Data Protection: Looking Closer at Cloud Storage

The way we store data is evolving, from the days of punch cards, magnetic tape, discs, solid state, and flash we have now arrived to having what is called cloud storage.  A research from IDC shows that IT Infrastructure sales into the cloud has finally surpassed traditional IT environments for the first time in the […]

Cisco Umbrella: Camuto Group Case Study

The Challenge A US footwear and lifestyle brand company, the Camuto Group, has been thriving in their industry due to the unique designs that sets them apart from the competition.  However, the company’s creativity is also one of its IT’s main pain points when it comes to security.  With almost 100 employees working remotely and […]

Security Vulnerabilities: A look at a Criminal’s View of your System

You may be hearing more and more these days of new security vulnerabilities being discovered in the news and may be wondering what exactly it may imply?  Simply, a vulnerability represents the ideal opportunity for cyber criminals to infiltrate your system to compromise your data or to perform data theft. According to current data now, […]

Hyperconverge Workshop: A Test-Drive Awaits!

Join us for our upcoming event this coming April 4 at the EDSA Shangri-La Lubang Function Room to learn how you’re IT Infrastructure can become fast, efficient and simple by using HPE Simplivity! Test drive HPE Simplivity and experience for yourself what the platform has to offer for your organization. That’s not all, join our […]

Microsoft Office Suites: Office 365 or Office 2019?

Are you looking to get Microsoft office for your business but unsure which product you really need between Office 365 or Office 2019?  You aren’t alone, many other users and businesses usually are unsure what the main difference between the two are.  Many consider them the same product and buy Office 2019 since it’s a […]

Cyber Security Workshop : Security for your Business Critical Apps

Are your Business Critical Applications Secure? With business critical applications such as SAP, Sentinel RMS, and SCADA (to name a few) being the hub of an organization’s sensitive data, it is no wonder that more and more cybercriminals are focused on attacking these applications. Makers of such critical applications do prioritize the security of their […]