Marco Tiggelaar
New website & new projects in 2016

New website & new projects in 2016

Introduction It has been a while since my last update Key4ce hasn’t been sitting still in all those months, we are working hard on releasing several new projects and some major version releases for existing projects. New key4ce.com website in March Key4ce osTicket...

read more
Dangers of Weak Endpoint Security Management

Dangers of Weak Endpoint Security Management

Endpoint security management has become an area of much concern in recent years for a number of reasons, on top which are the ever-increasing incidents of hactivism/hacktivism, APT, and malware attacks and the proliferation of personal smart phones, tablets and iPads...

read more
How SWG Appliances Are Coping With Sophisticated Threats

How SWG Appliances Are Coping With Sophisticated Threats

A secure web gateway (SWG), in its early rudimentary implementation, is a firewall built at the application layer that performs uncomplicated evaluation of preset rules in order to either allow web content to pass through, or block it. Web connected businesses...

read more
Your Organization May Need ITIL Service Support

Your Organization May Need ITIL Service Support

If you are a big company that has the financial resources to maintain a full-blown IT department, you have probably been implementing the best practices documented in the information technology infrastructure library (ITIL), and this post may have little relevance for...

read more
DIY Routines to Keep Your Linux Server in Top Condition

DIY Routines to Keep Your Linux Server in Top Condition

Does your network run mainly on a Linux server? Just like any other network server, your Linux system needs to be checked regularly to keep it in good shape. There are a few things you may be able to do without having to call for outside help. One of the most...

read more
Keep Servers Running With Infrastructure Tools

Keep Servers Running With Infrastructure Tools

Infrastructure, in the context of IT servers, is simply organized server support. It refers to how the servers are physically, logically, and/or functionally grouped together and includes the tools (mostly provided by vendors and occasionally custom-made by the system...

read more
IT Efficiency Through Converged Infrastructure

IT Efficiency Through Converged Infrastructure

The idea of converged infrastructure revolves around forming a single optimized IT package by putting together several components to meet present-day business needs. According to HP, converged infrastructure meets these needs “by bringing storage, servers, networking,...

read more
Systems Can Be Attacked Via NTP Flaws

Systems Can Be Attacked Via NTP Flaws

At least three serious vulnerabilities in the Network Time Protocol (NTP) have been uncovered by security researchers at Google in 2014. This is quite serious because of the sheer number of computers that may potentially be targets of DDoS (click here to read earlier...

read more
Who Needs an Intrusion Detection System?

Who Needs an Intrusion Detection System?

Intrusion detection systems (also called ID systems and IDS) have been, and are still constantly being developed in response to past and present attacks on many high-profile websites and networks, including those of Sony, eBay, Yahoo Mail, Google, Apple iCloud, UPS,...

read more
Here Comes the Anti-DDoS Appliance

Here Comes the Anti-DDoS Appliance

"More creative and varied", this is how Brad Casemore describes the current nature of DDoS attacks in a recent article in the TechTarget website. Casemore, who is research director at International Data Corporation (IDC), said that the burden is on the shoulders of IT...

read more

 

Coming soon...

Sorry, Hosting services are currently all sold out.

 

We expect to have more clustered servers available after Q1 of 2020, If you need any advice, or want to purchase your own equipment please contact us.