Insights from OAS

Practical guidance on managed security, Citrix virtualisation, ransomware response, and the technology decisions that protect South African businesses.

Citrix & Virtualisation

Citrix DaaS: Cloud-Managed Desktop Delivery for South African Enterprises

Citrix DaaS gives South African enterprises cloud-managed virtual desktops without replacing on-premises infrastructure. Here is what it does, how it fits into hybrid deployments, and why the timing matters.

24 Mar 2026 · Justin Lavers · 4 min read

Citrix & Virtualisation

Monitoring Citrix Session Performance: How uberAgent Finds Problems Before Users Complain

Citrix Director shows you sessions are connected. uberAgent shows you whether users are productive. Here is how session-level monitoring transforms virtual desktop management.

24 Mar 2026 · Justin Lavers

Citrix & Virtualisation

What Is Citrix uberAgent? UXM and ESA Explained for IT Teams

Citrix uberAgent gives IT teams session-level visibility that Director and Analytics never could. Here is what UXM and ESA actually do — and where uberAgent fits alongside your infrastructure monitoring tools.

24 Mar 2026 · Justin Lavers · 5 min read

Cybersecurity

uberAgent ESA vs Traditional Endpoint Security: Where It Fits Alongside EDR

uberAgent ESA observes and reports. SentinelOne EDR detects and stops. Both are essential for securing Citrix environments — here is why they are complementary, not competing.

24 Mar 2026 · Justin Lavers

Citrix & Virtualisation

Setting Up uberAgent with Splunk: A Practical Guide for Citrix Admins

Deploying uberAgent with Splunk in a Citrix environment? Here are the common pitfalls, dashboard priorities, and architecture decisions you need to get right from day one.

24 Mar 2026 · Justin Lavers · 5 min read

Citrix & Virtualisation

uberAgent vs ControlUp vs Lakeside SysTrack: Choosing the Right VDI Monitoring Tool

Citrix Director only goes so far. Compare uberAgent, ControlUp, and Lakeside SysTrack to find the VDI monitoring tool that fits your environment, budget, and operational priorities.

24 Mar 2026 · Justin Lavers

Citrix & Virtualisation

Splunk + uberAgent: Enterprise Monitoring for Citrix

uberAgent collects the data. Splunk correlates and alerts on it. Together, they give Citrix admins and security teams complete environment visibility — user experience and threat detection in one pipeline.

19 Mar 2026 · 0x1m3 · 6 min read

Cloud & Infrastructure

Microsoft Sentinel: SIEM Made Simple for Mid-Market

Microsoft Sentinel makes enterprise-grade SIEM accessible for mid-market. Cloud-native, no infrastructure to manage, and deep M365 integration — here is what you need to know.

17 Mar 2026 · 0x1m3 · 4 min read

Backup & Recovery

Ransomware Recovery: How Immutable Backups Save Your Data

Modern ransomware encrypts your backups before it encrypts your data. Immutable cloud backups are the only way to guarantee recovery. Here's how they work.

12 Mar 2026 · 0x1m3 · 6 min read

Managed Services

N-able vs ConnectWise vs Datto: Choosing Your RMM

Choosing an RMM platform shapes your entire IT operation. We compare N-able, ConnectWise, and Datto head-to-head — features, automation, patching, and pricing.

10 Mar 2026 · 0x1m3 · 6 min read

Industry News

Government IT Modernisation: Legacy to Secure Cloud

South African government departments face mounting pressure to modernise IT while maintaining data sovereignty and security. Here is the path forward.

05 Mar 2026 · 0x1m3 · 6 min read

Cybersecurity

Endpoint Protection for Remote Workers: A Quick Guide

Your team works from home, coffee shops, and co-working spaces. Are their devices protected? 7 practical tips to secure every remote endpoint.

02 Mar 2026 · 0x1m3 · 5 min read

Citrix & Virtualisation

Citrix LAS Migration Deadline: What SA Enterprises Need to Know Before April 2026

Citrix file-based licensing ends 15 April 2026. If your organisation runs on-premises Citrix, the License Activation Service migration is not optional. Here is what you need to know — and what to do now.

01 Mar 2026 · Justin Lavers

Three Pillar

Protect, Detect, Recover: Why SA Businesses Need All Three Pillars of Security

Your antivirus caught the threat — but who was monitoring the 200 other endpoints? And where is your backup? Protection alone is not enough. Here is why SA businesses need all three pillars of security.

01 Mar 2026 · Justin Lavers

Citrix & Virtualisation

Citrix Aidrien: AI Comes to Desktop Management

Citrix Aidrien reaches general availability in March 2026. It is an AI assistant for Citrix administrators — natural language queries, troubleshooting guidance, and workflow automation built into the management console.

25 Feb 2026 · 0x1m3 · 4 min read

Cloud & Infrastructure

Azure Virtual Desktop vs Citrix DaaS: Head to Head

AVD or Citrix DaaS? Both deliver virtual desktops — but they solve different problems. Here is an honest comparison from a team that deploys both.

23 Feb 2026 · 0x1m3 · 5 min read

Backup & Recovery

TrueDelta: How Cove Makes Backups 60x Smaller

Traditional backups send the entire changed file every time. Cove's TrueDelta sends only the changed blocks — making incrementals 60x smaller. Here's how it works.

18 Feb 2026 · 0x1m3 · 6 min read

Three Pillar

Three Pillar Security Assessment: How Does Your Business Score?

15 yes/no questions. Three pillars. One honest score. Take the Three Pillar Security Assessment and find out where your business stands — and where the gaps are.

16 Feb 2026 · 0x1m3 · 5 min read

Managed Services

Third-Party App Patching: The Security Gap You're Missing

You patch Windows religiously. But what about Chrome, Adobe, Java, and Zoom? Third-party apps are how attackers actually get in — and most businesses leave them wide open.

11 Feb 2026 · 0x1m3 · 5 min read

Cybersecurity

What to Do When Your Business Is Under Cyber Attack

You have just been breached. Every minute counts. Here is exactly what to do — step by step — when your business is under cyber attack.

09 Feb 2026 · 0x1m3 · 6 min read

Industry News

Financial Services Cybersecurity: Meeting FSCA Requirements

The FSCA Joint Standard on cybersecurity is now in enforcement. Here is what financial services firms need — and how to prove compliance to regulators.

04 Feb 2026 · 0x1m3 · 6 min read

Citrix & Virtualisation

Virtual Desktop Infrastructure: A Buyer's Guide for 2026

VDI is not one-size-fits-all in 2026. On-premises, cloud, or hybrid — each model has trade-offs. This buyer's guide breaks down the real decision factors for IT directors evaluating virtual desktop delivery.

28 Jan 2026 · 0x1m3 · 6 min read

Cloud & Infrastructure

How to Plan Your Cloud Migration Step by Step

Cloud migration fails when it starts with technology instead of planning. This step-by-step guide covers assessment, strategy, execution, and rollback — built for SA businesses.

26 Jan 2026 · 0x1m3 · 7 min read

Backup & Recovery

Disaster Recovery Planning: Your Business Continuity Checklist

93% of businesses without a tested disaster recovery plan close within a year of a major data loss. Use this checklist to make sure yours actually works.

21 Jan 2026 · 0x1m3 · 7 min read

Three Pillar

The Hidden Cost of Incomplete Security

A firewall without monitoring is a locked door with no camera. A backup without endpoint protection is a safety net under a burning building. Incomplete security has a cost — and it is always higher than you expect.

19 Jan 2026 · 0x1m3 · 5 min read

Managed Services

5 Signs You've Outgrown Break-Fix IT Support

Break-fix IT was fine when you had five PCs. But if the same problems keep coming back and surprise invoices keep arriving, you have outgrown it.

14 Jan 2026 · 0x1m3 · 5 min read

Cybersecurity

Zero Trust Security: A Practical Guide for SA Enterprises

Zero trust is not a product you buy — it is an architecture you build. Here is how SA enterprises can implement it with tools they may already have.

12 Jan 2026 · 0x1m3 · 7 min read

Industry News

Healthcare IT Security: Protecting Patient Data in SA

Healthcare is the most targeted sector for ransomware globally. South African hospitals and practices face unique challenges — here is how to address them.

07 Jan 2026 · 0x1m3 · 6 min read

Citrix & Virtualisation

NetScaler Explained: Load Balancing and Security in One

NetScaler is not just a load balancer. It is a multi-function security and networking appliance that now includes AI Gateway for LLM traffic management. Here is how it all fits together.

29 Dec 2025 · 0x1m3 · 5 min read

Cloud & Infrastructure

Nutanix HCI: Simplify Your Data Centre Without VMware

VMware licensing costs have changed dramatically since the Broadcom acquisition. Nutanix HCI delivers the same data centre power — without the licensing overhead.

22 Dec 2025 · 0x1m3 · 6 min read

Backup & Recovery

How to Back Up Microsoft 365: A Complete Guide

Microsoft protects the infrastructure. You protect the data. Most businesses do not realise M365 backup is their responsibility — until they lose something they cannot recover.

17 Dec 2025 · 0x1m3 · 6 min read

Cybersecurity

South Africa's Cyber Threat Landscape: What 2025 Taught Us

South Africa ranked among Africa's most targeted countries in 2025. Here is what the threat landscape taught us — and what smart businesses are doing about it in 2026.

15 Dec 2025 · 0x1m3 · 6 min read

Managed Services

How to Set Up Automated IT Monitoring for Your Business

Setting up IT monitoring does not have to be complicated. This step-by-step guide covers device discovery, alert configuration, and automation — everything you need to monitor your network properly.

10 Dec 2025 · 0x1m3 · 7 min read

Three Pillar

Protect, Detect, Recover in Practice: Building a Complete Stack

Theory is one thing. Implementation is another. Here is exactly how OAS builds a complete Protect, Detect, Recover security stack — and what each layer actually does.

08 Dec 2025 · 0x1m3 · 6 min read

Industry News

POPIA Compliance in 2026: What's Changed and What to Do

POPIA enforcement is accelerating. Here is what the Information Regulator expects in 2026 — and where most South African businesses still fall short.

26 Nov 2025 · 0x1m3 · 5 min read

Managed Services

Automated Patch Management: Stop Chasing Updates

Every unpatched application is an open door for attackers. Automated patch management closes those doors — across every device, every week, without manual effort.

24 Nov 2025 · 0x1m3 · 6 min read

Citrix & Virtualisation

ShareFile for Professional Services: Secure Sharing Done Right

Law firms, accountants, and consultancies handle sensitive documents daily. ShareFile provides secure client portals, e-signatures, and POPIA-compliant storage — without the complexity.

19 Nov 2025 · 0x1m3 · 4 min read

Cybersecurity

How SentinelOne AI Detects Threats Before They Execute

SentinelOne does not wait for a signature update. Its dual AI engine analyses files before execution and monitors behaviour in real time. Here is how it works under the hood.

17 Nov 2025 · 0x1m3 · 7 min read

Cloud & Infrastructure

Microsoft 365 E5 Security: What You're Actually Paying For

Most organisations with M365 E5 licences use less than half the security features they're paying for. Here's what's actually included — and why it matters.

12 Nov 2025 · 0x1m3 · 6 min read

Backup & Recovery

Cove Data Protection: Why Cloud-First Backup Changes Everything

Cove Data Protection backs up direct-to-cloud with no appliances, 60x smaller incrementals, and immutable storage that ransomware cannot touch. Here is why it matters.

10 Nov 2025 · 0x1m3 · 6 min read

Managed Services

N-able N-central: The IT Management Platform Behind the Scenes

N-able N-central is the RMM platform powering enterprise IT management. 700+ automations, 100+ third-party patches, and network discovery — all from a single pane of glass.

05 Nov 2025 · 0x1m3 · 6 min read

Cybersecurity

5 Ransomware Prevention Steps for South African Businesses

South Africa is the most ransomware-targeted country in Africa. These five steps will protect your business — and they map directly to a proven security framework.

03 Nov 2025 · 0x1m3 · 6 min read

Cloud & Infrastructure

Azure for South Africa: Data Sovereignty and Local Regions

Your data doesn't need to leave South Africa. Azure's local regions in Johannesburg and Cape Town give SA businesses POPIA-compliant cloud without compromise.

22 Oct 2025 · 0x1m3 · 5 min read

Cybersecurity

SentinelOne vs Traditional Antivirus: What's Changed

Traditional antivirus catches known threats. SentinelOne catches the ones designed to slip past it. Here is how they compare — and what the switch actually costs.

20 Oct 2025 · 0x1m3 · 6 min read

Backup & Recovery

Cloud Backup vs On-Premises: Which Is Right for You?

Cloud backup or on-premises? Both have a place — but the right choice depends on your recovery goals, budget, and risk tolerance. Here is how to decide.

15 Oct 2025 · 0x1m3 · 5 min read

Three Pillar

Why Your Security Strategy Needs All Three Pillars

You locked the front door but left the windows open. Most SA businesses invest heavily in one pillar of security and ignore the other two. Here is what that actually costs.

13 Oct 2025 · 0x1m3 · 5 min read

Managed Services

What Is RMM and How Does It Keep Your Business Running?

Your IT should not wait for something to break before it gets attention. RMM monitors every device 24/7 and fixes problems before you even notice them.

08 Oct 2025 · 0x1m3 · 5 min read

Cybersecurity

What Is EDR and Why Every SA Business Needs It

Your antivirus can only stop threats it already knows about. EDR watches what software actually does — and stops attacks in real time. Here is why every SA business needs it.

06 Oct 2025 · 0x1m3 · 5 min read

Citrix & Virtualisation

Citrix deviceTRUST: Real-Time Zero Trust Access Control for Virtual Desktops...

· Justin Lavers · 5 min read

Cybersecurity

NetScaler Vulnerabilities: What South African Businesses Must Do Now

· Justin Lavers · 5 min read

Talk to Our Team

Whether you have a specific challenge or are just exploring options, our consultants are happy to help.