Salt Lake City, UT, April 11, 2018 – EY today announced that Rich Linton, CEO and Mike Linton, EVP of VLCM are a finalist for the Entrepreneur Of The Year® 2018 Awards in the Utah Region. As the world’s most prestigious business awards program for entrepreneurs, Entrepreneur Of The Year recognizes business leaders who are excelling in areas such as innovation, financial performance and personal commitment to their businesses and communities.
Topics: COMPANY NEWS
Salt Lake City, UT, March 26, 2018 – VLCM announced today that CRN®, a brand of The Channel Company, has named VLCM to its 2018 Tech Elite 250 list. This annual list honors an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers, scaled to their company size.
To compile the annual list, The Channel Company’s research group and CRN editors work together to identify the most customer-beneficial technical certifications in the North American IT channel. Companies who have obtained these elite designations— which enable solution providers to deliver premium products, services and customer support—are then selected from a pool of online applicants.
Salt Lake City, Utah. March 12, 2017 - VLCM, a regional leader in IT solutions and Managed Print Services, today announced its partnership with HP Inc. in providing new HP A3 multifunction copiers. This next generation portfolio includes 54 SKUs and is designed to provide qualified IT partners the ability to offer higher levels of performance that meet a wider range of customer’s printing and copying needs. VLCM is the only HP partner based in Utah that has the ability to sell this robust portfolio of A3 copiers and MFPs in the Mountain West Region and surrounding states.
Salt Lake City, Utah, February 20, 2018 – VLCM announced today that CRN®, a brand of The Channel Company, has named VLCM to its 2018 Managed Service Provider (MSP) 500 list in the Managed Security 100 category.
This annual list recognizes North American solution providers with cutting-edge approaches to delivering managed services. Their offerings help companies navigate the complex and ever-changing landscape of IT, improve operational efficiencies, and maximize their return on IT investments.
Just when you think it is safe, another global hack hits the headlines, and the cycle of frustration and worry begins anew. Are my systems safe? What would I do if our data was compromised? Is my IT prepared for a full-scale hacker attack?
If you care about your business, you’re asking yourself these questions. And you should be.
For data storage, project management, customer relationship management and more, SMBs are increasingly looking to cloud applications. Now, SMBs are also looking to the cloud for a way to better secure those apps with cloud-based unified threat management (UTM).
Cyber attacks are growing in quantity and sophistication while virtualized environments are more connected with more endpoints resulting in a larger attack surface. To keep pace with these threats, organizations need advanced security that spans across physical and virtual environments.
You’ve come to an important crossroads.
You’ve got a business worth protecting, you know cyber threats are on the rise, and you don’t have the talent in-house to step up and become a cybersecurity expert. Compounding the problem is an unemployment rate of qualified cybersecurity professionals near zero in most markets, making it nearly impossible to hire an IT staffer dedicated to cybersecurity.
The recent WannaCry and NotPetya attacks have highlighted not only how quickly ransomware actors are growing in sophistication, but also how the interconnectedness of today’s world puts all organizations at risk. In the education sector, ransomware is becoming a major headache for IT managers, making the back-to-school season is a good time to revisit ransomware protection policies.
Too often, a company’s approach to cyber security is reactive, with the IT support team focusing on vulnerabilities and improving security systems after an incident has occurred. It’s an ineffective method and leaves the organization susceptible to further attacks.
Taking a proactive, network wide cyber security approach allows the organization to pull together plans, policies, and tools to better anticipate and prevent cyber attacks from happening or mitigating them before damage is done. The first step in putting together a proactive approach is to take steps to truly understand the steps of the cyber kill chain.