Blog

By Gotham, Posted in Infrastructure

Written with contributions from Brian Wagner, Practice Director - EUC and Cloud, Ryan Lee, Senior Solutions Architect, Gotham Technology Group, and Dean Cefola, Principal Technical Marketing Manager, Nerdio. Windows 365 offers a predictable, per-user monthly pricing model that simplifies cloud VDI budgeting. However, without proper oversight, costs can escalate due to over-provisioned resources and underutilized licenses. Proactive cost management is essential to maximize your return on inve... read more.

  • January 19, 2026

By Gotham, Posted in Infrastructure

Written with contributions from Brian Wagner, Practice Director - EUC and Cloud, Ryan Lee, Senior Solutions Architect, Gotham Technology Group, and Dean Cefola, Principal Technical Marketing Manager, Nerdio. Windows 365 offers a predictable, per-user monthly pricing model that simplifies cloud VDI budgeting. However, without proper oversight, costs can escalate due to over-provisioned resources and underutilized licenses. Proactive cost management is essential to maximize your return on inve... read more.

  • January 19, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 1/12 Attackers Move into Microsoft Teams: Automated Remediation for Lateral Threats (Abnormal AI) Attackers increasingly rely on collaboration tools like Microsoft Teams because they move fast and operate on implicit trust. Automated detection and remediation changes that dynamic by addressing malicious messages as they appear—before users have a chance to interact and before threats can propagate across chats and channels. https://abnormal.ai/blog/microsoft-teams-automated-remediation Nuta... read more.

  • January 16, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In Jurassic Park, the electric fences surrounding the dinosaur enclosures were the first line of defense. They were designed to keep threats contained and protect the outside world. But when those fences failed—due to poor maintenance and lack of monitoring—the consequences were catastrophic. This is the perfect analogy for CIS Safeguard 7.6, which emphasizes the importance of automated vulnerab... read more.

  • January 14, 2026

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/22 Eon Cloud Backup: Transforming Data Protection for Modern Businesses Eon Cloud Backup feels like an SDWAN for Backup. It delivers management and data planes across hyperscalers, abstracting each platform’s functions and capabilities into an easily manageable and highly automated solution. By leveraging underlying infrastructure, Eon creates a system that truly is greater than the sum of its parts. https://www.gothamtg.com/blog/eon-cloud-backup-transforming-data-protection-for-modern-bu... read more.

  • January 09, 2026

By Steve Gold, Posted in Security

Written with contributions from Bryon Singh, Director of Security Operations, RailWorks Corporation In the Marvel Cinematic Universe, Tony Stark’s Iron Man suit is a technological marvel. But what truly makes it formidable isn’t just the armor, it’s the automated diagnostics and internal scans that constantly monitor for damage, threats, and system vulnerabilities. Every time Stark takes a hit, the suit runs a scan, identifies the issue, and adapts in real time. This is precisely the kin... read more.

  • January 06, 2026

By Jason Santamaria, Posted in Infrastructure, Storage

As someone with a long-standing career in network security, I always make a conscious effort to avoid dealing with data backup. My involvement typically ends at providing a port for converged access, after which I confidently pass off any backup-related questions or requests to other specialists. However, the story behind Eon Cloud Backup has piqued my interest and made me reconsider my stance on data protection. Security is a core component of Eon. The solution incorporates ransomware detection, immutable... read more.

  • December 22, 2025

By Timothy Karl, Posted in Technology Week in Review

As organizations modernize their end-user computing (EUC) environments, I’ve been helping customers work through Citrix’s evolving licensing options—most often during renewals, cloud planning, or broader modernization discussions. Below is a short summary of what I’ve learned and how I typically explain the differences between the three primary Citrix Cloud licensing options, Citrix Universal, Citrix Private Cloud, and Citrix Platform, to customers. Citrix Universal License Best f... read more.

  • December 19, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/15 Elevating the Microsoft Digital Workplace: Expert Insights on ControlUp’s Role in the AI-Era (ControlUp) Complete visibility into the digital workplace isn’t just helpful with a hybrid workforce, it’s critical. With solutions like Azure Virtual Desktop (AVD), Windows 365 (W365), Intune, and Microsoft Teams forming the backbone of many modern enterprises, the challenge goes beyond simply running these technologies to really ensuring they deliver a sea... read more.

  • December 19, 2025

By Eric Corcoran, Posted in Technology Week in Review

Monday 12/8 Identity Recovery Must Live Outside the Blast Radius of a Cyber Attack (Rubrik) As hybrid identity becomes the backbone of cloud and SaaS access, we can't afford recovery strategies that assume the control plane will stay safe. We have to assume breach. https://www.rubrik.com/blog/technology/25/12/identity-recovery-must-live-outside-the-blast-radius-of-a-cyber-attack Cyber resilience: The name of the game for 2026 (Delinea) With AI now making cybercrime easier by helping even inexperie... read more.

  • December 12, 2025