DANBURY, CONN. – iTech Solutions announces it has been shortlisted for a prestigious Cyber Security award. The category is for the best “Cyber Awareness Plan of the Year”. The winning plan will be presented to the world’s media at a prestigious black tie event in London on June 21st 2018, sponsored by Cyber Security Awards, a leading awards event for the cyber security industry. The Cyber Security Awards, established in 2014, reward the best individuals, teams and companies within the cyber security industry.
Author Archives: Brett Knobloch
IBM Names Mr. Pete Massiello, President and CEO of iTECH SOLUTIONS GROUP, LLC. First Power Lifetime Champion
DANBURY, CT — iTech Solutions Group, LLC.
IBM established the IBM Champions program to recognize the expertise in and extraordinary support and advocacy for IBM technology, communities, and solutions. IBM Champions are peer-nominated members of the user community who evangelize for the platform, and are not IBM employees. The “POWER” Champion class was started 2011. Massiello has been named a Lifetime POWER Champion, the first person to receive this honor.
iTech Solutions Group Champions featured in May issue of IBM Systems Magazine
IBMI i Advocate and OS Upgrade Specialist
Pete Massiello is a subject matter expert on IBM i system administration, virtualization and the IBM Power Systems hardware that IBM i runs on.
iTech Solutions Group, LLC. Introduces New IBM i Security Framework and Onboarding Service at Regional Seminar Series in February 2018
DANBURY, CT — iTech Solutions Group, LLC. Introduces new IBM i Security Monitoring Service
At an upcoming regional seminar series, iTech Solutions Group will unveil a service unlike anything else in the industry. This new framework covers in detail all the mandatory and advisory security controls needed, with a dominant focus on the IBM i Server. This new Framework provides a security baseline for the community.. To complement this, iTech has built an onboarding methodology centered on best practice IBM iSecurity Controls Policies, which sets out the terms under which your system will be protected. The methodology also describes the procedures governing how you will achieve compliance and ongoing change control.