Advanced Endpoint Protection Traps


Advanced Endpoint Protection Traps is a better solution than traditional antivirus. AEP traps has a multi-method prevention approach that secures endpoints against known and unknown malware and exploits before they can compromise a system. Traps prevents security breaches and successful ransomware attacks, in contrast to detection and response after critical assets have been compromised. In … Continue reading Advanced Endpoint Protection Traps

Overzicht samenhang beheeraspecten. Een onderschatte tak van sport.


Veel artikelen gaan over techniek / infrastructuur. Maar techniek moet beheerd worden. Het is een lastige en ingewikkelde taak. Vaak een onderschatte taak. Wat komt er zoal kijken bij het beheer. Hier in dit artikel worden vele aspecten kort aangestipt die met het beheer te maken hebben. De conclusie is dat beheer onder invloed stat … Continue reading Overzicht samenhang beheeraspecten. Een onderschatte tak van sport.

Overview project documents and sheets


Documentation is the keystone for the ICT and yet many people dislike the task of documenting. Unfortunately a lot of documents must be created and maintained. IF not the operation and projects do run a high risk of malfunctioning.  And the organisation could be in jeopardy. What type of documents must be created and what … Continue reading Overview project documents and sheets

High security controls moving from military to the business


EICAR EICAR is a 68-byte .com file detected as "EICAR-Test-File". This IS NOT a virus but is a manipulated file for testing for the presence of Antivirus systems in email, the file system, or other places. This test file simply displays a text message and returns the control to the operating system. Software vendors agreed about developing a uniform … Continue reading High security controls moving from military to the business

Testing – Rules of engagement


Testing is depending on a lot of other areas within an ICT project. Ignoring these dependencies and not following the principal rules can have devastating results on the testing. Here you find some come ground rules (principles) which contributes to better test results. Requirements / Statement of Work (SOW). Have (very) clear requirements in the Statement … Continue reading Testing – Rules of engagement

Control your devices in your network!


Long ago, 20 years, you had a terminal emulator such as 5250-emulator to connect to your system. Now-a-days you have so many devices that can be connected ranging from laptops, tablets, cellphones to printers and any endpoint that has an IP-address. How do you control so many devices that try to access the network from … Continue reading Control your devices in your network!

Blog statistics 2016 Toolsynergie


Here, an annual report on WordPress.com 2016 Toolsynergie. How attractive it has been for her readership. Read the statistics and determine whether ToolSynergie is an attractive site. VISITORS So if you want to move 771 people you need to have almost 20 busses for transportation.   Furthermore on the blog site Toolsynergie,  the number of  readers … Continue reading Blog statistics 2016 Toolsynergie

The irrational human being and the dangerous undercurrent.


The dangerous undercurrent Projects that will fail before it even starts and we still proceed; odd technology acquisitions that cost a lot of money and management already knew; unexplained mergers that ends in a disaster while investigations  and reports already highlighted the bad outcome and yet the reports went into the shredder; implementing methodologies no … Continue reading The irrational human being and the dangerous undercurrent.

STIX and TAXII, standards on security information exchange


Security is becoming increasingly important. Cybercrime is sophisticated and it takes more money, resources and most important, it requires a joined effort of our security solutions. Customers, vendors, commercial and non-commercial organisations should work together in order to defeat or minimise the impact of threats. In light of this two major developments in the area … Continue reading STIX and TAXII, standards on security information exchange

Application migrations to the Cloud


It is a huge endeavour when organisations wants to move their business to the Cloud. One of the many decisions you have to make upfront is the migration of your applications to the Cloud. Thinking about migrating your applications is always good even if your are NOT going to the Cloud. Applications support the business directly … Continue reading Application migrations to the Cloud

Implementing Microsoft Azure Infrastructure Solutions 70-533


Recently I found a very good website called CloudRanger with a complete training course about "MS Implementing MS Azure Infrastructure Solutions." The owner is Shawn Ismail and he is the creator of this training. Many thanks Shawn! My page is just meant as a passthrough to his website CloudRanger. Purpose training The website at CloudRanger lists all … Continue reading Implementing Microsoft Azure Infrastructure Solutions 70-533

Many reasons why projects succeed!


Do you recognise this? Projects finish on time within budget and constraints, and all the stakeholders needs and requirements are fulfilled. The teams operating exactly according to the guidelines and are "self steering" teams. The team members are inspired and there is no hidden agenda and all involved members are not afraid of changes. If you have … Continue reading Many reasons why projects succeed!

OpenStack: Install, build and run IaaS cloud with Open Stack | Udemy


ICT is all about knowledge and experience. In order to keep up the pace of developments within ICT you have to keep on learning. What is hot today, will be outdated tomorrow. On average, the life cycle of services and products as well as methodologies and techniques is about 3 years. For me I chose Cloud and … Continue reading OpenStack: Install, build and run IaaS cloud with Open Stack | Udemy

Cloud transformation – part one – Technology


Herman Rensink, Data center Architect / CISSP. Here I talk about the technological transformation which is one of the 3 key areas besides organisational and procedural.  Transformation is a continuous process and is done in steps that can be overseen and done. It is NOT a radical change but rather a good managed process with … Continue reading Cloud transformation – part one – Technology

The all-devouring black hole of ICT


 Herman Rensink Datacenter - & Cloud Archtect / CISSP   No doubt, ICT is complex! And the demand for ICT is increasing exponentially. Pushed by technologies like mobility,  The Internet of Things (IoT) and Big Data. They are all a catalyst and creating a huge demand. Can ICT keep up with this growing demand! Or is … Continue reading The all-devouring black hole of ICT

Are recruiters a bunch of incompetent professionals?


Are recruiters a bunch of incompetent professionals? That was a question posed on LinkedIn recently.  The labour market is changing at a rapid pace. Now a days we talk about flexibility of the labour market. A recent development that has not yet been crystallised by a long shot. On all sides you will notice that the … Continue reading Are recruiters a bunch of incompetent professionals?

“What….is” – Cloud Features


Here is a good video on YouTube about the basics of the Cloud. Topics such as Why public Cloud, Getting started, Features,  Costs, Operations, Security, Hybrid Cloud and DeskTop as a Service. It is presented by Pluralsight author & IT Consultant Elias Khnaser. The title "The difference between  MS Azure and Amzon AWS is not quite … Continue reading “What….is” – Cloud Features

NIST Computer Security Publications – NIST Special Publications (SPs)


Herman Rensink Datacenter - / Cloud Architect /CISSP (Associate Member ISC2) The National Institute of Standards and Technology (NIST) is a measurement standards laboratory, and a non-regulatory agency of the United States Department of Commerce. Its mission is to promote innovation and industrial competitiveness. It is ONE of the many sources on the Internet. NIST's activities … Continue reading NIST Computer Security Publications – NIST Special Publications (SPs)

Cloud features explained – Continued


 Herman Rensink Datacentre & Cloud Architect / CISSP In my article earlier on about  Cloud features explained I have summarised and explained a few features of the Big 3 Cloud providers from Amazon, Microsoft Azure and Google. In this article I continue where I left of and give you some additional information about the features. NOSQL Database … Continue reading Cloud features explained – Continued

Cloud Comparison BIG 3 Azure, AWS and Google


Herman  Rensink - Datacenter & Cloud Architect / CISSP. 25 years of ICT experience in infrastructure and security in large data centres.  The Cloud offers a "million" possibilities. Where can I find this information and how to choose? What provider does fit my needs? These are just some questions. In order to help you in … Continue reading Cloud Comparison BIG 3 Azure, AWS and Google

Commonalities and differentiators Cloud providers


Herman Rensink, Datacenter Architect / CISSP . When going to the "Cloud" an organisation has to decide on many subjects like Management strategy, Migration strategy, and Transition as well as Transformation strategy. However, in the early stage, before thinking about going to the Cloud you have to have a very good and clear picture of … Continue reading Commonalities and differentiators Cloud providers

Battle between old and young!


  Herman Rensink, 56 years old, Datacenter and Infrastructure Architect / CISSP. Before I continue with my opinionated article about the battle (or polarisation) between old and young based on age difference, I wonder if I am personally suffer from paranoia and is therefor my judgement clouded? Or is the identified trend, the battle between old and young … Continue reading Battle between old and young!

Trends in Data centers & Cloud


 Herman  Rensink - Datacenter & Cloud Architect / CISSP This article describes in a number of key themes that are related to each other and outlines the direction which Data centers and Cloud are going. Delivery models Governance Technology Deployment and provisioning Operations DELIVERY MODELS C-level executives realise that ICT is constantly increasing in importance … Continue reading Trends in Data centers & Cloud

The future of data centers & workload management


Herman  Rensink - Datacenter & Cloud Architect / CISSP A data center is nothing more than a logistics company which makes digital information (bits) available to the applications of business at the right time and under the proper conditions. In order to achieve this a data center offers computer power, resources or, in more generally … Continue reading The future of data centers & workload management

Data centre of today & future


  Herman  Rensink - Datacenter & Cloud Architect / CISSP Demand for ICT Een datacenter (DC) kent veel dynamiek waarin behoorlijk wat innovaties en migraties plaatsvinden. Het motto van tegenwoordig is “snel leveren” maar dat moet wel tegelijkertijd tegen lagere kosten, met minder personeel en tegen hogere eisen (zero down time en oneindige capaciteit). Dit allemaal … Continue reading Data centre of today & future