Microsoft User CAL pricing is changing. Here’s what you need to know.

In December 2012, Microsoft increased the cost of the User Client Access License (CAL) by 15 percent. Here on the SHI blog, we discussed the evolving nature of how organizations were accessing devices, both on premises and in the cloud, and Microsoft’s need to address this shift through an increase in the cost of User ....

Read More
Tags: , , , ,

Cloud adoption fuels SHI’s growth in Q1 2015

SHI continued its fast-paced growth during the first quarter of 2015, and brought in $1.3 billion in revenue, which represents a 12 percent year-over-year increase over Q1 2014. This growth was propelled in part by demand for Microsoft products and services, and for cloud solutions in particular. SHI’s Microsoft cloud business, including Office 365 and…

Read More
Tags: , ,

4 tips I’ve learned after 100 Enterprise Vault rollouts

Pop quiz for IT: How long does your organization retain emails, even those in the Deleted folder? How long are business invoices archived, and how are they organized while in storage? Many organizations are taking a proactive approach in answering these questions, and writing specific retention guidelines as data archiving becomes a business priority. These…

Read More
Tags: , , ,

SHI wins 2 Cisco Partner of the Year awards, preps for new Cisco growth

Cisco is building on its traditional dominance in networking, and evolving its strategy to meet customer demand for cloud, security, big data, and Internet of Things (IoT) technologies. At the Cisco Partner Summit last week in Montreal, Cisco executives acknowledged this shift by often categorizing the organization as a “software company,” and pointing to consumption…

Read More
Tags: , , ,

Why you don’t have to choose between productivity and security with DLP

You sit down, ready to save a file to a USB drive so you can finish up a project over the weekend. You’ve experienced the dreaded security lock that prevented access to a web page, but now you get a similar message for your download – access denied. The immediate reaction morphs from “Who do…

Read More
Tags: , ,

The 3 most common questions we hear about Office 365 deployment

Your organization has purchased Office 365 (O365). Now what? If you’re tasked with deploying O365 and are unsure what to do next, you’re not alone. From uncertainty about which workloads to move, to a lack of technical expertise, many IT professionals we’ve spoken with have run into roadblocks in the way of completing an O365…

Read More
Tags: ,

How to lock down your data with data loss prevention systems

Most of the highly publicized data breaches involve credit card or bank account numbers, but other sensitive data is also at risk, including Social Security numbers, medical records, personal information like your mother’s maiden name, and more. Sensitive data can also be trade secrets or any other type of intellectual property that, if stolen, could…

Read More
Tags: , ,

5 ways to deploy tablets in your retail store

From national chains to neighborhood shops, retailers understand that tablets can greatly enhance shopper experiences and they continue adopting this technology in store. Tablets and their applications possess such potential for changing the way people shop and spend that eventually all stores will be connected. Today’s shoppers are more knowledgeable than ever before, and they’re…

Read More
Tags: , , , , ,
More Posts