October 18, 2018

Move Over Windows 10, Thin is the New OS

Another fall is upon us, and with that, we are graced with another release of Windows 10 but not without a few bumps in the road. The Windows 10 October 2018 Update (version 1809) was slated to release on October 10th but got plagued with issues: “Microsoft cites problems with […]
April 4, 2018

IGEL UDC: Why Toss When You Can Revive Those Old Devices

I was recently talking with a customer the conversation went like this: Customer: “I cannot consider IGEL because I bunch of older Wyse devices. I love their devices but do not want to have a mismatch of devices.” Me: “Have you heard about the IGEL Universal Desktop Converter (UDC)?” Customer: […]
April 2, 2018

[Insert Company Here] has Massive Data Breach – You Can Prevent Being A Headline

I have said it before, and I will say it again, the end-user is your most significant threat to your company. Let’s take a look at some fun statistics: Wombat Security released their “2018 State of the Phish Report” and reveal, 76% of organizations experienced phishing attacks in 2017. According […]
December 29, 2017

Three Bold Predictions for 2018

Many of my industry friends who know me know that I like to speculate, make predictions and say who is going to acquire who. Over the coming weeks, I will share these thoughts and put my predictions out there in buckets of three. For starters, here are my bold, big […]
December 20, 2017

Make or Break: Five Companies to Watch in 2018

This year flew by and was a busy year in technology! In the coming weeks, I am going to write a few blogs to recap the year. As a partner, I come across a lot of great companies, and I can present solutions to my clients that fit their needs. […]
December 8, 2017

deviceTRUST: Context Awareness is Security’s Last Mile

I have said it before, and I will say it again, the end-user is your most significant threat to your company. Let’s take a look at some fun statistics: According to CSO, on average, cyber attacks cost U.S. enterprises $1.3 million in 2017. Phishing Labs latest report states that phishing […]
November 17, 2017

Don’t Toss Those Old Devices, Transform Them

I recently blogged about how to “Secure the Rogue Workforce with Ease” with the IGEL UD Pocket. Now, let’s focus on how to deal with outdated devices, incompatible operating systems and uncooperative existing thin clients. Before you consider tossing or donating your old assets, transform them. No, I do not […]
November 13, 2017

IGEL UD Pocket: Secure the Rogue Workforce with Ease

Security is top of mind for everyone these days, from the CISO all the way down to the end-user. The recent Equifax breech spooks the end-user, and the CISO is hoping a ransomware attack does not happen to his/her organization. Layer in the complexity of ‘bring your own devices’ (BYOD), […]
November 1, 2017

When Technologies Collide

As folks know, Landesk/Heat/Ivanti has made many key acquisitions over the last year. I have been in and around the technology industry approximately 20 years. I started in IT, was a sales engineer but spent the bulk of my career being a product manager. Now that I am out of […]
October 23, 2017

XenTegra Boot Camp Series: Citrix Cloud

  Join us for a highly practical training that combines lecture and formal Citrix hosted Labs with instructor guidance. Students will gain knowledge of the components, design considerations and use cases as well as get hands on experience building out their own Citrix Cloud Service with live instructor support. Citrix […]