Certified VMware Experts: Architects of Custom-Crafted Solutions

Every organization is different. A technology solution that’s best-in-class for one organization may not be right for yours. How can you be sure you’re receiving the optimal solution for your individual needs? Rolta|Advizex consultants include three VMware Certified Design Experts (and three candidate VMware experts!) who specialize in architecting solutions that meet your individual business requirements.

Read More…

Threat Vectors, The Adversary at Your Door

Month on month we hear about breach after breach. We hear about what was exposed or stolen, what was ransomed, the widespread impact of DDoS attacks. What doesn’t get covered as frequently is how it is that the exploit took place, what lesson we could learn from the breach, how we could protect ourselves in the future.

Read More…

Locking Down the Endpoint

The most common second step of any security breach is the exploit of a security vulnerability in a platform or application. Today, that includes not just PCs and Mac, but a whole host of mobile devices, and all the systems sitting in our datacenters, the cloud, and the Internet at large.

Read More…

Moats, Walls, Threats, Networks

Who’s in your network? The adversaries are already past the gate. One third of US companies were breached in 2016, and even more don’t yet know that they have already been breached. The amount of time-to-discover that a breach has happened is measured in weeks and months when the time-to-compromise defenses is measured in minutes. The moats and walls of yesteryear aren’t keeping us safe from the adversary anymore.

Read More…