the coin, you end up paying for services that you never really need. Also, what you pay for maintenance service increases as your equipment ages. TPMs offer customization and let you create a plan that focuses on the exact services that you need.
  • Create an OEM-TPM network hybrid model: Sometimes you want to work with an OEM. Their upgrade schedule and maintenance service plan works best for a specific piece of technology. But other components of your network, like VoIP or firewalls, don’t need to be upgraded as often and don’t require an OEM maintenance service plan. What you need in this situation is a hybrid model. Hybrid models are a major development made possible by TPMs.
  • Freedom: The OEM business model requires them to constantly sell you new versions of hardware or software to remain profitable. This works for them, but it doesn’t always work for you. When you work with a TPM, the decision-making power remains in your hands. You decide when an upgrade is needed. You decide when a component of your network needs to be scheduled for maintenance.

How to Select the Right TPM Service Provider for Your Business Needs

Working with a third-party maintenance company is an integral part of determining how to make better IT decisions for your business. But you want to make sure you choose the right TPM. Not all TPMs are equal, so you’ll want to invest time in finding the perfect partner for your business.

  • It’s in the contractual details. When you negotiate a contract with a TPM to provide maintenance support, make sure that the agreement explicitly defines the responsibilities of the TPM. It should also include details about what costs are incurred if a problem escalates, whether the TPM needs an on-site office and what happens if the TPM can’t solve the problem.
  • Knowledge of a variety of hardware and software. Businesses didn’t work with TPMs because of the misconception that they were limited in their ability to deal with diverse sets of hardware and devices. This is just not true. However, before signing a contract with a TPM, ensure they have the skills and knowledge to work with the various components of your network. Remember, working with a TPM makes sense because they don’t make hardware. Instead, they’re all about service and maintenance. Make sure your TPM can deliver in that area.
  • How fast do they answer support calls? When you’re all about service, you should also be all about speed. One reason businesses move away from OEM maintenance service plans is the lag time between the original phone call and when the service takes place. Talk to other businesses currently using TPMs you are considering and ask about their response time.
  • Are they logistically capable? If you need to replace a component of your network, can your TPM do it with minimal downtime for your business? A good TPM works with large volumes, has strategically placed forward stocking locations (FSL) and has the necessary licenses to deliver replacement parts.
  • Do they give good advice? A good TPM not only provides third-party maintenance services but also acts as a kind of consultant for you on important matters related to your network. They can help you determine when it’s time to replace a network component, how much longer a part will function correctly and whether your maintenance schedule needs any changes or revisions. If you’re going to buy a new piece of hardware, they can help you choose the best option. A good TPM will have the knowledge and experience to help you with all of these decisions.

When choosing a third-party support provider, you shouldn’t gamble. A little research goes a long way and will help you find the partner that enables you to make the best decisions for your business.

Work With Worldwide Services for All Your Networking and Service Needs

Worldwide Services has the technical expertise and the broad experience to help you make better business decisions.

The over 14,000 businesses with which we partner recognize us as a premier networking equipment provider. We pride ourselves on providing superb customer service regardless of where our customers are located in the world.

Every aspect of what we do conforms to the highest industry standards. We have been certified to TL 9000 standards, and our IT quality management systems are the most comprehensive in the industry. At Worldwide Services, we care deeply about quality and providing our clients with the best customer service.

Contact us today for a consultation or a quote. We look forward to working with you.

read more

Always Supporting The Leading Technology Brands