Author Archives: Thrive

Supporting & Securing The Evolving Network

The network has become the critical infrastructure of every business. It is the veins that push the new digital lifeblood around the organisation, connecting your people, connecting users to business-critical applications and providing key services to customers.

It is not just important that this network is available, it also needs to perform, be secure and have the agility to adopt to ever-changing business needs.

The criticality of your wired, wireless and wide-area networks is driving the IT team to look closely at how they manage this, the tools they use and the managed services partner they work with.

It All Starts With Visibility

Not only are today’s networks complex, they also serve a wide variety of needs and there is often a chasm between what they were originally designed for and how they are used right now.

Truly understanding your network and how it is being used is essential and this is why organisations are investing heavily in tools to monitor and analyse their network. The aim is to understand what is traversing their network, those heavy bandwidth consumers, rogue applications and also potential security vulnerabilities.

This is not a one-off exercise but a continuous process and one that fits perfectly with a managed service provider. Providing you with powerful insights, benchmarks, flagging priority areas and predicting future capacity requirements.

Embracing SDN & Continual Optimisation

With visibility you are then able to make more informed decisions about embracing SDN and how this can deliver value to every part of your network. For example, understanding the source and destination of your WAN traffic enables you to understand the most optimum route for this traffic and leverage SD-WAN to handle traffic destined to central systems or the internet differently.

SDN redefines how you support and manage your network; many of the manual configuration tasks are taken away with automation and you need less router experts and more assistance in defining the rules and policies. Support of your network becomes less about break-fix and more about a partner that can help you put in place the best practices to monitor and optimise performance.

Securing A Boundary-Less Network

The network is now truly boundary-less; your end-users need access from any location utilising their device of choice, and the systems they access often reside in clouds and on infrastructure that you do not own.

With a significantly increased attack surface area, it is no longer sufficient to simply protect the perimeter, but tools are required for policy-based access, secure end-user devices and to protect people from inadvertently accessing malicious websites or content.

The network is key to this, not only creating a zero-trust environment across your extended infrastructure but acting as a critical sensor, monitoring traffic and behaviour and alerting to abnormalities taking place.

This again changes how we think about support and managed services for our network. The worlds of network management and security are combining, and you need to ensure you are thinking secure network management.

Partnering For The New Era

All of these factors are redefining the role of the Managed Service Provider. Their expertise needs to extend beyond the network and embrace both security and hybrid cloud environments. Their focus can no longer be solely on availability, but the emphasis needs to be around meticulous monitoring and creating the insights that enable you to move your network forward.

The pace at which technology is advancing combined with the growing need for businesses to be more agile is driving organisations to look closely at the partnerships they have in place and ensuring that these partnerships are capable of taking the business where it needs to be.

At Thrive we are very proud of our expertise, tools and capabilities that help our clients to continually optimise and maximise their networks. We would love to talk to you about your specific challenges and explore ways that Thrive can augment your team in delivering a holistic managed service. Please do not hesitate to contact us on 01582 211530 or through our Contact Us page.

Run Flows Directly from SharePoint List/Library Using JSON Column Formatting

Good ol’ SharePoint and Power Automate. Two fantastic tools that power users and citizen developers use every day and seldom let us down. They have set the bar for Company Intranets and Business Enterprise Platforms. Continuously adding new features and enhancements. Ensuring all licensees are in the best of hands. As powerful as each is on its own, they are even more powerful together.

This post will cover triggering a flow directly from a SharePoint list or library, for selected items. This can be done using the default OOB Power Automate integration, or by adding custom JSON formatting to create buttons for specific items. I will cover both methods below:

First things first, create a flow with one of the following triggers:

For libraries:

For lists:

 

Pass in the following trigger parameters:

  • Site Address
  • List or Library Name

Using the OOB integration:

The list or library you entered in the flow trigger will automatically be displayed in the ribbon. To run it, do the following:

  • Select an item from the list or library.
  • In the ribbon, click the 3 dots (…).
  • Hover over Automate.
  • Select the flow name from the menu.
  • Select Run flow.
  • See screenshots below.

While the OOB method certainly gets the job done and is quicker to set up, it has its inconveniences and limitations. For instance, the number of steps or clicks it takes to run the flow can be a bit much for some users. Understandably so. Selecting an item, then selecting a button from the ribbon menu, then hovering over another button just to be able to select another button that appears, then followed up by one more button to select to run the flow. These days, the less screen navigating, and button clicks the users need to do, the better. That is where the next method has its benefits.

JSON Column Formatting:

This method allows columns to be formatted as a button associated with a specific item. The button will display within the item fields like the rest of the metadata and will open the panel with the Run flow button. Minimizing the amount of clicks a user needs to run the flow.

This method also allows the button to be styled as a link or any way you prefer. Using the JSON formatter. Another neat feature of this method is that you can use conditional formatting based off other columns. In the example below (see screenshot below), the button to run the flow is only visible for items that have an Assigned To. This makes sense for approval workflows. Not allowing approval workflows to be triggered if there is no assigned approver.

To access column formatting, do the following:

  • Click on the dropdown of the column you want to format.
  • Hover over Column settings.
  • Select Format this column.
  • See screenshot below.

To add custom JSON, do the following:

  • Select Advanced mode.
  • Paste in the code.
  • Select Save.
  • See screenshots below.

In my example above, to get the light-blue button with white text and have it show only on items when the Assigned To column is not empty, use the following code:

{
$schema”: “https://developer.microsoft.com/json-schemas/sp/v2/column-formatting.schema.json“,
“elmType“: “span”,
 “customRowAction”: {
“action”: “executeFlow”,
“actionParams”: “{\”id\”: \”546e42c3-23fc-41fa-950f-6f7331e7edce\”}”
},
“attributes”: {
“class”: “ms-fontColor-themePrimary ms-fontColor-themeDarker–hover”
},
“style”: {
 “border”: “none”,
“background-color”: “lightblue”,
 “color”: “white”,
“padding”: “5px”,
“border-radius”: “20px”,
“display”: {
 “operator”: “:”,
 “operands”: [
{
  “operator”: “==”,
  “operands”: [
“[$AssignedTo.email]”,
        “”
    ]
},
 “none”,
 “flex”
   ]
},
  “cursor”: “pointer”
},
“txtContent”
: “Notify Assigned To”
}

As a pointer for creating your own custom JSON, a neat little hack I find very useful is to use the design mode OOB conditional formatter to intuitively add rules and conditions. This generates JSON underneath, and that JSON can be used as a starting template for add your own customizations to. It is much easier to start with JSON that your SharePoint list already recognizes than it is to start from scratch or find solutions online that need to be completely restructured.

To accomplish this, do the following:

  • Select Manage rules.
  • Select the column to base your condition off.
  • Select the operator of the condition.
  • Enter the value the operator should look for.
  • Switch to Advanced Mode.
  • Copy out the code that was generated.
  • See screenshots.

That concludes the pot.

Cybersecurity: A Sound Investment in Your Firm’s Future

By Ian Bowell, Head of Information Security – EMEA

Cybersecurity is now in the direct line of sight for executive management and boards in the alternative asset industry.  C-level executives have the power to act and ensure the investment in their IT strategy. An effective cybersecurity program can protect infrastructure against severe threats and eliminate potential reputational damage caused by bad actors.

A company board is charged with guiding and challenging the company’s senior leaders.  The board is in the right position to focus on opportunities in long-term, versatile cybersecurity planning.  A short-sighted, narrow plan of action should be challenged in this ever-changing landscape.

Board members have a strategic role to play in guiding opportunities for expansion and change in response to threats as well as challenging long-held assumptions.

Relevant questions are:

  1. How are we responding right now to the threats affecting our industry?
  2. Where does the leadership team see the business in 2025?
  3. What can we do to move toward that vision?

However, it’s not so simple or complete. It’s a great step forward when top-level leadership is paying attention. There is still a lot to be done to quantify or address the risks in cybersecurity as well as demonstrate how an IT-based strategy can generate positive business outcomes. The investment is needed to raise the bar, and the wall, against the growing flow of vulnerabilities and opportunistic, well-planned hacking. Insider threat and exfiltration of data are other areas of concern with different indicators and protection tactics.

It’s great to recognize and identify the risk, but what should be done about it? What will happen if the board doesn’t act to fully eliminate or mitigate so many risks out there? There are two main approaches to evaluating cybersecurity requirements: maturity-based and risk-based and both are needed to function optimally.

Maturity-based approaches are great for a quick check across a very wide range of technical, and let’s not forget about physical, security challenges. Risk-based approaches are great for targeting specific prioritized areas, such as staff training, but one is not sufficient without the other.

Read more: Cybersecurity for a distributed workforce.

The maturity-based approach is necessary to cover all the ground and the risk-based approach can help prioritize the weakest areas, but both are needed to ensure a complete process. The maturity approach is useful when starting from scratch, or when facing a new environment, in need of assessment or update. The maturity approach also helps to feed the risk-based approach and roll up assessments across a company, enterprise, or organization with many entities, especially those recently acquired.

Often, a recent acquisition or series of acquisitions brings into focus the nature of cybersecurity as an investment risk, especially in the governance of ESG investors.  Here at Thrive Technology Group, we are partnering with our clients to help assess their cybersecurity risk and maturity ultimately leading to a positive impact on their investment portfolio.  Any firm in the alternative asset industry not sufficiently secure, and exploited by a cybersecurity attack, sees a significant market hit on the value of their company in the public and private markets. Thanks to mean reversion, this is also an opportunity for those ready to buy low and, subsequently, sell high, if the risk has been evaluated correctly.

Cybersecurity maturity changes over time, ideally improving from strategic planning by executive leadership and company boards.  The benefit of a cybersecurity training program or intrusion detection investment can jumpstart the path to a more secure future.  Thrive Technology Group is ready to take that first step with you in cybersecurity and be by your side for the journey.

Contact us to learn how you can succeed with Thrive.

Supporting An Agile, Hybrid Cloud Environment

You are likely to be on a journey to cloud with a roadmap to migrate to a hybrid environment that will see some equipment remaining on-premise, some elements moved to a private cloud and over time, increasing use of public cloud services and applications. The mix of this hybrid environment is set to change over time.  As you continue your journey, it is also critical that you have a Managed Service Provider that understands and can help you embrace the hybrid world.

During this transitionary time, a partner that understands both on-premises and cloud environments is invaluable. They can assist in the migration of infrastructure to cloud, are experienced at unifying the management of hybrid environments and can add considerable value in helping you understand what is possible and evaluate all of your available options.

Guiding You On Your Options

Along your journey to the cloud there are so many options available to you and it is vital you understand all of these and get help in making the right decisions. Do you create a private cloud environment?  What are the best options in terms of public cloud services and how do you manage those applications and servers that cannot move to cloud?

Impartial advice from a partner that has expertise across the whole hybrid world is key in truly understanding all of the choices and recognising that some options you take may just be an incremental step.

Simplifying The Public Cloud

Where there are many benefits from utilising a public cloud service, simplicity is probably not one. For many IT teams it is a challenge to understand all of the services that are available, how these work together, which ones are needed and which pricing model is applied.

In many cases, organisations find themselves paying too much for a public cloud environment that does not entirely meet their needs, not to mention the periodic ‘bill shock’ that can occur.

Getting help here can prove invaluable; accessing specific expertise around Azure or AWS can save you a great deal of time and ensures you get the service you need. Likewise, leveraging the expertise of a partner who understands public cloud can ensure you continue to optimise these services.

Taking Care of The Misfits

Not everything that currently sits in your comms room or on-premise data centre can be moved to the cloud. The challenge is, as you migrate more of your infrastructure you create a disproportionate cost to maintain the misfits.

Utilising co-location can prove to be an attractive option for these applications and you should be relying on your MSP to assist you with the migration to this environment and ongoing management until a point that these applications can move to cloud.

Creating Unified Management of a Hybrid World

The biggest challenge once you are in the hybrid world is consolidated management. Many organisations fail to see the full benefits of moving to the cloud as they don’t unify management and have the additional overhead of managing three environments: on-premises, private cloud and public cloud.

As each of your business-critical applications and the experiences they provide to end-users and customers likely spans across all parts of your hybrid world, ensuring these perform requires a holistic approach to operations. You need visibility and performance insights that spans the different clouds, security and access management that is consistent across clouds and a management framework across all environments.

This again points to the need to have in place a Managed Service Partner that is not focused solely on one specific environment but are truly experts in hybrid environments. Their focus should be on helping you seamlessly migrate across environments and to create next generation operations that holistically covers the hybrid world.

At Thrive we do exactly that; we have expertise in on-premises infrastructure, private cloud environments and public cloud services. We would love to talk to you about your specific challenges and explore how Thrive can provide you a more holistic managed service. Please do not hesitate to contact us on 01582 211530 or through our Contact Us page.

Thrive re-certifies in Cisco Advanced Security Architecture & Data Center Specialisation

Thrive is pleased to confirm we have re-certified in Cisco Advanced Security Architecture Specialisation and Data Center Specialisation in the UK.

This once again confirms our ability to provide sophisticated, value added Cisco solutions through our in-depth sales capabilities, technology skills and service offerings in the UK.

We invite you to find out more about Thrive’s security expertise and to arrange a free virtual security assessment.

Microsoft Ends Support for Older Outlook Versions – Upgrade Paths Available

In a Microsoft blog article published August 27, the software giant announced Outlook clients older than Outlook 2013 SP1 (with latest fixes) will be blocked from connecting to Microsoft 365 services after November 1, 2021.

“After November 1, 2021, only Outlook 2013 Service Pack 1 (with latest fixes) and later will be able to connect to Microsoft 365 services.”

This follows on from Microsoft ending support for older versions of Microsoft Office such as the once hugely popular version Office 2010, which ended October 13, 2020.

But what does this really mean?

Well, for organizations still running Outlook/Office version older than Office 2013 SP1 (with latest fixes), and with mailboxes in Office365/Exchange Online post-November 1, users will no longer be able to access their mailboxes via the Windows desktop client.

This highlights Microsoft’s commitment to securing access to the Office 365 platform, ensuring companies progressively upgrade their desktop software to later, more secure, and feature-rich versions.

For most organizations, whose mailboxes are in Office365/Exchange Online, typically a subscription covering the Office365 desktop application suite ensures users always have access to the latest version of applications.

Having a patching schedule and software life-cycle in place is crucial to maintaining IT Security. It’s worth noting that Microsoft no longer supports older versions of Office, but some smaller organizations without an internal IT department or a Managed Service Provider (MSP) to manage technology might not have a software life-cycle policy in place. And at the time of this article, Microsoft no longer supports Office versions earlier than Office 2013 15.0.4971.1000.

Read more: Mastering Microsoft Teams.

So, what next?

For those organizations who are using Office365/Exchange Online for mailbox hosting only, and using older and unsupported versions of Outlook/Office what upgrade paths are available?

Upgrade Path: Office 365 Subscription

A recommended solution would be to ensure employees whose mailboxes are in Office365/Exchange Online and require the Office desktops application suite are covered by a relevant Office365 subscription. This will ensure employees always have access to the latest version of the Office365 desktop applications. Including the latest features!

Upgrade Path: Retail Version

If an organization is running a retrial version older than Outlook/Office 2013 SP1 (with latest fixes), and for internal company reasons don’t want to upgrade to a more expensive Office 365 subscription, a retail version can be purchased. The latest retail version of Microsoft Office at the time of this article is Microsoft Office 2019.

Upgrade Path: Office 2013

If an organization is running Office 2013 and doesn’t want to upgrade to a more expensive Office365 subscription, ensuring the software is always updated to the latest version will prevent users from losing access to the mailboxes. But keep in mind that at the time of this article, Microsoft is ending support for Office 2013 on April 11, 2023.

Read more: Get to Know Microsoft’s New Office App.

Questions about Microsoft Office and your firm’s security? Contact us today to speak with our IT security experts.

Backup vs. Replication: Opposing or Complementary?

What is Veeam Backup? What is Veeam Replication? Which solution is best for your business and why? Let’s find out!

Veeam Backup & Replication is the foundation of the Veeam Platform, providing backup, recovery, and replication for your critical workloads including VMware, AWS, Microsoft Azure, Windows, Linux, enterprise apps, and much more. 

But why do you even need backup and replication, you might ask? Here’s why… 

The Achilles heel of information technology has always been the non-physical nature of data records. Electrons can disappear in startlingly large quantities in less than the blink of an eye. This can happen with a simple user error, by clicking on the wrong menu item for instance, or through sophisticated attacks such as ransomware, which encrypts your data, effectively scrambling it beyond recognition or usability — unless you pay to have it de-encrypted. Then there are natural disasters, like fires, floods, tornadoes, etc. Although, these latter threats are arguably more dangerous to physical files than they are to electronic data given the relative ease with which electronic data can be protected. That is why even before the modern information age, keeping backups of critical data has always been essential. 

Learn More on Thrive’s Disaster Recovery as a Service

What’s a Backup and how does it work?

A backup is a copy of a set of data or a full system that is made at a specific time and stored away, either on the business premises, at an offsite location, or in the cloud — or some mix of the three. A backup is time-bound. Even seconds after it is made, a backup will no longer represent the existing live data set, which is continuously changing. For many kinds of data, this isn’t a problem. Sometimes it is even an advantage. For instance, in the case of a ransomware attack where the entire data store has been compromised, having a clean backup of your data and systems taken from a point in time before the infection is the only way to recover from the attack.

A Veeam Backup makes a point-in-time archive of all the files, settings, snapshots, binaries, and configuration files that make up a virtual machine (VM) or system. This archive is stored in a single file (*.VBK) that is often compressed and deduplicated to save disk space. Completed backup files give the business a point in time from which to recover any files that are associated with a system or application. If backups are completed with regular frequency, they can be very effective at preventing data loss entirely and at recovering data in the event of accidental or purposeful deletion. Backup provides a very strong RPO (Recovery Point Objective) solution. Veeam also provides Veeam Cloud Connect, which enables the capability to make backup copies offsite to a Cloud Connect Service Provider to ensure offsite and ransomware protection for backups.

Get the latest Insights on Ransomware

What’s Replication and how does it work? 

Replication makes a copy of a running Insightsng virtual machine and then synchronizes updates from that running VM at regular intervals so that the replica is ready to run with the most current information should the need arise for a failover. The content of a replica changes with each new synchronization. Failover can take place very rapidly and often results in little to no downtime for the business and a very low RTO (Recovery Time Objective). 

In today’s virtual environments, where critical services such as e-commerce and supply chain are being provided to customers, or where automated manufacturing and smart processes generally rely on instantaneous access to changing data, the live nature of the data is critical. In case of a failure of a primary system, it is essential to have a failover to a redundant system that can immediately restore the service. In this case, more than the data is replicated. The virtual machines, as well as the underlying network, have to be replicated so that services accessing a given IP address will continue seamlessly. Again, the replication may be on the enterprise premises, in a physically distant alternate location, or in the cloud – or some mix of the three.

What are the differences? Backup vs. Replication  

Now that we have discussed the importance and the process of replicating and backing up your essential business systems and data, let’s talk about the differences between the two. When it comes to backup and replication, the most frequently asked question is – do you need one of these solutions, or do you need both? 

The two terms, Backup and Replication, are often used interchangeably, but they aren’t the same thing. Sometimes they are presented as alternative ways to protect your systems, as if you must choose one or the other. The thoroughness of the replication solution sometimes makes enterprises believe incorrectly that they can dispense with backups since there is always one or more replications of the live data store at any time. However, this misses the point that data that is corrupted or lost is also replicated in the failover system. If an employee hits the wrong key or a ransomware attack encrypts data in the primary system, it will be replicated through the redundant systems based on the replication frequency. Because of the trend towards Continuous Data Protection (CDP) and low recovery point objectives (RPO) for frequently replicated systems, it is also essential to have historical backups with longer RPOs. 

So, for most businesses Backup and Replication are both essential and you should employ them together to ensure that you have a full data protection and disaster recovery plan. What mix of replication and backup your business needs will depend on the nature of your data and the role it plays in your business. The required availability of systems and the budget you have for disaster recovery will also play a role in these decisions.  More critical and frequently changing systems will be stronger candidates to add replication, but will also add cost to the solution.  Options for failover may also exist to balance costs including both “Warm” and “Hot” (high availability) Disaster Recovery as a Service (DRaaS).  A good DRaaS provider will be able to provide a cost-effective solution to meet your managed disaster recovery requirements while ensuring that both replication and backup processes are provided to balance availability with data protection. 

Partner with Thrive for Veeam Backup, Recovery, and Replication Services. 

As businesses pursue digital transformation strategies that integrate data across their internal silos for end-to-end data-driven processes, they will have to consider replication for either partial or full failover scenarios, as well as complementary backup services. As your DRaaS partner, Thrive works with you to determine what mix of backup and replication makes the most sense for your business operations. We will help you to analyze the role that your data plays in your business and assess the cost of data loss vs. the cost of the disaster recovery effort. And, if your business needs it, we will design an appropriately scaled DRaaS solution to ensure that your essential services are restored and up and running before your customers have even noticed.

 

About Thrive

Thrive is a trusted global provider of comprehensive cloud, data protection, and security services.

Since 2001, Thrive has provided these robust and secure Managed Cloud and Disaster Recovery solutions from a scalable multi-tenant infrastructure, supported by our first-class in-house technical team. Thrive delivers highly flexible and responsive solutions with outstanding value and service, using state-of-the-art technology to offer ultimate protection and peace of mind.

We are driven to be your trusted partner and to ensure that we deliver a Thrive Experience that meets your business requirements with the reliability, scalability, and support that your business demands.

Have questions? Contact Us!


Endpoint Detection and Response Services: Why You Need Them

A cyber attack can take mere minutes, or even seconds, to compromise endpoints. In the face of these growing threats, current signature-based antivirus and anti-malware products can struggle to keep up.

Cyber security teams can no longer rely on first-generation endpoint detection and response (EDR) tools to respond to the fast pace of today’s threats. Aging EDR tools can also be difficult to maintain and drive up security operations costs. What is the answer? Every organization should have a signatureless endpoint security solution that protects servers and workstations from advanced threats.

Thrive’s Managed Endpoint Security and Response, powered by Fortinet’s FortiEDR platform, offers real-time, proactive security across all devices covering legacy and current operating systems. With the right EDR tool in place, organizations have the ability to prevent the theft of data and intrusion of ransomware, automating response and remediation procedures to give security teams a more effective, time-saving solution.

EDR: The Better Solution

Traditional antivirus tools may provide an alert during an attack, but it is often too late for security teams to react and prevent data theft or an intrusion. EDR tools such as FortiEDR use threat intelligence to monitor suspicious behavior, taking a proactive approach to cyber security.

An antivirus alert may help to an extent, but EDR tools such as FortiEDR provide the “why”, analyzing issues so a security team discovers the root cause of an attack. This allows security teams to track unwanted behavior from the initial incident all the way through remediation. FortiEDR also provides automated attack surface policy control that discovers rogue devices and reduces the attack surface through risk-based proactive policies.

FortiEDR’s next-generation antivirus (NGAV) uses machine learning capabilities to protect critical data and prevent breaches, ensuring business continuity even if a device is compromised. With threat protection both pre- and post-infection in real time, organizations have the capability to shut down entry points commonly used by hackers to compromise critical systems.

Thrive’s Endpoint Detection and Response Provides Peace of Mind

Thrive’s Managed Endpoint Detection and Response service offers proactive, real-time automated security with incident response across all devices covering current and legacy operating systems. If a suspicious event is detected, alerting is provided to Thrive’s Security Operations Center 24X7, so immediate remediation steps can be taken.

FortiEDR provides security analysts with detailed malware information pre- and post-infection, so analysts can take the required steps to secure the endpoints with minimal disruption to end users. The playbook-based system allows security teams to put in place a consistent incident response, using security resources only as needed. Instead of the entire team responding to potentially false alarms, automated, real-time incident response allows your entire security team to focus on isolating devices, terminating malicious processes, and deleting malicious files.

Thrive’s Managed Endpoint Security and Response services allow for business continuity if a hack or security event occurs. Keeping systems online and saving time and money, this service protects endpoints and critical data.

To learn more about Thrive’s EDR solutions, get in touch with our team today!

Thrive completes Cyber Essentials Plus certification

Thrive is delighted to now be Cyber Essentials Plus certified as part of the Government’s business cybersecurity initiative.

The certification process is a welcome opportunity for us to validate our approach to securing our own business information and that of our clients.

Whilst no security strategy can stop 100% of attacks, the aim is to mitigate the risk as much as possible from common threats and CE Plus certification demonstrates our commitment to doing just that. The time we take to ensure we are certified should also reassure our clients that we take cybersecurity seriously and provide confidence to our staff that they are working in a safe, secure, and compliant environment.

ONI Achieve MS Gold Competency in Communications and Project & Portfolio Management

Tuesday, 3rd August 2021, Luton. Thrive is pleased to announce that they have achieved MS Gold Competency in both Communications and Project & Portfolio Management.

With the competency recognition in Communications, Thrive has shown its ability to design, deploy and manage Unified Communications and Collaboration solutions based on MS Teams.

With the additional competency in Project & Portfolio Management, Thrive has demonstrated its ability to design, build and deploy enterprise-wide project management solutions based on Microsoft project solutions.

“This is a great accomplishment that we are pleased to have achieved. It enables us to offer a wider set of skills and services to our customers moving forward.” Commented Phil Cotterill, Sales Director, Thrive European Division.

With a rich heritage in providing unified communications and collaboration solutions, this accreditation enables Thrive to extend the solutions it delivers and manages to its customers across the full capabilities of MS Teams.

In a similar manner, Thrive is well versed in helping customers to manage complex projects and change programmes. This competency in Project & Portfolio Management enables the team to assist customers to leverage the full power of the Microsoft toolset.

“At Thrive we continually invest in skilling our people to ensure we provide a comprehensive range of services and solutions that align to the needs of our customers. These accreditations continue to demonstrate Thrive’s high degree of competence in the collaboration and project management space that has enabled us to deliver significant value to our customers over the past three decades,” said Cotterill.