Our Services

Whether you want to free-up your IT resources to focus on other priorities, decrease operational risks, or gain access to world-class Microsoft IT infrastructure talents, we offer both managed services and dedicated IT support that will protect the value of your IT investments. 

Threats & Risks of the New Normal (webinar)

On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats and risks to organisations as people try to work during the pandemic, and prepare for the changes moving forward.  The link to the recorded webinar is here.  The pandemic took us all by surprise. Companies rushed to deploy solutions to enable employees to work remotely, often without securing them.   […] On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats  … On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats and risks  … On June 10th, Itergy, along with Quest Software, hosted an interactive webinar discussing the reality of IT threats and risks to organisations as people  …

Strengthen your remote working defences against cyber-attacks

A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health Organization (WHO) has seen attacks rise by 100%2, and hospitals and research centres have been victims of ransomware3. With the majority of office-workers now accessing systems remotely, the risks for companies of […] A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1  … A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health  … A quick search of Google news reveals that there has been a dramatic increase in cyber-attacks due to Coronavirus.1 Even the World Health Organization  …

Remote working: Are you providing the required security?

In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from home. Without a doubt, this is the result of a cloud journey which started years ago, when Office 365 provided online versions of Word, Excel, Outlook and OneDrive, allowing people to […] In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees  … In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from  … In these uncertain times, it has been impressive to watch companies large and small quickly provide their employees with the ability to work from home.  …

Bridging Identity With The Cloud

We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance and Administration (IGA). Although Identity and Access Management (IAM) as a practice has been around for many years, most implementations still go awry. Why is this? In my humble opinion, the traditional implementation approach has been wrong. Cloud versus […] We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance  … We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance and Administration (IGA).  … We’ve recently been seeing a renewed interest in the Identity space, more specifically around Identity Governance and Administration (IGA). Although  …

The DEFINITIVE Corporate Data Security Checklist For Your Organization

In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach has risen 12% over the past five years[1] and now costs $3.92 million on average. This past year alone, over 2.3 billion records have been involuntarily leaked[2]! […] In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT  … In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach  … In this day and age, the digital age that is, database security is of the utmost importance for CIO’s and IT leaders. The cost of a data breach has risen  …
Office 365 Security Assessment

You’re Vulnerable. And You Don’t Even Know It —Microsoft Office 365 Security Misconfigurations

The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office 365 implementations. The report echoes our finding over the last few years – many organizations adopted Office 365 without doing a proper assessment of their security needs, and how these should be supported by […] The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of  … The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office  … The US Department of Homeland Security’s CyberSecurity Division, CISA, recently published a report on the state of security in Microsoft Office 365  …

The Case for Modernizing Your Active Directory

Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a good idea—it’s a necessity. Unfortunately, few IT departments are equipped to undertake such a project. Malheureusement, très peu de services de TI internes sont bien outillés pour entreprendre un tel projet. Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning  … Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a  … Investing in the modernization and optimization of your corporate Active Directory infrastructure and in cleaning up the data is now not simply a good  …

What is Microsoft 365?

Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility + Security (EMS) together, to simplify licensing and management. Microsoft 365 is an integrated solution that helps businesses effectively address identity and security issues and safeguard apps and data on-premises, in the cloud, and across devices. Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility  … Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility + Security (EMS) together, to  … Microsoft 365 is Microsoft’s latest licensing bundle that combines Windows 10, Office 365, and Enterprise Mobility + Security (EMS) together, to simplify  …

Key IT Integration Challenges & Solutions Following a M&A

IT integration projects are often not a top priority during the due diligence and early integration phases. One CIO mentioned that the business may actually request that no changes be made in the first six months, meaning the IT consolidation that would drive many ongoing efficiencies is left unfunded. And the IT pain points associated with the lack of centralization start rising to the surface. IT integration projects are often not a top priority during the due diligence and early integration phases. One  … IT integration projects are often not a top priority during the due diligence and early integration phases. One CIO mentioned that the business  … IT integration projects are often not a top priority during the due diligence and early integration phases. One CIO mentioned that the business may  …