This week we got a new client, and it was a fantastic first meeting that it must be shared. It was a simple 5 person company but they were government funded. I can't reveal much more than that without disclosing what they do. Small but important. On the first meeting, the new director was recommended to us by a friendly competitor of...

Read More

The Benefits of In-House Expertise: Enhancing Customer Experience through Local Technical Support For years, as Triton Technologies grew we were approached by many third party IT support contractors. From telephone only, to individuals we were contacted sometimes almost daily. The offers were inviting. Learn why we've been vindicated by our decision that we don't source our technical support. How We Kept It...

Read More

We get a call on Monday morning, like you do, but this one was more panic. The owner went on a week long vacation and came back to a resignation letter sitting on his desk from what was then his previous IT person. In-house person, quit Wednesday the previous week.  The boss was in a panic. So he googled the...

Read More

A Client in Need of a SolutionTriton Technologies does a lot of different kinds of business. Some logistics, medical, hospitality, government, military and more. So we are quite diverse on the types of clients that we work with. We were asked about 3 months ago to install software for an oil distribution company on a new server, tablets and so...

Read More

Why is Triton Technologies changing firewall vendors? Triton Technologies has been with SonicWALL since 2006 and have implemented thousands of installs throughout the world. The United States, France, Germany, India, Brazil, Mexico, Canada, and more we have sent and more deployed many hundreds of firewalls throughout those countries. But due to unresolved issues, we're changing firewall vendors. But Why the Change? In September...

Read More

The importance of having an IT staff with impeccable backgrounds. In our line of work we have many keys to many kingdoms. That also means that we need to be more secure than all of our clients. That includes not only complex passwords, multi-authentication techniques, tokens and everything is secure. Because of the risk of having breaches within the network not...

Read More