The IT Summit was selected as one of the top ten "must-attend" events for CIOs and IT Marketers
— April 2013 CTOsOnTheMove.com
Overview
The IT Summit is the executive technology conference series returning to Houston for our third annual event on May 21st 2015. The purpose of the summit is to provide educational and networking resources for the IT leaders throughout the region. The conference is driven by an Executive Board of regional IT professionals that directs the content of the educational sessions and sponsor participation. The IT Summit is designed to address the real-world opportunities and challenges faced by today’s executives, by facilitating face-to-face interaction and networking among information technology peers.
Join your peers at the conclusion of the conference to enjoy the Executive Reception.
Join us at 2:15pm for the end of the day prize giveawayfor a chance to winsome great prizes from some of our great sponsors, including:
Blue Coat Systems – Apple Beats Earbud Headphones
Dell Software – SYMA X5C-W 4CH 2.4G Quadcopter Drone (with Camera)
Infor CRM – Apple TV
Mitel – $100 Gift Card
NetApp – NetApp PowerTrip
New Horizons Learning Center – Microsoft Technical Course
PFU, A Fujitsu Company – $50 Gift Card
Shavlik – Bose SoundLink Color Bluetooth Speaker
TelePacific Communcations – TBA
Event Updates and Information
Earn Free CPE Credits at The IT Summit
The IT Summit offers complimentary certificates of attendance for CPE credits. Continuing professional development or continuing professional education is the means by which people maintain their knowledge and skills related to their professional lives. Upon completion and approval of your registration, we will provide you with information on how you can receive free CPE credits at The IT Summit.
.
Agenda
9:00 AM – 3:00 PM
Registration Open – Lobby (600 series rooms on mezzanine level in NRG center building)
9:00 AM – 9:30 AM
Tour Exhibits – Visit our solution providers and learn about the latest technologies.
Join Comcast Business Class at Booth #101 for Morning Coffee
Complimentary Shuttle to The NRG Center is available every half hour from 6am to 9pm Mon-Fri
Event Location
NRG Center 8400 Kirby Dr
Houston, TX 77054 (832) _667-1400 Parking is $10.00 (Cash Only)
The Closest Parking Lot to the NRG Center is North Fannin Lot
Driving Directions
NRG Park is located within the Inner Loop of the southern portion of Interstate Loop 610 between Kirby Street and Fannin Street. For specific driving directions and to print out a driving map, please click on the Google Maps icon.
From the North
Take I-45 (south) or Hwy. 59 (south) to Hwy. 288 (south)
Take Hwy. 288 (south) to 610 Loop (west)
Take 610 (west) to Fannin or South Main exit
Exit and turn right on Fannin or South Main
From Fannin turn left on Naomi or Holly Hall
From South Main turn right on McNee
Enter main gate at NRG Park
From the South
Take I-45 (north) or Hwy. 288 (north) to 610 (west) to Fannin or South Main exit
Comcast was founded in 1963 as a single-system cable operation of 1,200 subscribers. Since then we’ve grown to be the nation’s leading provider of entertainment, information and communications products and services with 24.4 million cable customers, 14.7 million high-speed Internet customers and 6.1 million digital voice customers in 39 states and the District of Columbia.
Enjoy a delicious cup of coffee while catching up with your IT-professional peers and visiting with our vendors, before beginning your day of education and networking.
Join your peers for a delicious breakfast. Complimentary for all who attend.
She is a Certified Public Account (CPA) in the State of Texas, a Certified Fraud Examiner (CFE) from the Association of Certified Fraud Examiner, a Certified Valuation Analyst (CVA) from the National Association of Certified Valuators and Analysts, and has a Certificate in International Financial Reporting (CertIFR) from the Association of Chartered Certified Accountants in the United Kingdom.
Danielle is a member of the PCPS Technical Issues Committee with the American Institute for CPAs, a National Vice President for the American Woman’s Society of CPAs, a Past President of the Houston Affiliate of the American Woman’s Society of CPAs, was a recipient of the Woman of Excellence Award by the Federation of Houston Professional Women, and is a 2014 Texas Society of CPA’s Rising Star, and was named a 40 under 40 by the CPA Practice Advisor. Danielle also sits on the American Institute of Certified Public Accountants GenNext Task Force and formerly sat on the Woman’s Initiative Executive Committee Champions Task Force.
Danielle is a member of the Texas Society of Certified Public Accountants (TSCPA), and is a member of the American Institute for Certified Public Accountants (AICPA).
Danielle will use IDEA to develop a trend analysis of business operations to prove a Ponzi Scheme. This discussion and exercise will highlight the advantages of using IDEA over excel with the following IDEA tools and functions:
– Import QB GL into IDEA (import, export as txt, import, set layers & traps, etc)
– Append field with Debit(Credit)
– Categorize data (right now using embedded if statements, but may find a faster way)
– Separate GL detail by year (append field and extract)
– Summarize by month (download and use canned IDEA script)
– Recombine data (join db)
– Append field to be cumulative data
– Chart data
Carmine Clementelli is a security expert and Manager with PFU Systems, Inc. — a Fujitsu Company. Clementelli and his team help integrators and enterprises in sectors such as healthcare, pharmaceutical, banking/finance and education to secure their networks, data and critical information assets. He has previously served as Network Security Project Manager with Fujitsu, Project Manager with Datalogic and Software Consultant with Accenture. He holds a Master of Science (M.S.), Electrical Engineering and Computer Science from the University of Bologna.
Hack attacks – and in particular Advanced Persistent Threats (APTs) – are on the rise, eroding reputations and looting organizational and customer assets with disturbing regularity. With mobility the new norm and native-device-level mobile security in its relative infancy, are BYOD enterprises inviting APT attacks? Mobile devices potentially open the organizational network to an entirely new set of security risks that challenge both IT professionals and C-suite executives to plan strategically and move proactively. This session examines effective new approaches to redefine the network perimeter, gain real time network visibility and insight into who and what is on it, and control access automatically. Importantly, the session offers proven strategies for preventing and controlling APTs and other infections – whether from mobile devices, an online users’ “bad click” or other common hack attack strategies. Through new network visibility and control, organizations can secure their network and assets while supporting the productivity and freedom that mobility promises and users expect.
Paul Williams is the Chief Technology Officer of Pennsylvania-based White Badger Group. Paul has thirty-eight years of breakthrough innovation in cyber security, artificial intelligence, high speed databases, professional software development, software quality test engineering, electronics, communications, mechanical engineering, weapons development and defense related technologies.
Paul has extensive experience developing effective security solutions and conducting security risk assessments for large commercial and government customers, including the energy industry. Paul is also an expert in rapidly solving complex cybercrime investigations through use of innovative techniques.
Paul is an active national and international public who speaks at multiple high profile cyber-security speaking engagements every year for prestigious organizations such as the United States Secret Service, U.S. Department of Justice, InfraGard, ACP, ASIS, IIA, ISACA, ISSA, as well as at universities and colleges across the nation and abroad. As a result of Paul’s long time personal interest in malware, he has collected a wide assortment of hacking tools, worms, Trojan Horses, and computer viruses. He maintains his collection of 24,000 major computer viruses and 1,700 Trojan Horses for advanced research purposes to this day.
Through study of actual case histories, this session examines the motives and damage caused to organizations from within by “insiders” – rogue employees, network administrators, and even senior company executives who sabotage or steal from their own companies. Learn technical, practical and procedural ways to prevent, deter, detect, and mitigate internal information thieves and saboteurs.
As Director of Evangelism, Grant brings more than 30 years of experience in sales, marketing and management to Blue Coat. Grant combines his long history in web security and networking with a sense of humor and energetic style. Prior to Blue Coat, Grant was head of market development and sales for Altor Networks, which was acquired by Juniper Networks. Before joining Altor Networks, he was vice president, enterprise sales for NeuStar. Earlier, he was president and CEO of MetaInfo and successfully sold the company to NeuStar. Grant was the worldwide Senior Product Evangelist for Check Point, which he joined after the company acquired MetaInfo.
Cybercriminals love to use SSL to conceal malicious content. Recent attacks such as Shylock, SpyEye, Gameover and Zeus all use(d) SSL to conceal ‘Command and Control’ channels, hide data exfiltration and to evade detection. Despite the benefits, SSL traffic is one of the darkest alleys in enterprise networks and represents a significant blind spot in today’s security defenses. Organizations have invested millions, if not billions, in a myriad of security tools and nearly all of them are rendered useless and unable to ‘do what they are supposed to do’ if the traffic is encrypted using SSL. Furthermore, decrypting SSL is highly processor intensive and results in significant degradation of performance when implemented. According to NSS Labs, performance loss is often 74% or higher when SSL decryption is implemented.
The use of SSL is exploding. 25–35% of enterprise network traffic is SSL and is forecasted to increase 20% YoY. Despite the benefits, SSL represents a significant blind spot in today’s security defenses. Analyst forecast up to 50% of malware will be delivered via SSL by 2017. This session will discuss the risks as well as mitigation techniques in order to reduce threats introduced via SSL.
Join your IT peers for a complimentary luncheon including assorted sandwiches, salads, and dessert. This is a perfect opportunity to interact with other technology professionals in a relaxed environment.
Paul Williams is the Chief Technology Officer of Pennsylvania-based White Badger Group. Paul has thirty-eight years of breakthrough innovation in cyber security, artificial intelligence, high speed databases, professional software development, software quality test engineering, electronics, communications, mechanical engineering, weapons development and defense related technologies.
Paul has extensive experience developing effective security solutions and conducting security risk assessments for large commercial and government customers, including the energy industry. Paul is also an expert in rapidly solving complex cybercrime investigations through use of innovative techniques.
Paul is an active national and international public who speaks at multiple high profile cyber-security speaking engagements every year for prestigious organizations such as the United States Secret Service, U.S. Department of Justice, InfraGard, ACP, ASIS, IIA, ISACA, ISSA, as well as at universities and colleges across the nation and abroad. As a result of Paul’s long time personal interest in malware, he has collected a wide assortment of hacking tools, worms, Trojan Horses, and computer viruses. He maintains his collection of 24,000 major computer viruses and 1,700 Trojan Horses for advanced research purposes to this day.
An overview of the thinking, tools, tactics and analytical mentality that is needed to discover, eliminate, and prevent Advanced Persistent Threat (APT) malware in enterprise IT networks.
Desolyn Foy has over 16 years of internal audit, corporate compliance, and forensic audit experience with public and governmental entities. She has been integral to establishing continuous monitoring and data mining at Harris Health System. Working with executive leadership, Desolyn has used data analytics to identify opportunities for operational efficiencies and cost savings. Desolyn was an ACL Impact Award winner in 2012 for the “Best Use of Analytics” among audit, finance, compliance and risk professionals
Christina has over 13 years of internal audit and data analytics experience working in both public and governmental environments. She holds an MBA in Accounting from Sam Houston State University. Christina was part of the winning team for the 2012 ACL Impact Award for the “Best Use of Analytics” among audit, finance, compliance and risk professionals.
Maureen has over 11 years of internal audit, data analytics, and corporate compliance experience in healthcare. She holds a Masters degree in Accounting from Louisiana State University. Maureen was part of the winning team for the 2012 ACL Impact Award for the “Best Use of Analytics” among audit, finance, compliance and risk professionals.
Discuss how Harris Health System is using ACL Analytics to manage a wide array of operational, compliance and risk challenges. Develop high impact analysis by combining datasets and ensuring data integrity for 100% of transactions. Describe challenges of working with unlimited data from independent databases. Prepare executive dashboards and reports that support leadership in decision making, achieving goals, and identify cost savings.
Discuss how Harris Health System is using ACL Analytics to manage a wide array of operational, compliance and risk challenges. Develop high impact analysis by combining datasets and ensuring data integrity for 100% of transactions. Describe challenges of working with unlimited data from independent databases. Prepare executive dashboards and reports that support leadership in decision making, achieving goals, and identify cost savings.
Discuss how Harris Health System is using ACL Analytics to manage a wide array of operational, compliance and risk challenges. Develop high impact analysis by combining datasets and ensuring data integrity for 100% of transactions. Describe challenges of working with unlimited data from independent databases. Prepare executive dashboards and reports that support leadership in decision making, achieving goals, and identify cost savings.
Metka is a Product Marketing Manager at Aerohive Networks. She has more than twenty-five years of experience in IT industry and delivering training programs. Her corporate career included positions in Application Programming, Database Administration, System Administration and Network Engineering. Experience gained from these positions, years of mentoring and certifications from Microsoft, Cisco and CWNP gives her unique blend of real life and classroom scenarios that she passionately shares with her students and wireless community.
Optimizing user mobile experience requires more than high speed Wi-Fi. IT professionals are facing challenges of capacity, flexibility, security, privacy, and visibility as they evaluate complex combinations of WLAN standards, management, and new technology like MU-MIMO. This session covers 802.11ac and upcoming WLAN standards, iBeacons, and building robust wireless networks.
Matt Burdette is the Chief of Intelligence – Global Risk, of UnitedHealthcare Global, leading a team of 15 analysts in providing strategic analysis and assessments of global events to hundreds of international corporations, NGOs and the scholastic community in addressing global risk. On a daily basis they provide insight and expertise on global risk issues and projects that range from confirming changes in a country’s immigration policies to supporting security evacuations to providing multi-year forecasts for international business interests. Matt has been a part of the Global Risk team for more than 17 years and has written published articles on a range of topics including Pakistan’s future outlook, the threat of surface-to-air missiles and the changing security environment for corporate aircraft. He has been interviewed by European Business Aviation News and the National Business Aviation Association’s (NBAA) Flight Plan on Identity Theft and the 2012 Summer Olympics. Matt earned his Master’s degree in US National Security History from the University of North Carolina at Wilmington.
As a special thank you to all of our guests at The IT Summit, our sponsors have arranged for a prize drawing for you, our valued supporters. The prizes are different at every conference, but in the past have included items such as iPods, golf clubs, sporting event tickets, and eReaders.
Join your peers at the end of the conference to enjoy our Executive Reception.
Infor CRM delivers tools for individuals, teams, and companies focused on increasing sales performance and the insights to optimize sales, marketing, and service strategy and execution. This breadth allows you to manage the full customer lifecycle in one environment, access relevant ERP data to help win customers, manage future sales opportunities, and deliver exceptional customer service.
People want to work anywhere; on any device, and IT needs to enable them — without drowning in complexity or compromising on security, performance, reliability or cost. Aerohive’s mission is to Simpli-Fi these enterprise access networks with a cloud-enabled, self-organizing, service-aware, identity-based infrastructure that includes innovative Wi-Fi, VPN, branch routing and switching solutions.
AITP Houston strives to serve our members with education on emerging technologies and leadership, information on current business challenges and technology, forums for networking and collaboration, and opportunities for students to network with top leaders in Information Technology. Our mission is to encourage and empower the next generation of leaders in technology. We aim to bridge the gap between existing technology leaders and the next generation.
ASIS International (ASIS) Houston Chapter, is the Houston, Texas chapter of ASIS International, the preeminent organization for security professionals, with more than 37,000 members worldwide. Founded in 1955, ASIS is dedicated to increasing the effectiveness and productivity of security professionals.
Blue Coat empowers enterprises to safely and securely choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat has a long history of protecting organizations, their data and their employees and is the trusted brand to 15,000 customers worldwide, including 86 percent of the Fortune® Global 500. With a robust portfolio of intellectual property anchored by more than 200 patents and patents pending, the company continues to drive innovations that assure business continuity, agility and governance. Blue Coat offers the industry’s most advanced and sophisticated security technology with a new outlook on how security technology provides business value. It’s called Business Assurance Technology and includes a comprehensive array of technologies, services, and capabilities that provide total protection—and help advance the business. Blue Coat’s Advanced Threat Protection provides a comprehensive lifecycle defense that fortifies the network against advanced targeted attacks. The combination of real-time protection, dynamic analysis, and post-breach investigation and remediation closes the gap between ongoing security operations and incident discovery, containment, and resolution.
Comcast was founded in 1963 as a single-system cable operation of 1,200 subscribers. Since then we’ve grown to be the nation’s leading provider of entertainment, information and communications products and services with 24.4 million cable customers, 14.7 million high-speed Internet customers and 6.1 million digital voice customers in 39 states and the District of Columbia.
Dell Software makes it easy to securely manage and protect applications, systems, devices and data to help organizations of all sizes fully deliver on the promise of technology. Our simple yet powerful software – combined with Dell hardware and services – provide scalable, integrated solutions to drive value and accelerate results. Whether it’s Windows infrastructure, the cloud and mobile computing, or networks, databases and business intelligence, we dramatically reduce complexity and risk to unlock the power of IT
Epiphany is a NetSuite Solution Provider and SuiteCloud Developer. We focus exclusively on NetSuite — Sales, Implementation, Support, Training and Product Development.
As a Software Developer, we have taken NetSuite one step further by designing Solutions that are completely embedded into NetSuite, providing you with the ability to quickly and cost effectively make NetSuite’s cloud — YOUR Cloud. Our comprehensive portfolio of integrated end-to-end solutions allow companies to manage essential business processes while leveraging the power of NetSuite’s core business suite.
Leveraging our expertise in product development and NetSuite, we can create and implement a business critical solution to efficiently address your requirements. Our cross-industry knowledge, research, innovation, comprehensive go-to-market support and broad spectrum of knowledge allows us to develop practical solutions; enabling business process improvements that help you increase efficiencies, profitability, improve customer service and more.
For over three decades, the International Legal Technology Association has led the way in sharing knowledge and experience for those faced with challenges in their firms and legal departments. Through delivery of educational content and peer-networking opportunities, we provide members information resources in order to make technology work for the legal profession. Connect and participate today!
With more than 86,000 constituents in more than 160 countries, ISACA® (www.isaca.org) is a leading global provider of knowledge, certifications, community, advocacy and education on information systems assurance and security, enterprise governance of IT, and IT-related risk and compliance. Founded in 1969, ISACA sponsors international conferences, publishes the ISACA® Journal, and develops international information systems auditing and control standards. It also administers the globally respected Certified Information Systems Auditor™ (CISA®), Certified Information Security Manager® (CISM®) and Certified in the Governance of Enterprise IT® (CGEIT®) designations.
ISACA developed and continually updates the COBIT®, Val IT™ and Risk IT frameworks, which help IT professionals and enterprise leaders fulfill their IT governance responsibilities and deliver value to the business.
The Greater Houston chapter was founded in 1969 and in 2009 has approximately 1000 members. The Houston chapter membership includes a wide range of IS audit and control professionals working for all types of business as well as local and national governments. These professionals hold a variety of positions including: CEO, CIO, IS Director, IS Manager, IS Audit professionals, and IS Security professionals, just to name a few.
The South Texas Chapter of the Information Systems Security Association (ISSA) is a non-profit organization of information security professionals and practitioners.
South Texas ISSA provides education forums, publications and peer interaction opportunities which enhance the knowledge, skill and professional growth of its members. This Chapter is affiliated with the international ISSA organization, conforms to its professional and organizational guidelines, and supports the ISSA Code of Ethics. We encourage our members to pursue and maintain formal security certifications in their chosen fields and offer training opportunities to help members meet requirements for continuing education.
“We believe that everyone – from home computer users and small companies to large corporations and governments – has the right to be free from cyber-security fears. We have therefore made it our mission to provide the world’s most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target countries’ critical infrastructure with potentially catastrophic consequences. We’re here to protect our users from them all.”
Kaspersky Lab is one of the fastest growing IT security vendors in the world. Firmly positioned as one of the top four leading vendors of security solutions for endpoint users*, Kaspersky Lab continues to improve its market position. According to the company’s 2012 unaudited financial results, Kaspersky Lab’s global revenue grew by 3% compared to the previous year and reached $628 million. Today it is the world’s largest privately held vendor of endpoint protection solutions. The company provides a wide range of products and solutions for different types of clients, with a special focus on large enterprises, and small and medium-sized businesses.
The heart of IT is about empowering people—and being able to serve and secure all types of users, on all the devices they use, wherever they are. With an end-to-end Service Management solution, only LANDESK unifies and automates the delivery of all the assets and services users need across mobile, cloud, and personal computing environments. By making users happy, we make IT more strategic and business more productive.
Mashery provides the most innovative and successful brands with the API management platform and tools that help them scale their businesses and extend their APIs’ reach. Mashery is an Intel company.
A global market leader powering more than 2 billion business connections and 2 billion mobile subscribers every day, Mitel helps businesses and mobile operators connect, collaborate and take care of their customers. Our innovation and communications experts serve more than 60 million business users in more than 100 countries, and 130 service providers including 15 of the top 20 mobile carriers in the world.
In 1993, we shipped our first data storage system to Patrick Mulroney, who was a system administrator at Tandem Computers at that time. The network appliance was designed to clean up his infrastructure sprawl. He loved its simplicity.
“Patrick’s favourite attribute was that our system rebooted in 30 seconds instead of hours like our competitors,” says NetApp co-founder, Dave Hitz. “While solving the downtime problem, we also gave Patrick a competitive edge.”
More than 20 years later, our story is still about delivering innovation that gives our customers an edge over their competitors. From the edge of the universe with CERN’s Large Hadron Collider, to the edge of human endurance in Formula One auto racing, we help you to do things you couldn’t before – at speeds you never thought possible.
Our team is passionate about customer success. Our company culture and work environment support that dedication. Together with our global network of partners, we are united in one goal: to help our customers achieve the outcomes that matter most to them.
The reason for New Horizons’ 30-year success is simple—we are the best source for computer training and certification in the world. New Horizons offers an extensive selection of vendor-authorized training and certifications for top technology providers such as Microsoft, Cisco, CompTIA and VMware. In fact, we are Microsoft’s largest training provider, delivering more than 40% of all authorized Microsoft training worldwide; the largest Cisco-authorized training partner with courses available at 250 centers worldwide; and the largest authorized provider of CompTIA training and certification in the world. Being an authorized partner ensures that our students have the highest quality training materials and train on the latest products and technologies available. New Horizons offers the largest Guaranteed-to-Run course schedule in the world.
PFU Systems, a Fujitsu company, headquartered in Sunnyvale, California, is the U.S. operations of Japan-based PFU Limited, a $1.2 billion global enterprise that designs, develops, manufactures, sells and maintains computer hardware, imaging scanners, peripheral products, enterprise software, systems and network security solutions.
Launched in North America in 2013, iNetSec Smart Finder is an internal network appliance that provides wireless and wired device discovery&visualization and BYOD access control, application control and behavioral malware detection to secure your network from advanced APT attacks and malware spread. It installs in less than 2 hours, not in-line and with no agent required.
Prairie View A&M University is the second-oldest public institution of higher education in Texas. Offering baccalaureate degrees in 50 academic majors, 37 masters degrees and four doctoral degrees, this Historically Black University has an established reputation for producing thousands of African American engineers, nurses and educators. The University has been dedicated to fulfilling its land-grant mission of achieving excellence in teaching, research and service since 1876.
QNAP, Inc., as its brand promise “Quality Network Appliance Provider”, aims to deliver comprehensive offerings of cutting edge network attached storage (NAS) and network video recorder (NVR) solutions featured with ease-of-use, robust operation, large storage capacity, and trustworthy reliability. QNAP integrates technologies and designs to bring forth quality products that effectively improve business efficiency on file sharing, virtualization applications, storage management and surveillance in the business environments, as well as enrich entertainment life for home users with the offering of a fun multimedia center experience. Headquartered in Taipei, QNAP delivers its solutions to the global market with nonstop innovation and passion.
Shavlik, a global leader in simplifying the complexity of IT management, is dedicated to significantly reducing the time-to-value for IT professionals from months to minutes. Shavlik’s Protect, Patch for Microsoft System Center and Management Intelligence are some of its on-premise and cloud base solutions that enable customers to manage both physical and virtual machines, deploy software, discover assets, simplify configuration, control power usage and ensure endpoint security. By bringing the sophisticated capabilities enjoyed by large companies to organizations of all sizes and types, Shavlik is driving the democratization of IT.
Shavlik Protect brings enterprise-level IT management to companies of all sizes. Get centralized patch management and asset inventory for Windows and third party applications for both virtual and physical machines. And, from the same console, get patch management capabilities, dozens of pre-built ITScripts, power management, and centralized antivirus.
SMS Systems Maintenance Services offers an adaptive suite of managed IT asset lifecycle support services throughout North America, Asia and Europe. Services include independent hardware maintenance, hardware sales and leasing alternatives, data center relocations and consolidations, data migrations, data storage audits, deployments, secure asset disposition, recycling, to name a few.
The Society of Communications Technology Consultants International, Inc., (SCTC) offers information and communications technology (ICT) answers. Our professional network of experienced, vendor independent, vetted consultants has extensive knowledge and expertise to guide organizations to optimal solutions.
When you engage an SCTC consultant, you can be confident that you are working with the best. SCTC consultants are:
Experts in their field, thoroughly vetted by the SCTC.
Part of a powerful network of consultants, able to form teams on demand with the right expertise for each project.
The SCTC has been a recognized force in the information and communications technology industry since 1976. This non-profit society provides a robust network of consultant resources and opportunities for collaboration, a forum for professional development, mentoring of new consultants, and access to a vendor advisory council that offers product, service, and channel information for our consultants and clients.
Our mission is to accelerate the transformation of enterprise IT by changing the performance and economics of enterprise storage. Since 2009, we’ve provided innovative flash-optimized storage solutions that enable businesses of all sizes to accelerate their applications, reduce their storage footprint and cut operational costs. With demand growing for bigger data and faster service, your data storage choices can make or break your business. Accelerate your business with Tegile’s all-flash and hybrid storage solutions.
When it comes to competitive telecom carriers, one name stands above the rest. TelePacific. The largest competitor to AT&T, Verizon, and CenturyLink in California and Nevada is now one of the top communications provider options nationwide with a private fiber network that can serve any business in the country. We’ve also added a major footprint in Texas. This strong position brings competitive advantages to our more than 40,000 business customers who have over a million lines in service all across the U.S.
Since 1986, Unique Digital has been providing our customers with the tools and knowledge to ensure that their data is secure, protected, available and recoverable.We address the entire storage infrastructure life-cycle to deliver end-to-end solutions that successfully corresponds with our client’s needs. By partnering with industry leading manufacturers, we are able to provide our customers with superior computer hardware and software solutions at competitive prices.
Whether the need is networked storage, tiered storage, data life-cycle management, backup/restore, virtualization, consolidation or disaster recovery; Unique Digital can help.