About Us:


Since 1997, EDI has been a value-added provider of high quality computer components, systems, servers, and computing solutions. Headquartered in Norcross, Georgia, EDI maintains a presence throughout the eastern United States and many European markets.

At EDI, we recognize that business policies and practices that serve the technology community provide an important business advantage, both for us and our customers. As a prominent distributor of computer components and white-box systems, we affect the communities where we do business. As such, we build quality relationships with clients and develop strong vendor alliances. For us, there are multiple benefits – better financial returns, increased opportunities, more efficient operations, higher employee motivation, and improved goodwill between us, our vendors, and our customers. For our customers, there is a triple bottom line – more efficient service, increased selection, and smart savings.

Leveraging our strengths (accelerated delivery time, affordable pricing, assorted purchase options, and exceptional customer service), we plan to improve product accessibility and affordability, provide innovative solutions, and continuously improve our service and products. To achieve this goal, EDI pursues an individual relationship with each customer and tailors services to meet each customer’s specific needs. By contributing to the success of our customers, we hope to stimulate the use of technology throughout a variety of industry sectors, including schools, government institutions, and corporations.

Thursday, July 27, 2017

Four ways to enhance your endpoint security

Four ways to enhance your endpoint security


Modern technology presents a potential security nightmare for IT. Ransomware attacks and well-publicized cases such as the loss of a laptop with sensitive data by a US Secret Service agent have highlighted the risks involved in defending critical assets against loss or theft.

With more data than ever being stored on mobile and other external devices, supported by ‘bring your own device’ (BYOD) policies, what features should IT decision-makers look for in ensuring suitable endpoint security solutions?

Full article here.