Welcome to our Blog

The Post

Read our Blog

Crossmatch and Accordant Technology Partnership to Bring DigitalPersona Authentication Software to Clients

New partnership delivers mobility, security and virtualization solutions to healthcare, financial services, and retail customers.

Crossmatch®, a globally-recognized leader in biometric identity management and secure authentication solutions and Accordant Technology, Inc., today announced a strategic partnership to offer advanced authentication to enterprise customers.

Accordant Technology will be an authorized reseller offering Crossmatch’s state-of-the-art DigitalPersona® software to its base of customers. Accordant specializes in helping organizations get the most out of their mobility and virtualization solutions. Security is a necessary component of both core technology areas.

“Virtualization is enabling organizations to better centralize control of their data and manage their devices,” says Anthony Graziano, Director of North American Channel Sales for Crossmatch. “But what can’t be overlooked is assuring the identity of the user at the far end. We’re excited about Accordant’s reach and expertise with security, mobility, everything is the Citrix domain, and now multifactor authentication with DigitalPersona.”

DigitalPersona is a comprehensive, integrated authentication solution that secures disparate applications and systems using a common administration and authentication interface. It provides for the security of all IT assets on-premises, in the cloud or some combination in between.

“Digital transformation is pushing an ‘access to everything mentality.’ One of Accordant’s key strengths is helping our customers secure their entire business from anywhere, at any time, and through any device. Crossmatch DigitalPersona gives us the advantage of truly being able to deliver on securing digital assets and people against the threat of identity compromise and inappropriate use,” says Tim Tyler; CEO.

Crossmatch’s Composite Authentication solution transcends 2FA and MFA offerings by delivering an optimal mix of factors enabling risk-based authentication policies that adapt to dynamic threat environments and increasingly complex IT environments.

About Accordant Technology

Accordant Technology is changing the way businesses leverage technology by focusing on the user experience and business outcomes. Accordant delivers secure virtual workspaces and cloud-based solutions with a commitment to providing 5 Star user experiences tailored to clients’ objectives.

Accordant application virtualization and hosting consultants and engineers use industry leading products and best practices to ensure seamless end user experiences. Strategically, Accordant stands at the crossroads of leadership, business and technology. We are committed to ensuring clients, users, partners and employees experience the best of all three. For more information, read Accordant’s blog: http://accordanttechnology.com/blog/

About Crossmatch

Crossmatch® solutions solve security and identity management challenges for hundreds of millions of users around the world. Our proven DigitalPersona® Composite Authentication solution is designed to provide the optimal set of authentication factors to meet today’s unique risk requirements and afford complete enterprise authentication coverage. Crossmatch identity management solutions include trusted biometric identity management hardware and software that deliver the highest quality and performance required for critical applications. Our solutions support the financial, retail, commercial, government, law enforcement and military markets. With 300 employees and customers in more than 80 countries, Crossmatch sets the standard for innovation and reliability. Learn more: Crossmatch.com


Biometric Identity Management and MFA

Identity and access management, often referred to as IAM, is about defining and managing the access privileges and roles of certain network users, as well as the reasons users are granted (or denied) those privileges. The main purpose of the IAM system is to create one identity per person. Once the digital identity is created, it is maintained, monitored and modified through the user’s access lifecycle.

Now, the use of biometric identity management has been created, making the ability to monitor and manage access to certain parts of a business or even files and documents easier.

Common Uses for Biometric Identity Management

Some of the most common ways this technology is used today include:

  • Logical and physical access control (i.e. unlocking doors, weapon safety, logging into or out of accounts, etc.)
  • National security and surveillance
  • Forensics and investigations at crime scenes
  • Identification and authentication for payments cards, ATMs, kiosks, POS and more
  • Criminal identification and enrollment
  • Biometric passports, background checks, verification, identification, civil enrollment and national ID

These are just a few of the ways that this technology is used today. However, it isn’t the only high-tech method of protection information, physical property and other things.

Introducing MFA

MFA, or multi-factor authentication, is a process used by an individual or computer to prove identity and gain access to data or information using several authentication methods.

A multi-factor application is created by combining several pieces of evidence from different categories into some type of authentication mechanism. The identification items include:

  • Biometrics (i.e. your fingerprint or retina)
  • A token or smartcard
  • A password

This multi-layer approach to security help prevent hackers and attackers from gaining access to sensitive information or locations.

Use of MFA Today

There are currently countless websites utilizing MFA to protect customers. One example is Instagram, which released an MFA process, which allows users to receive a code via text that they have enter to gain access to their account.

The Benefits of Biometrics and MFA Used Together

By combining “something you are” (biometrics) with “something you have” (tokens and smartcards) and with “something you know” (pins and passwords), you can feel confident that it’s going to be virtually impossible for your portals and data to be breached and reached by unauthorized users.


The Rise of the Mobile Workforce: Are You Ready?

When it comes to workplace transformation, Citrix estimates that the number of companies enabling a mobile workforce will rise to 70% by the year 2020. Don’t get left behind in the race for digital transformation! Provide a simple, secure workspace for everyone on your team the right business technology, consulting, systems integration, and support.

Employees and remote team members need to be able to access critical documents and resources from any device, at any time. The virtualization and cloud solutions market is bustling with options, but only a select few allow for true flexibility for mobile workforces while protecting sensitive business information.

Implementing VDI and cloud solutions does not begin with planning and end with implementation. A 5 Star user experience with virtual workspaces and cloud solutions includes support, fulfillment, and customer satisfaction. When considering options for mobile workforce solutions, keep these processes in mind and ensure that you’re working with a team who understands the importance of access during these critical business periods:

  • Employee or Freelancer On-Boarding
  • Role and Title Changes
  • Off-Boarding or Project Removal

New employees should be able to be productive from day one without a significant investment from the IT team, and securing company or project information should be as easy as flipping a switch upon separation of an employee or the finalization of a project.

When selecting an enterprise VDI consultant, make sure they work with only the best-of-breed technology solutions, complete with support and service.

When considering a virtualization platform, security safeguards becomes a priority. Each new device and each new team member has the potential to weaken the perimeter as the cybersecurity threats expand. With so many devices and people accessing the network, the strategies to mitigate these risks must be in place from the beginning.

Secure application access management is critical for your organization, and malware is no longer a distant threat, with ransomware reigning supreme with phishing attacks and malicious document attacks. WannaCry and Petya attacks brought malware into the headlines, making cybersecurity a priority for today’s CIO and IT teams.

Policies are the key to security within your organization’s mobile workforce platform. An experienced virtualization expert can help you set up policies and guidelines in all of the following areas:

  • Device Policies: Define the make, model, and approved operating systems
  • Access: The team members who will be given access to remote workplace options
  • Compliance: Requirements and actions if violations occur
  • Security: Define applications and data for company monitoring purposes

Managing Storage
Along with proactively managing cybersecurity threats, today’s enterprise organization must also consider secure storage and backup options. Physical, in-house data storage centers are on the decline, as many organizations are turning to the cloud to house data. The cost of archiving all of this data in-house is becoming prohibitive, as it requires significant investments in hardware and software and time investments from the IT team.Cloud hosting and virtual servers are the primary sources of storage for virtualization platforms. In addition to files, these hosting options also give organizations access to memory and network bandwidth and connectivity to remote applications.

When implementing a new VDI solution, it’s important to ask about updates and bug fixes. Lack of proper support and maintenance can lead to network vulnerabilities, but the right IT consulting team will have support and maintenance processes in place.

In summary, when considering a platform to support a modern, mobile workforce, make sure your IT consulting team addresses simplicity, security, and storage.

Exciting things are happening at Accordant!

I could not be more excited about what’s been happening in 2018! First, let me sincerely thank you for entrusting your business to Accordant. There is no way we could do what we do and have the awesome experiences we have without you. I am truly thankful for you.

2017 was a tremendous year of change for Accordant. We’ve implemented some needed adjustments to continue to position us as a vibrant and strategic presence in our market. That included restructuring our team, allowing us to recruit more top talent in our market. Top talent delivers 5 Star User Experiences, so the reward made the challenges worth it.

Concurrently we have added 2 strategic partners to strengthen our position in End-User Computing (EUC). Included in those additions are:

  • Crossmatch for biometric-based user identification management & multi-factor authentication, and
  • Recorded Future for threat intelligence

These partners all help us to continue to bring best-of-breed solutions to our VM Stack.

Not less importantly, we have released “Accordant Insight”, our new Managed Services for the Virtual Workspace. Managing day-to-day of virtual workspaces can prove challenging. Not anymore. Accordant Insight is a holistic managed service delivering proactive monitoring and alerting on environments with a fully staffed 24×7 NOC for support. We are eager to share more information about this service, as it enhances the value of the virtual workspace and ensures constant security, availability and uptime.

We are experiencing substantial geographic growth with our continued commitment in Georgia as well as our focus now on the Citrix TOLA region with a huge focus in Texas. It is a pleasure to work with the Dallas team and we’re looking forward to accelerated activity and growth in that region.

I am most excited to announce we have named Alan Watson as our new President of Accordant
Alan brings decades of experience in technology strategy, operations and service delivery. We are honored to have Alan as our new president, partner and board of directors. You will be hearing from him in the very near future. Bringing Alan onto the team allows me to move to a pure CEO role where I can focus on overall vision, strategy, new market business development initiatives.

Under Alan’s leadership, it is important to note some key promotions. First, Lawrence Haas has been promoted to Director, Business Development. With over 4 years contributing to the growth and success of the Accordant sales team, Lawrence brings tremendous insight and leadership to help us to continue to build a world class sales organization. Second, Fred Wix has been promoted to Director, Client Services. There aren’t many better than he at guaranteeing that our clients, partners and teammates receive the consistent 5-star user experience that we are so passionate about. Congratulations to both. Their hard work and commitment to our success is unwavering. We are proud to add them to our management team. It’s so fulfilling to see the growth and maturity of our existing team, and help them flourish in their endeavors with our company. That is one of the fundamental reasons that Accordant was founded. I love and appreciate our team beyond what I can verbally communicate.

Lastly, we are excited to be finally settled in our new corporate office
Our growth required a new facility to accommodate all the fun things we’re accomplishing. We are now located at 361 Mallory Station Road Suite 103 Franklin, TN 37067. Located in the heart of Cool Springs, we are easily accessible and now able to accommodate customers and partners in our office comfortably. We will be scheduling an open house late in Q2 and would love to see you.

As you can see, we have been busy! 2018 is going to be an epic year. Our commitment to delivering first class virtual workspaces with a 5-star user experience is in full swing. We look forward to continued partnerships with you this year and many years to come.

I can’t thank you enough for your continued confidence in Accordant. Our commitment to serving you and providing relevant value has never been stronger!

Best regards,

Tim Tyler

Security in Virtual Workspaces (Citrix)

Virtual workspaces are a great tool for businesses. They allow remote access to company networks so that employees can use tools while out of the office. But how do you know that your virtual workspace is secure? How can you best protect your data? Citrix has a proven track record of security and ease of access for those who want to take their companies to the future.

How poor security can fail you
Virtual workspaces are an incredibly convenient tool, and they actually provide an added layer of security. While in the office it’s possible to keep an eye on your important data and files, making sure that your information is protected from people who will abuse it, the equation gets more complicated once you incorporate remote access. Employees might not use acceptable antiviral software, or they might not take proper precautions to protect their device. This could result in you losing sensitive data.

How Citrix works
Citrix is a software that takes every precaution when dealing with your information to keep you as secure as possible. It works by taking information from virtual workspaces and sending it to the Citrix cloud. From the cloud, it’s transferred to Citrix’s Technology Solution which includes secure netscalers, delivery controllers, and data storage. You are able to monitor use of your virtual workspaces with this tool, as well as run analytics and automate certain processes. Citrix uses strong data separation policies to best protect your sensitive information.

In this day and age where data leaks happen frequently and clients worry for their information’s safety, it is vital to take every step possible to make sure that you, and those that work with you, are protected. Constant security can sometimes be a headache, but with virtual workspaces through Citrix, it’s simple. Only using virtual workspaces that are secured by the best technology, and making sure to reinforce information security with employees will go a long way towards protecting your information. Citrix is a great, easy to use tool that can help you do just that, and it might just be the solution you’ve been looking for.

Growth spurs addition of Alan D. Watson to the Accordant executive leadership team

Accordant Technology CEO Tim Tyler has announced the appointment of a nationally-recognized IT executive to Accordant’s executive leadership. Alan D. Watson, Accordant’s newly announced President was previously Executive Vice President and Chief Information Officer of ChanceLight Behavioral Health, Therapy & Education, a Citrix Innovation Award Winner. Citrix awarded his previous work for collaboration, networking and virtualization to provide customized learning resources in a secure, regulatory compliant environment.

“We’re thrilled to welcome Alan to our team, as Alan’s real-world experience with the challenges of enterprise technology will bring direct benefit to our clients,” says Tyler. “Alan’s proven track record is compelling. As Accordant is growing and maturing, he’s both a vital and timely addition to our team.”

Watson speaks on behalf of Citrix at Executive Insights and national conferences. “In serving previous firms as CIO, I understand the challenges of the enterprise,” says Watson. “I’m eager to bring that perspective to help ensure Accordant clients end-user experiences are optimized.” Watson’s background includes a proven consulting track record in the highly regulated environments of healthcare and financial sectors.

Accordant has been recognized as experts in virtualization, application delivery and mobility for firms throughout the southeast. Accordant’s commitment to seamless end-user experiences has produced such outstanding outcomes that Accordant finds itself expanding into additional markets due to client demand. The addition of Watson as President affords Accordant further leadership scalability to address those demands.

Accordant Technology is changing the way businesses leverage technology by focusing on the user experience and business outcomes. Accordant delivers secure virtual workspaces and cloud-based solutions with a commitment to providing 5 Star user experiences tailored to clients’ objectives.

Accordant application virtualization and hosting consultants and engineers use industry leading products and best practices to ensure seamless end user experiences. Strategically, Accordant stands at the crossroads of leadership, business and technology. We are committed to ensuring clients, users, partners and employees experience the best of all three.

Tami Orrange


Accordant Technology Partners with ExtraHop to Accelerate Digital Enterprise Initiatives


New Channel Partnership Brings Enterprises Comprehensive IT Visibility to Improve IT Performance and User Experience

BRENTWOOD, Tenn. — May 24, 2017 — Accordant Technology, a trusted IT solutions provider, today announced the addition of ExtraHop to its solutions portfolio. ExtraHop delivers an analytics-first approach, layered with machine learning, that provides real-time visibility into the performance, availability, and security of every IT system, from the datacenter to the cloud to the edge. Through the new partnership, customers get the real-time situational insight they need for proactive, data-driven operations, as well as the support of a trusted partner with deep domain expertise.

Businesses across every vertical increasingly rely on information technology to support operations and customer experiences. But as the volume and speed of digital interactions increases, so too does the complexity of the applications and infrastructure that deliver them. Real-time visibility into IT performance and security — and its impact on digital experience — is now critical to both IT and business operations.

With ExtraHop and Accordant, businesses can take a data-driven approach to ensuring digital experience. The ExtraHop platform delivers an industry-leading, analytics-first approach supported by machine learning that delivers real-time visibility into the performance, availability, and security of every IT system. When partnered with deep expertise in application delivery and user experience from Accordant, customers can be more proactive, secure, and achieve better alignment between IT performance and business goals.

“At Accordant, we know how profoundly IT performance can impact business outcomes, and we strive to deliver to our customers leading-edge, customized solutions that equip them to understand and manage both applications and user experience,” said Tim Tyler, President and Founder of Accordant Technology. “By partnering with ExtraHop, we can now offer our customers powerful IT insights so they can better understand and manage their IT operations, reduce costs, and make data-driven decisions that align with their business goals.”

“Accordant approaches IT solutions from a unique perspective by starting with the outcome of a customer’s digital experience and working from there to build the hosted infrastructure and management technology to support that experience,” said Todd Fraser, VP of North America Sales at ExtraHop. “Our new partnership brings together Accordant’s user experience-centric approach with the real-time visibility ExtraHop delivers into that experience, allowing customers to be more proactive in improving IT operations in support of digital business.

About Accordant Technology
Accordant Technology is an innovative and rapidly growing IT consulting firm located in Brentwood, Tennessee. Focused on Virtualization, Application Delivery, Mobility, and Hosting, Accordant provides clients with best-of-breed technologies and the ability to apply them to their individual business models. For more information, visit http://accordanttechnology.com or call (615) 800-8024.

Accordant Contact:
Tami Orrange

About ExtraHop
ExtraHop makes data-driven IT a reality. By applying real-time analytics and machine learning to all digital interactions, ExtraHop delivers instant and unbiased insights. IT leaders turn to ExtraHop first to help them make faster, better-informed decisions that improve performance, security, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo. Connect with us on Twitter, LinkedIn, and Facebook.

ExtraHop Contact:
Rachel Pepple


Kicking Off 2017

Dear valued partner:

Happy New Year! I would like to kick this new year with a sincere thank you for your continued business and partnership. It’s due to our customers and partners Accordant experienced record growth in 2016. This growth wasn’t just focused on revenue or team size but included our operational excellence, engineering capabilities and a more disciplined and effective project delivery process. What comes from all of this growth internally? The ability to provide a better customer experience, a 5 Star user experience. #5StarUX

We will continue our mission in 2017 to provide first class, secure virtual workspaces and cloud solutions based on 3 core values and differentiators:

  1. Business Relevance:  Our goal is to fully understand business initiatives and solve problems- also to understand how our customers make and spend money. Our result will to assist in increasing revenue and decreasing costs for our customers.
  1. Transparency:  It is our goal to keep our customers and our partners involved, active and provide real-time visibility to Accordant processes. We believe this drives results and keeps every stakeholder informed.
  1. Transition:  Our goal is to finish for you, our customer. It is important documentation and knowledge transfer occurs after every project. We want to ensure and validate what you purchased and implemented actually meets or exceeds the objectives identified by our Business Relevance.

Certainly, you have and will continue to hear from every member of the Accordant team. You will enjoy the benefit of tools that enable you to provide your end user with a 5 Star User Experience. We believe the stack we currently represent; Citrix, Carbon Black, UCS, Tintri, and Green Cloud Technologies, offers the best of breed solutions that do just that. To continue to align with this methodology we have added another very key partner and component to help us drive that mission.

We are excited to announce that we are strategic partners with Nutanix to bring you an enterprise Cloud platform by combining the traditional 3 tiered architectures into one single software-defined platform.

As we continue to focus on first class secure virtual workspaces, we will also continue to provide strategy for your cloud enablement and cloud readiness. The industry is truly driving to the convergence of things to single, flexible and secure workspaces that can be accessed anywhere. We intend to lead the charge, delivering the message and the solutions that enable this and we will make it successful for you.

We look forward to interaction this year to discuss how we may continue to provide value. Thank you again for the relationship and business we enjoy together. We look forward to growing with you in 2017 and many years to come.


Tim Tyler
President, Accordant Technology, Inc.


When all is said and done, every Accordant project should have some sort of closing procedure. This means ensuring that there is an official conclusion and the business operations have been enhanced through the implementation. This is a process of tying up loose ends and transferring knowledge and enabling your team to take control. It is a phase that validates that the solution purchased, works and meets the clients need. We call this process Transition at Accordant.

Our number one goal for any engagement is to implement a solution that performs as intended supporting identified use cases and drives Business Relevance. Simply—We help our clients operationalize IT by collaborating and using technology to optimize the processes necessary to meet business objectives.

Operationalize — it’s something that has concrete, measurable impact on our client’s business.  Transition provides confirmation that the criteria for customer acceptance has been met and identifies any outstanding business activities, risks and issues have been addressed.  Transition validates that business relevance has been applied by the technology!

At Accordant, Transition is a core value and the final component of our focus. Our team is committed to finishing our projects and sharing our knowledge. We believe that focus on Transition is a critical element of the 5 Star User Experience you have come to expect from our team.



While transparency is most often seen in the realm of social responsibility and compliance, its real benefit is when it’s seen as a business priority. So what does Accordant mean by Transparency? It is about information.  It is about the organization being upfront about the actions it takes, and working in collaboration with customers and partners; and validating whether those actions are consistent with its values. At Accordant, we embrace Transparency because we know that our customers are more confident when they feel they’ve been engaged and made a part of the process. We are open, honest and accountable.

As a team, we believe that Accordant is meant not only to grow a community of people interested in the business virtualization and cloud solutions that we offer but to serve that community in a responsible manner.

At Accordant, Transparency is a core value and at the root of our focus. Our team is committed to communicating and involving our clients in the process. We believe that focus on Transparency is a critical component of the 5 Star User Experience you have come to expect from our team.

Happy Holidays!