Prudent investment reduces risk of data loss
Today ITConsult customer PRUDENTIAL Investment Company Australia (PICA) provided The Australian with insights into their solution for a heavy workload across the WAN; and how PICA’s hourly back-ups...
View ArticleIT Leaders Event – hosted by ITConsult and Azzurri communications
ITConsult together with Azzurri communications is hosting ‘The future of managed IT services and the impact on your business’ an IT leaders event. Aimed at examining how, with the introduction of the...
View ArticleITConsult Launches SharePod File Sharing Solution
ITConsult, together with partners NetApp, Citrix and Cisco have today launched an industry first for the Australian market. SharePod, the validated platform for syncing, sharing, storage and security...
View ArticleWAN Accelerate Business Breakfast
Disaster recovery, data centre consolidation, virtual desktops, unified communications, cloud computing – nearly every major IT initiative today depends on a high performing and reliable wide area...
View ArticleITConsult and Citrix to host second SharePod Lunch For Enterprise Mobility
Due to the success of our first lunch (which was a full house) ITConsult, together with Citrix are offering those who missed the opportunity to attend our first enterprise lunch to join us for steak,...
View Article2013 a year of recognition
ITConsult has been listed amongst some of the country’s fastest growing businesses in the BRW 2013. This year’s list consisted of only a handful of technology companies of which ITConsult was one. In...
View ArticleSilver Peak CIO Workshop
February 12 saw ITConsult join forces with Brian Grant of Silver Peak to jointly host the CIO Workflow Acceleration lunch at Sydney’s prestigious three hat restaurant est., enjoying three courses,...
View ArticleITConsult’s second Citrix ShareFile Mobility Lunch ends in success
ShareFile’s mobility suite was on full display at ITConsult’s first Citrix ShareFile Enterprise Mobility Lunch of 2014. Attendees from many verticals braved the threat of wet weather to discover more...
View ArticleCisco ASA-CX Firewall
ITConsult introduces next generation firewall: Cisco’s ASA-CX Cisco ASA Next-Generation Firewall Services include security software ITConsult customers can add to the Cisco ASA family of stateful...
View ArticleITConsult ramps up design capability with DesignPod
In a market first ITConsult is proud to deliver the ‘DesignPod‘, a pre-validated technology solution enabling firms requiring even the most resource consuming design software (think Autodesk,...
View ArticlePress Release: ITConsult acquires Genisyst
The IT Consultancy Group Pty Ltd (ITConsult) is excited to announce the acquisition of Genisyst Pty Ltd effective October 1, 2016. ITConsult is a specialist Managed Service Provider, infrastructure and...
View Article5 things to consider before choosing hyperconverged infrastructure
Hyperconverged infrastructure (HCI) has come a long way over the last few years. A small handful of the vendors have been modernising many businesses by replacing the traditional technology stack with...
View ArticleManaging the costs of cloud
There are two types of cloud users today. There are those that are just starting to ramp up their usage of cloud technologies and there are those that are pretty much “all-in” and have been in the...
View Article4 ways to avoid being paralysed by your backups
It seems that backups are more often than not seen as a necessary evil. To the IT team it’s just another dreary admin task. To the business it’s just another cost of IT. That is until it all goes...
View ArticleMandatory data breach laws are here – are you ready?
It’s nearing 12 months ago when the Australian federal government introduced legislation to force mandatory data breach notifications on businesses in Australia. In that time, we’ve found only a small...
View ArticleSpectre is the first major security issue of 2018
Intel has said that every model of its processors are open to massive security vulnerabilities nicknamed Meltdown and Spectre. The design flaw allows sensitive data to be stolen from running memory....
View ArticleMandatory data breach laws are here – are you ready?
It’s nearing 12 months ago when the Australian federal government introduced legislation to force mandatory data breach notifications on businesses in Australia. In that time, we’ve found only a small...
View ArticleEmail Threat Intelligence Review of 2018
As 2018 draws to a close we thought it might be worth a look back on the year to see if there’s anything we can learn from email threat intelligence activity for next calendar year. Our review is a...
View Article5 Things to consider before choosing Hyperconverged Infrastructure
Hyperconverged infrastructure (HCI) has come a long way over the last few years. A small handful of the vendors have been modernising many businesses by replacing the traditional technology stack with...
View ArticleOffice 365 Enterprise vs Office 365 Business Plans
Microsoft’s Office 365 offers tons of options for businesses of all sizes. For your business through, how do your choose between Office 365 Business packages and the Office 365 Enterprise options?...
View Article