Resources

Network Design Principles

Pentech’s network design methodology uses the industry standard tiered network model to ensure we provide you with a robust, high-performance communications network. We also make accommodations for smaller businesses, for whom this may not have been the most cost-effective choice previously.
Download Resource

Design & Implementation Roadmap

At Pentech, we have developed a robust design and implementation process that ensures from the initial consultation to deployment that you have visibility throughout. Our roadmap to deployment is structured into project phases that have clearly defined outcomes.
Download Resource

What does cloud mean to enterprise security?

The world of enterprise security has been undergoing a complete transformation as a result of rapid and sweeping changes that are re-making the way companies do business. New technologies and trends are changing the very definition of an enterprise, how and where we work, and the tools we use to do our jobs.
Download Resource

Mobile Application Security

Mobile devices, and the advantages they offer, have changed the way we do business and even live. However, smartphones and tablets have also wrought a new class of security threats and attack vectors. Security industry offerings that tried to graft existing PC era security technology onto mobile devices as well as mobile device management (MDM) solutions have proven inadequate to properly secure mobile devices and the networks they are accessing.
Download Resource

Glossary of Networking Terms

The glossary of networking terms includes definitions for the commonly used words and acronyms.
Download Resource