Authored by: Peter Lees, Chief Technologist, SUSE Asia Pacific & Japan
In a world in which organisations are becoming more digitally driven and transforming like never before, the Enterprise Resource Planning (ERP)...
Full disclosure, I served nearly four years as Zerto’s Vice President for Asia Pacific & Japan and remain a Zerto shareholder. Thus, my assessment of this announcement cannot be described as impartial. While it has been...
As telecommunication service providers (SPs) look to stave off competitive threats from over the top (OTT) providers, they are digitally transforming their operations to greatly enhance customer experience and relevance by...
Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT device.
Today,...
Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run remediation and investigation...
Layered endpoint protection is a cybersecurity platform that integrates multiple layers of protection with a combination of rule-based techniques as well as static and dynamic threat detection technologies to protect an...
By Dennis Kom, Director, Global & Strategic Accounts, Enterprise Networks, Corning Optical Communications
The data centre industry in Malaysia is worth an estimated US$229.5 million (RM950 million) according to...
A private email server is an email system that’s offered via a private server for better functionality, privacy and security. Most public email providers like Google and Hotmail use their own servers to host your emails....
By Azrin Abd Shukor, Country Manager, NetApp Malaysia
It’s 2019, and it’s safe to say that almost everyone knows what an ‘app’ is. This is in no small part due to the arrival of sophisticated...
Cloud-native disaster recovery is a modern approach of DR that is low-cost and on-demand as it is optimised to make the best use of cloud resources for guaranteed business continuity, scalability and...