0800 8047 256
United Kingdom
EACS on LinkedInEACS on TwitterEACS on YouTubeEACS on FacebookEACS on Goolge+EACS on Pintrest
≡ Menu

Journey to the Cloud – Cloud Readiness Assessments

IT leaders are under increasing pressure to do more with less money. They are constantly bombarded by outside influences such as partners, vendors, industry forums and industry analysts all saying that the time is right to move to the cloud. It is easy to be lured with the quick wins that the cloud promises, such […] ...read the full article

Mobile Workspaces

Securely deliver apps, files and services seamlessly to any user, on any device, over any network. Today, work happens from many locations and devices. As employees increasingly expect to be able to do their jobs outside the office on their choice of device, IT is struggling with the new security and management challenges this mobility […] ...read the full article

Diversity & Women in IT

David Fuller, EACS Director of Partner and Alliances, considers why businesses should embrace diversity… The only time I remember being denied an opportunity based on who I am, was many years ago. It was for a sales role and I was told that I had all the right attributes apart from one and that was […] ...read the full article

Asset Disposition Solutions – Computer Recycling Services

EACS IT Disposal and Asset Recovery Services are focused on generating value from used IT for our clients and creating an environmentally sustainable computer disposal solution for anything unsuitable for reuse. All businesses have policies that require responsible electronics recycling and in Europe this is regulated by the WEEE Directive. Government bodies like the Environment […] ...read the full article

Windows 10

With the Windows 10 Preview having been available for a while now, it’s a good time to look at this new version of Windows and see what it offers business users. One converged Windows platform A lot of work has been done in the background over the last few years to converge the disparate Windows […] ...read the full article

Protecting Your Virtual Machines from Malware

By Maxim Weinstein, CISSP, Security Advisor, Sophos IT teams must now support a mobile workforce, diverse portable devices, interactive websites, and a portfolio of critical business applications, in addition to the traditional network services and infrastructure. While IT spending has grown in many organisations, it rarely keeps pace with the demand for services, leading IT […] ...read the full article

How to Disarm the Spear Phishing Threat

Orlando-Scott Cowley, security strategist at Mimecast, explores the rise of spear phishing and ways to mitigate the risk of new email-borne attacks. Spear phishing is the new frontline in the battle to protect enterprise systems and data. As security scanning or gateway security services have made it hard for traditional spam or phishing attacks to […] ...read the full article

Office 365 and Azure for SMBs

Office 365 is the same Office you already know and use every day but because it is powered by the cloud, you can get to your applications and files from virtually anywhere—PC, Mac, and tablets—and they're always up to date. The same goes for updates to features—you get them automatically. Microsoft recently released three new […] ...read the full article

Flash to Cloud and Back Again

Matt Watts , EMEA Director of Technology and Strategy at NetApp frequently attends events articulating the business value of IT and is a previous keynote speaker at Optimise IT. Below he considers a future involving Hybrid Cloud models... IT has never had so many options open to it and most companies that I meet tell […] ...read the full article

Case Study: Managing Configurations in a School Environment using Microsoft SCCM 2012

A high school in London had invested in a technology platform that has become central to its learning experience, including state-of-the-art ICT labs, interactive whiteboards, projectors and interactive design workstations. The ICT support team of four people has to ensure that whenever a teacher goes into the classroom or lab, they are able to dock […] ...read the full article