Micro Technology Solutions Inc.

September 21 - National day

Vulnerability Assessment

Vulnerability Assessment Wherever you are on the journey to cybersecurity, undetected vulnerabilities can open the door to cyber criminals. Vulnerabilities can come from a variety of sources including outdated software, patches that have not been applied, and system misconfiguration. These vulnerabilities are invisible to administrators because they are not causing systems to malfunction, so they

Vulnerability Assessment Read More »

Male Network Engineer Performing Network Security Check in Server Room

MTSi Achieves Nutanix Partnership

Recently MTSi achieved partner status with Nutanix to give the small and medium-size businesses we serve another option for server virtualization and hyper-converged infrastructure. Hyperconverged Infrastructure (HCI) is an IT framework that combines storage, computing, and networking into a single, integrated system. This approach simplifies data center operations by consolidating all necessary resources into a

MTSi Achieves Nutanix Partnership Read More »

Digital transformation - Cloud computing

Migrating On-Premises to Azure: Streamlining Domain Management and File Sharing

When a server reaches End-of-life, most small businesses plan for the capital outlay to replace it with a newer server at their location, but as cloud adoption accelerates, more small companies are considering Azure as an alternative. This blog explores how Microsoft Azure can be leveraged to replace an on-premises server functioning as both a

Migrating On-Premises to Azure: Streamlining Domain Management and File Sharing Read More »

Computer security - Computer

Introducing Huntress for Managed Detection and Response

A customer enrolled in our security protection suite clicked on a malicious link, what happened? Malware opened a command prompt and began running scripts on her machine. This situation could have ended with numerous computers at our client firm sitting idle with their data encrypted. Fortunately, this customer has Huntress installed on all of their

Introducing Huntress for Managed Detection and Response Read More »

Convention - Academic conference

MTSi and Cisco Present: Zero Trust and Meraki Solutions at Top Golf

Eric Shain, our Cisco Territory Account Manager, spoke about Meraki and Zero Trust. He discussed Meraki’s ascendance from a startup, to their acquisition by Cisco, to now a firm with over 14 million active devices currently in use. Eric showed the wide range of products in the Meraki lineup including enterprise grade access points, cameras,

MTSi and Cisco Present: Zero Trust and Meraki Solutions at Top Golf Read More »

woman on her laptop using her phone as multi-factor authentication device

Streamline Your Business and Boost Security with Single Sign-On (SSO)

Businesses today rely on a growing number of software applications. This means employees must manage several sets of login credentials, which can become overwhelming. Frustration often leads to shortcuts and security risks. Single Sign-On (SSO) can help simplify the login process and avoid these risks. What is Single Sign-ON (SSO)? SSO is a user authentication

Streamline Your Business and Boost Security with Single Sign-On (SSO) Read More »

network, server, system

Server Virtualization Landscape for 2024

SERVER VIRTUALIZATION After 18 months, Broadcom has finally closed their deal to purchase VMware. Since then, there have been many stories about Broadcom terminating partners and raising prices. Like many vendors, VMware by Broadcom is shifting to a subscription licensing model, which means you can no longer purchase licenses that continue to be valid indefinitely.

Server Virtualization Landscape for 2024 Read More »