When Amazon Zigs, Everyone Else Zigs and Zags
For the most part, corporate press releases are boring. It’s an exercise in patting oneself ...
Antimalware and Virtual Machines: square peg, round hole problems
As endpoints are virtualized, it is tempting to assume that everything within the endpoint ...
Desktop-as-a-Service: New Opportunities for the Channel
Desktop-as-a-service (DaaS), yet another “as-a-service” offering made possible by the cloud, ...
Is Your Security Losing to Marketing Jiu-Jitsu?
We see, day after day, real and so-called security experts announcing the newest security ...
The Costs of a Cost, and the Opportunities Lost – Why US Retailers Need to Give Their PoS a Shake
Credit cards are very convenient; swipe, sign, pay later. That is going to change in the US ...
Desktop-as-a-Service (DaaS): when traditional security just won’t cut it
Destkop-as-a-Service (DaaS) is on the rise in terms of adoption and maturation. You just ...
VDI, for sure, but which one is best for me?
With this post dedicated to the series of newer IT infrastructure models and options ...
Better BYOD Security Management Choices for Customers: The ‘Bells and Whistles’ vs ‘Simplicity’ Conundrum
Anyone who thinks the bring-your-own-device (BYOD) phenomenon will quietly go away is not ...
Stop the Delusion: Security Compliance isn’t Synonymous with Bullet-Proof Security
The ongoing history of credit card breaches at major card processing organizations ...
Antimalware as a Competitive Differentiator – 3 Advantages for Infrastructure-as-a-Service (IaaS) Providers
In this post, I’ll focus on Infrastructure providers (IaaS), though these points may be ...
5 Important Things to Consider When Evaluating Security for a Virtualization Platform
As a VAR or managed services provider, you’ve no doubt received queries from many of your ...
VDI, Security and Keeping your Sanity
In a recent post about new technology paradigms for SME we have been trying to provide ...


