Join us for an insightful session as we delve into the world of Microsoft Surface devices and their transformative impact on Federal agencies and government sectors. This webinar is designed to help you understand how Surface devices are revolutionizing the government...
Transforming Federal Workspaces with Surface Hub 2S
Join us for a captivating session as we explore the transformative potential of Microsoft's Surface Hub 2S for Federal agencies and government sectors. This webinar is specially designed to showcase how Surface Hub 2S is reshaping the collaboration landscape in...
Meet the new Microsoft Surface Suite
Meet the Surface Family This is an important time for government, and being able to step up efficiently and effectively is critical. Do you have the tools you need? With so much shifting in government right now, I thought it might be helpful for you to see how others...
Meet the new Microsoft Surface Hub 2S for Federal
Bring Remote Teams Together Remote teamwork has never been easier with the light-weight, mobile Surface Hub 2S. Collaborate via Microsoft Teams, and stay engaged during meetings with a 4K+ quality screen and camera, along with enhanced speakers and mics. Take...
Meet the Microsoft Surface Products for Federal
Powerful versatilityWork the way you want with our ultra-light 2-in-1. Surface Pro 7+ is portable enough to take anywhere starting at just 1.7 pounds,1 yet powerful enough to handle all your business apps. Get intensive tasks done 2.1 times faster than before and...
How to Prepare for Cloud Security (Post-COVID)
You might not be able to see it, but it’s here. Lingering in the virtual cyber sphere lay containerized packets of information from sensitive data to music and photos. More and more organizations are migrating to the cloud if they haven’t done so already. The pandemic...
Game Face On: Getting Serious About Data Breaches
An August T-Mobile data breach affecting more than 53 million people including current, former and prospective customers is one of many recent cyber attacks to flood headlines. The breach led to two class action lawsuits filed by customers and accuses the company of...
Four Tools & Tips to Properly Secure Your Network
A recent report issued by a U.S. Senate Committee revealed that America’s data is in fact still at risk. Cybersecurity at eight federal agencies was found to be so poor that four of them earned grades of D, three got Cs, and only one received a B. The report also...
The Price is Right- Part 2: A New Wave of Cybersecurity Requirements
On July 20, 2021, The Department of Homeland Security’s Transportation Security Administration (TSA) announced new requirements for U.S. pipeline operators to bolster cybersecurity following the May ransomware attack against Colonial Pipeline that disrupted gas...
Full Speed Ahead: Preparing Higher Ed Networks for a Hybrid Future
School is out and summer is in – but not for long. With more restrictions lifting across the U.S., higher education institutions will soon switch to a hybrid learning model, offering both in-person and online instruction. While this sounds beneficial to IT departments...
Hot Take: Should Paying Ransoms be Illegal?
It’s everywhere – national headlines, talk shows, podcasts, blogs and social media. The latest topic in tech has everyone talking: should paying off ransomware criminals be illegal? Following the recent increase in ransomware attacks around the globe, governments are...
Addressing Security Challenges in the ‘New Normal’
While more businesses are returning to the office, the world we live in is still very far from ‘normal.’ As companies play catch up to our new reality, they will need to re-establish effective controls over new working models and IT and security challenges. During...
The Price is Right: The Cost of $ecurity for Colonial Pipeline
The May 7, 2021 cybersecurity attack on Colonial Pipeline is the latest ransomware attack to widely disrupt national infrastructure and one of our nation’s largest and most successful attacks to date. Like most Americans, we bet you’re extremely familiar with this...
The Future of Enterprise Security: 5G Edge Computing
Digital innovation is all around us. New technologies and advances enter the market each and every day, and 5G edge computing is just one example of digital innovation at its best. While 5G edge computing is poised to improve the performance of applications and enable...
The State of Security: April Update
Over the past few years, it’s become clear that the U.S. government is under-prepared in matters of cybersecurity, a fact underscored by the pandemic and recent breaches like the SolarWinds incident. From energy, industrial and supply chain to military and government...
Risk Reimagined: 4 Steps to Adopting a Cybersecurity Compliance Program
Today's CISOs are tasked with many jobs. While all are of great importance, one in particular stands out among the crowd – and that’s ensuring cybersecurity and compliance go hand in hand. Compliance is becoming more important to understanding and effectively...
Reinforcing government cyber defenses: 3 tools to protect your organization
Following recent cybersecurity attacks that may have revealed secrets and critical information to Russia, the U.S. government is scrambling to reinforce the nation’s cyber defenses. With access to the data and emails of at least nine U.S. government agencies,...
Lost in the Chaos: 3 Tips to Mitigate COVID-19 Security Challenges in Healthcare
Worldwide, we’ve taken many hits in the past year and a half. From the economy to healthcare and everything in between, COVID-19 has uprooted the daily lives and operations of people and organizations everywhere. Lost in the chaos of it all, there was IT security....
Carolina Advanced Digital Drives Advanced Security Operations through Arctic Wolf Partnership
Raleigh, N.C. (February 1, 2021) – Carolina Advanced Digital, a nationally-recognized leader in technology infrastructure and security solutions, today announced its partnership with Arctic Wolf, a leader in security operations and dynamic cybersecurity monitoring for...
Cybersecurity for All: How the IoT Cybersecurity Improvement Act Will Impact Government Entities
Cybersecurity made it through Capitol Hill! After its long, long journey to Washington D.C., the Internet of Things Cybersecurity Improvement Act has finally become a law. (Throwback to School House Rock, anyone?) On Dec. 4, the president signed new legislation to...
Here Comes the Boom: How 5G Will Impact IoT Applications and Devices
Here comes the boom – the IoT boom, that is. The 5G era is here, and whether or not you feed into the hype, there’s no doubt that 5G capabilities will continue to bring unimaginable user experiences. With faster speeds and lower latency expected to transform...
10 things you missed securing your remote workforce- Recap of Tech Talk Ep. 4
A Whole New World – Securing a Remote Workforce & the 10 Things You Missed! We’ll get straight to the point— this ain’t the shining, shimmering, splendid world that Aladdin and Jasmine were singing about. Following the COVID-19 outbreak, we’ve quite literally...
High Risks in Higher Education: 2021 Security Outlook
COVID-19 has changed nearly every aspect of our lives, not to mention the operations of entire industries. Think about it: what does your ‘new normal’ look like? For higher ed institutions, it consists of the rapid switch to online learning to ensure the physical...
It Takes a Village: 5 Leadership Principles to Help Build a Resilient Cybersecurity Program
It takes a village. From day one, it requires hard work, attention, constant maintenance and nurturing. If you thought the ‘it’ we were referring to was a child, you’re on the right track, but sadly mistaken— we’re talking about a cybersecurity program. To keep up...
COVID-19 & 2021 Cybersecurity Predictions
In the wise words of Will Smith, our lives have indeed been flipped turned upside down. And if the title of this article made you do a double take, you’re not alone. Cybersecurity predictions for 2021— where’d all the time go? Well, we’d like to take a minute so just...
Microsoft Surface family for Federal users
In a time of international crisis, federal governments are stepping up to lead. Modernizing your office technology can better position your organization to address increased expectations and optimize your citizen engagement. Microsoft Surface devices and software...
The Wild, Wild, World of Wi-Fi and MAC Randomization
If one thing's for sure, it’s that the wild, wild world of Wi-Fi stops for no one. As a matter of fact, it doesn’t stop for anything at all and has become even more popular during the coronavirus pandemic following the uptick of remote workers. Back in July, Apple...
Digital Transformation and Real Network Automation in Action
If your organization is looking to streamline operations through automation and the use of AI/ML, then chances are you've heard of Mist. Other manufacturers are on board the AI/ML train too, and we're eager to see where the technology takes us, but for now we believe...
So you wanna try Mist? Here’s how
At Carolina Advanced Digital, we've been designing and deploying enterprise Wi-Fi solutions for 20 years, so it's hard to get us excited about "yet another Wi-Fi product" -- but here we are! Our clients are really loving the Mist AI platform for networking, and we’d...
Dream of Coronacation: What organizations need to know about privacy, BLE attacks, and contact tracing
It’s been said that Virginia is the state for lovers, but nowadays it’s popping up in global headlines for other (and might we add, less politically charged) reasons. Earlier this month, Virginia released the first U.S. COVID-19 contact tracing app based on the...
Cybersecurity Strategies Post-COVID-19: Get Protected or Get Down with the Sickness
COVID-19 has single handedly changed the technology infrastructure of every organization. In fact, it’s done so faster than any known event or phenomenon. That’s right, folks— this stuff is serious! According to a survey by ISSA International and ESG, cybersecurity...
Why you want Aruba’s NetEdit tool for managing switches
With the new Aruba CX switches came a nifty tool that doesn't seem to be getting the attention it deserves (yet). We think when you see this tool, you'll fall in love just like we did. NetEdit has all the usual network management tidbits you've come to know and...
Aruba’s New Edge and Tomorrow’s Network Minions
At Aruba's virtual Atmosphere event recently, they announced a vision around the network having a 'sixth sense'. Throughout the virtual sessions and demos one thing became obvious - Aruba is finally executing on its strategy to pull its portfolio in to a tighter weave...
Get It or Get Gone: 4 Best Practices for Adopting Security Automation
It’s a tale as old as time. Like many technologies, automation has evolved from a simple process into a complex system of controls that operate machinery and functionalities across various industries. Automation in security operations and incident response has become...
3 Tips for Keeping Your Enterprise Safe in the Era of IoT
Do you ever stop to think about the rate at which the technology around us is evolving? Most people don’t. Technology is so ingrained into our everyday lives that the rapid digital transformation across entire industries goes unnoticed. Perhaps the most destructive,...
How to Secure Your Online Meeting Platform: Tips for U.S. Federal & Government Personnel
The COVID-19 pandemic has pushed the majority of organizations remote, and workers have turned to video conferencing platforms like Zoom, Skype, GoToMeeting and Microsoft Teams to keep the ball rolling. As expected, major security issues have emerged on these...
3 Steps to Manage Your Enterprise’s Digital Footprint
Think about how many things you touch each day. Whether it’s a door handle, a box at the grocery store or a simple handshake, your fingerprints are everywhere. Now think about your online activity. How many websites do you browse each day? What social platforms do you...
Post COVID-19: 4 Emerging New-Age Tech Security Challenges
If you’re like the majority of the world’s population, you’re probably cooped up in your home, wondering when life will return to normal. We hate to break it to you, but the new ‘normal’ won’t be so normal. The virtual workforce explosion has not only altered our...
The Future of Cybersecurity: COVID-19 Impacts
Cybersecurity was important pre-COVID-19, and it will be even more important post-COVID-19. As people around the globe are required to work from home, telework is becoming engrained into the fabric of billions of organizations, whether they like it or not. Does this...
How to Properly Support Your CISOs and IT Staff
What’s tech-savvy, focused and brings business success full circle? You guessed it— CISOs. CISOs and IT leaders are vital to the success of every organization. They’re the key orchestrators of an organization’s security performance and ensure that information assets...
Top 3 Security Concepts for WLAN Pros
Cybersecurity is a top priority for every organization and securing our organizations’ networked infrastructures plays a major role in the success of a meaningful security strategy. So why should Wi-Fi pros care about security? For starters, we live in a world where...
COVID-19 Cybersecurity Checklist: 4 Steps to Secure Remote Workers
COVID-19, better known as the coronavirus, has imposed tremendous impacts on economies, financial markets, hospitality, tourism, manufacturing and transportation industries worldwide. As this virus continues to spread rapidly, many businesses and schools are closing...
4 Easy Connectivity Options for a Remote Workforce- COVID-19 Response
Right now, many of our clients are looking for ways to support a suddenly remote workforce, as the impact of COVID-19 ripples through the U.S. There are several ways your organization can support a remote workforce, and here we share a few common options along with...
Tech Q&A: Will my current infrastructure support client VPNs?
With the onset of the COVID-19 pandemic, many organizations are asking some variation of the question “will my infrastructure support remote access for my employees”. This is evident by the fact that VPN usage in the U.S. grew by 53% between March 9th and 15th...
5 Technical Recommendations for COVID-19 and Pandemic Preparation
We asked the engineering team what customers should be considering during the time of COVID-19 and other pandemic or natural disasters. Be aware of phishing emails Phishing emails and malicious activity increase during times of crisis. Attackers are opportunistic, so...
3 Ways to Measure the Effectiveness of Your Cybersecurity Program
No one thinks they’re at risk of being targeted until it’s too late. A security attack can wreak havoc on any individual or company, causing potential legal, financial and operational disturbance. With more emerging security threats on the horizon than ever before,...
The Best of Both Worlds: Data Privacy Regulations and Enhanced Security Postures
For years, European data privacy laws have eclipsed those in the U.S., but the tides may be changing. To safeguard the increasing amounts of digital data, policy makers in the U.S. are focused on adopting stringent regulations to push the data privacy initiative....
Emerging Security Threats: Defending Your Organization from Deepfake Technology
Following Facebook’s recent decision to ban deepfake technology from its social platform, many other social media companies are following suit, cracking down on what Mark Zuckerberg has called an “emerging threat.” Deepfake has quickly transcended from YouTube and...
Our Best CLI Cheat Sheet: Cisco, Aruba CX, and Aruba OS Switch
This is the latest version of our favorite CLI Reference Guide showing popular platforms side-by-side for easy configuration on Cisco and Aruba. If you’ve purchased HPE Aruba Networking equipment from us (Carolina Advanced Digital), and/or if you’ve worked with our...
How Smart is IoT Device Security? Continuous inventory, monitoring, and security for enterprise IoT
Consumers have fallen in love with smart devices and effortless connectivity. If you own devices like Amazon Alexa or Google Assistant, chances are you’ve fallen down the IoT rabbit hole. IoT-enabled devices allow both technical and non-technical consumers of...
Free Cyber Threat Assessment Offer- Security, Productivity, Performance
Gauge Your Current Security, Productivity and Performance at No Cost Carolina Advanced Digital, in conjunction with partner Fortinet, will be conducting Cyber Threat Assessments for customers. Assessments are being offered at no cost for a limited time and include...
The Weak Link in Cloud Security
The popularity of cloud computing has continued to rise with the emergence of digital transformation initiatives. Whether it public, private or hybrid, cloud architecture offers cost-effective and scalable computing power. While cloud computing is more secure than...
Carolina Advanced Digital Offers AI-driven Wireless Solutions Through Mist Systems Partnership
Raleigh, N.C. [December 10, 2019] – Carolina Advanced Digital, a nationally-recognized leader in technology infrastructure and security solutions, has partnered with Mist Systems to improve user experiences and address specific client needs for managing wireless...
2020 Cybersecurity Predictions
Imagine this: The year is 2020. You sit down for dinner and notice your children’s eyes are glued to the device in front of them. Your partner calls out from the kitchen, “Alexa, what time is my hair appointment tomorrow?” Suddenly, your Bluetooth-enabled crockpot...
Support Your Local CyberPatriot: Carolina Advanced Digital & The Black Falcons
The Green Hope HS Black Falcons and Coaches Green Hope High School, located in Cary, NC, is home to its very own CyberPatriot team – the Black Falcons. The Black Falcons are a savvy, technical group of high school-aged cyber gurus. These students are building the...
Carolina Advanced Digital Named to TalentDesk’s 2019 Best Companies to Work For
Carolina Advanced Digital ranked as a Top 5 company in annual rankings Raleigh, N.C. (November 18, 2019) – Carolina Advanced Digital, a nationally-recognized leader in technology infrastructure and security solutions, announced today that the company has been named to...
2019 National Cybersecurity Awareness Month
It’s spooky season! There’s no better time to celebrate National Cybersecurity Awareness Month than October, a month dedicated to both tricks and treats. While cybersecurity may seem like a scary topic, there’s no need to fear. Treat yourself to peace of mind this...
Carolina Advanced Digital Named Finalist for NC TECH Private Company Award
Raleigh, N.C. [October 2, 2019] – Carolina Advanced Digital, a nationally-recognized leader in technology infrastructure and security solutions, has been selected as a finalist for the NC TECH Awards in the Private Company category. This award recognizes companies for...
Carolina Advanced Digital finalist in 2019 NC TECH awards for outstanding performance, innovation, and growth
Carolina Advanced Digital, Inc. is announced as a finalist in the NC TECH Awards category for Private Company, recognizing outstanding performance in revenue, product innovation, market penetration, sales growth and employment expansion. Read more at...
Meet Joe Caiola, Director of Service Delivery
CAD Q&A Blog Series | Employee Interview This ain’t your grandma’s IT-shop. At Carolina Advanced Digital, we’ve mastered the art of having fun while we get the job done. A company is only as good as its employees, and as a nationally-recognized leader in...
Recruiting & Maintaining Top Cybersecurity Talent
We’ve all heard it before: the cybersecurity industry is suffering from a lack of skilled professionals. Unfortunately, demand for top cybersecurity talent is at an all-time high and is expected to continue rising. To attract the industry’s best and brightest, we must...
Meet Julie Allen, Carolina Advanced Digital Director of Sales Operation
Q&A Blog Series | Employee Interview Carolina Advanced Digital started with a single brown phone and a stack of plain business cards in the basement of John Jabbusch’s Siler City home. Today, our business employs just under twenty individuals across North...
A New Era of Security: Passwordless Authentication
Passwords were created to block unwanted users from accessing systems and networks. Today, they have become the weakest link in cybersecurity. As hackers continue to compromise the personal data of millions worldwide, an examination of major breaches has revealed the...
Jennifer Minella Ranks #4 in Security Thought Leadership
Our VP of Engineering & Security is dominating 2019. This year alone, Jennifer Minella has been featured in Cyber Ventures “Women Know Cyber: 100 Fascinating Females Fighting Cybercrime” and spoken at industry-leading events including the RSA Conference and the...
The Impact of 5G in Cybersecurity
Everyone wants 5G, and the hype surrounding its launch only continues to grow. Wireless providers have promised that the 5G rollout will bring faster speeds, instantaneous communication and global interconnectivity. This next generation of wireless connectivity is...
Building a Security-Centric Culture in a Digital Age
Cyber is here, there and everywhere in between. As our technology-dependent world grows, consumers and organizations alike are eager to adopt the latest innovations. Digital transformation has many people focused on IoT, SD-WAN and the cloud while the topic of...
Demystifying Artificial Intelligence (AI)
Artificial intelligence (AI), one of many double-edged swords in technology, is expected to incite both positive and negative impacts on people and industries worldwide. It’s constantly evolving and as technological advancements emerge, these changes are leading many...
Advanced Persistent Threats | Know Them & Stop Them
Advanced persistent threat (APT) attackers are the top attackers of the cyber chain. Sounds scary, right? What’s worse is that these groups can steal your organization’s data and navigate its network without ever being noticed. APT is a broad term used to describe an...
IT Hot Topics Conference Spotlight: Chuck Kesler
IT Hot Topics 2019 was a success! We’d like to give a big shout out to all of our conference go’ers, speakers, sponsors and Carolina Advanced Digital teams for making this our hottest conference yet. We hope to see everyone back at the Grandover Resort next year! We...
IT Hot Topics Conference Spotlight: Stacy Thayer, Ph.D.
Are you ready for IT Hot Topics 2019? We sure are! In just a few days, the industry’s best and brightest will join conference goers for three days of networking, keynotes and hands-on workshops. We recently spoke with Dr. Stacy Thayer, independent organizational...
IT Hot Topics Conference Spotlight: Diana Kelley
IT Hot Topics 2019 is right around the corner! This conference is going to be hot, hot, hot— and it’s in part to our incredible speakers who have volunteered their time and talent to teaching current and emerging security professionals about the ever-evolving...
The Fast and the Furious: Wi-Fi 6
The future of Wi-Fi is scheduled to officially arrive in 2019. Wi-Fi 6, the simplified name for 802.11ax issued by the Wi-Fi Alliance in 2018, will support everything you want to do with your wireless LANs. Not only does it promise to live up to the hype, but it’s...
Rise in Cyber Attacks Increase Growth of Cloud-Based SIEM Solution
The rise in technological advancements and dependence on online platforms means cybersecurity solutions are more important now than ever before. In 2018, 765 million individuals were affected by cybersecurity attacks and data breaches in the months of April, May and...
Insider View: Why you won’t want to miss IT Hot Topics Conference 2019
The area's longest-running and most intimate cyber security and technology conference returns to the Grandover Resort in NC for 2019. Whether you're a veteran conference-goer or a first-timer, this year's IT Hot Topics Conference is sure to educate and amaze. Here's...
Help the World be Safe and Secure Online
In celebration of National Cybersecurity Awareness Month, we'd like to introduce you to the Center for Cyber Safety & Education, a charitable trust that offers training and education for children and seniors, as well as scholarship programs. The Center makes...
Celebrating Our Top Cyber Security Solutions
Since it's National Cybersecurity Month, we're sharing some of our top security solutions including a few new faces. New Endpoint Security solutions Crowdstrike SentinelOne New SIEM & UEBA solutions LogRhythm Updated NAC solutions Fortinet FortiNAC (formerly...
Out ‘n About – October Events
Look for our teams at these upcoming October events. Also check our event calendar for more upcoming conferences and events. Oct 1-3: UNC Cause 2018 @ Greenville Oct 8-9: NCHICA 24th Annual Conference @ Charlotte Oct 22-23: SCITDA (SC IT Directors Association) @...
SecureDoc, PCI DSS, and TLS 1.2 by June 30, 2018 [Product Update]
For our clients using Winmagic SecureDoc and required to meet PCI DSS standards, please read this important Product Update. Are you still using Secure Sockets Layer (SSL) or early Transport Layer Security (TLS) protocols? As a valued partner of WinMagic, we want to...
Watch “What’s Needed to Secure the IoT & IIoT” with Jennifer Minella, Mark Weatherford, and Robert M. Lee
What's Needed to Secure the IoT & IIoT Mark Weatherford (vArmour) | Robert M. Lee (Dragos) | Jennifer Minella (Carolina Advanced Digital) Recorded from June 12, 2018: https://cadinc.com/event/whats-needed-secure-iot-iiot-keynote-panel?instance_id=121, Watch the...
Healthcare buzz podcast with our Director of Strategic Accounts
Our very own Wayne Gaudette, Director of Strategic Accounts joins Janet Kennedy of Get Social Health for a discussion about healthcare, cybersecurity, and NCHICA. They discuss: Leading cybersecurity issues in healthcare Why healthcare is unique in use cases Solutions...
Watch “Why Your NAC Projects Keep Failing” recording from RSA Conference
At the RSA Conference USA, our VP of Engineering and long-time NAC specialist presented a special session on "Why Your NAC Projects Keep Failing". Watch the recording to learn how people, process, and most importantly -product - are the leading causes of failed...
Professional Services team credentials in 2017
Both our technical and sales teams work tirelessly to stay up to speed on the industry, market segment needs, as well as manufacturer solutions. It's no surprise then that our teams are constantly gaining knowledge through events, training, and certification. The...
Advisory from Carolina Advanced Digital on new Wi-Fi KRACK attack
Advisory from Carolina Advanced Digital on new Wi-Fi KRACK attack Ref: CERT advisory Wi-Fi Protected Access II (WPA2) handshake traffic can be manipulated to induce nonce and session key reuse Contents Executive summary Technical highlights Recommended actions Anatomy...
Take-aways from “Another Women in Cybersecurity Panel”, VP of Engineering Jennifer Minella featured
Eleanor Dallaway, Editor and Publisher of Infosecurity Magazine captured our VP of Engineering's comments in her highlight rel recap of the (ISC)2 Security Congress panel on A Snapshot of Women in Information Security. In her writeup, Eleanor captures the essence of a...
Watch RSAC TV’s interview with Jennifer Minella, VP of Engineering
Jennifer Minella, VP of Engineering and Security, Carolina Advanced Digital, Inc., is interviewed by Paul Roberts, Editor in Chief and Founder of the Security Ledger. In this 2017 interview during the RSAC USA Conference, Paul and Jennifer discuss diversity, why the...
Bradford Networks Announces Availability of the Network Sentry 8.1 Release
Our partner, Bradford Networks, features Carolina Advanced Digital and our client Pike Electric in their recent press release. You can read the full press release here. Significant Enhancements to Security Automation and Orchestration Platform bridge the gap between...
Jennifer Minella speaks at RSAC 2017 on “Expert Mobility: Managing the Wi-Fi World of Wearables, Sensors and IoT”
Thursday, February 16th at the RSA Conference USA, Carolina Advanced Digital's VP of Engineering will be speaking on advanced and emergent wireless technologies, with a focus on those designed for supporting IoT, wearables, and sensors. "This wireless session will be...
Jennifer Minella hosts RSAC’s first “Securing Diversity: Women in Cybersecurity” event
Our own VP of Engineering, Jennifer Minella, is hosting the RSA Conference's first ever minority-focused event. This important event is designed to highlight our industry's workforce gap and the need for diversity, in all forms, to solve some of our industry's...
Look for our new event display booth
If you're roaming the halls of the next IT or information security event, keep an eye out for our new event booth display being used by our sales and events team.
RSAC’s Q&A Series with Jennifer Minella & Mark Nunnikhoven
The RSAC editorial team ask our VP of Engineering Jennifer Minella and professional colleague Mark Nunnikhoven of Trend Micro for the "off topic" tips and tricks for getting the most out of the RSA Conference in San Francisco. In the two-part Q&A series, the RSAC...
Bradford Networks to Rollout Managed Security Services with Select Partners to Automate Security Response Process for Safe Deployment of Mobile and IoT Endpoints
Our partner, Bradford Networks featured us in their announcement of managed security services. You can read their full press release here. December 1, 2016 – Boston, MA – Bradford Networks, a leading provider of network security solutions that provide end-to-end...
Featured in NASA SEWP V Contract Guide for Federal Buyers
The 2015-2016 Contract Guide for the new NASA SEWP V contract is out! Learn more about this government-wide contract, our company -- Carolina Advanced Digital -- and the breadth of products and services available through our NASA SEWP V contract. Carolina Advanced...
Our Best CLI Cheat Sheet: Cisco and HP
If you've purchased HP Networking equipment from us (Carolina Advanced Digital), and/or if you've worked with our Professional Services team on networking projects, you're probably familiar with our go-to resource for all things CLI -- The HP Networking and Cisco CLI...
Wi-Fi News: Connecting 5K+ Gamers at One of World’s Largest Events
Our partner Meru Networks has a constant stream of success stories with the incredibly high density demands of environments as diverse and challenging as outdoor stadiums to the confined and RF-choking construction of a cruise ship. Today's story of how Meru Networks...
CIOs share their secrets to unplugging on vacation [CIO]
from CIO Magazine IT executives have learned how to build strong, reliable and trustworthy teams so that no one person is the single point of contact. That not only allows for more efficiency, it lets CIOs unplug on summer vacations. ... “I put a lot of stock into a...
Jennifer Minella, a Beacon Award winner [WRAL]
from WRAL News TechWire Carolina Advanced Digital's Jennifer Minella
Security: Top Twitter Influencers to Follow [Techopedia]
By Techopedia Staff, find VP of Engineering Jennifer Minella Takeaway: Stay on top of the latest news and views on cybersecurity by following these top influencers on Twitter. If there's one area of the tech industry that's undoubtly growing - and growing fast - it's...
Upgrade Your Wireless in 16 Hours
Wireless technologies are everywhere. With the growing popularity of wireless, we’re seeing more and more places businesses, schools, government offices, retail stores, and transportation systems like air planes and trains--that are fully loaded with wireless. And...
One trick for best match and best pricing on eRate networking gear
If you’ve seen any of the USAC training for eRate, you know it says schools shouldn’t submit 470s that require specific manufacturers or part numbers, but should instead provide a list technical requirements, or list a specific part number with an “or equivalent”...
Top Influencers in Security You Should Be Following in 2015
from Tripwire For each influencer whom we have selected, we include their Twitter handle, blog URL and reasoning for selecting them. We also include their answer for what infosec-related superpower they would choose to have. This year’s list (in no particular order)...
Special Feature: Our staff picks their favorite holiday flicks
It's the holiday season and one of our favorite times of the year here at Carolina Advanced Digital, Inc. There's nothing like cuddling up to a good Christmas flick (or five) on a cold, blustery December night. Even though we've seen them a thousand times, there's...
Is Security Awareness Training Really Worth It? [Dark Reading]
from Dark Reading Experts weigh in on the value of end-user security training, and how to make education more effective. Nothing riles up information security professionals quicker than the question of how much to invest in security awareness training. Does it work?...
How to Write a Killer Switch RFP for eRate
Click here to watch our webcast that we hosted on November 20th titled “4 Tips for Writing a Killer Switch RFP for eRate.” To meet the requirements of USAC and other RFP requirements, it’s strongly recommended to include enough detail in your RFP or Form 470 to allow...
Dynamic Frequency Selection: Why It’s Critical In 802.11ac
Full article by VP of Engineering Jennifer Minella can be found at Network Computing DFS is the focus of much debate in the wireless industry. Here's why it's a crucial requirement with the arrival of 802.11ac devices. Dynamic Frequency Selection (DFS) has been a...
87 Security Experts You Need to Be Following on Twitter
from Security Innovation Europe, you'll find VP of Engineering Jennifer Minella on this list As computers become exponentially more involved in our everyday working lives, security is an increasing concern. It’s therefore essential for security conscious...
Special Feature: Staff picks for Top 10 Geek Gifts
You better watch out, you better not cry. You better not pout, I'm telling you why. Tech Geek Santa is coming to Town! We asked a few of our employees what is on their tech wist list for this Christmas. But the big question we have is, "Who has been naughty and who...
Find WiFi and networking articles by Jennifer Minella at Network Computing
Jennifer Minella, vice president of engineering here at Carolina Advanced Digital, authors articles for a variety of industry publications. Currently, she’s contracted with Network Computing for technical content centered around wired and wireless networking and...
Why your Apple iOS 7 device won’t connect to the WiFi network
Recently Apple released an iOS 7 update for iPhones and iPads. Since the release, customers have reported that iOS 7 devices are having issues connecting to their wireless networks. This issue occurs if the Apple device believes it can’t access the Internet. As part...
IT HOT TOPICS 2013 Registration Opens!
We are pleased to announce registration if officially open for IT Hot Topics Conference 2013. Who should attend? Our conference content is designed to meet the needs of a variety of IT and security professional positions. Traditionally, our attendees have titles...
Register now for IT Hot Topics 2012
It's that time of year again! Carolina Advanced Digital would like to invite you to join us at our tenth annual IT Hot Topics Conference and Golf Tourney at the Grandover Resort in Greensboro, NC. Seating is limited and the event is free for CAD customers as part of...
Jennifer Minella Hosting Peer2Peer BYOD Session at RSA Conference 2012
The 2012 RSA Conference begins next week in San Francisco. Thursday, March 1st, CAD's Jennifer Minella will be hosting the Peer2Peer session on BYOD in the enterprise. If you are heading that way, this session is not to be missed (BYOD is the buzzword of the year it...
Juniper Networks Tech Days: RTP & Charlotte
Juniper Networks is hosting two free tech days in February-- one in Charlotte, NC and the other in Research Triangle Park (RTP), NC. CAD is attending both events so we'll see you there! Come learn about the latest in Secure Mobility - Enabling BYOD, Non-Stop Wireless,...
“Low Tech Hacking” Now Shipping
CAD's very own Jennifer Minella is a co-author of the new book, Low Tech Hacking. You can find Jennifer's work in the introduction, with an overview of each chapter, and in Chapter 4 Low Tech Wireless Hacking. What's covered in Low Tech Hacking: Criminals using...
Webinar: Fallout of the iPad Holiday
Research firm IHS predicts that more than 25 million tablets will ship in Q4 2011, driven by huge demand during the holiday season. The tablet market is expected to reach 72 million in 2012, and 287 million in 2015 – a clear signal that the BYOD “trend” is becoming...
Webinar: Identity Manager
The holidays are fast approaching. Is your organization ready to support all the new wireless gadgets that Santa will be bringing? If you’re in the majority, then you’re probably still trying to figure out how to offer secure network access for guests and employees...
Juniper Networks Tech Days: RTP & Columbia
Juniper Networks is hosting two free tech days in December-- one in Research Triangle Park (RTP), NC and the other in Columbia, SC. CAD is attending both events so we'll see you there! Come learn about the latest in Data Center Architecture, Innovative Campus Designs...
Lunch & Learn: Prepare against classroom Wi-Fi meltdowns with Meru Networks
We're hosting a Lunch and Learn seminar next week with Meru Networks at Tribeca Tavern in Raleigh. . Lunch & Learn Seminar: "Prepare against classroom Wi-Fi meltdowns" Are you thinking about... Converting to ebooks? Rolling out laptops? iPads in the classroom? 1...
HP Networking Back on SC State Contract, Carolina Advanced Digital Awarded Contract Number
CARY, NC (August 10, 2011) – The state of South Carolina has reestablished HP Networking on the statewide contract for Network Hardware Equipment. Carolina Advanced Digital, Inc., an industry leader of IT infrastructure, management and security solutions, has been...
Calling all K-12 schools – Win a FREE wireless network from Meru!
Meru's Spring of Wireless Promotion Meru is giving away a wireless network to three K-12 schools or school districts with more than 250 students in the United States! The winning schools will receive the following bundle which includes installation by CAD. 15 AP320i...
*EXCLUSIVE CAD HP SERVER PROMO*
We've secured a special HP server promotion just for our customers! Receive an HP ProLiant DL120 G6 Server* FREE when you buy $50k or more of HP Networking hardware on a single PO. This is the perfect opportunity to add PCM+ or IMC to your network. CAD is the only HP...
CAD’s Jabbuschs Quoted in CRN Article
New Meru Wireless Platform Anticipates All-Mobile Edge By Chad Berndtson, CRN May. 04, 2011 11:21 AM EST As Meru Networks sees it, the enterprise network edge is going inevitably wireless -- inevitably mobile -- and that move is going to require the most robust and...
Register now for IT Hot Topics 2011
It's that time of year again! Carolina Advanced Digital would like to invite you to join us at our ninth annual IT Hot Topics Conference and Golf Tourney. Seating is limited and the event is free, so register today at http://hottopicsconference.com/. IT Hot Topics...
Free VIP Seats for Techno Security 2011
The management team of TheTrainingCo., producers of the annual Techno Security Conference and the Mobile Forensics Conference at Myrtle Beach, SC has again made Carolina Advanced Digital a special offer for this year's Techno Security Conference being held on June 5 -...
Carolina Advanced Digital Launches New Website Design
CARY, NC (March 7, 2011)—Carolina Advanced Digital, Inc. (CAD), an industry leader of IT infrastructure, management and security solutions, today announced the launch of its newly redesigned website, at https://www.cadinc.com. The new, fresh look of the site embodies...
IT Hot Topics Conference 2011 – Save the Date
Mark your calendar! Our ninth-annual IT Hot Topics Conference & Golf Tourney is fast approaching. IT Hot Topics Conference & Golf Tourney 2011 May 12-13, 2011 Grandover Resort | Greensboro, NC This free event offers our customers insight into the industry’s...
RSA Conference – Peer2Peer Session & Partner Booths
Going to RSA? Live in the San Francisco area? Jennifer Jabbusch, our Chief Information Security Officer and Network Security Specialist, will be leading a Peer2Peer session at the RSA Conference in San Francisco on February 17. Session Title: Jumping Wireless Hurdles...
December Crash Courses
Carolina Advanced Digital is excited to announce the return of our famous Crash Courses. These one-day technology quick start trainings cover two products or technologies, with a half day for each. They are held back-to-back in three cities. Lunch is provided and...
Visit us at the NCLGISA Conference in Asheville
NCLGISA Semiannual Conference Crowne Plaza Resort, Asheville, NC October 19-22, 2010 Booth #11 Carolina Advanced Digital is thrilled to attend the semiannual NCLGISA (North Carolina Local Government Information Systems Association) conference this week, October 19-22,...
Techno Forensics & Digital Investigations 2010 // Special Offer for VIP tickets!
Carolina Advanced Digital is proud to present a SPECIAL OFFER for: Techno Forensics Conference October 25 – 26, 2010 The Training Company management team produces the annual Techno Forensics & Digital Investigations Conference. This year’s conference will...
IT Summer Camp
Carolina Advanced Digital is excited to host this year’s IT Summer Camp in beautiful Wrighstville Beach, North Carolina! This camp entails free Crash Courses provided to attendees by Carolina Advanced Digital and our partners: Blue Coat, Bradford, HP Networking, Meru...
Carolina Advanced Digital Ranked 71 in Top 100 Small Businesses
CARY, N.C. (July 9, 2010) – On June 24, Carolina Advanced Digital, Inc. (CAD), an engineering company focused on IT infrastructure, management and security solutions, was recognized by Business Leader Media as one of North Carolina’s Top 100 Small Businesses at the...
IT Hot Topics 2010 Details
The official website shares the most current conference schedule and other helpful information. Remember that the event is free and space is limited, so visit http://hottopicsconference.com for details and to reserve your spot! Grandover Resort – 800.472.6301 Room...
Register for IT Hot Topics Conference 2010
Registration for our eighth-annual IT Hot Topics conference and golf tournament is now open! This free event, which offers our customers insight into the industry’s newest developments, will be held May 6-7 at the Grandover Resort in Greensboro, NC. John McCumber,...
What Are the Most Overrated Security Technologies? [CSO Online]
from CSO Online The security community has grown to depend on some basic technologies in the fight against cyber thieves, such as antivirus software and firewalls. But are practitioners clinging to tools that outlived their usefulness long ago? Were those tools...
Visit Our Partners At HIMSS10
HIMSS10 is the largest healthcare IT conference in North America. This year’s conference will be held at the Georgia World Congress Center in Atlanta, Georgia, from March 1-March 4. If you are planning to attend, stop by our partners’ booths: AirTight Networks in...
Join Us at Our Free Information Security Seminar in Raleigh on February 17
Few people realize how much money is tied up in their network–not only in the hardware and software, but also in their data. Even fewer people realize that their valuable information can be compromised or lost altogether. On Wednesday, February 17, Carolina Advanced...
Customer Loyalty Program
To thank our loyal customers for your continued business and support, we have instituted a customer loyalty program in which we offer you the enjoyment of deeper discounts, free hands-on training opportunities, hardware seed units and more. Here are some specific...
Realize the Future with HP: Washington, D.C.
Learn about breakthroughs in cloud computing, application modernization and automation and virtualization that will redirect your IT investments and transform your business. Hear strategies, insights and visions from HP’s executive team to help you realize the future....
WinMagic Releases SecureDoc 4.9
What’s new in the latest version of SecureDoc? • TCG OPAL Compliant Self Encrypting Drives (SEDs) Support • Supports Windows XP/Vista/7 in 32 and 64 bit • Improved SaaS hosting services • New v4.7 FIPS AES Encryption engine (validation in process) • Seagate devices...
First Public Educational AIS Training Offered by Carolina Advanced Digital, HP and CCCC
Central Carolina Community College has become North America’s first public educational institution to offer training in Hewlett Packard’s ProCurve Networking products. The college and the corporation have signed a contract for the college to offer the training at its...
Upcoming Webcasts: Bradford Networks and Blue Coat PacketShaper 8.5
Take a break from the holiday rush! Join us for an introduction to Bradford Networks’ Adaptive Network Security technology, followed by an update on Blue Coat’s PacketShaper 8.5 release. See webcast details and register below. ___________________________________...
Dear John: Default Gateway vs. Default Route?
Q: When should I use a default gateway instead of a default route? A: Based upon the source and nature of the question, I am proceeding with the assumption that the question was made in reference to network switches. The short answer is that a default gateway...
CAD Welcomes Two New Partnerships
We are pleased to announce new partnerships with Bradford Networks and Meru Networks to enhance our service and product offerings for access control and wireless solutions. Bradford Networks Bradford Networks is a proven leader in securing today’s heterogeneous...
Train or Treat: Buy HP ProCurve & Win Free Training
For every $5,000 in HP ProCurve orders, you will be entered to win a free HP AIS 2010 certification training seat! Now’s the time to order before HP’s Year End! New ProCurve blade switches New PoE+ power and SFP+ 10GbE switches ProCurve/Colubris wireless ProCurve...
Jennifer Jabbusch Releases NAC White Paper, “Catching the Unicorn”
A technical exploration of network access control (NAC) and how to overcome the technology’s failure Download CARY, N.C. (October 7, 2009)—On September 19, 2009, Jennifer Jabbusch, network security engineer and CISO of Carolina Advanced Digital, Inc., an...
Carolina Advanced Digital Expands Managed Security Services Division
The division now offers customized “RacPack” product to all small-medium businesses www.racpacksecurity.com CARY, N.C. (October 6, 2009)–Carolina Advanced Digital, Inc., an engineering focused VAR with specialization in IT network infrastructure, management and...
Raleigh ISSA Chapter to Host Fifth Annual InfoSeCon
Carolina Advanced Digital is pleased to be a Platinum Corporate Sponsor for ISSA’s 2009 Triangle InfoSeCon security conference in Raleigh, N.C. Stop by and see us in the exhibit area! 2009 ISSA Triangle InfoSeCon October 15, 2008 McKimmon Center Raleigh, NC Event...
IAM Certification Trainings Now Available on GSA
In partnership with Expanding Security, we are pleased to offer unique training programs for any customer preparing for an IAM certification exam. Plus, now that we offer these trainings on our GSA schedule, it’s even easier for public sector customers to achieve...
Attend the Techno Forensics Conference for FREE
Once again, The Training Co. has offered Carolina Advanced Digital a limited number of VIP guest passes for the fifth annual Techno Forensics & Digital Investigations Conference, which will be held October 26-28 in Gaithersburg, Maryland. With more than 1,000...
Wireless Guidelines for PCI Compliance
This month, the PCI Security Standards Council released a wireless compliance guide in order to help organizations better understand PCI DSS requirements and practical methods for deployment of secure wireless environments. If your organization stores, processes or...
SonicWALL Launches New TZ 100 & 200 Series
On July 16, 2009, SonicWALL officially launched the new TZ 100 and TZ 200 Series appliances, along with the new Comprehensive Anti-Spam Service. The TZ Series is a security services platform that enables you to deliver complete customer protection–right from the...
Blue Coat Again Recognized as WAN Optimization Leader
In this market, current trends and demands on networks and budgets are causing organizations to re-evaluate their options. These reports analyze the competition of the three challengers – Cisco, Riverbed and Blue Coat, who claims the top spot. Infonetics Report (May...
Breach Security Releases WebDefend, Version 3.6
On June 22, Breach Security announced the latest release of its flagship WebDefend web application security appliance, version 3.6. Designed to provide enhanced support to large-scale deployments, WebDefend now offers advanced enterprise-wide reporting and the...
Changes to HP ProCurve Wireless Product Line
HP ProCurve Networking has announced that the legacy AP420 and AP530 devices have been discontinued and are available only through November 1, 2009, or while supplies last. Carolina Advanced Digital will be moving forward with HP ProCurve’s new Colubris solution for a...
Information Security Health Check
Is your organization at risk? According to Perimeter e-Security, the top security threats in 2009 include: 1. Malicious insiders, such as malware and exploited vulnerabilities 2. Social engineering 3. Careless employees 4. Reduced budgets 5. Remote workers and road...
Web Application Security Assessment
A recent report by Cenzic identified 2835 vulnerabilities during the third and fourth quarters of 2008 alone. Eighty percent of these vulnerabilities involved web services, which are critical, strategic resources that present your organization’s brand and provide the...
Blue Coat Supplemental Materials
In case you missed our Blue Coat webinar sessions in April 2009, take a look at these additional materials! Top 5 Myths on WAN Optimization Solution Brief (PDF) A misunderstanding of the problem within your network can lead to a costly and incorrect IT investment, not...
Carolina Advanced Digital Announces Upcoming IT Hot Topics Conference
GREENSBORO, N.C. (April 22, 2009) – Carolina Advanced Digital, Inc., a Siler City-based engineering company focused on IT infrastructure, management and security solutions, today announced their seventh annual IT Hot Topics Conference and Golf Tournament. This free...
IT Hot Topics 2009 Announced
It’s the time of year again for our annual IT Hot Topics Conference and Golf Tournament! Join us for free on May 7th & 8th at the Grandover Resort in Greensboro, NC to learn about this year’s biggest security and cost-savings hot topics, including: Securing...
Jennifer Jabbusch Addresses U.S. Secret Service on Secure Wireless Networking
March 17, 2009 On Tuesday, CISO and Network Security Specialist Jennifer Jabbusch addressed wireless security for the U.S. Secret Service’s Electronic Crimes Task Force (USSS ECTF) at their quarterly meeting at the Charlotte field office. Jabbusch explained the...
Free SonicWALL Roadshow – 2/24/09 in Columbia, SC
Now that we are on SC state contract, we would like to invite you to join us for a FREE lunch-and-learn event. And just for attending, you’re entered to win a FREE SonicWALL training seat, normally worth $2000! SonicWALL Roadshow event details: February 24, 2009 11...
IT Hot Topics 2009 Survey
IT Hot Topics, Carolina Advanced Digital’s annual conference and golf tournament, is planned for May 7-8 in central North Carolina. Due to the current economic situation, we would like to keep this event as affordable as possible for all of our attendees. We have...
Free WAN Assessment Offer in Florida
Carolina Advanced Digital, Inc. is now on Florida state contract! If you are in Florida, allow one of our certified engineers to perform a FREE WAN assessment on your network using Blue Coat appliances and specialized software. This on-site network evaluation uses the...
Free VIP Pass to join CAD at Techno Security 2009
As a diamond sponsor and Wednesday’s closing keynote, Carolina Advanced Digital would appreciate your support at Techno Security 2009. VIP registration is normally $1095, but because current budgets are tight and travel is limited, we would like to invite you to join...
“Penetration Testing: Dead in 2009? – CSO Magazine
Carolina Advanced Digital Quotables Penetration Testing: Dead in 2009 By Bill Brenner, Senior Editor December 08, 2008 — CSO Magazine Does penetration testing belong in the QA department? Fortify Co-Founder and Chief Scientist Brian Chess says 2009 will mark the end...
“MD5 insecurity affects all internet users” – SC Magazine
Carolina Advanced Digital Quotables MD5 insecurity affects all internet users SC Magazine Angela Moscaritolo December 31, 2008 Usually the bad actions of a company only affect its own customers. However, Certification Authorities (CA) that have not yet migrated away...
“Yes, Trust In The PKI Is Broken” – InformationWeek Analytics
Carolina Advanced Digital Quotables Yes, Trust In The PKI Is Broken InformationWeek Analytics By Mike Fratto Dec 30, 2008 The trust in digital certificates relies on the fact that the authority issuing the certificate has validated the identity of the person or...
“The (Not Quite) End Of Security On The Internet” – InformationWeek
Carolina Advanced Digital Quotables The (Not Quite) End Of Security On The Internet InformationWeek Security Weblog By George Hulme Dec 30, 2008 Speaking at the 25th annual Chaos Communication Congress in Berlin, security researchers showed how they developed a rogue...
Pen Testing: Dead in 2009 [CSO Online]
from CSO Online Does pen testing belong in the QA department? Fortify Co-Founder and Chief Scientist Brian Chess says 2009 will mark the end of pen tests as we know them. His theory is being met with resistance. ... Naturally, security practitioners who swear by pen...
“Get More Bang for Your Buck” – IT World Canada
Carolina Advanced Digital Quotables More bang for your security buck By: Rafael Ruffolo – Computerworld Canada (21 Nov 2008) Companies know they have to make some financial investment to protect their mission-critical systems and data, but the results aren’t always...
2008 NCLGISA Fall Conference
Come see Carolina Advanced Digital at the 2008 NCLGISA Fall Conference in beautiful Asheville, NC. We’ll be exhibiting at the show for the duration as well as presenting on network security. Presentation details will be posted as we approach the event. 2008 NCLGISA...
“Three ways for security and compliance” – CDN
Carolina Advanced Digital Quotables Three ways for security and compliance Consultants are the keys to knowledge transfer 11/4/2008 By: Lynn Greiner There are three ways to achieve security and compliance goals, according to Jennifer Jabbusch, network security...
Packeteer Training Nov 3-7 in NC
Carolina Advanced Digital will be hosting a Packeteer Intensive Training November 3-7th in Chapel Hill, NC. The training is official certification training from an authorized Packeteer Trainer. The week-long intensive covers both Levels I and II. Packeteer Intensive...
“Security admins offer their risk management pitch” – ComputerWorld
Carolina Advanced Digital Quotables Security admins offer their risk management pitch By: Rafael Ruffolo – ComputerWorld Canada Oct 8, 2008 Representatives from CIBC, Unisys and elsewhere discuss their approach to selling business leaders on the right products and...
“All in the Family” – NaVOBA Magazine
Carolina Advanced Digital Featured in National Veteran-Owned Business Association Magazine All in the Family By: Michael Crawford, 2008 Families start businesses all the time – a restaurant on the street corner or a grocery store in the center of town. Sometimes,...
Presenting at SecTor
Carolina Advanced Digital is pleased to participate in SecTor 2009, the Security Education Conference in Toronto. About SecTor Illuminating the Black Art of Security. SecTor brings the world’s brightest (and darkest) minds together to identify, discuss, dissect and...
‘Trick or Treat’ Network Promo
Trick or Treat Promo Spend $20k on ProCurve with Carolina Advanced Digital and Pick Your Treat! Choose your treat: - ProCurve 530 AP (#J8986) - ProCurve Radio Port 230 (#J9006) (*requires WESM module) - ProCurve 2610-24/12 Partial PoE Switch (#J9086) • THE FINE PRINT....
2008 ISSA Triangle InfoSeCon
Carolina Advanced Digital is pleased to be a Platinum Corporate Sponsor for ISSA’s 2008 Triangle InfoSeCon security conference in Raleigh, NC. Stop by and see us in the exhibit area and don’t miss our talk on Network Security. 2008 ISSA Triangle InfoSeCon October 16,...
SCITDA 2008 Presentation
Come see Carolina Advanced Digital at the 2008 SCITDA conference in Myrtle Beach, SC. We’ll be exhibiting as well as presenting a session on security. Don’t miss the debut of this hot new topic! SCITDA 2008 Fall Conference September 7-10, 2008 Myrtle Beach, SC Visit...
“ProCurve’s Colubris Buy A ‘Great Move’” – CRN
Carolina Advanced Digital Quotables ProCurve’s Colubris Buy A ‘Great Move’ By Andrew R Hickey, ChannelWeb Aug. 11, 2008 Solution providers hope that HP (NYSE:HPQ) ProCurve’s acquisition of Colubris Networks can help propel not only ProCurve but themselves into new...
CAD Sponsoring ISSA InfoSeCon
Carolina Advanced Digital, Inc. will be participating as a Platinum Sponsor of this year’s ISSA Triangle InfoSeCon. The ISSA InfoSeCon security conference is being held Thursday, October 16th at the McKimmon Center in Raleigh, NC. Registration has just opened. Find...
ProCurve Routing Class in GA
ProCurve routing class, Building ProCurve Resiliant Networks, (originally scheduled for Chapel Hill, NC) has been moved to Alpharetta, GA October 7-10th, 2008. Join CAD’s favorite instructor John Lancaster in this 4-day, hands-on training course using the new ProCurve...
6th Annual IT Hot Topics Conference
This year is our best yet! IT Hot Topics Conference is now two days, packed full of technical breakouts, roundtables, workshops, keynotes and our special CXO Focus Sessions. We’re pleased to offer this great lineup, with presentations by industry experts from across...
Network Security Road Show: March 12 in Lexington, NC
Overview: Add HP ProCurve to your technical strategy to strengthen your network and achieve high availability. ProCurve delivers a trusted network infrastructure that is immune to threats, controllable for appropriate use, and able to protect data and integrity for...
Network Security Road Show: March 11 in Cary, NC
Overview Add HP ProCurve to your technical strategy to strengthen your network and achieve high availability. ProCurve delivers a trusted network infrastructure that is immune to threats, controllable for appropriate use, and able to protect data and integrity for all...
“ProCurve At The Next Level” – CRN
Carolina Advanced Digital Quotables ProCurve At The Next Level HP networking unit gets channel partners trained and ready to go with standard IPv6 By Andrew R Hickey, ChannelWeb From the February 11, 2008 issue of CRN ProCurve Networking by Hewlett-Packard (NYSE:HPQ)...
ProCurve Trade-In Promo
ProCurve Networking- “It Pays to Trade” promo gives you 10% of the list price of your purchase for your trade in of old networking equipment. What’s eligible? Almost anything- any manfucturers hub, switch, router or wireless devices. Just trade in +/- 20% of what...
“ProCurve Adds IPv6 Support To Switch Software” – CRN
Carolina Advanced Digital Quotables ProCurve Adds IPv6 Support To Switch Software By Andrew R Hickey, ChannelWeb Jan. 15, 2008 ProCurve Networking by HP (NYSE:HPQ) on Tuesday announced a software update that allows its switches to be managed and deployed at the edge...
SNUG-IT Meeting: Network Security Overview
SNUG-IT Meeting: Network Security Overview First ‘official’ SNUG-IT Meeting, we’re piggy-backing with the Mitel Users group, run primarily by NCLGISA and Glenn Hays with Mitel. November 13, 2007 10:30am SCHEDULE Members can attend one or both sessions, no charge....
2007 NCLGISA Fall Conference
Carolina Advanced Digital is pleased to sponsor, exhibit and host the Encryption session at the 2007 NCLGISA Fall Conference in NC. 2007 NCLGISA Fall Conference October 24-26, 2007 Asheville, NC Event Website
2007 ISSA Triangle InfoSeCon
Carolina Advanced Digital is pleased to sponsor the 2007 ISSA Triangle InfoSeCon Conference in Raleigh, NC. 2007 InfoSeCon October 18, 2007 Embassy Suites Cary, NC Event Website
Webcast- Winmagic Full Disk Encryption
Join us for a live demonstration on the ease of use of WinMagic’s SecureDoc 4.3. Provides full disk encryption to protect sensitive information stored on laptops, desktops and PDAs. By offering integration with popular tokens and PKI at pre-boot time (after bios POST...
2007 SCITDA Fall Conference
Carolina Advanced Digital will be exhibiting and presenting at the 2007 SCITDA Fall Conference in Myrtle Beach, SC this September. Don’t miss an exciting session on NAC (Network Access Control) Technologies by Jennifer Jabbusch, Carolina Advanced Digital. SCITDA 2007...
2007 NC Digital Government Summit
Come see Carolina Advanced Digital at the 2007 NC Digital Government Summit in North Carolina. A Government Technology Executive Leadership Forum September 5 – September 6 North Raleigh Hilton Raleigh, NC Event Website
Proxy-Blocking Webcast with SonicWALL
Controlling web Proxy sites a problem? We’re hosting a special webcast for our k12 users… Join us Friday, August 31st for HTTPs Proxy Blocking with Your SonicWall. Matt’s going to demonstrate the new SonicOS Enhanced 4.0, which includes new SSL management for blocking...
Webcast – ProCurve NAC Solution
HP ProCurve’s NAC 800 appliance is part of the new Secure Access Solution and the most recent player in the ProActive Defense strategy. See the new (soon-to-be-released) ProCurve NAC 800 appliance, features, implementation methods and planning considerations. Learn...
Webcast- Wireless Migration Strategies
Thanks to rapid innovations in wireless technology, wireless infrastructures are changing in unthought-of ways: Organizations who once deployed autonomous “thick” access points are now buying “thin” APs and controllers, and even mesh nodes, and wondering how to...
Carolina Advanced Digital Publishes 2007 Professional Services Offering
JUNE 28, 2007 Are You Missing Out? You may be buying your enterprise software and hardware from Carolina Advanced Digital, but did you know we also offer certified Professional Services nationwide? For over 20 years, organizations have turned to Carolina Advanced...
NCLGISA 2007 Spring Conference
See Carolina Advanced Digital at the NCLGISA Spring Conference in May. For more information visit NCLGISA’s site at www.nclgisa.org. NCLGISA Spring Conference May 30-31, 2007 Wilmington, NC
2007 IT Hot Topics Conference
About IT Hot Topics View of Grandover Pools & Spa Our annual IT Hot Topics sessions & IT Golf Tournament is an event you don’t want to miss. This one-day training and technology conference is followed by the much-awaited IT Golf Tourney. This year we’ve moved...
Network Security Road Show in SC
South Carolina Road Show Date: Thursday, April 26th, 2007 Time: 1:00 – 4:00pm Location: Jillian’s, Columbia 800 Gervais St Columbia, SC 29201 Web Keynote: Andre Kindness, Security Solutions Manager for ProCurve by HP Cost: Free for Qualified Attendees RSVP: preferred,...
Network Security Road Show in NC
North Carolina Road Show Date: Thursday, March 29th, 2007 Time: 1:00 – 4:00pm Location: Embassy Suites, Cary 201 Harrison Oaks Blvd Cary, NC 27513 Web Keynote: Andre Kindness, Security Solutions Manager for ProCurve by HP Cost: Free for Qualified Attendees RSVP:...
NCET 2007 Presentations
Carolina Advanced Digital will be exhibiting and presenting at NCET 2007 in Greenville, NC. Overview of presentations is below. Presentations Title: VLANs: Planning VLANs in Education Environments Overview: When and how to design and implement VLANs on your school...
Carolina Advanced Digital’s Federal LAN/WAN Security Seminar
Join us Thursday, March 1st in downtown DC for a half-day seminar on LAN/WAN Security topics. We’ll spotlight key areas of interest to the particular needs of Federal agencies, with topics to help align, enforce and manage security policies within your organization....
Content Filtering in Schools: Best Practices
Carolina Advanced Digital releases ‘Content Filtering in Schools: Best Practices for K-12? by Jennifer Jabbusch SILER CITY, NC – May 3, 2006- Carolina Advanced Digital, Inc., today released a comprehensive white paper detailing best practices for content filtering in...
2006 IT Hot Topics a Success
Over fifty technologists converge to view today’s hottest technology topics at event in North Carolina. SILER CITY, NC – April 27, 2006- Carolina Advanced Digital, Inc., declared their Fourth Annual IT Hot Topics Training and Golf Tourney a success. Over fifty...
CAD Sponsors Sessions and Events at NCET 2006
Engineering-level technology sessions and evening events planned for education technology conference in NC. NCET (NC Education Technologists Association) site www.ncet.net.
“Bloom: Wait And See” – CRN
Carolina Advanced Digital Quotables Bloom: Wait And See Tells VARs that Symantec-Veritas integration will be a slow process By Larry Hooper, ChannelWeb From the September 19, 2005 issue of CRN Symantec (NSDQ:SYMC) and Veritas Software partners looking for details on...
“Symantec Livens Up LiveState Storage Software” – CRN
Carolina Advanced Digital Quotables Symantec Livens Up LiveState Storage Software By Joseph F. Kovar, ChannelWeb Mar. 07, 2005 Symantec (NSDQ:SYMC) is not waiting for its pending acquisition of Veritas Software to be completed before upgrading its storage software...
“Symantec Makes Strides In Services” – CRN
CAD Quotables Symantec Makes Strides In Services By Michael Vizard, Heather Clancy, ChannelWeb From the November 29, 2004 issue of CRN Symantec (NSDQ:SYMC)’s efforts to expand beyond antivirus products is working. Following a yearlong acquisition binge, Symantec’s...