<
>

Storing European Data? Better Be Ready For GDPR

We are now living in the post-digital era where it’s almost impossible for an individual not to leave digital footprints through their daily transactions and interactions. Businesses, meanwhile, are collecting more data...

Stopping Hidden Threats: How to Defend Against Fileless Attacks

Just like tsunamis wreaking havoc in certain parts of the world, fileless attacks are creating similar damages in the cybersecurity scene. Fileless attacks are basically set of tactics that are deployed to intrude the system...

What are some examples of Unified IT?

Attributed to McKay Allen, Director of Global Marketing, Ivanti Ivanti has talked a lot lately about their vision for Unifying IT, about breaking down siloes and improving IT departments at companies across the world....

Backup Pain Solved - NetApp E-Series Flash with Veeam Hyper-Availability

Ask any IT professional where their greatest source of pain is and it would be a safe bet that backup and recovery operations is near the top of the list.   If you have ever heard yourself or colleague say things...

What is Data Virtualisation and Why Does It Matter to Your Business?

Big Data Analytics and Business Intelligence Systems no longer just answer questions and provide deep insights to business. They are the key component in enabling new business models, achieving competitive advantage, developing...

How Machine Learning Works in Cyber Security

Almost every vendor in the tech space is claiming that their offering is powered by artificial intelligence or machine learning. These are buzzwords that marketing departments feel the need to include to make their offerings...

Machine Learning Alone Can’t Keep Your End Points Secure

Machine Learning is rapidly being deployed into many areas of IT where success has been seen in the cyber security space. As a direct result of machine learning techniques, we have moved beyond solutions that rely on databases...

Pathfinder of Pervasive Integration

How to interconnect everything for everyone We previously outlined what Pervasive Integration means for the digital business, and how it can be applied structurally to business activities. Applying that same...

Application Recovery Made Fast and Simple

Downtime is bad news for any business. According to a study by Data Foundry, depending on how big your company is, the cost of an unplanned IT downtime could cost your business somewhere between $137 To $17,244 per minute, with...

Cloud outages: How to weather the storm

Author: Nop Srinara - Director, Datto Asia If you believe that all your data is magically safe from all harm once it’s in the cloud, Microsoft’s latest data centre outage is telling you to think...