-
The Cisco Email Security Appliance (ESA) is your Answer to the Canadian Anti Spam Legislation (CASL)
UncategorizedThe recent introduction of the Canadian Anti-Spam Legislation (CASL) requires Canadian companies to verify whether individuals have given permission to
Read More -
Putting the ‘Everywhere’ in Advanced Malware Protection Everywhere
SecurityIt’s no secret that we’re more focused today on security than we have ever been. It began last year with
Read More -
How To Secure Your Organization’s Mobile Devices
Borderless NetworksToday, cybercriminals and Canadian business leaders share a common challenge: both are trying to figure out how best to leverage
Read More -
IT Infrastructure and Cloud Services Conference
Data Centre, Virtualization and CloudNetworking and meeting with potential customers and partners is only one of the benefits you will receive by attending the
Read More -
Trust Issues: Cisco Annual Security Report 2014
SecurityIt’s that time of year again, it’s January and that means it’s time for resolutions, new beginnings and looking forward
Read More -
The Security of Networked infrastructure and Intelligent Communities
Internet of EverythingThis is the first of a short series of blogs on topics that continue to be raised in my travels
Read More -
Cisco and Sourcefire: Where there’s smoke there’s fire
SecurityAs you may have heard, on October 7 2013, Cisco made a significant announcement in terms of its security offering
Read More -
My first 100 Days as Channel Chief
CollaborationAfter 14 years at Cisco, I am very pleased after my first 100 days as Canadian Channel Chief to share
Read More -
Three Technology Security Concerns every Small Business Must Prepare For
Data Centre, Virtualization and CloudSecuring your company’s technology infrastructure no longer means just locking the office doors. The dramatic reshaping of the IT landscape
Read More -
Is your small business ready for a mobile workforce?
SecurityAn employee travelling to different cities for business is in no way a new phenomenon, but having that worker completely
Read More -
Q&A with Divyesh Lavingia – Bridge Studios
Small and Midsize BusinessI recently spoke with Divyesh Lavingia, IT Director with Bridge Studios, a full-service motion picture and television production facility in
Read More -
Customer Experience – The new competitive frontier for retail banks in an Omni-channel world
CollaborationA consistent, superior customer experience is a key element for every bank as they define and implement Omni-channel delivery strategies.
Read More -
Win – Win Situation For Smart Buildings
Smart + Connected CommunitiesQuestion: What could be better than building a Smart Building where the lighting, HVAC, security and access controls communicate together
Read More -
Search engines and online shopping: the new security threats?
SecurityYou have your IT security policy in place; you’ve blocked access to or otherwise protected yourself from the usual suspects
Read More -
One switch to rule them all: The Cisco Catalyst 3850
UncategorizedToday we announced the final piece of our Unified Access vision, introducing the Cisco Catalyst 3850 switch at Cisco Live
Read More -
Why BYOD is critical to your mid-market company
Borderless NetworksThe bring-your-own-device (BYOD) phenomenon has dramatically changed the way many Canadian organizations do business, especially those in the mid-market sector.
Read More -
Why a BYOD plan is more than just policy
Borderless NetworksThis isn’t the first time we’ve delved into the Bring-Your-Own-Device (BYOD) movement on this blog and it certainly won’t be
Read More -
Security architect? Why you need one!
Canada PerspectivesIt never fails. Walk into any IT department and ask who is responsible for the overall security architecture. Whether you
Read More -
Softchoice Cares + 7 IT Companies = A future for 500
Canada PerspectivesBy Karly Pierce, Softchoice We’d done overseas missions in the past but the trip to Bali was going to be
Read More -
Understanding Cisco’s Security Intelligence Operations
Borderless NetworksI have been in the security field long enough to know that software based intelligence is certainly not enough in
Read More