Professional & Training Services

  • The Scheduling Challenge

    The Scheduling Challenge

    If you can’t keep up with technology, technology will keep up for you. Experts have predicted that in over the next 5 years, the office of the future will be populated by people who will wear their t

    Read Article
  • Power of Performance and Simplicity Demystified - NVMe

    Power of Performance and Simplicity Demystified - NVMe

    There’s no doubt that Non-Volatile Memory Express (NVMe) has taken the technology world by storm. We know that NVMe drives are designed to deliver speed, future readiness, accessibility and agility.

    Read Article
  • The Talos Principle

    The Talos Principle

    Access to a team of over 250 researchers and engineers focused on security. That’s what you get when you purchase Cisco Talos as part of your Cisco security solutions.

    Read Article
  • BYOD and Chill - Threat Prevention on Mobile Devices

    BYOD and Chill - Threat Prevention on Mobile Devices

    According to the latest research report on BYOD by Hexa Research, the BYOD market is projected to grow beyond $350 billion by 2022 from $94.15 billion in 2014.

    Read Article
  • First rootkit found in the wild, courtesy of the Sednit group

    First rootkit found in the wild, courtesy of the Sednit group

    UEFI rootkits are widely viewed as extremely dangerous tools for implementing cyberattacks

    Read Article
  • The Mind Hunter – A Social Engineering Attack

    The Mind Hunter – A Social Engineering Attack

    An email arrives, with an “urgent” request from your boss. The email contains a link to update some information on a portal that looks like your company’s web portal addresses.

    Read Article
  • Behind the scenes of a Cyber Security practice: A mini three case summary

    Behind the scenes of a Cyber Security practice: A mini three case summary

    Within hours of British Airways admitting that it had suffered a serious security breach through hackers accessing customer data and the full details of 380,000 payment cards,

    Read Article
  • Build a Competitive Edge for your Business

    Build a Competitive Edge for your Business

    What’s needed for your business to build the right ecosystem to provide better customer experiences and a better bottom line? And what would be your starting point?

    Read Article
  • Takes two to Tango: Meraki MR and Cisco Umbrella Security Integration

    Takes two to Tango: Meraki MR and Cisco Umbrella Security Integration

    With the average cost of a malware attack on a company being $2.4 million1 cyber security can no longer be an afterthought for products, software and networks.

    Read Article
  • A Cloudy day with Disaster Recovery

    A Cloudy day with Disaster Recovery

    Not sure where to start regarding public cloud? Think top-notch disaster recovery – easy, fast and cost-effective.

    Read Article
  • Proof of Value

    Proof of Value

    Read Article
  • Integrating Security Solutions for better threat Prevention

    Integrating Security Solutions for better threat Prevention

    Read Article
  • UCC do you know me?

    UCC do you know me?

    Read Article
  • IoT Sensor Placement

    IoT Sensor Placement

    Read Article
  • Don’t let unwanted intruders gain access to your network

    Don’t let unwanted intruders gain access to your network

    Read Article
  • One of Ingram Micro’s Best Kept Secrets

    One of Ingram Micro’s Best Kept Secrets

    While distribution is what Ingram Micro is known for, their portfolio of solutions & services is astounding - and highly leveraged by industry leaders.Welcome to one of Ingram Micro's Best kept secret

    Read Article
  • Are you safe from Ransomware CryptoAttacks?

    Are you safe from Ransomware CryptoAttacks?

    Read Article
  • Professional Services: Borrow Our Bench

    Professional Services: Borrow Our Bench

    Read Article
  • loading
    Loading More...