"Do I Need IT Inventory Management Software?" 4 Questions to Ask.

> Read More

Managed Threat Response (MTR) service, powered by Sophos.

24/7 threat hunting, detection, and response delivered for a price that will surprise you. 

 

Few organizations are equipped internally with the proven processes, skilled employees or tools to [...]

> Read More

VMware, Nutanix & Cisco named Leaders in 2019 Magic Quadrant for Hyperconverged.

Hyperconverged infrastructure (HCI) is a category of scale-out software-integrated infrastructure that applies a modular approach to compute, network and storage on standard hardware, leveraging [...]

> Read More

Xigent an Exhibitor at Cisco Connect Minneapolis 2019.

> Read More

Recap: Xigent and Sophos Co-sponsor Siouxland IT Symposium.

 

> Read More

Xigent Holds Annual Customer Appreciation Events in Minneapolis, Sioux Falls.

 

Each autumn is signaled by the changing of the leaves, carving pumpkins and of course, Xigent's customer appreciation events! We make sure to take the time each year to show our customers just [...]

> Read More

Xigent Fall Sport Shooting Event A Success Once Again.

Yesterday (Monday, Sept. 30) we held our annual sport shooting event, At The Range with Xigent, at Hunters Pointe, a top-of-the-line sporting clays and shooting complex located in Humboldt, SD – [...]

> Read More

NetApp Once Again Billed a Leader in Gartner's Magic Quadrant.

Recently, leading global research and advisory firm Gartner released their 2019 edition of the Magic Quadrant for Primary Storage, and we are proud to have our partner, NetApp, be named a Leader once [...]

> Read More

What Can NVMe Help Your Business Accomplish?

The steady increase of Non-Volatile Memory Express (NVMe) implementation and utilization has made our industry stand up and take notice. In today’s age of big data, artificial intelligence [...]

> Read More

Why Cyber Attackers Have a Bullseye on Servers.

 

As most of our readers are likely aware, a cyberattack is an intentional exploitation of computer systems, networks or other tech-driven enterprises. Cyberattacks cause disruptive events using [...]

> Read More