Knowledge Centre

A tale of two Azure transitions

We’ve been speaking with customers a lot about the end of mainstream support for SQL and Windows Servers 2008.

Feeling insecure about LDAP?

March 2020 will be a critical month for system administrators and this advisory is a must read for anyone involved…

The Digital Transformation Keeping WA Ahead

If Australia is truly the lucky country, then surely WA must be the most fortunate of all. From unspoilt beaches…

Top 5 tips for efficiently running an Azure environment
Top 5 tips for efficiently running an Azure environment

As more and more people adopt cloud computing, it’s become evident that business are struggling to manage the costs…

Cloud Managed Services and the fight for cloud skills

In a recent blog post, my colleague Richard Kirby talked to how customers can go about hitting their managed…

Why upgrade to Microsoft 365 E5 for improved security

Over the course of the past few decades, Microsoft has gone from being unfairly perceived as an outcast in the…

Tackling cloud app security with Microsoft 365

Your organisation may not be in the cloud, but I can guarantee your employees definitely are. Cloud apps are essential…

VMware, VMworld
What I learnt at VMworld 2019 in San Francisco

Late last month, I had the privilege of attending VMworld 2019 in San Francisco. It was my first time at…

Veeam and Cisco Hyperflex: Intelligent data management for the hybrid data centre card image
Veeam with Cisco HyperFlex: intelligent data management for the hybrid data centre

Software as a Service (SaaS) applications are the backbone of productivity. For enterprises driving productivity value, data and the applications…

A mobile first network
4 reasons why you need a mobile-first network

We’re all becoming increasingly reliant on digital devices and cloud services in our day-to-day lives, and the workplace is no…

Networking modernisation
3 ways your network can be your competitive advantage

Think about the last time you ordered a cab, or booked accommodation, chances are you used one of the many…

Mobile Cybersecurity
Protecting GenMobile: the need for adaptive trust in cybersecurity

For better or worse we are all dependant on our mobile devices these days. This is especially true for the…