Hardware based two-factor authentication implementation

We are in the process of implementing hardware based two-factor authentication.  What does this mean?  Our staff will no longer use just passwords to access any data in our network.  They will need a hardware USB key to access servers, billing etc.  This added level of security will prevent brute force attacks and many other unauthorized ...

Secure Backups

We now offer secure backups.  Block level backups allow for superior performance and speed advantages over traditional file level backup methods. Windows & Linux / Physical & Virtual. RedHat, CentOS, Ubuntu, Debian, SUSE and most custom kernels. VMWare, Hyper-V, XenServer and more. Now powering over 250,000 servers at over 1,800 ...