State of Women in Technology
Companies in the tech industry are always scrambling to find qualified IT talent. Achieving greater female representation in those technology roles requires companies to think outside of the box to recruit and retain women in areas such as cybersecurity and software engineering.
According to the ISC2 Women in Cybersecurity report, women make up only 24% of the overall workforce, and another report showed about the same percentage of women account for data and AI positions in the workforce.
While these numbers slowly creep up each year, it’s not fast enough to keep up with the opportunity and demand in the technology industry.
However, Thrive is an industry leader that is committed to making a positive impact. Currently, women make up 40% of Thrive’s Platform team and the company is actively recruiting to increase that percentage.
“At Thrive, we are thrilled to be working alongside the most talented women in tech,” said Foster Hardie, VP, Digital Platform Architecture at Thrive. “From engineering and technical support to financial and cybersecurity, we empower women throughout our technology ecosystem to grow and succeed.”
Focus on Retention
What’s also concerning is that women are leaving the tech industry at a 45% higher rate than men. Bias, microaggressions and being passed over from promotions are huge factors for women leaving the IT workforce.
So, while it’s difficult to increase the female representation in the technology space, it’s even more difficult to maintain that demographic diversity. This ‘quicksand effect’ shines a light on the imperative of retention alongside the importance of recruiting.
Choosing the Right Place, Right Culture
The tech industry can recruit all day every day, but retention is the critical component to moving the needle. However, only 38% of CIOs say that talent acquisitions and retention strategies are key issues.
To truly make an impact, the entire tech industry must unite to make a positive change in women’s representation in the tech workforce. A big step in the right direction is changing company culture to demonstrate inclusion and build trust in the workplace so that women feel heard, respected and that they belong.
Thrive has stayed one step ahead from the norm by providing training and support for its female tech employees.
“I’ve been at Thrive for 15 years and I’ve grown as a team member and a leader of this company,” said Jackie Erickson, Director of Platform Operations at Thrive. “Throughout my time at Thrive, I’ve moved up the ranks from a support professional to a director of our critical platform operations. The amount of support and training Thrive has given me is a testament to the company’s inclusive culture that also recognizes and rewards women in technology roles.”
Investing in the Next Generation of Tech Talent
It’s crucial that the tech industry invests in the next generation of women tech talent through support, mentoring and providing available resources to contribute to their growth and development.
One great resource is the Women in Technology (WIT) organization. This group is made up of a dedicated team of female professionals committed to empowering women to be architects of change in the technology industry.
At Thrive, we strive to make the best team of professionals. In our numerous employee spotlight blogs, our amazing team and culture are often touted as our secret to success. While there is an effort to increase awareness about women in tech in our industry, Thrive already leads the way as a company that focuses on its people and a place where everyone can ‘thrive’.
How to Outlast a Data DisasterWhen your business experiences a significant disruption, a disaster recovery plan is critical to getting back to normal. Some disasters are the result of external threats, while others come about from internal problems with your company’s operations. Here are some things you should consider when looking into potential disaster recovery solutions to help you get through a data disaster.
Disaster recovery, as far as IT is concerned, focuses on protecting your data and information systems, but it can also refer to the broad overarching strategy you use to keep your organization operational in difficult times. Companies today handle more data than ever before, and customers are much more cognizant of when companies don’t appropriately manage or protect their data, so it’s more important than ever to have a strategy in place to keep it safe and protected. Here are three things you should properly manage for your disaster recovery plan.
Planning is Imperative
First, we want to dispel the misconception that disaster recovery is a big, complicated process and strategy that needs to be handled before you take care of general, everyday business. This is not true; many small businesses can leverage a comprehensive data backup and recovery plan with relative ease, although larger organizations might require more details to be addressed, specifically how systems are to be recovered, as well as applications and working conditions.
It doesn’t matter what type of company you are–there are certain aspects of data recovery that always need to be addressed. For example, you’ll need to know how your backup system works, who is in charge of it, and what the responsible recovery point objective (RPO), or the amount of data you need to back up, is. Furthermore, knowing these details can dramatically reduce the time it takes to get back in business following a disaster to help you meet your specified recovery time objective (RTO).
Test Your DR
One major problem that organizations have with their disaster recovery processes is that they aren’t routinely testing them. Nearly a quarter of businesses have never tested their disaster recovery plan, and considering the dire consequences of a failed data recovery, this should be a major cause for concern. You should test your platform regularly, whether it’s once a month, once a quarter, or even once a year.
Testing your disaster recovery system can interfere with your business’ operations and potentially even cut into productivity, depending on when it takes place. Whenever you test your systems, you’re bound to find something wrong with it, so you’ll find your DR strategy changing over time as you address these issues. If you can appropriately address these issues during the testing phase, you’ll have a better chance when you actually need to seriously use your DR strategy.
The Human Element
While it might seem like your disaster recovery strategy is governed by your IT infrastructure, remember that your IT infrastructure is governed by people. You’ll want your DR strategy to take human behavior into account. For example, if your company’s location is compromised by a disaster, do you have the ability to get your business’ employees access to the data they need to effectively do their jobs?
The COVID-19 pandemic made it that much more apparent, as organizations that did not have contingencies in place to handle the remote operations struggled to adjust to the new normal. Businesses that did not have the capital to implement the appropriate technologies and accommodations for remote employees had significant problems in the early days of the pandemic, many of which could have been prevented if they had ensured continuity through work-from-home strategies and other possibilities in the event your office is inoperable short or long term.
Thrive can help your business implement and test a business continuity solution. To learn more, contact Thrive today.
Employee Spotlight: Moira Danaher, Director of Talent Acquisition
Welcome back to another installment of our “Thrive Spotlight” blog series.
Our featured Thrive Employee is Moira Danaher, Director of Talent Acquisition at Thrive.
As Director of Talent Acquisition, Moira is responsible for the company’s recruiting initiatives across several different departments to keep up with Thrive’s rapid growth. She is primarily focused on finding candidates for infrastructure, technical support, sales, project management and client roles.
Moira lives in Weehawken, NJ, and enjoys summers at the beach and pool! When she’s not outside trying to avoid a sunburn, you can most likely find Moira on a spin bike or trying out a new recipe in the kitchen!
Hi Moira! Can you tell us about your background and how you came to Thrive?
I started my career at TheLadders, an online job board that caters to executives. I transitioned from a customer service focused role into recruitment. I’ve recruited for all different sorts of roles for a wide variety of companies including an experiential marketing agency, expert network and a technology medica company.
I joined the Thrive family in the summer of 2021 through the acquisition of S7 Technology Group in NYC. I went from recruiting for a 50+ person organization to recruiting for a 500+ person organization.
Where did you go to school or get training?
I graduated from Marist College in Poughkeepsie, NY, with a Bachelor of Arts degree in Communications.
What do you most enjoy about working for Thrive?
The fast pace is definitely exciting! I enjoy being a resource for my co-workers. The culture at Thrive is amazing and I’m always so eager to talk to candidates about how the company is both personally and professionally rewarding. My opinions and ideas are valued and appreciated by Thrive!
Any recent exciting projects at Thrive that you can tell us about?
Recruiting, recruiting, recruiting! I enjoy helping Thrive grow and deliver incentives to our incredible employees and future employees.
Are you interested in learning more about Thrive? Click here!
And don’t forget to follow us on Twitter and LinkedIn for the latest news, and continue checking our blog for more in our “Thrive Employee Spotlight” series. Until next time…
Make the IoT Work for Your Business
By now you’ve probably heard the term Internet of Things (IoT). You may not completely understand what it is, but you know it has something to do with all those “smart” devices that you see popping up everywhere. Today, we thought we’d get into what types of things are on the IoT and how they can have an impact on your business.
What Is the Internet of Things?
The Internet of Things started growing a decade or so ago as “smart” technologies were being developed to present people with technology that they can use to make their lives easier. This concept is what technology is all about, after all, and it quickly became a business opportunity for OEM (original equipment manufacturers) and other companies. This has led to a massive explosion of “smart” devices designed to unburden the lives of their users.
Of course, the more businesses that are developing this technology, the more tools will be aimed to transform business. There are now 14 billion IoT devices (including smartphones) connected to the Internet, so there is a breadth of options for businesses to choose from. It’s also one of the more funded technology markets by venture capital firms with close to $5 billion being invested annually, as the practical use of IoT is just now scratching the surface.
The IoT Is Everywhere
The IoT can be used in multiple ways in and around your business; and each adds its own unique variables to the way you go about integrating them. Obviously, a large portion of your employees have smartphones, that is an added consideration because you need to ensure that all those mobile devices are working with the applications that you use; or, if you don’t go that far, at least that they don’t bring unwanted passengers along on to your network.
More complex industrial IoT (IIoT) platforms can really alter the way a business operates, so training will have to be considered to help your employees understand how they work. There is a lot of good that the IoT can do, but it also comes with some challenges. Not only do you need to set up your IoT platform from the ground up, but you also need to make sure that it integrates with your back-end software systems and any other applications that would provide the benefits needed to implement them.
Set up and Security Questions for the Implementation of Business IoT
For most businesses looking to implement IoT to help automate some things will first start by using it in the ways that your average home consumer might. You get systems that can help save you on utility costs and help you save time (smart thermostats, smart lights, voice-driven personal assistant hubs, etc.).
More complex systems like asset tracking and inventory management allow for pinpoint control over supply chain issues. This can get complicated, quickly, but that’s the point. The IoT helps humans do things humans couldn’t do without these tools. It is the perfect confluence of human-made tools (hardware and applications) and constant data streaming that can help businesses automate more and collect more data to help them make better business decisions.
Businesses need their technology to be scalable and secure. This is where the IoT hits a snag a lot of the time. There are serious security questions with any number of devices, but that part of it is improving. For the business, however, “improving” could mean “still too expensive/risky”. The truth is that any business can utilize some form of IoT to help them cut costs, improve efficiency, and improve decision making. You just need to know how.
At Thrive, we understand where and how the IoT fits into a business. If you would like to learn more about the Internet of Things and how it can help your organization grow, contact Thrive today.
Securing Every Endpoint is Important to Maintaining Security
Sometimes it can be easy to take cybersecurity for granted, especially when you consider that built-in security features are more powerful than they have ever been. Unfortunately, if you think that cybersecurity is something that ends with the built-in security of your desktops and laptops, then you’re in for a rude awakening.
Most Devices Are Connected These Days
Besides older industrial machinery and equipment, just about all devices connected to your network communicate with each other in some way, thereby making them a cybersecurity risk. Individual workstations and desktops might be protected, but you also need to keep them updated, along with all of the other endpoints that might be connected to your network.
In fact, you might be surprised by some of the other devices that could potentially be threats to your network.
Network Printers Can Be Dangerous
Does the name Stackoverflowin ring a bell? Back in 2017, this hacker hijacked 150,000 printers all over the world from big brands like Canon, Brother, Epson, HP, and Samsung. They were then able to send documents to these printers to print out the messages. The attack might be harmless, but it showcases just how serious issues of cybersecurity with printers can be, as they can be controlled and manipulated in ways you might not expect.
In essence, the above attack could be categorized as a botnet, or a large group of infected devices from all over the Internet using their collective power to launch an attack against a network. This segues nicely into our next topic of discussion, the DDoS attack.
Internet of Things and Distributed Denial of Service Attacks (DDoS)
Just last year, the world saw the most massive DDoS attack yet. A DDoS attack is when countless devices—we’re talking hundreds, thousands, or even millions of infected devices—band together to launch all of their power against a website or service. It’s like when the grocery store has too much traffic and people get stuck waiting around in the aisles, or when a highway experiences traffic congestion.
Anyway, back to the attack. It went after its target with 17.2 million requests per second, three times larger than the largest DDoS attack which preceded it. With a varied list of compromised devices, including smart appliances and various Internet of Things devices such as smart light bulbs, thermostats, washing machines, and others that can connect to a smartphone, anyone with connected devices has reason to fear these attacks. And, of course, if a hacker can take over your washing machine, you bet they’re not going to be doing your chores for you. They’ll likely use it to gain deeper access to your network and create all kinds of problems for you.
Networking Equipment Like Routers, Switches, and Other Hardware
Any device which sends or receives network traffic throughout your office is going to be vulnerable, as it’s likely connected to your workstations, which your employees use on a day-to-day basis. Even in the home environment, you can expect there to be threats aplenty, as just last month a new type of malware was discovered making its home on consumer and small-business grade network routers. This particular threat allowed hackers to influence connected devices using the Windows, Linux, and macOS operating systems.
The malware, an incredibly complicated and sophisticated threat called ZuoRAT, is believed to have been created by a major organization or perhaps even a nation-state. The threat is quite difficult to identify and detect, all while granting a considerable amount of control to any potential attacker, making it a dangerous combination of stealthy and powerful. It can also be used to roll out additional malware, bypassing security measures along the way.
Yes, Even the Bluetooth Earbuds
Bluetooth headphones might seem small and of little consequence, but even these devices can be vulnerable to threats. Take, for example, the vulnerability which was discovered within the microcontrollers of a handful of earbuds, allowing hackers to gain control over the device for the purposes of a botnet. The threat has only been used by researchers, but security experts were able to break into their own Bluetooth earbuds and disable the Bluetooth and wireless communications on the connected device. Imagine the repercussions this could have in the realm of a physical security system, where security cameras could be broken into and turned off.
Pretty scary stuff, although we would like to mention that we don’t bring this up to scare you—merely to open your eyes to the possibilities out there for hackers, which are seemingly infinite in scope.
It’s Never a Bad Time to Consider Your Cybersecurity Strategy
We know it can be a little unnerving to think about the many threats out there, but you don’t have to do it alone. Thrive is here to help you navigate the cybersecurity landscape. To learn more, contact Thrive.
Employee Spotlight: Courtney Gallant, Purchasing Manager
Welcome back to another installment of our “Thrive Spotlight” blog series.
Our featured Thrive Employee is Courtney Gallant, Purchasing Manager at Thrive.
As Purchasing Manager, Courtney oversees the acquisition of all hardware, software and project equipment for Thrive’s customers. She also maintains a close relationship with Thrive’s suppliers that help balance costs and stock availability to meet project deadlines. In addition, Courtney works with the finance team to develop invoices and resolve any discrepancies.
Originally from Lakeville, MA, Courtney now lives in Attleboro, MA with her fiancé where you can often find her on the lake with her two dogs or on the hiking trails. She is a sports enthusiast and, depending on the season, enjoys wakeboarding, snowboarding and kiteboarding.
Hi Courtney! Can you tell us about your background and how you came to Thrive?
I previously worked at BJ Headquarters in the merchandising procurement department. In that role, I became inspired to learn more about technology in addition to advancing my procurement skills. I also have experience in the promotional products industry and spent time working at a calendar supply company. I have been with Thrive for almost four years.
Where did you go to school or get training?
I graduated from the University of Massachusetts Dartmouth with a bachelor’s degree in Liberal Arts and Sciences, General Studies and Humanities.
What do you most enjoy about working for Thrive?
My team! I feel very fortunate to have a steady team that works closely together and communicates every day. Working at Thrive has given me a better understanding of how to accomplish tasks as a team while adjusting to new processes that help make our work more efficient.
Are you interested in learning more about Thrive? Click here!
And don’t forget to follow us on Twitter and LinkedIn for the latest news, and continue checking our blog for more in our “Thrive Employee Spotlight” series. Until next time…
Proactive IT Management Works Better
How does your company manage its technology? Does it struggle with the idea of managing multiple workstations, server units, networking components, mobile devices, and more? If so, then read on—we have some tips to help you better manage the many different technological parts of your organization.
Keep in mind that this is general advice that can be applied to just about any company. If you want specific advice, we are happy to have a discussion with you through a consultation!
Less Is More
The more complex an IT infrastructure gets, the more difficult it gets to manage. Therefore, to keep your infrastructure as easy to manage as possible, we recommend keeping things simple, or as simple as is appropriate for your business practices. The reason for this is that IT infrastructures with large amounts of varied software and hardware can be difficult to keep centralized and monitored without a dedicated technician to keep tabs on it.
Proactive is Better
If we asked you whether it is better to deal with problems that have derailed your productivity or to prevent them entirely and dodge that bullet, what would you say? Proactive maintenance is one of the most important parts of running any IT infrastructure. If problems persist and grow to be so bad that they cause downtime, then you are leaving money on the table and putting your business at risk. It’s better to just keep the issues from growing to become this bad in the first place.
Outsource When Necessary
We know that not all companies have access to the same talented group of IT technicians, and this lack of talent can often lead to businesses foregoing IT maintenance altogether or relying on existing resources that are not adequately trained or prepared to handle this responsibility. In situations like this, you can rely on outsourcing to an appropriate third party. Even if you have an in-house IT department, outsourcing can be a valuable investment to save your business
If you want to take the guesswork out of IT management, Thrive can help with that, too. Our trained technicians can provide all of the support you need to ensure maximum productivity and efficiency with your network and IT resources. To learn more, contact Thrive
Thrive Acquires Edge Technology Group to Become the Leading Cybersecurity Managed Services Provider for the Global Financial CommunityEdge Technology Group will help introduce Thrive’s award-winning Cyber, Cloud & Automation Platform into Asia while amplifying their existing North American & UK Operations
FOXBOROUGH, Mass. – June 30, 2022 – Thrive, a premier provider of Cybersecurity and Digital Transformation Managed Services, announced today that it has acquired Connecticut-based Edge Technology Group, a leading global technology advisory and fully-managed IT service provider for alternative investment managers. The acquisition of Edge Technology Group adds new global offices and data centers across the United Kingdom, Australia, Singapore, Hong Kong, and the Philippines, strengthening Thrive’s international presence for all customers. Edge clients, including hedge funds, private equity firms, family offices, and asset managers across the world, will now benefit from Thrive’s next-generation managed cybersecurity, collaboration, and cloud services.
Founded in 2007, Edge is a global technology advisory and fully managed Financial Services IT service provider that provides advisory services and cloud computing solutions to alternative investment managers. Edge serves more than 300 hedge fund, asset managers, private equity, REIT, and wealth management clientele, providing public cloud configurations that are designed to address the distinct business needs of this disparate client base. Edge Technology Group has 265 employees that include a team of client-centered IT strategists and engineers.
“Edge Technology Group is the leading Financial Industry MSP in the world,” said Rob Stephenson, Thrive’s CEO. “Their talented engineering and account management teams will now have access to the Thrive Automation Platform and our 24x7x365 comprehensive suite of Cybersecurity SOC services to enhance the Edge client experience.”
“As a founder-owned managed services provider, we are fully immersed in advancing clients’ alternative investment practices via our IT advisory services and cloud computing solutions,” said Jim Nekos, CEO, Edge Technology Group. “Edge is thrilled to join the Thrive family as their client-first commitment is perfectly aligned with ours and their advanced cybersecurity, automation, collaboration and managed services platform will expedite our customers’ Digital Transformation journey.”
Through this acquisition, Thrive will now have over 1,000 employees serving clients around the world, solidifying their position as the leading technology outsourcing provider for the Financial Industry. Edge Technology Group marks the fourth acquisition by Thrive in 2022 and cements Thrive’s global position as a leading technology provider delivering end-to-end managed services and unmatched expertise to drive secure digital transformation.
Canaccord Genuity served as the exclusive financial advisor to Edge. Dechert LLP served as legal counsel to Court Square Capital. Alliance Bernstein, Morgan Stanley, NXT, Northwestern Mutual and Churchill provided financing for the transaction.
For more information on Thrive, visit thrivenextgen.com.
About Thrive
Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company’s Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application takes advantage of technology that enables peak performance, scale, and the highest level of security.
For more information, thrivenextgen.com.
Thrive: LinkedIn, Twitter, Facebook, YouTube and Instagram
About Edge Technology Group
Edge Technology Group is a sector-focused consultancy, exclusively representing alternative investment managers globally. Edge offers fully managed IT services and complete cloud solutions. The company delivers immediate, flexible and proprietary solutions that satisfy the needs of hedge funds, private equity firms, family offices and asset managers worldwide. Edge has 8 locations across Asia Pacific, Europe and the US, including Singapore, Hong Kong, Sydney, London, New York, San Francisco, Austin and Greenwich, CT.
About Court Square
Court Square is a middle market private equity firm with one of the most experienced investment teams in the industry. Since 1979, the team has completed over 235 investments, including several landmark transactions, and has developed numerous businesses into leaders in their respective markets. Court Square invests in companies that have compelling growth potential within the business services, general industrial, healthcare, and technology and telecommunications sectors. The firm has $7.0 billion of assets under management and is based in New York, N.Y. For more information on Court Square, please visit www.courtsquare.com.
MEDIA CONTACT:
Patrick Reilly
Zer0 to 5ive, for Thrive
732-687-4683
Sustainably Manage Your IT ServicesIt’s fair to say that, across the board, times have been particularly tough as of late for businesses. On top of businesses having to fight through the socioeconomic crisis created by the COVID-19 pandemic and the supply chain issues, they also must juggle more data than ever.
In short, businesses need reliable and cost-effective ways to manage their critical technologies.
Managed Services Can Provide Modern Businesses with a Reprieve
Pardon me for asking about your financial situation, but how are you currently paying for your IT services? Is your current strategy sustainable over time? If yours is one of the many businesses who answer the first question with “on a case-by-case basis,” the answer to the second is almost certainly a resounding “no.”
The issue with pay-as-you-go IT services is that there’s no motivation for the provider to solve issues in the long term.
Think about it—when a company’s bottom line relies on your IT having issues every now and again, it goes against their best interests to prevent them. After all, if you don’t need them on a regular basis, their business model collapses.
Managed services, on the other hand, are designed to take the opposite tack. Rather than charging on a per-case basis for each issue you encounter, the all-inclusive nature of managed services ensures that your business is covered by a comprehensive agreement. So long as it falls under this agreement—and most things do—we’ll take care of it on your behalf.
This Predictability is Something that Today’s Businesses Need
As we’ve established, today’s times are uncertain—for many of us, in a way that is unprecedented in our memories. With this uncertainty, business can become far more challenging to maintain.
However, the predictability that our managed services can provide to what is commonly the most volatile part of a business’ budget makes it far easier to keep your business in the black. By eliminating the potential of a lot of the issues that would otherwise incur severe costs, managed services put your business in the position to succeed.
Contact Thrive today to learn more about our managed services, and what it takes to implement them.
Thrive Enhances Florida Presence with the Acquisition of DSMAs the leading CJIS Cloud, Datacenter & Managed Services Provider in Florida, DSM will provide Thrive with a State, Local & Education (SLED) platform from which to expand nationally
FOXBOROUGH, MASS. – June 24, 2022 – Thrive, a premier provider of NextGen Managed Services, announces today that it has acquired DSM, a Florida-based provider of managed IT services to State, Local, and Education (SLED) government agencies. The acquisition will enable DSM’s existing government and corporate clients to benefit from Thrive’s next-generation managed cybersecurity, global Cloud footprint, and Microsoft collaboration services while strengthening Thrive’s offering to SLED agencies across the US.
Founded in 1986, DSM has been helping clients achieve their IT goals by providing innovative solutions for data protection, disaster recovery, and managed cloud services bolstered by their CJIS compliant data centers. Focusing on data assurance, DSM offers clients the ability to survive and recover quickly from a data breach or ransomware attack, ensuring business continuity. DSM’s expert team of highly qualified professionals develop flexible and cost-effective solutions that address the challenges of customers that serve commercial, government, and CJIS-bound agencies.
“DSM is a leader in the SLED space with significant traction in the state of Florida. With this partnership, they’ll be able to augment their Cloud-based service offerings via Thrive’s SOC and comprehensive suite of cybersecurity services,” said Rob Stephenson, Thrive’s CEO. “DSM’s talented engineers and experienced management team will help to greatly enhance our rapidly growing Florida presence, as well as position the SLED vertical to go national under their leadership.”
“For over three decades, DSM’s primary objective for our clients has been to optimize their digital transformation and their journey to the Cloud,” said David Robinson, CEO and Founder of DSM. “We are delighted to be the newest members of the Thrive family as their dedication to providing a personalized IT path towards customer satisfaction complements our commitment to total IT peace of mind for our clients.”
Robinson and Greg Madden, DSM’s COO, will assume senior leadership roles and helm the newly established Thrive SLED group as a special unit focusing on existing government business in Florida, Alabama, and Massachusetts. In addition, Robinson and Madden will assist in Thrive’s expansion of state and local contracts up and down the East Coast.
DSM is now the third acquisition by Thrive in Florida in the last six months and builds upon its established presence in the Southeast region. Thrive is a security-first MSP that delivers comprehensive managed services and unmatched expertise to drive secure digital transformation for small to mid-sized enterprises across multiple industries. For more information on Thrive, visit thrivenextgen.com.
About Thrive
Thrive is a leading provider of NextGen managed services designed to drive business outcomes through application enablement and optimization. The company’s Thrive5 Methodology utilizes a unique combination of its Application Performance Platform and strategic services to ensure each business application takes advantage of technology that enables peak performance, scale, and the highest level of security. For more information, thrivenextgen.com.
Thrive: LinkedIn, Twitter, Facebook, YouTube and Instagram
About DSM
DSM redefines our client’s business outcomes that they consider possible from their IT infrastructure ensuring that their data is protected and available when and where they need it, saving time and money. As our clients embark on their journey to trusted data availability, DSM guides them, allowing them to focus on their core business, rather than the technology that runs it.
MEDIA CONTACT:
Patrick Reilly
Zer0 to 5ive, for Thrive
732-687-4683 | patrick@0to5.com