The Loopster

Boldly inquisitive, cognitive, and highly intelligent—Loopsters are able to gather data, assess the information gathered, and react appropriately. Know What's Next!

blog featured image

Loop1 strengthens European operations with the acquisition of I.Tresor GmbH & Co. KG

Establishing its first offices in Germany and adding additional sales and technical resources to support a growing client base throughout Europe. The addition of I.Tresor to the European operations delivers on Loop1’s strategic plan to increase the depth and breadth of its European business and to drive new opportunities in the DACH region.

Loop1 strengthens European operations with the acquisition of I.Tresor GmbH & Co. KG Read More »

Loop1 achieves Cisco Select Partner status in the US, UK, and Singapore

Loop1 has successfully met all the authorization program requirements necessary to earn Cisco Select Partner designation status for its operations in the US, UK, and Singapore. This attainment marks an important milestone in Loop1’s global Cisco Partnership Roadmap, that will see the US, UK, and Singapore join the APJ operation at Premier Partner Status by the end of 2020.

Loop1 achieves Cisco Select Partner status in the US, UK, and Singapore Read More »

Loop1 blue logo loop1 white logo SolarWinds Elite Partner

Loop1 Systems Welcomes Kenson Network Engineering to the Loop1 Family

Loop1 Systems Welcomes Kenson Network Engineering to the Loop1 Family Austin, TX, [September 30, 2019] – Loop1 Systems, an Austin-based enterprise IT service organization, proudly announces the acquisition of Kenson, one of the U.K.’s most respected suppliers of network management tools, expertise, and support. Kenson has served the market for more than 15 years and

Loop1 Systems Welcomes Kenson Network Engineering to the Loop1 Family Read More »

Network Management

Keeping your network secure–a Q&A with our Loop1 Engineer

With the ever-present threat of a cyber attack, it’s important to maintain proper cybersecurity. Company networks are a common point of cyber attacks. Network security breaches primarily come from attacks from outside the network attempting to get in: hacking, phishing attacks, etc. But, according to the “2018 Data Breach Investigations” by Verison, network vulnerabilities can

Keeping your network secure–a Q&A with our Loop1 Engineer Read More »

Shopping Cart

No products in the cart.

No products in the cart.