Filter blog content

  • Platform Hosting and Performance Management

    We start by understanding the requirements for your production environment. What are the applications? How do they face customers? What performance is needed and more.

    Explore Resources
  • Disaster Recovery as a Service

    DRaaS is a managed, cloud-based Disaster Recovery (DR) service that builds upon a standard backup and restore solution, enabling complete replication and re-enablement of your ICT operations during a business affecting outage.

    Explore Resources
  • Disk Erasing and Shredding

    ix Degrees utilises Disk Eraser, a powerful and compact piece of software that destroys all data on hard disks completely, preventing any possibility of future recovery of deleted files and folders.

    Explore Resources
  • Chief Information Security Officer (CISO)

    What can a Virtual CISO offer you?

    Explore Resources
  • Mimecast

    Mimecast Unified Email Management is used as an email filtering, security, archiving and continuity solution, particularly for Microsoft Office 365 and Microsoft Exchange.

    Explore Resources
  • 3 Day Security Health Check

    The purpose of this three day health check is to review the technical aspects of a company’s infrastructure, focusing on the network perimeter of the main office.

    Explore Resources
  • 10 Day Security Health Check

    The purpose of this 10 day health check is to review the technical aspects of a company’s infrastructure, focusing on the network perimeter of the main office.

    Explore Resources
  • Managed Antivirus

    Managed Antivirus is primarily a file antivirus, which means it will not scan emails, monitor network traffic or interfere in any way.

    Explore Resources
  • 10 Key Questions

    The security environment in which our customers operate is critical. The Financial Conduct Authority (FCA) and the U.S. Securities and Exchange Commission (SEC) are tightening their controls on the security processes at investment firms. If you answer ‘No’ to any of these 10 security questions, your organisation is at risk of a potential cyber-attack.

    Explore Resources