News and Events

Tuesday, 15th September 2009

Technology In Management Ltd in collaboration with McAfee Inc. will be holding a Workshop on McAfee ePolicy Orchestrator (ePO).   We would like to invite you to this Free workshop which is being held at TIM’s Training Centre in Balzan, on Tuesday, 15th September 2009


McAfee ePolicy Orchestrator® 4.5

Extensible. Actionable. Enterprise-class.

McAfee ePolicy Orchestrator® 4.5 is the only enterprise-class, open platform to centrally manage security for systems, networks, data, and compliance solutions. With end-to-end visibility and powerful automations that slash incident response times, ePolicy Orchestrator dramatically strengthens protection and drives down the cost of managing security.

McAfee ePO 4.5 Highlights

McAfee ePO software is the industry’s most scalable security management platform, allowing organizations of all sizes to manage, from a single server, dozens of devices up to hundreds of thousands of devices.


McAfee ePO 4.5 software includes enhancements in the following areas:

  • Improved enterprise scalability with a new multi-tiered architecture that features load balancing, failover support, and multiple server awareness for improved policy management and reporting.
  • Enhanced Web-based, customizable interface with streamlined navigation and reporting enhancements to provide immediate visibility into the organization’s security posture. The enhanced interface is more intuitive and more powerful in delivering end-to-end visibility across the organization’s entire security environment.
  • Improved workflow and automation framework to help minimize vulnerabilities and save administrator time in completing common tasks. This framework can utilize the ePO software’s advanced tagging capability to automatically add protection to discovered systems. Administrators can also develop security policies to automate protection based on user profiles rather than merely by system or device (this is especially important for encryption and/or URL filtering capabilities). In addition, new help desk ticketing integration with HP OpenView and BMC Remedy automate workflow tasks and make security a transparent part of IT operations.


April 20, 2006

Technology In Management Ltd holds a 3 day Information Security workshop

If you use computers and the Internet, then, most probably have experienced some form or another of an electronic security breach.  We receive e-mails that try to entice us into some bogus investment, or a worm disguised as a “Love Letter” or other pleasures of the flesh.  After all we are all humans, and we all err…

 In a 3 day workshop organised by TIM Ltd., I.T. Managers got a good understanding of attackers’ tactics and strategies in detail, with hands-on experience in finding vulnerabilities and discovering intrusions, and equipping them with a comprehensive incident handling plan, turning the tables on computer attackers.

 The training was delivered by Mr. Mark Semmler, an experienced IT Security Expert from Germany, At an early age, Mark, developed a great passion for "Creative Research in IT Security" and has been working on this subject since 1990.

 Today, because of this vast collection of experiences and expertise, Mr. Semmler works as an independent IT security consultant all across Europe.  Among his clients, one can find financial institutions, airports, Corporate Organisations, and Government Agencies from all over Europe. Mr. Semmler is a licensed reviewer of the German seal of privacy for IT-products and privacy protection since August 2005.  Amongst the services offered by Mr. Semmler one can find :Security-Scans (checking the technical aspects of security by attacking them) Security-Assessments (checking organisational aspects of security) Auditing on ISO 17799 (Security checking on international standard) Computer-Forensic (Analysis on intrusions) Training for retailer and customers, High-Level Consulting (first-hand know-how with practical use)

 The event was held between the 5th and 7th April at Technology In Management Ltd. (TIM) Training Centre.  On completion the participants were presented with a certificate. 

For the event, a retrospective exhibition of 15 paintings by Justine Meli Bugeja adorned the walls of the premises. (

Due to the overwhelming demand two more sessions are being held between 12th and 16th June 2006.  An Advanced Course and more sessions are being planned for the near future.




Focus on IT compliance, optimization and security means a bright future for Centennial Software

Leading provider of IT discovery & endpoint security solutions featured in Sunday Times Microsoft TechTrack 100 for second year running

25/9/05 UK: Centennial Software has today been confirmed by the Sunday Times as one of the fastest-growing technology companies in the UK. This is the second year running that the company, which develops IT asset discovery and endpoint security solutions, has been featured in the Sunday Times Microsoft TechTrack 100.

Centennial Software is the only developer of asset discovery solutions to be featured in the league table, where it was placed 94th overall.

"To be featured in the Sunday Times TechTrack100 for two years in a row illustrates perfectly that Centennial Software's solutions are in tune with our customers' critical IT needs," said Andy Burton, CEO at Centennial Software. "While many companies are struggling with static IT budgets, increased compliance obligations and new security threats, our Discovery and DeviceWall solutions are actively helping to drive down the costs of IT and address major security risks facing the network.

" Centennial's Discovery solution provides key intelligence about the volume, type, usage and location of hardware and software on the network, helping organizations to identify where cost savings can be made by rationalizing purchasing, retiring unused assets, reducing software compliance and security risks. Discovery users can typically expect to lower their total IT spend by 20% or more within six months.

DeviceWall helps organizations address the key threats of identity theft, data loss and the propagation of malware by preventing unauthorized portable storage devices (including USB sticks, MP3 players, PDAs and smart phones) being connected to company PCs.

Burton continued: "Most companies can only dream of appearing in the Tech Track 100 once; the fact that we have been able to sustain a high level of growth shows that our solutions are closely aligned with the needs and issues that are closest to the hearts of IT directors and executives. It's very much a case that our success is a direct reflection of our customers' abilities to realize significant cost savings and operational benefits using our products."

Founded in 1997 by two ex-Novell engineers, Centennial Software is today headquartered in Swindon, Wiltshire, with international offices in the USA, Germany, Australia and South Africa.

~ Ends ~



Magic Version 8 Official Launch.

A complete service solution, Magic IT Service Support for the Small and Mid-sized Business combines best-in-class help desk software with core ITIL best practices, the industry standard framework for IT service delivery and support processes. Regardless of industry or size, successful organizations must deliver high-quality services that quickly adapt to changes in business climate. Growing mid-sized companies are under extreme pressure to reduce costs and expedite service. Magic IT Service Support helps to relieve that pressure by keeping your help desk informed, connected, and running smoothly.



McAfee, Inc. Announces Availability of Industry's First Anti-Virus Solution with Intrusion Prevention Capabilities.

Mr. Shmuel Antebi - Teritory Manager and Yaniv Alf -System's Engineer were in Malta to officially present the new McAfee VirusScan 8i and IntruShield. The event was held at the TIM offices in Balzan on the 10th November 2004. Two sessions were held during which the audience had the opportunity participate in the presentations.


If you would like to participate in our event, we can notify you. Simply send us an e-mail, informing us that you would like to joint our mailing list and we will gladly include you when we issue the invitations. These events are of inerest to Value-Added Resellers, Systems Integrators, Enterprise Integrators, Corporate Resellers, Consultants, Corporate clients, Government entities, Small Enterprise, etc., basically any organization or individual that is concerned in protecting his systems and data.