TEC Technology Blog

Welcome Gerald Gregory to the TEC Family!

Gerald joins us as a Sales Account Manager.
What can you expect?
Nothing but the best.
 

Gerald is an experienced salesperson, who is knowledgeable in global and local telecommunication and IT business solutions.  His experience ranges from data storage and voice projects to managed services and cloud-based technologies.  In every position he…

What is Hyperconvergence?

What Does It Mean for Data Center Management?
What is hyperconvergence? To understand what hyperconvergence is, it helps to understand where we’ve come from in the data center space.

The data center – or “server closet”, depending on the size of your business – used to be a room that kept…

Chris Harris

Systems engineer.
Spartan. (Go MSU!)
Ironman (2.4 miles, 112 miles, 26.2 miles. 3 times.)

What is a Next Generation Firewall?

By Frank Keogh
While the name, “Next Generation Firewall” sounds like one of those “hype” terms that marketers often use to get you excited about a product, this is one instance where the technology really lives up the to the name.
 
To understand what a Next Generation Firewall (NGFW) is, it…

Frank Keogh

Frank is a systems engineers, specializing in network consulting for LAN, WAN, cybersecurity and data center/hyperconvergence.
Credentials? Plenty. CCNA, CCDA, CCNP, CCSP, VCP5-DCV

What is Advanced Malware Protection (AMP)?

By Frank Keogh
As technologies evolve, fancy new names have to be created by technology vendors in order to differentiate today’s super-cool technology from yesterday’s super-cool-but-now-outdated technology.

 

This is the case with the label “Advanced Malware Protection”, or “AMP”.  AMP is the name given to the most current iteration of antivirus…

Frank Keogh

Frank is a systems engineers, specializing in network consulting for LAN, WAN, cybersecurity and data center/hyperconvergence.
Credentials? Plenty. CCNA, CCDA, CCNP, CCSP, VCP5-DCV

3 Essential Features of a Modern Enterprise Cybersecurity Solution

TEC Tech Quick Hits

In Cisco’s 2017 Annual Cybersecurity Report, Cisco’s SVP of Security, John N. Stewart, had the following to say:
“It’s really quite simple: The more attack vectors that go unnoticed and the longer we allow attackers time to exploit our systems and infrastructure, the greater their chance for…

Frank Keogh

Frank is a systems engineers, specializing in network consulting for LAN, WAN, cybersecurity and data center/hyperconvergence.
Credentials? Plenty. CCNA, CCDA, CCNP, CCSP, VCP5-DCV

Top 5 Damaging Ransomware Attacks

What one word can strike fear into end users, security pros, and CIOs? Ransomware. This malware has raised to infamy recently with many major-headline attacks hitting all over the world. These recent attacks don’t indicate a new form of attack, ransomware has actually been around just about as long…

Frank Keogh

Frank is a systems engineers, specializing in network consulting for LAN, WAN, cybersecurity and data center/hyperconvergence.
Credentials? Plenty. CCNA, CCDA, CCNP, CCSP, VCP5-DCV