Vendor Watch – Managed Antivirus for Mac is here
Microsoft-based machines remain dominant in most of your end-users’ operating environments. While this makes life simpler to manage, the question remains on how to best implement antivirus (AV) on Mac workstations. You may be setting up AV manually on these...
Have you automated your Active Directory process for user onboarding?
The new employee onboarding process usually stays the same at most organisations. Many companies are still manually onboarding employees within their Active Directory (AD). This manual process not only takes a lot of man-hours, but also risks human error while setting...
Revising pricing for GFI’s products – May 1, 2019
As a valued GFI partner, we wanted to advise you of an upcoming change to the GFI price-book, as they have revised pricing. Please share this notice with anyone in the organisation you believe should be across these licensing changes. On May 1, 2019 GFI...
VoIP Troubleshooting
Capturing traffic for VoIP troubleshooting When troubleshooting VoIP issues, there are a few ways to get the details needed for both Soft Solutions and our vendors to assist. This will be along the lines of increasing the logging verbosity within 3CX, generating the...
How do you track down a lost or stolen mobile device?
Have you thought about what you would do if your mobile gets stolen? These days we all rely on our phones for both work and personal use. If it gets stolen or lost, it becomes a nightmare. There’s a tonne of private data stored on our phones - from photos to texts,...
Vendor Watch – A backup solution that scales with your needs
The days of guessing how much data your customers need to back up, are over. With a traditional backup solution, it requires ongoing storage forecasting, provisioning and adjustment. Choosing a cloud-first solution, lets you easily scale up (and down) as demand...
How to discover ALL potential impacts before rebooting a server
IT changes are one of the main sources of outages, that easily impact a business’s production environment. Change management is an ITSM (IT Service Management) process that has been designed to mitigate such risks, however, it’s often difficult to follow. Potential...
3CX launches v16 of their IP PBX
Now more than ever customers are switching from a traditional PBX to an IP PBX. 3CX has stamped its mark as a leading provider in the VoIP space. With the launch of version 16 last week, the product introduces much longed for features. 3CX is well known for its...
Request Life Cycle feature in ServiceDesk Plus
ITSM ServiceDesk Plus Request Life Cycle can be used in organisations to: Guide technicians at each step. Restrict access to a group or an individual. Request information only when it's required. Provide contextual notifications. Abort ticket processing. Invoke...
An easier way to discover and manage SSL certificates
Even the most effective webmaster struggles to overcome problems with SSL/TLS certificates. Discover an easier way to manage SSL certificates. The top 5 challenges for a SSL manager are: Discovering all certificates in the network. Keeping up with...