1. From education to the enterprise, the mobile device trend is changing the IT landscape and there is no going back.

    During this seminar series we will discuss the key elements CIO's and IT decision makers need to consider, understand and address without restricting the end-user experience.

    Topics covered will include:

    - BYOD Readiness Roadmap
    - Defining BYOD (Bring Your Own Device) priorities
    - The new evolution & business experience in enterprise mobility
    - Securing and optimising your infrastructure for added mobility
    - Providing guest, visitor or contractor provisioning
    - Gaining visibility of your BYOD/Mobile device fleet
    - Secure data access and file sharing on any mobile device
    - Improving mobile productivity without compromising security
    - Mitigating mobility risk and protecting corporate resources
    - Managing corporate-owned and employee-owned devices
    - Controlling access to resources based on policies
    - Simplify and streamline your service desk in a mobile world

    Who should attend:
    CIO's, IT Managers or Business Unit Executives responsible for policies, structures, and processes to maximise potential value from mobile technologies.

    Catering:
    Arrival tea and coffee will be provided along with morning tea.

    Spaces are limited and will be allocated on a first come basis. To register please select your city on the top right.

    For any questions relating to this event, please contact events(at)intechnology.com.au

    # vimeo.com/72631173 Uploaded 182 Plays 0 Comments
  2. From education to the enterprise, the mobile device trend is changing the IT landscape and there is no going back.

    During this event we will discuss the key elements CIO's and IT decision makers need to consider, understand and address without restricting the end-user experience.

    Topics covered will include:

    - BYOD Readiness Roadmap
    - Defining BYOD (Bring Your Own Device) priorities
    - The new evolution & business experience in enterprise mobility
    - Securing and optimising your infrastructure for added mobility
    - Providing guest, visitor or contractor provisioning
    - Gaining visibility of your BYOD/Mobile device fleet
    - Secure data access and file sharing on any mobile device
    - Improving mobile productivity without compromising security
    - Mitigating mobility risk and protecting corporate resources
    - Managing corporate-owned and employee-owned devices
    - Controlling access to resources based on policies
    - Simplify and streamline your service desk in a mobile world

    Who should attend:
    CIO's, IT Managers or Business Unit Executives responsible for policies, structures, and processes to maximise potential value from mobile technologies.

    Catering:
    Arrival tea and coffee will be provided along with morning tea.

    Spaces are limited and will be allocated on a first come basis. To register please select your city on the top right.

    For any questions relating to this event, please contact events(at)intechnology.com.au

    Uploaded 280 Plays 0 Comments
  3. From education to the enterprise, the mobile device trend is changing the IT landscape and there is no going back.

    During this seminar series we will discuss the key elements CIO's and IT decision makers need to consider, understand and address without restricting the end-user experience.

    Topics covered will include:

    - BYOD Readiness Roadmap
    - Defining BYOD (Bring Your Own Device) priorities
    - The new evolution & business experience in enterprise mobility
    - Securing and optimising your infrastructure for added mobility
    - Providing guest, visitor or contractor provisioning
    - Gaining visibility of your BYOD/Mobile device fleet
    - Secure data access and file sharing on any mobile device
    - Improving mobile productivity without compromising security
    - Mitigating mobility risk and protecting corporate resources
    - Managing corporate-owned and employee-owned devices
    - Controlling access to resources based on policies
    - Simplify and streamline your service desk in a mobile world

    Who should attend:
    CIO's, IT Managers or Business Unit Executives responsible for policies, structures, and processes to maximise potential value from mobile technologies.

    Catering:
    Arrival tea and coffee will be provided along with morning tea.

    Spaces are limited and will be allocated on a first come basis. To register please select your city on the top right.

    For any questions relating to this event, please contact events(at)intechnology.com.au

    # vimeo.com/72241740 Uploaded 24 Plays 0 Comments
  4. inTechnology Distribution is a specialist value-add distributor bringing "best of breed' hardware and software to the Asia Pacific market through its extensive reseller channel program. inTechnology’s competencies can be separated into three primary areas: Security, Management and Control with a strong focus on BYOD (Bring Your Own Device) technologies.

    inTechnology Distribution, a private company, has been in operation since June 1999. Its value-add distributor channel model targets those areas within IT that impact on business and show a justifiable return on investment. The company is effective in building market awareness to introduce products and supports this with specialist technology teams.

    inTechnology Distribution’s reputation is based on its customer service, ethical practice and honouring commitments. It is headquartered in Currumbin Waters Queensland with sales offices in Melbourne, Auckland, Manila and with our SE Asia headquaters in Kuala Lumpar.

    In particular, inTechnology Distribution has the technical and strong awareness of technologies of today and future challenges faced by many organisations, both large and small. inTechnology Distribution has a young and highly focused team of Pre/Post sales engineers that have the knowledge and expertise to assist channel partners and resellers carry out any scale of projects.

    Uploaded 1 Play 0 Comments
  5. Smoothwall are the innovators of Real-Time content filtering, and have continued to push the boundaries to give you the features that you need.

    Real-Time Content Filtering
    When the content of a page can change from second to second, URL blocklists can't keep up. Our web filter analyzes the content and context of new material in real time to prevent anything slipping through.

    BYOD Support
    Enabling mobile devices to use the secured and filtered internet is becoming essential to organizations across all sectors. Our BYOD support means that any device connected to your Wi-Fi is filtered and protected, including: iOS, Android, Blackberry, and Windows.

    "Who, What, When, Where" Policies
    Smoothwall's policy engine allows unprecedented flexbility. For the first time, you are able to build policies based not only on user groups and content, but also timeframe, and even location.

    Block P2P File sharing
    Peer to Peer filesharing can monopolize your available bandwidth as well as being used to illegally transfer copyrighted material. Smoothwall UTM and WAM solutions allow you to control the use of these applications.

    Time Quotas
    Time Quotas allow you to be flexible about the web filtering policies applied to your users. The feature allows you to assign different policies for specific amounts of time, such as a more relaxed policy during lunch breaks.

    Comprehensive Reporting
    Get complete visibility over the web activity on your network, and schedule automatic reports to stakeholders. Included across the Smoothwall range, with over 300 report templates, and the ability to view web requests in real time.

    Central, Local & Hybrid Deployment
    Smoothwall's products are designed to provide complete flexibility in deployment.

    Where a company with a large headquarters and many satellite offices may best suit a centralized deployment, an organization with a small number of quite large sites may choose to have a local appliance at each site. Large complex organizations may need a mixture of the two in a hybrid deployment.

    Bandwidth Optimisation
    To make sure that business critical services perform consistently, and the user web experience is satisfactory, you have to make the most of your bandwidth. Our ability to limit bandwidth usage by policy can minimize the impact of streaming media, filesharing, and similar services without having to block outright.

    Social Media Control
    Social networks have proven to be invaluable for information and communication throughout the world. They can also provide distractions, and platforms for inappropriate behaviour.

    Our social media tools allow you use these tools while preventing inappropriate content being either viewed or submitted on your network.

    Link & Load Balancing
    UTM and WAM allow you to aggregate multiple external connections to maximize the bandwidth available to you, and ensure that the services using that bandwidth are properly managed.

    Connection failover also ensures resilient service for your users.

    Swurl Delegated Management
    There are some resources on the web that are useful in very specific circumstances but that you would otherwise want to block. With other solutions unblocking a page means putting a request into a busy IT department and potentially waiting some time for action. Swurl gives selected users and managers the ability to unblock content, meaning that resources are available as soon as they're required.

    Perimeter Firewall
    A fully-featured stateful firewall featuring IPS, VPN (L2TP, IPsec, SSL), and high availability. With the addition of Layer 7 Application Control, the Smoothwall UTM provides a true next-generation firewall.

    Email Anti-Spam & Anti-Malware
    Available as an option across our product range, our gateway anti-spam and anti-malware gives you full email security.

    Application Control
    Not all problematic online traffic uses the http or https protocols. Applications like skype and various peer to peer filesharing systems can not be managed with a web filter alone. Application control (also known as Deep Packet Inspection, or Layer 7 Filtering) can identify over 100 common application protocols and and allow you to block or allow them.

    HTTPS Filtering
    Many websites use https to offer secure access to confidential information (online banking for example). However, SSL is often used to conceal anonymous proxies, phishing sites, and more. Smoothwall's filtering ensures that no unwanted content goes undetected.

    Anonymous Proxy Blocking
    Anonymous proxies are used to circumvent your filtering policies, disguising inappropriate content as something harmless. Most filters use URL lists which leave these loopholes open for days, and even weeks. Smoothwall's combination of Real-Time Content Analysis, HTTPS Filtering, and Anonymous Proxy Detection gives you the most complete

    # vimeo.com/81786216 Uploaded 157 Plays 0 Comments

inTechnology Distribution

social PRO

Browse This Channel

Shout Box

Heads up: the shoutbox will be retiring soon. It’s tired of working, and can’t wait to relax. You can still send a message to the channel owner, though!

Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.