Insights from OAS
Practical guidance on managed security, Citrix virtualisation, ransomware response, and the technology decisions that protect South African businesses.
Citrix & Virtualisation
Citrix DaaS: Cloud-Managed Desktop Delivery for South African Enterprises
Citrix DaaS gives South African enterprises cloud-managed virtual desktops without replacing on-premises infrastructure. Here is what it does, how it fits into hybrid deployments, and why the timing matters.
24 Mar 2026 · Justin Lavers · 4 min read
Citrix & Virtualisation
Monitoring Citrix Session Performance: How uberAgent Finds Problems Before Users Complain
Citrix Director shows you sessions are connected. uberAgent shows you whether users are productive. Here is how session-level monitoring transforms virtual desktop management.
24 Mar 2026 · Justin Lavers
Citrix & Virtualisation
What Is Citrix uberAgent? UXM and ESA Explained for IT Teams
Citrix uberAgent gives IT teams session-level visibility that Director and Analytics never could. Here is what UXM and ESA actually do — and where uberAgent fits alongside your infrastructure monitoring tools.
24 Mar 2026 · Justin Lavers · 5 min read
Cybersecurity
uberAgent ESA vs Traditional Endpoint Security: Where It Fits Alongside EDR
uberAgent ESA observes and reports. SentinelOne EDR detects and stops. Both are essential for securing Citrix environments — here is why they are complementary, not competing.
24 Mar 2026 · Justin Lavers
Citrix & Virtualisation
Setting Up uberAgent with Splunk: A Practical Guide for Citrix Admins
Deploying uberAgent with Splunk in a Citrix environment? Here are the common pitfalls, dashboard priorities, and architecture decisions you need to get right from day one.
24 Mar 2026 · Justin Lavers · 5 min read
Citrix & Virtualisation
uberAgent vs ControlUp vs Lakeside SysTrack: Choosing the Right VDI Monitoring Tool
Citrix Director only goes so far. Compare uberAgent, ControlUp, and Lakeside SysTrack to find the VDI monitoring tool that fits your environment, budget, and operational priorities.
24 Mar 2026 · Justin Lavers
Citrix & Virtualisation
Splunk + uberAgent: Enterprise Monitoring for Citrix
uberAgent collects the data. Splunk correlates and alerts on it. Together, they give Citrix admins and security teams complete environment visibility — user experience and threat detection in one pipeline.
19 Mar 2026 · 0x1m3 · 6 min read
Cloud & Infrastructure
Microsoft Sentinel: SIEM Made Simple for Mid-Market
Microsoft Sentinel makes enterprise-grade SIEM accessible for mid-market. Cloud-native, no infrastructure to manage, and deep M365 integration — here is what you need to know.
17 Mar 2026 · 0x1m3 · 4 min read
Backup & Recovery
Ransomware Recovery: How Immutable Backups Save Your Data
Modern ransomware encrypts your backups before it encrypts your data. Immutable cloud backups are the only way to guarantee recovery. Here's how they work.
12 Mar 2026 · 0x1m3 · 6 min read
Managed Services
N-able vs ConnectWise vs Datto: Choosing Your RMM
Choosing an RMM platform shapes your entire IT operation. We compare N-able, ConnectWise, and Datto head-to-head — features, automation, patching, and pricing.
10 Mar 2026 · 0x1m3 · 6 min read
Industry News
Government IT Modernisation: Legacy to Secure Cloud
South African government departments face mounting pressure to modernise IT while maintaining data sovereignty and security. Here is the path forward.
05 Mar 2026 · 0x1m3 · 6 min read
Cybersecurity
Endpoint Protection for Remote Workers: A Quick Guide
Your team works from home, coffee shops, and co-working spaces. Are their devices protected? 7 practical tips to secure every remote endpoint.
02 Mar 2026 · 0x1m3 · 5 min read
Citrix & Virtualisation
Citrix LAS Migration Deadline: What SA Enterprises Need to Know Before April 2026
Citrix file-based licensing ends 15 April 2026. If your organisation runs on-premises Citrix, the License Activation Service migration is not optional. Here is what you need to know — and what to do now.
01 Mar 2026 · Justin Lavers
Three Pillar
Protect, Detect, Recover: Why SA Businesses Need All Three Pillars of Security
Your antivirus caught the threat — but who was monitoring the 200 other endpoints? And where is your backup? Protection alone is not enough. Here is why SA businesses need all three pillars of security.
01 Mar 2026 · Justin Lavers
Citrix & Virtualisation
Citrix Aidrien: AI Comes to Desktop Management
Citrix Aidrien reaches general availability in March 2026. It is an AI assistant for Citrix administrators — natural language queries, troubleshooting guidance, and workflow automation built into the management console.
25 Feb 2026 · 0x1m3 · 4 min read
Cloud & Infrastructure
Azure Virtual Desktop vs Citrix DaaS: Head to Head
AVD or Citrix DaaS? Both deliver virtual desktops — but they solve different problems. Here is an honest comparison from a team that deploys both.
23 Feb 2026 · 0x1m3 · 5 min read
Backup & Recovery
TrueDelta: How Cove Makes Backups 60x Smaller
Traditional backups send the entire changed file every time. Cove's TrueDelta sends only the changed blocks — making incrementals 60x smaller. Here's how it works.
18 Feb 2026 · 0x1m3 · 6 min read
Three Pillar
Three Pillar Security Assessment: How Does Your Business Score?
15 yes/no questions. Three pillars. One honest score. Take the Three Pillar Security Assessment and find out where your business stands — and where the gaps are.
16 Feb 2026 · 0x1m3 · 5 min read
Managed Services
Third-Party App Patching: The Security Gap You're Missing
You patch Windows religiously. But what about Chrome, Adobe, Java, and Zoom? Third-party apps are how attackers actually get in — and most businesses leave them wide open.
11 Feb 2026 · 0x1m3 · 5 min read
Cybersecurity
What to Do When Your Business Is Under Cyber Attack
You have just been breached. Every minute counts. Here is exactly what to do — step by step — when your business is under cyber attack.
09 Feb 2026 · 0x1m3 · 6 min read
Industry News
Financial Services Cybersecurity: Meeting FSCA Requirements
The FSCA Joint Standard on cybersecurity is now in enforcement. Here is what financial services firms need — and how to prove compliance to regulators.
04 Feb 2026 · 0x1m3 · 6 min read
Citrix & Virtualisation
Virtual Desktop Infrastructure: A Buyer's Guide for 2026
VDI is not one-size-fits-all in 2026. On-premises, cloud, or hybrid — each model has trade-offs. This buyer's guide breaks down the real decision factors for IT directors evaluating virtual desktop delivery.
28 Jan 2026 · 0x1m3 · 6 min read
Cloud & Infrastructure
How to Plan Your Cloud Migration Step by Step
Cloud migration fails when it starts with technology instead of planning. This step-by-step guide covers assessment, strategy, execution, and rollback — built for SA businesses.
26 Jan 2026 · 0x1m3 · 7 min read
Backup & Recovery
Disaster Recovery Planning: Your Business Continuity Checklist
93% of businesses without a tested disaster recovery plan close within a year of a major data loss. Use this checklist to make sure yours actually works.
21 Jan 2026 · 0x1m3 · 7 min read
Three Pillar
The Hidden Cost of Incomplete Security
A firewall without monitoring is a locked door with no camera. A backup without endpoint protection is a safety net under a burning building. Incomplete security has a cost — and it is always higher than you expect.
19 Jan 2026 · 0x1m3 · 5 min read
Managed Services
5 Signs You've Outgrown Break-Fix IT Support
Break-fix IT was fine when you had five PCs. But if the same problems keep coming back and surprise invoices keep arriving, you have outgrown it.
14 Jan 2026 · 0x1m3 · 5 min read
Cybersecurity
Zero Trust Security: A Practical Guide for SA Enterprises
Zero trust is not a product you buy — it is an architecture you build. Here is how SA enterprises can implement it with tools they may already have.
12 Jan 2026 · 0x1m3 · 7 min read
Industry News
Healthcare IT Security: Protecting Patient Data in SA
Healthcare is the most targeted sector for ransomware globally. South African hospitals and practices face unique challenges — here is how to address them.
07 Jan 2026 · 0x1m3 · 6 min read
Citrix & Virtualisation
NetScaler Explained: Load Balancing and Security in One
NetScaler is not just a load balancer. It is a multi-function security and networking appliance that now includes AI Gateway for LLM traffic management. Here is how it all fits together.
29 Dec 2025 · 0x1m3 · 5 min read
Cloud & Infrastructure
Nutanix HCI: Simplify Your Data Centre Without VMware
VMware licensing costs have changed dramatically since the Broadcom acquisition. Nutanix HCI delivers the same data centre power — without the licensing overhead.
22 Dec 2025 · 0x1m3 · 6 min read
Backup & Recovery
How to Back Up Microsoft 365: A Complete Guide
Microsoft protects the infrastructure. You protect the data. Most businesses do not realise M365 backup is their responsibility — until they lose something they cannot recover.
17 Dec 2025 · 0x1m3 · 6 min read
Cybersecurity
South Africa's Cyber Threat Landscape: What 2025 Taught Us
South Africa ranked among Africa's most targeted countries in 2025. Here is what the threat landscape taught us — and what smart businesses are doing about it in 2026.
15 Dec 2025 · 0x1m3 · 6 min read
Managed Services
How to Set Up Automated IT Monitoring for Your Business
Setting up IT monitoring does not have to be complicated. This step-by-step guide covers device discovery, alert configuration, and automation — everything you need to monitor your network properly.
10 Dec 2025 · 0x1m3 · 7 min read
Three Pillar
Protect, Detect, Recover in Practice: Building a Complete Stack
Theory is one thing. Implementation is another. Here is exactly how OAS builds a complete Protect, Detect, Recover security stack — and what each layer actually does.
08 Dec 2025 · 0x1m3 · 6 min read
Industry News
POPIA Compliance in 2026: What's Changed and What to Do
POPIA enforcement is accelerating. Here is what the Information Regulator expects in 2026 — and where most South African businesses still fall short.
26 Nov 2025 · 0x1m3 · 5 min read
Managed Services
Automated Patch Management: Stop Chasing Updates
Every unpatched application is an open door for attackers. Automated patch management closes those doors — across every device, every week, without manual effort.
24 Nov 2025 · 0x1m3 · 6 min read
Citrix & Virtualisation
ShareFile for Professional Services: Secure Sharing Done Right
Law firms, accountants, and consultancies handle sensitive documents daily. ShareFile provides secure client portals, e-signatures, and POPIA-compliant storage — without the complexity.
19 Nov 2025 · 0x1m3 · 4 min read
Cybersecurity
How SentinelOne AI Detects Threats Before They Execute
SentinelOne does not wait for a signature update. Its dual AI engine analyses files before execution and monitors behaviour in real time. Here is how it works under the hood.
17 Nov 2025 · 0x1m3 · 7 min read
Cloud & Infrastructure
Microsoft 365 E5 Security: What You're Actually Paying For
Most organisations with M365 E5 licences use less than half the security features they're paying for. Here's what's actually included — and why it matters.
12 Nov 2025 · 0x1m3 · 6 min read
Backup & Recovery
Cove Data Protection: Why Cloud-First Backup Changes Everything
Cove Data Protection backs up direct-to-cloud with no appliances, 60x smaller incrementals, and immutable storage that ransomware cannot touch. Here is why it matters.
10 Nov 2025 · 0x1m3 · 6 min read
Managed Services
N-able N-central: The IT Management Platform Behind the Scenes
N-able N-central is the RMM platform powering enterprise IT management. 700+ automations, 100+ third-party patches, and network discovery — all from a single pane of glass.
05 Nov 2025 · 0x1m3 · 6 min read
Cybersecurity
5 Ransomware Prevention Steps for South African Businesses
South Africa is the most ransomware-targeted country in Africa. These five steps will protect your business — and they map directly to a proven security framework.
03 Nov 2025 · 0x1m3 · 6 min read
Cloud & Infrastructure
Azure for South Africa: Data Sovereignty and Local Regions
Your data doesn't need to leave South Africa. Azure's local regions in Johannesburg and Cape Town give SA businesses POPIA-compliant cloud without compromise.
22 Oct 2025 · 0x1m3 · 5 min read
Cybersecurity
SentinelOne vs Traditional Antivirus: What's Changed
Traditional antivirus catches known threats. SentinelOne catches the ones designed to slip past it. Here is how they compare — and what the switch actually costs.
20 Oct 2025 · 0x1m3 · 6 min read
Backup & Recovery
Cloud Backup vs On-Premises: Which Is Right for You?
Cloud backup or on-premises? Both have a place — but the right choice depends on your recovery goals, budget, and risk tolerance. Here is how to decide.
15 Oct 2025 · 0x1m3 · 5 min read
Three Pillar
Why Your Security Strategy Needs All Three Pillars
You locked the front door but left the windows open. Most SA businesses invest heavily in one pillar of security and ignore the other two. Here is what that actually costs.
13 Oct 2025 · 0x1m3 · 5 min read
Managed Services
What Is RMM and How Does It Keep Your Business Running?
Your IT should not wait for something to break before it gets attention. RMM monitors every device 24/7 and fixes problems before you even notice them.
08 Oct 2025 · 0x1m3 · 5 min read
Cybersecurity
What Is EDR and Why Every SA Business Needs It
Your antivirus can only stop threats it already knows about. EDR watches what software actually does — and stops attacks in real time. Here is why every SA business needs it.
06 Oct 2025 · 0x1m3 · 5 min read
Citrix & Virtualisation
Citrix deviceTRUST: Real-Time Zero Trust Access Control for Virtual Desktops...
· Justin Lavers · 5 min read
Cybersecurity
NetScaler Vulnerabilities: What South African Businesses Must Do Now
· Justin Lavers · 5 min read