Security

Security Tip 3

use 2 factor authentication to be safe when accessing your e-mails or social media accounts on untrusted or public computers

Read More >

Password Hardening

As computer processing power increases the security of traditional passwords decreases due to vulnerability to what is known as dictionary attacks or brute force attacks. These are attacks where an

Read More >

Security Tip 2

Avoid entering sensitive data like your credit card numbers or any other financial or sensitive information into any public computer.

Read More >

Security Tip

Always log out of websites by clicking “log out” on the site. It’s not enough to simply close the browser window or go to another website.

Read More >

Password Manager Apps

Today you can’t live in the business world without spending some time online. Your online presence is secured by the passwords that secure your many accounts. The volume of the

Read More >

What is a Phishing Attack?

A phishing attack is basically an attack that can be used by a hacker to obtain information about you simply by asking for it. This is a rather simplified definition.

Read More >

Secure use of USB Flash Disks

Flash sticks are typically used to transport data physically with us from one location or workstation to another. The flash sticks may contain information that is sensitive be it business

Read More >

Benefits of Password Complexity

We’re sorry, your password must contain an uppercase letter, a number, a metaphor, a graffiti, a hieroglyph and the blood of a witch. Yes, but why? Password-cracking software uses one

Read More >

Get in touch

We respond within 1 hour on weekdays
EXEO Logo white

Paris. Beirut. Dubai.

Reach out

Re-Architect

This methodology requires the most effort to implement but it results in the most optimised recurring cost and will provide the best scalability for apps. This involves re-adapting the code of applications and the heavy use of SAAS solutions in order to replace existing hosted applications.

Re-Platform

This method utilizes the power of  PAAS services, like transferring a database to an as-a-service model,  the use of containers for some apps or the use of network/security functions as a service. Greater scalability and lower cost of operation is achieved.

Re-Host (Lift & Shift)

the migration of workloads from  to the cloud without changing the architecture. Machines get to keep their  OS and apps. This is the quickest and easy way to migrate, but since its  utilising IAAS, its is also the most expensive on the long term.