Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in IT If you're looking for quick tips on optimizing tech, managing suppliers, and growing a business, 20 Minutes Max is the space for you. Join me as I talk about things that come up during my day and share insights on taking your business to the next level. In less than 20 minutes, you'll walk away with actionable advice and strategies for success. Take advantage of this valuable re ...
…
continue reading

1
From Specs to Solutions: Avoiding Product Confusion and Focusing on Impact
6:18
6:18
Play later
Play later
Lists
Like
Liked
6:18Tired of getting lost in technical specs that don’t translate to real-world benefits? Let’s shift our perspective and focus on what technology can actually do for you. Understand how to match tech solutions to your daily challenges, not just the specs. Seen a product recently that perfectly matched its practical promise to your needs? *** Billions …
…
continue reading

1
Mastering Tech Sales: Addressing Pain Points, Selling Compliance, and Understanding Client Needs
11:53
11:53
Play later
Play later
Lists
Like
Liked
11:53Understand how to stop pushing products and start solving real client pain points and compliance needs. This deep dive into strategic selling is a game-changer for anyone in the tech industry. What selling strategies have worked best for you? Drop a comment below and let's discuss successful tech sales tactics! *** Billions & Billions of eyeballs, …
…
continue reading

1
Optimizing Security Strategies: Balancing Defense Layers, Navigating Microsoft E5, MDR & SIEM Costs
8:14
8:14
Play later
Play later
Lists
Like
Liked
8:14Maximizing your security stack while navigating costs can be a challenge, especially with Microsoft E5, MDR, and SIEM. It's not just about turning on features—there's configuration, licensing, and hidden costs involved that could impact your business. Are you really getting the best value from your security investments? Take a closer look at how to…
…
continue reading

1
Building Strong Cybersecurity: ITBroker’s Role, Preparing for Insurance and Meeting Rising Standards
6:55
6:55
Play later
Play later
Lists
Like
Liked
6:55Cyber insurance isn’t just a checkbox anymore—it’s becoming a critical part of your business security strategy. As insurance requirements tighten, now’s the time to ensure your cybersecurity posture meets rising standards. From identity management to email gateways, the right tools can lower premiums and protect your business from costly breaches. …
…
continue reading

1
Choosing Secure Email Solutions: Balancing Licensing, Cyber Insurance Needs and Gateway Protection
5:37
5:37
Play later
Play later
Lists
Like
Liked
5:37Unlock stronger email security without breaking the bank! When balancing licensing, cyber insurance, and gateway protection, secure email gateways are becoming a must-have for businesses. If you're not using one yet, your cyber insurance might already require it. Protect your email, reduce risks, and ensure compliance without adding significant cos…
…
continue reading

1
A Big Secret in IT Projects: 9 Out of 10 Times the Decision Has Already Been Made for You
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41Achieving success in IT projects isn’t about starting from scratch—it’s about building on what you already have. By aligning your goals with your current systems, you can save time, reduce costs, and avoid common pitfalls. Understanding how your business operates and utilizing existing resources is the foundation of every successful project. What s…
…
continue reading

1
In IT(Information Technology) More is Less
14:08
14:08
Play later
Play later
Lists
Like
Liked
14:08In IT, more is less. Let's discuss three examples that prove doubling your resources doesn’t mean double efficiency—it often means more complexity. 💡 Before you add to your setup, take a step back and rethink if that extra layer is really necessary. Have you found that sometimes less really is more? Share your thoughts in the comments👇 👇 You can al…
…
continue reading

1
Optimizing IT Spend: Navigating Cloud DataCosts, Effective Budgeting and AWS Discounts
26:57
26:57
Play later
Play later
Lists
Like
Liked
26:57Unlock serious savings on your AWS spend—without the guesswork. If your cloud costs are climbing, you need the right strategy to control and reduce them. I’m Max Clark, and I’m diving into real-world solutions for companies spending millions on AWS each month. Let’s talk tagging, budget alignment, and making business decisions that truly impact you…
…
continue reading

1
Leveraging CSPs for IT Efficiency: Managing Admin Access, Password Resets, and Cloud Complexities
6:58
6:58
Play later
Play later
Lists
Like
Liked
6:58Imagine your IT team dedicating their time to innovation instead of routine tasks like password resets. A Cloud Service Provider (CSP) can handle it all—from admin access to cloud complexities—freeing your team to focus on business growth. CSPs take care of everything from migrations to daily IT maintenance, so your resources are better spent. How …
…
continue reading

1
Microsoft Teams Did Something Amazing Few Talk About
8:38
8:38
Play later
Play later
Lists
Like
Liked
8:38Experience seamless communication with Microsoft Teams' unified software stack. Enjoy consistent interfaces across all devices, enhancing productivity and ease of use. Share your thoughts on Microsoft Teams in the comments!👇👇👇 *** Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ decades in I.T. If…
…
continue reading

1
This Might Shock You: Indefinite Data Retention on Free Accounts Like Slack Can Be a Legal Risk!
7:54
7:54
Play later
Play later
Lists
Like
Liked
7:54The Danger of Indefinite Data Storage: Avoid Legal Hassles Using platforms with indefinite data storage like free versions of Slack can be risky. In the event of a lawsuit, you'll need to upgrade to access old data, costing you time and money. Solution: Opt for a plan that only stores data for a year, automatically applying retention policies. This…
…
continue reading

1
Don’t Settle for Less When ITBroker.com Can Match You with the Best from 595 Top IT Suppliers
10:13
10:13
Play later
Play later
Lists
Like
Liked
10:13Need help finding the Right IT Service Provider? Here's the Solution! At ITBroker.com, we've built a comprehensive database to understand the subtle differences between providers. This allows us to match your company with the right IT services based on industry, geography, size, technology integrations, and maturity. Whether you're a large enterpri…
…
continue reading

1
Most IT Engineers Say Build over Buy—But I 100% Disagree. Here’s Why
5:43
5:43
Play later
Play later
Lists
Like
Liked
5:43Struggling with the classic buy vs. build dilemma? Engineers often lean towards building for control and customization, but is it always the best choice? Discover the key factors to consider for your next project. Share your thoughts below👇 👇 *** Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of lessons learned over 2+ de…
…
continue reading

1
Are You Struggling with IT Security and Access? Discover SD-WAN, SSE, and SASE Solutions
15:28
15:28
Play later
Play later
Lists
Like
Liked
15:28Struggling with a complex security stack? Meet SSE and SASE: The Cloud-Delivered Solution! Traditional security functions are cumbersome and inefficient. Secure Service Edge (SSE) modernizes them into cloud-delivered applications like Secure Web Gateway, ZTNA, CASB, and Firewall as a Service. But what about seamless access? That's where SASE comes …
…
continue reading

1
A Business Leader's Guide to Navigating SD-WAN, SSE, and SASE
17:34
17:34
Play later
Play later
Lists
Like
Liked
17:34This detailed discussion touches on the evolution of networking, particularly the transition from traditional methods to modern solutions like SD-WAN, SSE, and SASE. The key takeaway is that understanding these modern technologies can help businesses navigate the complexities of networking and optimize their infrastructure for better performance an…
…
continue reading

1
Why Firewalls Aren't as Essential as They Were 25 Years Ago
12:42
12:42
Play later
Play later
Lists
Like
Liked
12:42Are Big Firewalls Still Essential in Modern Offices? Discover why firewalls aren't as critical as they were 25 years ago in today's cloud-based environments. Learn about the changes in network address translation, policy enforcement, and VPN needs for modern enterprises. Has your office shifted away from traditional firewall use? Share your thought…
…
continue reading

1
Shopping for Office Space? Skip Buildings with a Managed Riser Company!
7:02
7:02
Play later
Play later
Lists
Like
Liked
7:02Choosing the right office space is crucial for your business. Managed riser companies, while intended to help, can cause more problems than they solve. They often lead to tangled telecom setups and increased costs. These companies manage the building’s telecom risers, which can become cluttered and outdated. This results in higher fees and complex …
…
continue reading

1
When The Security Director Knows He's There to Take the Fall!
12:30
12:30
Play later
Play later
Lists
Like
Liked
12:30In the fast-paced world of tech, SecOps teams are essential for maintaining security and operations. Yet, when executive leaders withhold necessary support, the heads of these teams face a daunting reality. Without the resources they need, it's only a matter of time before a cybersecurity breach occurs, potentially making them the scapegoats for la…
…
continue reading

1
Say Goodbye to Endless Tech Debates Once and for All
6:31
6:31
Play later
Play later
Lists
Like
Liked
6:31Are you stuck in endless debates about which tech tools to use? This constant back-and-forth can waste valuable time and energy. Instead, the first question you should be asking is: should you even be doing it in the first place? Does this actually benefit the business? Watch the full episode to learn how to evaluate tools based on their actual imp…
…
continue reading

1
Don't Miss Out on 25 Years of Expertise in Choosing Top Data Centers
14:21
14:21
Play later
Play later
Lists
Like
Liked
14:21Struggling with choosing the right data center location for your business? Location is more than just a spot for your servers; it's a strategic asset! Proximity can save your team valuable time and resources, but distance can also mean lower costs and other benefits. Weighing these trade-offs is essential for maximizing efficiency and gaining a com…
…
continue reading

1
Some Companies Save $12M a Year with Baremetal! How Much Can Yours?
13:12
13:12
Play later
Play later
Lists
Like
Liked
13:12Is your company overspending on Amazon Web Services (AWS)? Discover how some businesses save $12 million annually by switching to Bare Metal servers! Learn how to optimize your infrastructure and extend your runway. Comment below to find out how much you can save 👇👇👇 *** Billions & Billions of eyeballs, six continents, 10k+ servers, and plenty of l…
…
continue reading

1
Ubiquity vs. Meraki: Which Network Solution Fits Your Business?
8:59
8:59
Play later
Play later
Lists
Like
Liked
8:59Finding the right network solution can be a challenge. While Ubiquiti offers reliable performance at a lower cost, other brands like Ruckus, Meraki, and Aruba excel in specific areas like antenna design, device handoff, and advanced switch control. If you're looking for a budget-friendly option and can compromise on some features, Ubiquiti is your …
…
continue reading

1
How to Find Shadow IT and Uncover Unknown Apps in Your Organization
6:12
6:12
Play later
Play later
Lists
Like
Liked
6:12CEOs, are you aware of the unknown apps your employees might be using? Hidden tools can pose significant risks to your business, from compliance issues to security threats. Here's the solution: start with asset and vulnerability management to identify all installed applications. Leverage SaaS tools and secure web gateways with CASB functionality to…
…
continue reading

1
Protecting Your Business: Preventing CircleCI Cybersecurity Breaches
14:37
14:37
Play later
Play later
Lists
Like
Liked
14:37CircleCI, a leading continuous integration and deployment (CI/CD) platform, faced a breach detected by a vigilant customer, involving compromised tokens. This incident underscores the critical need for robust security measures. Tune in to our latest episode to discover how CircleCI could have prevented this breach, its impact on stakeholders, and h…
…
continue reading

1
Discover Why SASE is the Ultimate Upgrade from Secure Service Edge
12:19
12:19
Play later
Play later
Lists
Like
Liked
12:19Explore how Secure Service Edge (SSE) and Secure Access Service Edge (SASE) revolutionize your network security! Let’s discuss the key differences and benefits, highlighting why SASE might be your next big move for seamless, secure connectivity. Tune in to learn more and share your thoughts in the comments 👇 *** Billions & Billions of eyeballs, six…
…
continue reading

1
You're Moving to Bare Metal or Colocation Wrong When You Shoot for the Moon, Here's Why
4:25
4:25
Play later
Play later
Lists
Like
Liked
4:25Discover why striving for top-tier hardware in your bare metal or colocation setup can derail your project with excessive costs. Learn the smarter way to transition from AWS to Bare Metal and save big. Share your thoughts and experiences in the comments below👇 You can also listen on your favorite podcast: *** Billions & Billions of eyeballs, six co…
…
continue reading

1
Discover the Secret to Successfully Buying IT Services: 25 Years of Experience
7:46
7:46
Play later
Play later
Lists
Like
Liked
7:46Are you facing challenges when buying IT services? In this episode, I'll share 25 years of experience to help you navigate the process with ease. Discover how to identify your business needs, narrow down options, evaluate quality, and master costs. I'll guide you to successful IT service acquisition. Comment below with your biggest IT service chall…
…
continue reading

1
Make Cybersecurity a Hassle for Hackers, Not for You.
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Facing a cybersecurity incident can be a game-changer for any business. How prepared are you to handle a breach? Tune in to discuss the critical steps to prevent future incidents and the importance of layering people, processes, and tools. Begin your cybersecurity journey by reviewing and adhering to your cyber insurance policy requirements. This w…
…
continue reading

1
If You Want to Thrive in Business, You Have to Make Things Easier for Your Clients
4:15
4:15
Play later
Play later
Lists
Like
Liked
4:15Struggling to stand out in business? Simplify your client interactions! Identify how you're making life easier for your clients. If you can't easily explain it, it's time to reevaluate your approach. Clear communication enhances understanding and showcases your value. What are you doing to simplify things for your clients? Share your thoughts in th…
…
continue reading

1
Choosing Your Internet: Broadband, Dedicated Fiber, Fixed Wireless, or Satellite—Which Is Best for You?
12:13
12:13
Play later
Play later
Lists
Like
Liked
12:13Struggling to choose the best internet service for your business? From broadband to dedicated fiber, fixed wireless, and satellite, the options can be overwhelming. The key is understanding what you're actually getting. Broadband might seem attractive, but is it fiber or DSL? Fiber offers higher bandwidth and symmetrical speeds, while DSL is slower…
…
continue reading

1
What Every CEO Ought to Know About Telecom Provisioning!
18:35
18:35
Play later
Play later
Lists
Like
Liked
18:35Beware of misleading telecom provisioning timelines! If a salesperson promises a 25-day circuit installation, they're not being truthful. Once you sign the order, they move on, leaving you waiting. The reality is that installation dates can't be guaranteed. In fact, make sure you advise the executive leaders that Just the legal negotiations before …
…
continue reading

1
Paying Too Much for Network Bandwidth? Why You Should Choose Burst Over Flat Rate Circuits
8:12
8:12
Play later
Play later
Lists
Like
Liked
8:12Tired of high network bandwidth costs? Burstable billing could be your solution. This method measures bandwidth based on peak use, allowing you to exceed a specified threshold for brief periods without the financial penalty of purchasing a higher committed information rate (CIR) from an ISP. Most ISPs use a five-minute sampling and 95% usage when c…
…
continue reading

1
What Nobody Tells You About Right of First Refusal in Data Center Deals!
5:55
5:55
Play later
Play later
Lists
Like
Liked
5:55A Right of First Refusal (ROFR) lets you match any offer on an asset before it’s sold to someone else. Though it sounds beneficial, data center licenses often lead to more headaches than advantages. What are the real drawbacks of ROFR? Let's dive into the key issues and uncover why ROFR might not be the best choice. Share your thoughts on ROFRs in …
…
continue reading

1
What Does a Data Center's REIT Status Mean for You? Find Out Here!
8:37
8:37
Play later
Play later
Lists
Like
Liked
8:37Ever wondered what a data center's REIT status means for its tech offerings? If a data center provider operates as a REIT, they're restricted to earning no more than 1% of their gross income from non-real estate assets like bare metal services. That means despite boasting top-tier hardware capabilities, they're limited to a tiny fraction of potenti…
…
continue reading

1
Exposing the Two Most Hostile Contract Clauses I've Encountered!
12:39
12:39
Play later
Play later
Lists
Like
Liked
12:39Unveiling the Truth About Hostile Contract Clauses and How to Navigate Them! Navigating contract negotiations can be a minefield, especially with less-than-fair clauses. Example 1: Imagine your contract is nearing its end, and you’re negotiating a month-to-month extension. Suddenly, your provider states that they will discontinue services immediate…
…
continue reading

1
My Big Mistake: Stop Debating the Communication Tool—It's Your Approach That's the Real Issue"
10:00
10:00
Play later
Play later
Lists
Like
Liked
10:00Are you tired of ineffective asynchronous messaging? The real solution is to focus on aligning communication types with the right tools. Whether it's Slack, Teams, or any other platform, prioritize the message's purpose over urgency. How do you manage your communication tools effectively? Share your strategies in the comments! *** Billions & Billio…
…
continue reading

1
Here’s How to Find a Good MSP or Computer Consultant if You’re a Small Business a
10:29
10:29
Play later
Play later
Lists
Like
Liked
10:29Struggling to find a top-notch MSP for your small biz? The real secret lies in understanding their approach to standardization and scale. Top MSPs often avoid small clients because the amount of revenue that can be captured from a really small business as a client is the same amount of energy and work as if they were just going upmarket. They still…
…
continue reading

1
The Ultimate Guide to Contract Negotiations in IT!
13:33
13:33
Play later
Play later
Lists
Like
Liked
13:33Navigating IT service contracts can be daunting, but tune in for insider tips to ensure you're not only selecting the right technology but also mastering the negotiation terms. Struggling with rigid service agreements or unexpected auto-renewals? Let’s reveal how to leverage standard addendums and secret phrases to secure favorable terms, ensuring …
…
continue reading

1
What Most CEOs Don’t Realize About Having a Lengthy Vendor Onboarding Process!
5:38
5:38
Play later
Play later
Lists
Like
Liked
5:38A lengthy vendor onboarding process can cripple your teams, leaving them unable to act effectively. When it takes a long time to onboard a vendor, projects stall, and new vendors are often rejected due to procurement resistance. This delay forces you to rely on existing vendors, limiting your options and slowing growth. Solution: Streamline your on…
…
continue reading

1
Struggling with Corporate Culture? The Power of Core Behaviors in Building a High-Trust Workplace
5:10
5:10
Play later
Play later
Lists
Like
Liked
5:10Feeling lost in your corporate culture? Building a high-trust workplace starts with core behaviors that prioritize trust, support, and accountability. Embracing a blameless culture allows room for innovation and growth without fear of repercussion. Foster an environment where trust is the foundation, enabling employees to experiment, learn, and thr…
…
continue reading

1
One of the Most Shocking Things I've Ever Seen a CEO Do in a Company
10:06
10:06
Play later
Play later
Lists
Like
Liked
10:06A significant credit card fraud issue emerged, and the CEO's response was shocking. Instead of enhancing verification for valid transactions, they disabled address verification to artificially boost revenue. This shady decision led to a surge in fake transactions and chargebacks, severely compromising the company's integrity and resulting in substa…
…
continue reading

1
My Honest, Unfiltered Thoughts About Big Firewalls!
13:44
13:44
Play later
Play later
Lists
Like
Liked
13:44Thinking of investing in a big, traditional firewall? Before you commit, consider the full impact: ongoing maintenance, complex updates, and costly support. Especially if you're managing multiple sites, the logistics alone can be a nightmare. Why not explore smarter alternatives? Virtual and cloud-based firewalls offer flexibility, easier managemen…
…
continue reading

1
Revealing How We Evaluate New Data Center Providers for Our Portfolio
12:33
12:33
Play later
Play later
Lists
Like
Liked
12:33Tune in as we navigate the intricate process of evaluating and integrating new data center providers into our portfolio. From geographic advantages to historical operator trends, discover what makes a data center stand out in competitive markets like Los Angeles. What do you think are the most critical factors when choosing a data center provider? …
…
continue reading

1
How to Choose the Perfect Service Provider for Your Business Size
4:56
4:56
Play later
Play later
Lists
Like
Liked
4:56Finding the Right Service Provider for Your Company Size Can Be Tricky! Tune in to learn how matching service providers with businesses based on size and structure can optimize your operations. Getting the right fit matters to avoid bureaucracy and enhance efficiency, whether you're a small business or a large enterprise. Small business or global g…
…
continue reading

1
How 95th Percentile Billing Reduces Bandwidth Costs: Is It Available From Your Provider?
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Are you familiar with 95th-percentile billing? This innovative billing structure allows you to order and install a circuit with a higher capacity than you typically use, making it ideal for backbone engineering or high-capacity data centers. Every 5 minutes, your bandwidth usage is sampled, and at the end of the month, the top 5% of your highest us…
…
continue reading

1
Are Your Emails Getting Blocked? Here’s How to Guarantee Delivery!
11:54
11:54
Play later
Play later
Lists
Like
Liked
11:54Struggling with email blocks? Boost your delivery rates now. Did you know that sending high volume of emails can land you in a digital penalty box unless you follow certain protocols? Ensuring your emails have SPF, DKIM, and DMARC configurations is crucial to avoid rejection. But don't worry, you might already be covered if you use a reputable emai…
…
continue reading

1
Which Tech Giant to Trust? Navigating Choices Between HPE, Juniper, Broadcom, and Beyond
6:30
6:30
Play later
Play later
Lists
Like
Liked
6:30As Hewlett Packard Enterprise (HPE) merges with Juniper Networks and Broadcom takes over VMware, the ground of the technology sector is shifting dramatically. This merger not only signifies HPE's ambition to boost its networking capabilities with Juniper's top-notch routing solutions but also marks Broadcom's strategic move into the realm of cloud …
…
continue reading

1
Is Your Microsoft E5 Security Expert Truly Qualified? Find Out on Our Podcast!
12:59
12:59
Play later
Play later
Lists
Like
Liked
12:59Are you navigating the complex terrain of Microsoft E5 Security for your Microsoft 365 Enterprise? Boasting tools like EDR, email filtering, and the SIEM platform, E5 is a cornerstone for fortifying your security posture. But here's where caution is key: the market is awash with so-called 'E5 Security Experts.' Distinguishing the genuine experts fr…
…
continue reading

1
Navigating the SASE (Secure Access Service Edge) Landscape for First-Time Adopters
11:14
11:14
Play later
Play later
Lists
Like
Liked
11:14Diving deep into SASE providers left us shocked—so many promise much but deliver little. Tune in to learn the spicy truth: While SASE (Secure Access Service Edge) is the future, blending essential cybersecurity tools like SD-WAN and cloud-based firewalls, finding a provider who doesn't fall short is a rare gem. The landscape is littered with option…
…
continue reading

1
Struggling with Slow and Costly Internet for Your Business? Discover the POP within a Data Center Secret!
10:11
10:11
Play later
Play later
Lists
Like
Liked
10:11Do you need help with slow internet at your business? Let’s discover how to unlock high-fast speeds with a POP (Point-of-Presence) within a Data Center solution. Say goodbye to the frustration of outdated connections and hello to 10—or 100-gig service for any building, whether an office or a warehouse. From LTE to satellite, learn about high-speed …
…
continue reading