Make the Most of your E-Rate Dollars!

By | K-12 | No Comments
Cathy HeadshotCathy is here to help you optimize your IT infrastructure by assisting you in identifying the E-rate eligible CAT2 technical solutions best suited to meet your K-12 and Library IT needs. Eligible solutions can include access points, firewalls, switches and more.  Cathy can guide you through the maze of solutions so that you can utilize your E-Rate funds confidently.

Contact Cathy

888.492.6843 x257
503.691.4364 x257
info@xiologix.com
Read More

Christopher Kusek and Kevin Elder earn Dell EMC Elect Recognition!

By | Storage, Xiologix in the News | No Comments

Dell-EMC-Elect-Engineers

Dell EMC Elect is an annual recognition for people who have given back to the community of Dell EMC users by sharing their technical expertise and evangelizing to others about Dell EMC solutions and services.  There are only 157 people worldwide with this recognition and Xiologix is proud to have two amazing engineers on staff who have earned this honor. Congratulations to both Christopher and Kevin for having earned this outstanding recognition.  Read More

Citrix Logo

What’s Happening to Citrix Subscription Advantage?

By | Virtualization | No Comments

Sid HerronIn case you haven’t heard, Citrix is retiring Subscription Advantage, and replacing it with a new suite of support services called “Customer Success Services” (“CSS”). Ultimately, there will be three tiers of CSS available – “Select”, “Priority”, and “Priority Plus” – although only Select is available at present. More information on Priority and Priority Plus will be available after July 1, 2017. All “Legacy Support” services (Preferred and Enterprise agreements) will also be retired in favor of the new program. Learn more about what that means to you as a Citrix customer.  Read More

4-Point Checklist for Choosing the Right SIEM

By | Security, SIEM | No Comments

SIEMOrganizations implement security information and event management systems (SIEMs) for a variety of reasons [Read “4 Reasons to Build SIEM into Your Security Platform”], from protecting data against increasingly sophisticated threats to improving compliance in complex regulatory environments. But while the use cases are clear, choosing the right SIEM to deliver on them isn’t as straightforward. To ensure your SIEM can support your organization today and tomorrow, it’s wise to focus on four key attributes. Read More

Byline: Securing Your Growing Home Network

By | Security | No Comments


As our work and social networks expand into the home, and the potential threat footprint in our homes continues to grow, it is critical that we take a fresh look at how we are protecting ourselves from the growing number of networks we interact with. Our personal, financial and medical information, as well as our work assets are all at risk from increasingly sophisticated malware and financially motivated cybercriminals.

Read More…

Christopher Kusek selected for Leaders to Sea Program!

By | Xiologix in the Community | No Comments
Leaders to SeaChristopher Kusek is honored to have been selected as a Cisco Champion to take part in the Leaders to Sea Program.  This program, hosted by the Commander – Naval Surface Force – U.S. Pacific Fleet, invites influential leaders to experience time aboard a U.S. Navy Ship out at sea while learning more about the Navy story.

Christopher will likely embark on his journey in a Navy SH-60 Seahawk Helicopter in late March.  He will be spending time and connecting with with Naval leaders aboard the USS Howard (DDG 83). Read More

Five Areas for Cybersecurity Innovation in 2017

By | Uncategorized | No Comments

The world never stands still. In the technology space, this means that constant innovation and discovery is the key to a solution provider's survival and growth. In the cybersecurity arena, this creed is even more vital. Many hackers are brilliant people. There's only one way to get the better of them – be even more brilliant. And faster and more creative. Which is why R&D is crucial in the security technology business. Cybersecurity solution providers must deliver open, integrated security and networking …

Read More…

FortiGuard Labs Telemetry – Roundup and Comparison of 2015 and 2016 IoT Threats

By | Security | No Comments

Attacks targeting and originating from IoT devices began grabbing news headlines toward the last quarter of 2016. Insecure IoT devices became the low-hanging fruit for threat actors to easily exploit. Some were even notoriously used as botnets to launch DDoS attacks against selected targets. For example, the infamous Mirai botnet exploited weak login vulnerabilities in insecure IoT devices such as IP cameras and home routers, and was responsible for one of the largest known DDoS attacks to date. …

Read More…