VLCM Blogs

HP, Cybersecurity, education, K-12, HP Wolf Security

HP computers and cybersecurity: What you need to know as a K-12 IT professional

As a K-12 IT professional, you know how critical cybersecurity is for your school. Cybersecurity...

Cybersecurity, zero trust, zerto

Using Air-Gapped Recovery Systems To Be More Cyber Secure

How Zerto's Cyber Resilience Vault can help businesses protect and recover their data from...

Cybersecurity, veeam

Everything You Need to Know About Veeam's Latest Cybersecurity Update [Infographic]

At VLCM, we are always eager to share breakthroughs in cybersecurity that have the potential to...

Cybersecurity, Barracuda, backup, veeam, microsoft, microsoft 365

Maximizing Cybersecurity with Microsoft 365: A Look at M365’s Essential Security Features

Microsoft 365 is a cornerstone in modern enterprise technology, essential for productivity and...

Cybersecurity

Choosing Between Penetration Testing and Vulnerability Assessments

As cybersecurity threats evolve and become more sophisticated, organizations must understand the...

Cybersecurity

How to Sell Cybersecurity Investments to Executives: A Guide for IT Professionals

In every organization, the conversation around cybersecurity often feels like a tale of two cities:...

VLCM TECH NEWS, Cybersecurity, sentinelone, awards

VLCM Wins SentinelOne 2023 West Region Partner of the Year

SentinelOne recognizesleading channel organizations for delivering next-generation protection and...

Cybersecurity, aruba networks, networking

The Future is Now: Overcoming Centralized Networking Service Bottlenecks with Aruba's CX10000

The evolution of the data center has been nothing short of transformative. Traditional data...

Cybersecurity, press release, stratodesk

VLCM Partners With Stratodesk to Deliver Secure and Easy to Manage Endpoint Solutions

Stratodesk's NoTouch Software Empowers VLCM Customers to Embrace Enhanced Endpoint Security and...

Cybersecurity, HPE, zero trust

How HPE ProLiant Implements the Zero Trust Model

Trust nothing, verify everything. This is the essence of the Zero Trust model—an innovative...