Document Review

  • Post category:Blog

Email from Client: "When we get a big project file in, we can easily convert files to pdf when there are multiple file types.  For example, we received 1000+ emails…

Continue ReadingDocument Review

Pen Testing

  • Post category:Blog

The requirement for network penetration testing has been prevalent among the security requirements being requested of our clients.  A penetration test is basically an authorized attempt to “break into” your…

Continue ReadingPen Testing

eDocs 16.5 New Toys

  • Post category:Blog

There is a really cool new add-on module with this new release.  Its called Edocs Defense and includes (2) unique features.  Activity Monitoring and Encryption at Rest.  This module does require additional…

Continue ReadingeDocs 16.5 New Toys

Product Choices

  • Post category:Blog

As a "guardian" of our clients networks, we make decisions on the products we recommend based upon our experience with the product itself, if it increases efficiency in the workflow…

Continue ReadingProduct Choices