James Nagurney - National Business Development Manager
James Nagurney
National Business Development Manager
Kurt Hildebrand
Director of Practices and Initiatives for Enterprise Storage
Lane Shelton - Vice President of Software Business Development
Lane Shelton
Vice President of Software Business Development
Rich Faille - Director of Mobility Practice
Rich Faille
Director of the Mobility Practice
Tony D'Ancona - Vice President of Professional Services
Tony D'Ancona
Vice President of Professional Services
»See All Authors
  • AwardsIndustry Recognition and More
  • EventsExpos, Conferences, and More
Bill Virtue - Senior Partner Development Specialist
Featured Story

Can Your Technology Stand Up to a Barrage of New Security Threats?

Keep Your Network Strong with Dell SonicWALL

by Bill Virtue | Thursday, October 16, 2014

Today, addressing security risk and threats is an ongoing rapid process. Organizations of all sizes need to protect themselves from the constant evolution of threats. My team at PC Connection is working with customers every day to eliminate dangerous gaps in protection and boost employee productivity at the same time.

Our team provides insight into network security, offers optimization options, and even eases administrative burdens. We start with the right questions, such as where are your critical assets located? Who can access these assets? And what types of vulnerabilities exist in your environment?

Any competent IT professional will tell you that one of their top priorities— probably the top priority—is securing their enterprise’s data and network. Indeed, CIOs typically allocate a healthy chunk of their overall IT budgets to security.

Concern, however, does not always translate into competence, or even common sense. Further, throwing money at a problem without first properly assessing and prioritizing an enterprise’s unique IT-related risks actually can create greater vulnerability. You can’t just buy technology, put it in your environment, and assume that your assets are safe.

The ‘Other’ CIA – Part of Achieving a Secure Storage Infrastructure

Plan, Audit, Integrate, Test — Keys to Storage Security

by Kurt Hildebrand | 10.01.14

In an era when data breeches can cost hundreds of millions of dollars, having a secure storage system is critical.

Technology Blog

Our technology blog, Connected, serves as your one-stop resource for valuable insights from our on-staff technology experts and featured industry leaders regarding the latest news and information on business IT solutions and technology trends.