About ITW
Services
Technology
Prospecting/Selling
Security
100
The city of Brampton, Ontario
Where is IT Weapons head office?
100
This service protects client's data in IT Weapons private Cloud
What is Data Protection Services
100
KM's new innovative IT solution that unifies all of an organization's technology via a single centralized platform
What is Workplace Hub (Workplace of the future)
100
Companies with 50-500 employees (computer users)
What is the ideal target company size for IT Weapons
100
This is one of the biggest cyber threats facing businesses of all sizes today
What is Ransomware. Ransomware is computer malware that installs covertly on a victim's device (e.g., computer, smartphone) and that either mounts the cryptoviral extortion attack from cryptovirology that holds the victim's data hostage, or mounts a cryptovirology leakware attack that threatens to publish the victim's data, until a ransom is paid.
200
The year 2000
When was IT Weapons founded?
200
ITW primary business focus is in these 2 core areas of practice
What are Consulting and Managed Services
200
Microsoft's subscription based product that includes access to Office applications plus other productivity services that are enabled using the Cloud.
What is Office 365
200
Company has multiple locations
What is another way to qualify an ideal IT Weapons client
200
78% of malware cyber espionage is related to this source
What are email attachments
300
These are IT Weapons core values
What are Integrity and Expertise
300
IT Weapon's consulting service used to thoroughly evaluate a clients network infrastructure
What is a Network Assessment
300
This technology allows mobile users to connect to a network wirelessly
What is WiFi
300
IT Weapons uses this basic network assessment to evaluate a client's network
What is an Infrastructure Review
300
A network device/appliance designed to prevent unauthorised access to or from a private computer network
What is a Firewall
400
At ITW, you can "Never leave your Wingman"
What is IT Weapons rule #2
400
IT Weapons 3 data centres are part of what service offering?
What is IT Weapons Private Cloud
400
These are the 2 most popular Hypervisors used for server virtualization
What are VMware vSphere and Microsoft Hyper-V. A hypervisor is also known as a Virtual Machine Manager (VMM) and its sole purpose is to allow multiple “virtual machines” to share a single hardware platform (server)
400
This is IT Weapons top award/recognition for 2017
What is Canada's 50 Best Managed IT Companies
400
This software actively scans files and email message for malicious threats
What is anti-virus software
500
IT Weapons rule #1 (internal use only!)
What is "Don't f__k up!
500
This service takes over some or all of the operational responsibility of maintaining a client's network
What is Managed Services
500
Citrix is best known for this technology
What is Virtual Desktop Infrastructure, or VDI. It’s a powerful form of desktop virtualization because it enables fully personalized desktops for each user with all the security and simplicity of centralized management.
500
This is the first step in engaging a client to further determine their needs after initially meeting with an ITSSC
What is a meeting/conference call with our Solutions Architect (Mark Fischer)
500
This centralized operation proactively monitors and deals with security issues on an organizational and technical level.
What is a Security Operations Center (SOC)
M
e
n
u