Quick Intelligence

Helping you attain peace of mind by equipping you to make smart technology and business decisions

VR Blockchain Data.png

Advisory Services

We help CIOs and technology leaders with systems architecture, data-centre technology choices, data security, and data management.

Data Security: we offer security consulting, security as a service, DR as a service and breach management as a service.


Data Security

We offer security consulting, security as a service. DR as a service and breach management as a service


Datacenter Solutions

Qi sells state-of-the-art solutions, including enterprise storage and hyper-converged systems.


Data Management

Qi delivers data management solutions, ranging from data architecture to big data analytics


Please click above to watch the video

Qi Video: Terry Swaren on Hybrid Storage using Cloudian

Amazon web services can be addictive. It's easy to start with some applications development work, move on to running prototypes and then find your company in a situation where large production applications are running on Amazon. Costs can quickly spiral out of control, especially if data is flowing between Amazon and your own datacentre. It's also easy to end up in a situation where inappropriate data (e.g. sensitive information or archival data) is sitting out on the cloud.

Cloudian S3 object storage, a software-defined or appliance-based solution solves this problem by allowing you to migrate Amazon S3 storage from the cloud into your on-premises infrastructure or to other cloud providers (e.g. Microsoft Azure or Google Cloud Platform). Cloudian's storage is suitable for a wide number of applications, including big data, Internet of Things, data protection, media and entertainment, and data life-cycle management. Migrating S3 storage from Amazon Web Services to Cloudian storage allows you to drastically reduce costs and increase data security by running data intensive applications in-house. 


Please click above to watch the video

Qi Video: Candace Ramirez on Hybrid Storage using Pure Storage

Many of our client's have been mandated to adopt a "cloud first" strategy. One of the biggest challenges is the difference between cloud storage APIs and traditional on-prem storage. You may have to re-write parts of your application or leave some of it behind. If you choose the latter, you end up with killer ingress and egress charges. 

One of our partners, Pure Storage, has come up with an innovative hybrid cloud strategy that allows legacy apps to access cloud storage through the same API that is used for on-prem storage. You also get the benefit of Pure Storage's data de-duplication and compression algorithms to reduce your cloud footprint and save money in ingress/egress charges. 



Please click above to watch the video

Qi Video: Allan Kennedy on protecting data with DataStealth

DataStealth is a data protection platform that applies data protection policies to network traffic in real-time, on the fly. This new product fits several common use cases:

  • PCI Compliance

  • Obfuscation of sensitive data in test files and databases

  • Elimination of sensitive data in unstructured data (e.g. in incoming and outgoing email traffic)

  • Tokenization of sensitive data when in motion

  • Compliance with GDPR

From a technical perspective, DataStealth inspects network traffic at the packet level, extracts data that matches your Data Protection Policy, replaces the extracted data with substitutes to be sent downstream, and secures the original data using a unique secure storage methodology.

From a business perspective, DataStealth takes your organizations privacy, compliance, governance and regulatory requirements, and combines them with tokenization, anonymization and encryption technologies to create a Data Protection Policy, which is then applied to all network traffic passing through DataStealth.

The original data elements can be restored at any point in the future, but only for authorized users, and for authorized use cases.

The real data isn't transmitted or stored downstream of DataStealth. In the event of a network breach, there is no sensitive data for an intruder to steal. 


Please click above to watch video

Qi Video: David Millier on Breach Readiness

New Canadian privacy breach notification rules, similar to European rules, came into force on November 1, 2018


  • Do you have a breach identification process in place?

  • Do you have a breach tracking and recording system in place?

  • Do you have a breach communication plan in place?


The Qi Peace of Mind Data Life-cycle

At Qi, we practice a continuous life-cycle approach to protecting your data, whether we are helping you address data security, DR, data back-up or data quality.