Microsoft to Scan All of Your Company’s Private Data in Azure and Office 365

In the wake of the recent news that campaign consultants Cambridge Analytica used data from 50 million Facebook users to target digital political advertising during the 2016 U.S. presidential election, it’s brought up many tough questions once again as to just how these large technology companies are using your data – and whether they’re doing so with your consent.

Facebook’s value has dropped precipitously since the news broke, and company founder Mark Zuckerberg will likely have to testify before Congress soon. The promise of data-driven advertising is that you will be served much more relevant material – it’s common knowledge that companies like Google and Amazon have been doing this for years. While these companies say you can control the type of information that’s shared with advertisers, it’s hard to say just how easy it is to limit access and if it’s truly being followed to the letter.

As more people and organizations move their data to public cloud environments, vendors are working closer with government entities to share information for any number of reasons – most of which having to do with supporting criminal investigations. While Microsoft hasn’t been wrapped up in this latest controversy, the company announced last month that it is going to start monitoring virtually everything across its platform – specifically calling out Office, Xbox, and Skype. According to a new services agreement written by Microsoft, it is planning to ban accounts using offensive language and will go through private data to investigate users.

Experts say that this is in response to new government regulations – specifically two new sex trafficking bills passed by the U.S. Congress: The Fight Online Sex Trafficking Act and the Stop Enabling Sex-Trafficking Act. These two acts hold platforms such as the ones Microsoft operates responsible for users’ speech, illegally shared content, and anything connected to sex trafficking. This is causing many internet privacy and civil rights advocates to speak out against the new agreement, calling it an attack on free speech and another excuse to monitor and police people’s behavior.

If you are using Azure and Office 365, this means you may need to start asking tougher questions about just how secure your proprietary information is that’s stored on these platforms. Even if Microsoft is mandated to look for specific reasons, the fact of the matter is that they now have the ability to search through virtually any data you store with the tech giant – including your sensitive customer data and proprietary intellectual property.

If you’ve been one of the many enterprises worldwide starting to utilize cloud computing in your overall IT portfolio, now’s the time to look seriously at implementing a private cloud. Private clouds are the best option if you require greater privacy, high security requirements, and the need to have direct control over your data – including the ability to customize according to your unique business needs. Private clouds also give you the ability to provision and configure virtual machines and change or optimize computing resources on-demand; hosted behind your company’s firewall or externally; and managed by you or by a third-party like US Cloud.

To learn more about the private cloud advantage, visit our website. US Cloud is ready to meet your needs to keep information safe and enable you to focus on running your business. With 2.1 billion secure logins managed since 1999, US Cloud can fully manage your private cloud with zero hassle on your end. Turn your operation into the most efficient machine possible.

Get a quote from us today to learn how you can save on startup costs and hardware with our fast, secure, and performance-driven private cloud service.

Is IoT device security the key to preventing more DDoS attacks?

IoT device securityImagine you came into work one morning, turned on your computer, and wasn’t able to access your company’s network. You may think the wifi is down or there’s a blip in the Ethernet, but then you start getting flooded with phone calls from other employees: They can’t access anything on their mobile phones, tablets, laptops … anything that requires connectivity to your company’s network. No matter what your IT team does, you’re still locked out of your network, servers, and applications.

This isn’t just any outage – it’s a Distributed Denial of Service cyberattack (DDoS), and it’s happening more and more frequently. You need to make sure you’re ready for it – otherwise you could face a tremendous disruption in business, lose money, and have to rebuild trust with your employees, customers, and clients.

DDoS attacks use junk data, usually sent from compromised machines or devices, to render a network, server, or application unavailable to legitimate users.

How can this happen? Increasingly, unsecured Internet of Things (IoT) devices such as video cameras are the source of this attack data. The more devices that are reliant on an internet connection, the easier it is becoming for bad actors to use these types of attacks to penetrate your IT environment and exploit your data. IoT isn’t going away – a recent study by PricewaterhouseCoopers (PwC) finds 63 percent of companies are planning to deploy IoT devices in the next year. IoT devices are estimated to grow from 20 billion last year to 51 billion by 2023.

You may think the answer is simple – secure IoT devices. The same PwC study also found that two-thirds of companies surveyed have an IoT security strategy in place or currently are implementing one to address the emerging risks of these devices. However, it isn’t so simple. The security mechanisms on IoT devices often are disabled by default, and security patches for the systems often are unused, allowing attackers to compromise them and use their collective bandwidth to steal your data. The distributed supply chain in which IoT devices are created and sold adds to the problem. There are three major players in IoT device manufacturing and selling:

  1. Specialized computer chip makers (e.g. Broadcom and Qualcomm)
  2. System manufacturers (e.g. Original Device Manufacturers)
  3. Brand-name companies selling to us (e.g. Fitbit and Apple)

Layer 1 is busy making the next chip, while Layer 2 is upgrading its product to work with the next chip. Maintaining older chips and products aren’t a priority. Even if you have a brand new smart watch, chances are the software components are four to five years old. The result is that hundreds of millions of devices are sitting on the Internet, unpatched and insecure. Hackers know this, and they’re working tirelessly to exploit this weakness and launch cyberattacks.

Despite the growing risk, the majority of attacks remain under the radar. Experts are finding that criminal DDoS attacks driven by extortion are coming to the fore once again. Hackers often contact businesses at a large scale and demand a bitcoin payment to prevent a DDoS. The majority of extortion attempts likely go unreported and uninvestigated. One trend fueling the rise of DDoS-extortion threats is the availability of DDoS-as-a-service. Cybercriminals rent their botnet to anyone willing to pay as little as a few dollars an hour, meaning no technical ability is required to launch attacks.

Lawmakers and regulators are trying to pressure companies to strengthen the IoT security. A bipartisan group of senators introduced a bill recently that would set security standards for IoT devices. In January, the Federal Trade Commission fined VTech Holdings Ltd. $650,000 for “failing to use reasonable and appropriate data measures” for an internet-connected toy.

As we’ve seen before, though, legislation and regulation take time to go into effect. Hackers aren’t waiting, and neither should you. How can you start to close the door on DDoS attacks on your enterprise?

First and foremost, you need to understand what’s critical to your business through a vulnerability assessment. Vulnerability assessments aren’t an opportunity to play the blame game. It’s an audit of what you have today in order to plan for a more secure tomorrow. Then, look for a managed security services provider like US Cloud which has endpoint security services that will ensure any device that is accessing your network won’t be susceptible to hackers trying to penetrate your enterprise’s defenses.

Using our next-generation anti-virus and activity recording for all your endpoints, US Cloud comprehensively monitors and protects your operating systems and infrastructure from cyberthreats. Contact US Cloud and get a quote today to ensure you’re not the next victim of a DDoS attack.

Secure Your Hybrid Cloud Environment

Cloud services offer efficiencies and productivity, agility, and cost savings. There is no question that it makes a lot of sense for many organizations to move to hybrid cloud solutions.

Many IT leaders are understandably hesitant about moving their IT infrastructure and critical workloads to the public cloud. In addition to public cloud security issues, they’re worried about losing visibility and control of their IT resources and data.

Ironically, many IT leaders don’t really know what’s in their IT environment, which means they have less visibility and control than they think. Recent ransomware and wiperware outbreaks have illuminated how few organizations have accurate records of what IT resources were operating in their environments, or even the status of the known systems. While this is due in part to the rapid adoption of things like shadow IT, it is also frequently the result of such things as personnel changes, mergers, and acquisitions. For many organizations, conducting a full network analysis before transitioning some of their network resources to the cloud is the first time an IT leader is able to scope a full and accurate view of what their IT environment looks like.

That has to be done before you can secure your hybrid cloud environment.

Where to Start

IT leaders need to know the delineation of responsibility between them and their cloud provider. That depends on whether their cloud provider is Infrastructure as a Service (IaaS), Software as a Service (SaaS), or Platform as a Service (PaaS).

Image result

A clear understanding of how much of the stack they are responsible for managing will drive the strategy for securing their hybrid cloud environment.

Key Strategies

Image result for who what where when whyKey strategies include knowing what’s running on your network, where things running on your network are being used and where users are connecting, why the things running on your network are being used, who is using the things running on your network and when.

Then, turn off what is not being used.

Unique Risks

Image result for credential managementCredential management is the biggest risk. Lots of cloud services are set up with security as an afterthought. Non-IT-trained people are setting up sharing services with things like non-expiring links, so confidential and proprietary information is sitting outside your network.

Emerging Trends

An emerging trend is that end users are setting up cloud services without considering the three tenants of information system management that IT professionals are trained to ensure – accessibility, availability, and security of information.

You don’t have someone handle the company finances who doesn’t know anything about accounting. Yet, we see companies letting unqualified personnel put the company’s proprietary information, the crown jewels, outside their network so that company data can walk out the door with them if and when they leave.

Help Wanted

Contact US Cloud to discuss your unique hybrid cloud security needs, roadmap your hybrid cloud security plan, or get pricing options for managed security services.

Follow These 3 Steps to Shine a Light on Cybersecurity in Your Enterprise

cybersecurity iconSecurity by its very nature is supposed to be in the background, working behind the scenes to ensure you don’t see the threats that could crop up at any moment. Hackers operate in the shadows, hiding in the dark web looking for areas to exploit in order to steal your sensitive customer data and intellectual property. However, an unfortunate consequence is that cybersecurity lacks the support and enforcement necessary to keep your data secure.

Your enterprise is likely similar to many we’ve worked with – complex daily operations, different demands requiring attention at all times, leaving many to have cybersecurity fatigue … if it’s more steps or workarounds for employees to do their jobs, they likely won’t participate.

In today’s environment, a focus on cybersecurity isn’t a luxury – it’s a necessity. Making sure that focus is achieved starts with your company’s culture. You may have fire extinguishers in your office building, but you prefer to prevent fires from ever happening so you don’t need to use the extinguishers, right? Same idea applies to cybersecurity – you want to prevent hackers from ever infiltrating your defenses so you don’t have to spend potentially millions of dollars dealing with the damage.

Here are three ways you can bring cybersecurity from the dark shadows of your office to the forefront of everyone’s minds, all the while keeping hackers out of your business:

Close the Skills Gap

As with many aspects of technology, the explosion in cybersecurity complexity and innovation is real. In the past, your IT security employees could learn a few cybersecurity protocols, monitor your on-premises system, and address any problems as they arose.

Thanks to software automation and cloud computing, taking a 20th century view of cybersecurity is no longer sufficient. Cybersecurity experts’ roles have changed, moving from being an order taker to one who needs to not only understand what’s happening but be able to make rapid decisions to keep your company secure.

Unfortunately, need hasn’t kept pace with skills: There’s a significant shortage of cybersecurity experts in today’s labor market, and that shortage will grow to 4 million people by 2020. While earlier cybersecurity systems may have been simple enough for one or two specialists to manage, the complexity of the modern landscape means you need a team possessing a constantly evolving skill set to cover emerging concerns. Instead of looking for a needle in a haystack, look to managed security service providers (MSSPs) like US Cloud, which already has experienced cybersecurity experts available to help you secure your data and applications.

Bring Your Security Team to Upper Management

As today’s cybersecurity experts evolve into tomorrow’s decision makers, they should also gain more influence in the boardroom. Security is a boardroom level issue, because the consequences of data breaches can lead to litigation, millions of dollars in damages, and loss of trust degrading your brand. Brand, money, and litigation are generally board level issues, and cybersecurity should be principal among them.

This should not only take place in the middle of a breach or other urgent challenge, but in all discussions. Technology and security experts have an invaluable vantage point thanks to their intimate knowledge of organizational structure, information flow, operational process, and more. Your leadership team has every reason to value their perspective.

By highlighting the dangers of security breaches and the efficiencies created by good security practices, cybersecurity professionals can prove the importance of integrating security measures into overall decision making, helping improve the bottom line. We have advisory services that can help you find the right ways to convince your boardroom cybersecurity is an issue they should bring to the forefront of their meetings moving forward.

Create a Security Culture

While a strong security approach needs leadership buy-in, that’s by no means the end of the battle. You need to take a top-down as well as bottom-up approach, which means working with your employees to help them recognize the need for stronger cybersecurity and how they can help.

It’s a two-way street, though: Security training is important, but take the time to listen to your employees and understand how they get their work done on a regular basis. If you just implement security policies that create barriers for employees to get their jobs done, they’ll find ways around them and subsequently leave you open to cyberattacks. It’s important to also take the time to communicate with them as threats arise: We all need regular reminders to remain vigilant against an ever-evolving world of security risks.

If cybersecurity was easy, we wouldn’t be losing billions of dollars a year to hackers. US Cloud has the experience and tools you need to create a specialized strategy to bring greater awareness and enforcement that safeguards your network and cloud from emerging cyber threats. From penetration testing and vulnerability assessments to managed security plans, hyper secure cloud and next-generation security tools, US Cloud has you covered.

New Rules in 2019 Change Data Center Lease Definition

New FASB/IASB rules that go into effect in 2019 require leased assets to be capitalized on the balance sheet instead of recorded as operating expenses.Previously, data center leases could be listed as an operating expense, rather than as capital expenditure on balance sheets, allowing systems integrators to operate ‘asset light’ models, where data center capacity was completely outsourced. New FASB/IASB rules that go into effect in 2019 require leased assets to be capitalized on the balance sheet instead of recorded as operating expenses.

In the new definition of a lease, an identified asset, plus the right to control that asset, constitutes a lease that must be recorded on the balance sheet. Therefore, organizations looking to avoid recording unused assets on their balance sheets need to optimize utilization and eliminate overprovisioning.

The accelerating success of cloud computing models has left organizations that must keep certain workloads on-premises with antiquated and wasteful processes – capacity planning, demand forecasting, and expensive and painstaking capex outlays for equipment whose value depreciates while it remains unused.

Talk to the cloud architects at US Cloud about a multi-cloud strategy to maximize the security and costs of your workloads. US Cloud can set you up so that your public and private cloud (including on-premises) infrastructures communicate to each other via a secure, encrypted connection, utilizing modern advances in tech that allows data and applications to be shared between both clouds.

US Cloud dedicated hosting includes the security and compliance-ready requirements that you would have to pay extra for from public cloud providers. US Cloud also provides colocation hosting in our all-USA-based SSAE 16 SOC II-certified data centers.

Contact US Cloud to simplify your infrastructure and to unburden your team with our expert, all-USA-based Cloud Keeper™ Support, on-premises or in any cloud, with a live, six-minute ticket response from the USA, 24/7/365.

Cross These 5 Programming Trends Off Your New Year’s Resolutions List

top 5 programming trends of 2018As we rapidly approach the end of 2017 and look ahead to 2018, it’s common for us to reflect on what worked for us this year and what we’d like to change when the ball drops in Times Square.

Some resolutions are more worthwhile than others. We’ve looked into our crystal ball here at US Cloud to find the 5 programming trends you should avoid in 2018, and what you should do instead:

Avoid: Buying your own data center

Let’s be honest – the days of keeping all your IT infrastructure in-house are over. It used to be a point of pride to open your own data center, hire your own staff to run it, and host all the software you needed. The cost to house, staff, train, and operate IT continues to grow – and so do all the complexities that come with ownership. You are on the hook for any breakdown, failure, or data breach. You have to be clairvoyant and be able to see into the future of your business, knowing the exact right mix of platforms and services to incorporate into your IT portfolio.

Do this instead: Simplify your infrastructure with US Cloud’s private cloud hosting and dedicated hosting for total server control. Stay secure, run all your custom code and apps, and focus on growing your business instead of buying more space for server racks.

Avoid: Relying on resumes to hire your next programmer

Relying on resumes to find the programmers that will take your team into the 21st century is so last decade. It’s one thing to talk the talk – listing out accomplishments and using big terms such as innovative and collaborative. It’s a completely other matter to walk the walk, to show your body of work and exactly how you’d be the perfect fit for a company. The good news? There’s places like GitHub where programmers go to code and then share it with other like-minded people. This is a gold mine for you to identify burgeoning talent you’d want to bring on board.

Do this instead: Let US Cloud do the vetting for you. While other IT staffing agencies might throw a bunch of candidates your way to see if any stick, US Cloud will just recommend the best one.

Avoid: Falling into the trap of assuming you can only leverage big data with Hadoop

Think of Hadoop like a Hummer. Big, strong, powerful … larger than life, and impossible to find parking on the street. When big data became the business term du jour a few years ago, people thought they needed the biggest, most powerful system possible to churn millions of lines of code to drive actionable insights. If you’re a large, multinational corporation that relies on data every second of every day, then Hadoop might be for you just like a Hummer works for those who go offroading and need to transport heavy material.

If you’re the other 99% of businesses today, you really just need a single machine without the hassles of coordination or communication, just like a weekend warrior who needs to drive twice a week and doesn’t want to have to spend a week’s pay filling their car with gas.

Do this instead: Pick the cloud services – and platforms – that fit your specific business needs, and let US Cloud operate them for you. Work with our seasoned experts who can assess your business needs and help you determine just how much IT you need to run your business.

Avoid: Not having a web application framework that coexist for both clients and servers

The server world has always thrived on the threaded model that let the operating system indulge any wayward, inefficient, or dissolute behavior by programmers. But when you use web app frameworks like JavaEE or Ruby on Rails, it’s nearly impossible to move around features and duplicate functionality between client-side and server-side. You’ll have to know a few different programming languages just to get your job done. More time, more complexity, and greater potential for error.

Do this instead: Call the experts at US Cloud – we are your safety net to bridge the institutional knowledge gap between your team and their predecessors, with an eye on next practices to allow your IT team to shine.

Avoid: The cloud computing simplicity trap

For years, cloud vendors hammered home just how easy it was to press a button and start running your IT services without worrying about maintaining server rooms. As we’ve all seen, cloud isn’t that simple. Anyone who tells you otherwise is lying to you. Choosing the right machines and figuring out the right discount programs can take more time than writing the code to make it all work for your business.

Do this instead: US Cloud works with all cloud vendors – in fact, check out our website and understand just how private versus public clouds stack up based on qualities such as security, compliance, support, ease of use, price, scalability, and cost predictability. The experts at US Cloud have the industry expertise to ask the right questions and help set up the perfect environment that will help differentiate your business.

Ready to take your programming and IT to the next level in 2018? Get a quote from US Cloud. We help you simplify your infrastructure, unburden your team, and protect your brand.

9 Free SharePoint Tools to Simplify Your SharePoint Admin Life

SharePoint logo

tools

SharePoint is packed with features, and once you connect to the SharePoint Store or Office 365 you’ll see there’s a rich ecosystem with thousands of products.  It’s been described as a 12 billion dollar ecosystem just a few years ago.

Here are nine free tools that could be useful as an administrator.

  • SPDeployment command-line tool by Marco Wiedmeyer – Wouldn’t it be great if you could deploy your solution consistently each time from early builds to release? Making sure the files go where they should, properties are set consistently, and login was handled?  SPDeployment is available on GitHub.
  • SharePoint Health Monitor by ManageEngine – Dashboard to Monitor CPU, Memory, Requests per second, system info, and Disk space in a dashboard.
  • SharePoint Designer is Free! Just kidding, Visual Studio Community Edition and Office Developer Tools.  IDE with plugin provides developer tools with Intellisense and debugging capabilities letting you run solutions in WSPs or remotely in O365.
  • 32 Free Webparts from Amrein – visualization of lists, pages, project sites, task rollups, stock parts, conf room calendars, and way more. They are the guys who did the free Dilbert cartoon webpart.
  • Migration Prep Tools – Metalogix Migration Planner, SharePoint Pre-Migration Discovery Analysis Tool, Use these free tools to understand your customizations, features, solutions, workflows, and more…
  • Help Desk Plus by Ivero – Help desk support templates, Service request management, queue and IT requests including easy to use security and roles
  • Responsive SharePoint – Codeplex templates for SharePoint sites.  There are good starter masterpages that support Twitter bootstrap.  Modern sites will eventually replace this need, but we can’t wait for 2019.
  • Autospinstaller – Automated SharePoint 2010/2013/2016 PowerShell-based scripted installation & configuration process.
  • Monitoring Content Pack 90-day SharePoint Monitoring in PowerBI reports with Office365Mon (free 90 days) Power BI content pack helps users explore and analyze uptime data.

Contact the SharePoint experts at US Cloud for more SharePoint consulting, SharePoint support, SharePoint migration services, SharePoint dev … SharePoint Everything™.

Microsoft Support For Exactly What You Need

premier supportUS Cloud™ has been working with Microsoft for 20+ years (time flies when you’re having fun) and we’ve been able to provide a cost-effective alternative for their prospective Premier (or Unified) Support customers who need all-USA-based support and more cost-efficient support.

We’ve been hearing from a lot of folks lately that when they are asking Microsoft for help with SQL Server, System Center Configuration Manager (SCCM), System Center Operations Manager (SCOM), or when they want a Technical Account Manager (TAM), SAM, or Dedicated Support Engineer (DSE), Microsoft is only including that level of support with the purchase of a supersized amount of support hours.

If you don’t need that many hours, you are still forced to purchase that amount in order to get the specific support level needed.

US Cloud can customize a support strategy to provide exactly what you need. Whether that is a prepaid bank of support hours for a specific project, a more encompassing safety net to provide support for your entire Microsoft stack at an hourly rate, or a monthly subscription plan for support as a service, US Cloud’s expert, 24/7, all-USA-based Microsoft support is available on premises or in any cloud.

So, for example, if you’re looking for SCCM and SCOM help, but only need a fraction of the support hours that Microsoft is requiring you to purchase in order to get SCCM and SCOM support, US Cloud can provide a hourly rate for that project so that you get exactly the kind and exactly the amount of support you need.

Or, if you’re looking for a ‘in case of emergency break glass’ package of support for your Microsoft stack, but you don’t need the amount of hours Microsoft is requiring you to purchase in order to get a TAM or DSE, or you don’t need the amount of hours Microsoft is requiring you to purchase to ensure that your support tickets are not being outsourced overseas, US Cloud can provide a hourly rate for that level of coverage so that you can control support costs and get a better support experience.

Contact US Cloud to discuss your unique needs.

 

Jay Kladiva Joins US Cloud as Director of Managed Services

Jay KladivaAs we continue to grow, we’re thrilled to to bring on Jay Kladiva as the new Director of Managed Services.

Jay started Oct. 30 and oversees the managed IT services department, steering the company’s hub of operations as it continues to scale with the booming cloud and cybersecurity industry. He will grow internal knowledge bases, mentor staff, and help transform clients into promoters.

Jay previously worked for Energizer Holdings, Inc., where he spent the last 11 years working his way up from Application Development Manager, to Global Platform Services Manager, and then to Infrastructure Director. He managed the operating budget for all infrastructure and led teams responsible for server operations, data centers, networking, end-user computing, enterprise architecture, IT security, voice, and the service desk to support global manufacturing, business objectives and daily operations.  Additionally, Jay was a key leader in the successful separation of Energizer into two publicly traded companies on an aggressive 14-month timeline.

Prior to his time at Energizer, Jay served as Senior Consultant, Technical Architect for Daugherty Business Solutions where he led the transition of the practice from VB/COM to .NET.  He also has experience as the Manger, Systems Architecture at Arthur Andersen. Jay also worked at Quilogy and Halliburton early in his career.

Jay earned a bachelor’s degree in Engineering and a master’s degree in Engineering Management from Missouri University of Science and Technology.

Fpweb and US Cyber Vault Reborn as US Cloud

Sister companies Fpweb.net and US Cyber Vault have rebranded as US Cloud™, a global managed cloud provider headquartered in St. Louis, Missouri.

With its 100 percent USA-based, 24/7 Cloud Keeper™ support, US Cloud helps companies start or continue their digital transformation by simplifying their infrastructure, unburdening their team, and protecting their brand. US Cloud’s technology with altitude™ services enable a multi-cloud hybrid IT and include cloud computing, management and security services.

Cloud computing services at US Cloud include Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Services (SaaS). Cloud servers and more traditional dedicated hosting and colocation are also available to bridge data center capacity expansion or retraction needs.

US Cloud’s management services cover public, hosted private and on-premises private clouds. More specifically, the architecture, integration and management of a multi-cloud hybrid IT environment is provided. US Cloud management services help customers identify what workloads and assets are best suited for a particular cloud and how to securely integrate them with the rest of the infrastructure.

US Cloud’s security services include risk assessment, architecture and managed services. Risk assessment services identify threats via penetration testing and network vulnerability discovery. Security architecture, implementation, and remediation services align technology, risk, and budget short-term while meeting long-term security roadmap goals. US Cloud managed security services rounds out the security portfolio by allowing a business to extend their security team or tools without the need to hire or buy hardware.

US Cloud technology partners include Microsoft, Google, IBM, Amazon, Cisco, Oracle, HPE, Salesforce, VMware, SAP, Dell, Palo Alto Networks and FireEye.

“In 2015, I wanted to build something special on top of what Fpweb and US Cyber Vault were all about – phenomenal customer service and protecting brands and data,” said the companies’ Founder and CEO Robert E. LaMear IV. “As the rush to cloud accelerates, so do all the problems. Hence US Cloud was born. But I soon realized I was missing the most important piece to build a new world-class organization, the people. I started a two-year national search to bring together the most brilliant and passionate technologists in the country. I’m excited and proud to report, mission accomplished.”

Founded in 1996, Fpweb has been the first to host every version of Microsoft SharePoint in the cloud and has managed 1.9 billion SharePoint logins since 1999. US Cloud will continue to provide Microsoft-based technology solutions as part of its services portfolio.

US Cyber Vault was launched in 2015 to build a cybersecurity container to protect a company’s data, brand, and reputation, while also trapping cyber criminals who attack the platform. US Cloud combines those next generation tools with USA-based cyberdefense experts to protect, detect, and respond to threats in real time.

US Cloud is focused on bringing enterprise-class strategy, support, and security to its clients’ cloud or on-premises environments. US Cloud is compliance ready for SSAE16, ITAR, HIPAA, PCI, SOX, NIST, and FedRAMP.

And for every $100 of new business spent with US Cloud, US Cloud donates $2 to charity: water, a non-profit organization bringing clean and safe drinking water to people in developing countries. 100 percent of the money is used to build clean water projects.

Visit www.uscloud.com to have a look around, follow @us_cloud on Twitter, LinkedIn, and Facebook, and contact sales at uscloud dot com, or call 800-200-8440 or 314-300-6000, for more information.

Microsoft Premier and Unified Support Alternative - US Cloud

Next Steps:

Save 30-50% with US Cloud

US CLOUD is the only Gartner-recognized Microsoft Premier & MS Unified Support alternative. Enterprises worldwide are replacing Microsoft with US CLOUD to save 30-50% on support costs.

Enjoy ultra-responsive, 24/7 fanatical global support from domestic US teams while freeing up funds to invest in innovation, create competitive advantage, and drive growth.