Featured Article

Hardware and Platform Security: Mastering the Balancing Act

You want to allow users to be their most productive. So, you introduce manageability measures to easily deploy tools and enforce security standards that prevent threats without disrupting the flow of productivity. Nonetheless, your users will always  take some steps to improve their own productivity (via apps and cloud services)  that also hampers manageability and […]

SAM WARS: Episode 1 – The Phantom License

Turmoil has engulfed the IT department. The licensing of software critical to outlying lines of business is under dispute… When it comes to software licensing, the worst-case scenario is the dreaded vendor audit. The risk is real and it’s not a scare tactic. A Gartner analysis from 2014 showed that 68% percent of companies would […]

Your Keys to Success with Cisco Spark

The way your organization works together is changing. You understand moving to a cloud collaboration suite could complement, or even replace, your current unified communications (UC) solution. But, until now, you’ve hesitated to invest in a public cloud-based service because: You worry adding high-traffic cloud services to your environment could strain your network You’re unsure […]

5 reasons why now is the right time to move Autodesk maintenance licenses to subscription

In this article, we cover the key benefits of subscription licensing and why now is the perfect time to make the move from maintenance to subscription.

5 Reasons Why It Pays to Go (Windows 10) Pro

Download the Infographic here Whether it is that time in the refresh cycle or your organization’s hardware has slowed to a crawl, upgrading to new devices powered by seventh-generation Intel Core processors and Windows 10 Pro can save time, money, and countless headaches. Here is why. 1. That old laptop isn’t what it used to […]

Why micro-segmentation security makes SDN safer

I can explain why modern data centers need micro-segmentation in two words: Trojan Horse.

Not the malware, but that timeless story of wooden-horsey riding saboteurs. In it, we see that even the most powerful perimeters fall short. The bad guys always find a way in. With virtualized data centers and desktops, this notion is particularly troubling. What if someone breaches the firewall protecting your virtual environments? Once inside, malware and attackers freely move laterally (east-west) causing mayhem and tons of financial damage.