Author Archive

Get Ready for Application-Layer DDoS Attacks

Written by neteffect technologies. Posted in ContentMX



For years, businesses offering Internet services have had to deal with distributed denial of service (DDoS) attacks. That threat has gotten worse.

How do DDOS attacks work? Put simply, they overwhelm services with traffic, making it impossible to address legitimate service requests, and leaving an unfavorable impression on customers who can’t get what they want. Who do customers blame, for example, if they can’t pay bills online because the bill paying service’s website is offline? Not the DDoS attack. They don’t even know about it. They blame the billing service.

Why Signature-based Defense Tactics Don’t Work

Various forms of defense have arisen in response. Most work by looking for some relatively simple signature, such as the specific IP addresses of attacking botnets.

Lately, however, attackers are defeating this kind of defense with specific, precision-targeted attacks. By focusing on layer seven (the application layer) of the standard OSI network model, they can hammer a site with service requests that appear to be legitimate, but aren’t. And because they’re harder to recognize, they’re also harder to stop.

This can be devastating — especially when it brings a business’s online operations to a standstill.

Consider a recent case cited by Imperva, in which more than 163,000 layer seven attacks per seconds were observed, consuming 8.7 Gb/second of bandwidth — shutting out customers entirely for the duration of the attack. Such attacks can, in theory, be sustained for days or even weeks, bringing Internet-facing services to a halt the entire time.

How Do You Fight DDOS Attacks At Every Layer?

At neteffect, a leading Charlotte-based IT service specialist, we’ve been tracking attacks of this sort for some time and have partnerships with top-tier security providers offering technology that responds effectively.

One of these partners is Fortinet, provider of the FortiDDOS solution which can recognize and block DDOS attacks at every layer — three, four and seven. This is possible because FortiDDOS is both faster and smarter than competing offerings, thanks to custom ASICs that assess incoming traffic at a packet level, then figure out what it’s trying to accomplish.

This means that instead of simply looking at where attacks originate, FortiDDOS also recognizes threat behavior. For example, it can determine if traffic is going to overwhelm the crucial link between an application and a customer information database to bring down the whole service — and after identifying the threat as a layer seven DDOS attack — stop the attack.

The whole process is extraordinarily fast, because the analysis is performed by optimized hardware (custom ASICs) and orchestrated via predefined policies that typically don’t require real-time human authorization. The upshot is that however powerful a layer seven DDOS attack may be, it gets very little time to impact business — so little time, in fact, customers may not even notice.

Of course, it’s also true that because FortiDDOS is relatively advanced, not all organizations have the in-house expertise to deploy and integrate it effectively. A partner of Fortinet, neteffect can help you defend against DDOS attacks of all types, including the application layer, by leveraging Fortinet FortiDDoS technology to work for you.

IT Innovators: Rethinking Assumptions About the Cloud

Written by neteffect technologies. Posted in ContentMX

ITPro logo

ITPro logo

Brought to You by IT Pro

Today’s corporate environments are filled with leaps and often times hesitations, followed by even larger leaps toward cloud deployment. But about those hesitations: from fears about IT jobs being outsourced to security concerns and questions about the most effective ways to centrally manage a cloud solution, apprehensions can run far and wide.

IT Innovators recently caught up with John Webster, analyst at Evaluator Group, to chat about some of the most common assumptions about the cloud and what factors should instead be top of mind for a more effective cloud deployment.

What would you say is the most common assumption about the cloud? What’s driving this, and what do you believe is the truth behind the concern?

I think one topic that really needs to be examined in more detail is the issue of security in the cloud, particularly the public cloud. There are a couple things going on that are changing people’s perceptions about security in the cloud. First, the more you understand the cloud, how to use it and which provider you want to work with, the less security becomes an issue. The best thing you can do for security as an issue is to get more experience working with the cloud. More experienced users have a tendency to view security as less of an issue. They realize that things like finding people to actually administer a cloud IT environment is the number 1 priority. Security seems to fall down the list.

What steps can IT professionals take to calm security concerns?

The good cloud service providers have heard that security is an issue. They are more than aware of it, and they’ve taken measures to address the problem. Sometimes, enterprise IT users have acknowledged security in the cloud to actually be better than their own Internet security and have moved apps to the cloud because of that. Now, some people are more concerned about the communication links in between getting from their location to the cloud service provider and back as being a bigger security concern than the cloud provider itself. My advice is to talk to the cloud vendor to address those concerns.

Are there any misconceptions about shadow IT, or the concept of employees using cloud applications that haven’t been authorized internally for use, and what are corporations doing to address this phenomenon?

Enterprises have seen this cloud creep, if you will, or proliferation of cloud usage and have encountered issues with that. For example, the cost of all these clouds start to get out of control if they’re not managed. You’ve got contracts, commitments, but you start to sense that every department now gets a cloud and questions arise, like: what kind of control are we exerting over this, and if we are not exerting any kind of control, should we manage this centrally? While the shift to the cloud began as a shadow IT phenomenon, meaning that employees were using unsanctioned cloud and mobile apps without corporations being fully aware, it’s now becoming a centralized IT-administered phenomenon because of cost and governance reasons. If we’re going to put sensitive data in the cloud, we need to know the nature of that data, the service provider and whether or not we even have the authority to put some kinds of data in the cloud without running the risk of exposure to regulatory agencies.

As more companies shift toward taking a centralized position to cloud management, what kinds of things should be on their radar?

People are starting to understand that they can use the cloud resources much more efficiently if they know from a centralized position what it is they need. This includes what kinds of contracts they will negotiate, what kind of pricing is available, and how to best manage pricing. Weighing these types of questions will allow IT professionals to make the most effective use of the cloud.

Renee Morad is a freelance writer and editor based in New Jersey. Her work has appeared in The New York Times, Discovery News, Business Insider,, NPR,, and other outlets. If you have a story you would like profiled, contact her at

The IT Innovators series of articles is underwritten by Microsoft, and is editorially independent.

This first ran at

How to ensure new graduates aren’t compromising enterprise networks

Written by neteffect technologies. Posted in netCare



You don’t have to look far to see one of many graduations occurring. Once college students have taken off their caps and gowns, with any luck it’s not long until they have secured jobs, with a lot of luck maybe even before they crossed the stage with degrees in hand. As these brand new employees come on the payroll, businesses must work to be certain their security habits are in line with the business’ policies. Recent studies suggest that the mass of Millennials truly are indifferent about their data.

Read more…

neteffect technologies LLC Ranked 222 Among Top 501 Managed Service Providers by Penton Technology’s MSPmentor

Written by neteffect technologies. Posted in netCare

9th Annual MSP 501 Ranking and Study Identifies World’s Most Progressive MSPs in Information Technology

neteffect technologies ranked position #222, among the world’s most progressive 501 Managed Service Providers (MSPs), according to Penton Technology’s 9th-annual MSP 501 study. The top MSP 501 companies ranked this year include organizations from around the world and from diverse technology and business backgrounds.

In addition to honoring neteffect technologies, this year’s MSP 501 list and study showcases the following:

  • The top ranked MSPs in North America
  • The top MSPs in Europe, Middle East and Africa
  • The top MSPs in Asia, Australia and New Zealand
  • The top Small Business MSPs’ list, comprised of organizations with 10 or fewer employees
  • The top vertical markets pursued by MSP 501 companies
  • The leading tools they leverage to run their businesses
  • And the top technologies they provide to customers

“It is an honor to be named to the MSPmentor 501 Global Edition, particularly since year after year there are so many competitors for a spot on this coveted list,” said David Wollenhaupt, President, neteffect technologies. “The service provider industry is changing faster than ever before. Being named 222nd is exciting; it speaks volumes about the business model we continue to build on to provide a sustainable and scalable service model. Our success is due to both our staff and our customer base who year after year contribute to the continued growth and success of neteffect technologies.”

As businesses continue migrating away from on premises computing environments in favor of SaaS solutions, managed it services providers continue to find new and innovative methods to add value for their clients as margins continue to be squeezed through the cloud movement. In 1991 neteffect technologies started out as an IT services provider primarily serving the architectural and engineering community before “virtual” and “cloud” were popular marketing terms. Servicing the business community in a reactive environment didn’t prove prudent to David Wollenhaupt. As a business owner, Wollenhaupt treats each customer as he wants his company to be treated, like it’s his own; this vision permeates throughout neteffect’s culture. Every customer’s needs are handled proactively, before a need presents itself. During the onboarding process, neteffect technologies spends time with the client learning about their business processes. This helps in putting into place innovative tools that best fit their companies’ needs.

“On behalf of Penton and MSPmentor, I would like to congratulate neteffect technologies for its recognition as an MSP 501 honoree,” said Aldrin Brown, Editor in Chief, MSPmentor. “The managed service provider market is evolving at a rapid pace and the companies showcased on the 2016 MSP 501 list represent the most agile, flexible and innovative organizations in the industry.”

The 2016 MSP 501 list is based on data collected by MSPmentor and its partner, Clarity Channel Advisors. Data was collected online from March through April 2016. The MSP 501 list recognizes top cloud service providers based on metrics including recurring revenue, growth and other factors. In addition to a ranking on the MSP 501 list, every company that participated in the study has been assigned a score reflecting its intrinsic value. The measure, known as the Total Service Provider (TSP) score, evaluates an MSP’s mix of revenue from various activities, including consulting, cloud, reselling and managed services. The TSP index ranked services providers based on the evolution of their business models, ranking neteffect technologies 129th.

To learn more about neteffect technologies, visit

About neteffect technologies

Based in Charlotte NC, neteffect technologies is celebrating its 25th anniversary this year, in business since 1991. neteffect technologies specializes in offering managed IT services, virtualization, cloud computing solutions, system design and implementation services, telecom solutions, and security solutions. Customer centric, neteffect technologies provides the innovative technologies that businesses need to compete with their budget and time constraints.

About Penton’s channel brands

Penton’s channel brands (, define emerging IT markets and disrupt established IT markets. The brands’ channel-centric online communities include MSPmentor (, The VAR Guy (, Talkin’ Cloud ( and the WHIR (

About Penton

Penton is an innovative information services company that empowers nearly 20 million business decision makers in markets that drive more than 12 trillion dollars in purchases each year. Our products inform with rich industry insights and workflow tools; engage through dynamic events, education and networking; and advance business with powerful marketing services programs. Penton is the way smart businesses buy, sell and grow. Headquartered in New York, Penton is privately owned by MidOcean Partners and Wasserstein & Co., LP. For additional information on the company and its businesses, visit or follow us on Twitter @PentonNow.



Beth Wallace

Director, Client Strategies & Business Development



Aldrin Brown, Editor in Chief, MSPmentor

Media Contact
Company Name: neteffect technologies
Contact Person: Beth Wallace
Email: Send Email
Phone: 704-504-9040
Country: United States

What Does Your IT Budget Look Like

Written by neteffect technologies. Posted in netCare

IT budget

IT budgetThe end of 2015 is rapidly approaching, which makes the subject of IT budgeting a little more prominent in people’s minds. There needs to be considerable thought into how much your business will be spending on IT compared to how much it is willing to spend. This can be a confusing situation with a lot of figures, projections and unfamiliar terminology. But you don’t have to make this important decision all by yourself.

neteffect technologies has an extensive amount of experience assisting businesses when it comes to technology, forecasting and budgets. At neteffect technologies, one of our core beliefs is that IT is one of the more integral components of a company’s budget. Every year, there is a natural increase in expenditure. Now, more than ever, companies are making substantial investments in the area of cyber security. Those investments increase every year as there is an ongoing need for tech solutions than ever before. Some of the more important areas to be considered are:

  • Cloud Computing
  • Mobile technology
  • Security
  • Big data analytics


Cloud Computing

Businesses are continuously changing the way they operate with cloud computing. ComputerWorld projects that more than 40 percent of businesses are going to incorporate a host of cloud infrastructures within the upcoming year. This includes private clouds, public clouds, hybrid clouds, and community clouds. Cloud computing provides such versatility that businesses can discover exactly what they need in order to operate more efficiently.

neteffect technologies offers the opportunity to equip your business with the cloud solution that fits best. Access, security and all the benefits that come with cloud service can be yours with the help of neteffect technologies.

Mobile Technology

Mobile technology is changing the way business is being conducted as company employees work from anywhere. Part of that includes secure WiFi networks, more efficient access tools and mobile device management systems. With the addition of each mobile device on the infrastructure comes the concern for reliable security. It is also important to note that mobile applications are not all secure and business transactions are not ideally conducted on unsecured WiFi networks. neteffect technologies can provide help ensuring the security of business transactions and network infrastructure.


The annual IT budgeting report as reported by ComputerWorld indicated that 46 percent of the companies involved are planning an increase in security expenditures. This is not surprising considering the amount of legitimate threats over the past year. But it does not take a multi-million dollar budget to provide adequate security. A flat-rate monthly fee provides your business with exceptional security solutions through neteffect technologies’ managed services, maintaining your company’s network infrastructure. There is enough to worry about just conducting daily business.

Big Data Analytics

The analysis of large amounts of data at a rapid rate is becoming a more popular business trend. This is also a way for your business to create new marketing possibilities and enhance overall sales. ComputerWorld’s recent survey reports that 38 percent of IT leaders will issue an increase in what they spend on big data analytics in 2016. Big data analytics introduces a lot of raw data and businesses are becoming more open to using the proper tools that will help in decoding and organizing that data.

Finding trends in data is made easy and will enable businesses to keep up with the latest industry developments.

The future is now

Outsourcing IT functions through neteffect technologies can wind up putting more money on your bottom line while also eliminating the need to hire more staff to meet the daily demands of your business. neteffect technologies’ services offer flat-rate solutions that accommodate all budget requirements.

To learn more contact the team at neteffect technologies by calling 704-504-9040. Top quality IT service and support await you along with an IT roadmap that can lead your business to a future full of success.

Do More. Travel Less.

Do More.
Travel Less.

Millions of successful meetings hosted
every month.

Try GoToMeeting Free

Citrix ® GoToMeeting

Google Fiber Partner with link


 gf tech partner digital new

network audit

Get a free network audit. No Charge, No Obligation!