<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

Lewan Recognized as Top IT Solutions Provider on CRN's 2018 SP500 List

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] June 29, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

For a 5th time, we're excited to announce that Lewan Technology has been recognized on CRN's 2018 Solution Provider 500 list as one of the top largest technology integrators, IT solution providers and IT consultants in Denver, Colorado and North America.

The SP500 list is the predominant channel partner award list, serving as the industry standard for recognition of the most successful solution provider companies.

Read More [fa icon="long-arrow-right"]

Finding Information in Multiple Repositories…the Struggle is Real

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 18, 2018 [fa icon="tags'] Paperless Solutions, Document Workflow, M-Files

This is a sponsored guest post by M-Files, a Lewan technology partner.

Information is a key asset to any organization. Even more important is how high the return on that information is. That return is strongly influenced by the ability to manage it and deliver the right information to the right person at the right time.

But how do you do this when your data all over the place?

Read More [fa icon="long-arrow-right"]

5 Reasons You Need a Security Operations Center (SOC)

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 15, 2018 [fa icon="tags'] Managed Services, Email Security, Data Security, Information Security

And 4 reasons you don’t want to do it yourself...

Almost every company today has at least some defensive cyber security equipment like a firewall, intrusion protection, URL filtering, email filtering and antivirus. These are the right basics to secure your employees against the Wild West that is the internet, but is this equipment enough to keep your company truly safe?

Yes…and no.

Defensive equipment keeps out the things you have it configured to keep out. But what about the things we don’t know about?

Read More [fa icon="long-arrow-right"]

CRN Names Lewan as top IT Service Provider on 2018 Tech Elite 250 List

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] April 30, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

CRN has named Lewan Technology to its 2018 Tech Elite 250 list. The list recognizes Lewan an part of an exclusive group of North American IT solution providers that have earned the highest number of advanced technical certifications from leading technology suppliers like Cisco, VMware, Dell EMC, HPE and Microsoft.

Read More [fa icon="long-arrow-right"]

6 Steps to Keep Your Computer Running Like New

[fa icon="pencil'] Posted by Heidi Van Anderson [fa icon="calendar'] April 17, 2018 [fa icon="tags'] Managed Services, How To Guide, Managed Infrastructure & Helpdesk, IT Solutions

No matter what industry you work in, there is probably a good chance you spend a lot of your day on a computer or laptop. The last thing you need is to have an issue with it right before an important deadline or even just during a regular busy work day.

Read More [fa icon="long-arrow-right"]

How to Build a Secure Network of Internet of Things (IoT) Devices

[fa icon="pencil'] Posted by Priyank Ghedia [fa icon="calendar'] April 10, 2018 [fa icon="tags'] Cisco, Networking, Data Security, Information Security, IoT

The “Internet of Things”, or IoT for short, is a buzzword you’ve probably heard many times before, but what does it really mean? Simply put, an IoT product is just a sensor with the ability to call home and execute functions that it’s designed for.

It’s become a hot topic in the last decade, but IoT has actually been around much longer than that even. One of the first mainstream consumer-facing applications was implemented in 1982. It was a smart Coca-Cola vending machine that reported the status of the vending machine so a technician could be sent to refill the cans when it was running low. If we fast forward to 2020, researchers predict 30-50 BILLION devices will be connected. By comparison, that’s 4-7x the world’s population.

Read More [fa icon="long-arrow-right"]

5 Key Reasons to Upgrade Now to VMware vSphere 6.5

[fa icon="pencil'] Posted by Mike Garner [fa icon="calendar'] March 28, 2018 [fa icon="tags'] Virtualization, VMware, Managed Infrastructure & Helpdesk, Data Security, VMware vSphere, VMware vCenter, Information Security, VMware Horizon

How time flies! Old reliable – Vmware vSphere 5.5 – is set for retirement in September of this year, meaning it will no longer be supported as of September 19, 2018.

See the Entire VMware Lifecycle Matrix

It’s had a good run and due to its impressive stability and wide adoption, I still see it deployed within many of our clients’ environments.

So what now? Our recommendation is to upgrade your systems to vSphere 6.5. Not only do you get the essential extension of support, but some really great new features.

Read More [fa icon="long-arrow-right"]

Lewan Named to 2018 CRN MSP500 List as Top IT Managed Services Provider

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] February 27, 2018 [fa icon="tags'] Managed Services, Lewan Awards & Certifications, CRN, IT Solutions

CRN has named Lewan Technology to its 2018 Managed Services Provider (MSP) 500 list in the MSP Elite 150 category. The CRN’s MSP 500 list recognizes Lewan as one of the preeminent IT managed services companies in Denver and North America.

Read More [fa icon="long-arrow-right"]

Have you patched the ASA vulnerability in your Cisco networking software?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] February 26, 2018 [fa icon="tags'] Email Security, Data Security, Information Security

Cisco has disclosed an Adaptive Security Appliance (ASA) Remote Code Execution and Denial of Service vulnerability that could affect your Cisco ASA and Cisco Next-Generation Firewall platforms.

The vulnerability, CVE-2018-0101, will allow a malicious individual to send specially crafted XML to your device and have it reboot or stop processing VPN traffic. This attack is currently being used and is not limited to the lab environments.

Read More [fa icon="long-arrow-right"]

What is WannaMine Crypocurrency Mining Malware?

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] February 6, 2018 [fa icon="tags'] Microsoft Windows, Email Security, Managed Infrastructure & Helpdesk, Data Security, Information Security

Remember the WannaCry ransomware that made us all want to cry? Well bad news, the base vulnerability of it is still lurking out there waiting to take your company’s infrastructure down. Our security team is still finding it on company’s systems today. The base vulnerability is called EternalBlue. (More details on Cisco’s open source security coverage here.)

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates

[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.

[fa icon="calendar"] Recent Posts