Why deploy cloud backup as a service with Azure Backup 

Posted by Claude Gagne_ on Feb 14, 2018 7:45:00 AM

In an economy with accelerated transformation, many organizations are investing considerable resources to increase their IT agility. They understand that better agility, provided for example by mobile applications and data analysis solutions, can help them better understand their customers, position themselves advantageously and quicker compared to their competitors and reduce their costs. 

Read More

IT Security : Survival Guide for Spectre and Meltdown 

Posted by Benoit Mercier_ on Jan 29, 2018 12:00:00 PM

A lot of information has circulated in the last few days about Spectre and Meltdown vulnerabilities. With all that can be found on the subject, the task of protecting oneself may seem overwhelming. 

If you have not had the chance to read about these IT security flaws, our previous article discusses these two security breaches in detail.

Read More

Topics: CIO/IT leaders, IT security

Case study: Familiprix gears up for new projects with the help of SAP HANA on IBM Power

Posted by Laurent Chayer_ on Jan 23, 2018 7:45:00 AM
Solution synopsis

Familiprix consolidates its infrastructure, simplifies the production environment and increases system uptime when it has IBM Gold Business Partner Present implement an IBM Power E850 server that runs a Linux operating system and an IBM Storwize device to support its new SAP S/4HANA application.

Read More

Topics: IT infrastructure, SAP Hana, Case study

The spectre of vulnerabilities at the CPU level is now hovering over IT infrastructures

Posted by Claude Gagne_ on Jan 9, 2018 11:45:00 AM

On January 3, 2018, two important security breaches named Meltdown and Spectre were publicly disclosed. These are two critical bugs located at the processor level.

Description of the vulnerabilities

Two flaws in processor design from leading chip makers could allow hackers to access sensitive information.

Read More

A look back at Present’s top blog posts from 2017

Posted by Jennifer Bridgeman_ on Jan 3, 2018 8:00:00 AM

Happy 2018! As we look ahead to a bright future, we wanted to take a moment to look back at the ideas we’ve shared and the topics we’ve covered this past year.

Read More

Best wishes for the holidays from the Present team!

Posted by present on Dec 19, 2017 11:45:00 AM

We would like to take this opportunity to send you and yours our very best wishes for a joyous and safe holiday and a wonderful New Year!

Our offices will be closed from December 23rd-January 1st, yet we are always available for any urgent situations.

Read More

Topics: Events

9 common risk factors linked to an enterprise’s IT network

Posted by Francois Desjardins_ on Dec 12, 2017 7:45:00 AM

The IT network is a driving force for all businesses today because of the volume of information that is exchanged electronically. But, when we talk about connectivity and information sharing, we also must address the increased risk of data loss or service disruption. Breaches in the system can be disastrous. 

To find out if a sword of Damocles hangs over your business, it is important to analyze the potential risks your network faces daily. If you experience one or more of these 9 problematic situations, you should remedy it as soon as possible. Here are our recommendations.

Read More

Topics: IT infrastructure, IT security

7 IT statistics that will blow your mind!

Posted by Jennifer Bridgeman_ on Nov 30, 2017 7:45:00 AM

We’re always coming across lots of statistics in our research and so our marketing department decided to put together a list of seven IT statistics that we found
interesting, even shocking!

We then asked our in-house experts if they could comment on each statistic; to put some context around the figures and hopefully provide some further insight into these astounding facts.

Take a gander!

Read More

4 steps to transform IT into a business unit

Posted by Marc Beaulieu on Nov 16, 2017 7:45:00 AM

For companies to succeed in this digital age, they must transform IT from service to the business units and cost center to strategic business partner.

In order to do this, IT needs to fundamentally shift the way it approaches business. IT can no longer be just a department that keeps the lights on–it needs to think strategically like other business units, focusing on ROI and efficiency.

Read More

Ruckus Cloudpath: security for wired AND wireless networks

Posted by Marc Therrien_ on Nov 1, 2017 7:45:00 AM

In recent years, IT experts have put a lot of emphasis on the importance of properly securing wireless networks. In fact, while the message has gone over well for wireless, this is far from the case for wired networks as most companies continue to neglect the protection of their LAN network. Companies are unknowingly at increased risk of being attacked or having their sensitive data accessible to anyone with a network connection at their disposal. 

 

Take for example your residential WiFi access. You most likely need a password to connect to the Internet. However, if you connect your workstation directly to your router, authentication is no longer necessary and you have immediate access to your network. This is exactly the same principle for companies. Remote access to the network is secure, but the wired entry doors within the building are unlocked when companies do not impose some form of authentication before a user can connect to the network.  

Read More

Topics: BYOD, IT infrastructure, IT security

About this blog

The right use of technology addresses business challenges and drives business growth in all areas of an enterprise.  We hope this blog will offer insight into developing strategies and tactics to enable you to identify those key drivers of growth and keep pace with and anticipate the rapid technology change of today.

Subscribe to Blog Updates by email

Protecting your business assets: Lower your risks with a disaster recovery plan

Recent Posts