April 1, 2017

Technology Partners

We partner up with some of the best technology companies to leverage their products and services in your success.

 

Datto

www.datto.com

Datto Inc. is an award-winning vendor of backup, disaster recovery and Intelligent Business Continuity (IBC) solutions, providing best-in-class technology and support to its channel partners throughout the globe. Datto is the only hybrid-cloud BDR/IBC vendor that provides instant onsite and offsite virtualization and screenshot backup verification, addressing the needs of small to medium-sized businesses.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………

Dell

www.dell.com

Dell is the largest provider of servers, workstations, and laptops to the small- and medium-sized business market. As a Dell Authorized Reseller, Kontech offers a wide

range of product and service categories, including desktop computer systems, servers and networking products, mobility products, software and peripherals to its clients.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Fortinet

www.fortinet.com

Fortinet is a leading provider of network security appliances and the leader of the unified threat management (UTM) market worldwide. Fortinet’s award-winning portfolio of security gateways, firewalls, subscription services, and complementary products delivers the highest level of network, content, and application security for enterprises of all sizes, managed service providers, and telecommunications carriers, while curtailing total cost of ownership (TCO) and furnishing a flexible, scalable path for future growth.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Meraki

www.meraki.cisco.com

Cisco Meraki is a cloud managed IT company based in San Francisco. They are a leading provider of wireless solutions such as: switching, security, EMM, communications, and security cameras, all centrally managed from the revolutionary cloud-based console.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Microsoft

www.microsoft.com

Microsoft Corporation is an American multinational corporation headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer web browser.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

SonicWALL

www.sonicwall.com

SonicWall provides real-time breach prevention that protects organizations from cyber threats including ransomware, IoT DDoS attacks and encrypted malware by leveraging its cloud-based multi-engine sandbox that safely identify and block advanced threats. Backed by research from the Global Response Intelligent Defense (GRID) Threat Network, our award winning real-time breach detection and prevention solutions are the backbone securing more than a million business and networks and their emails, applications and data.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

StoregeCraft

www.storagecraft.com

StorageCraft Technology Corporation is a thriving international software development company with phenomenal year-over-year revenue growth, talented and highly engaged staff and a mature line of award winning software products.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….

Webroot

www.webroot.com

Webroot is a private U.S. based company that provides Internet security solutions for consumers and businesses. It delivers next-generation endpoint security and threat intelligence services to effectively protect IT systems around the world.

………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………………….