<
>

Veeam Key Technology Trends for the 2020 Decade

By Anthony Spiteri, Senior Global Technologist, Product Strategy at Veeam Software   The last ten years have been very fulfilling for the technology industry. We’ve seen many technological advancements and...

Veritas rounds up 2019 with the top three predictions that will headline 2020

Authored by: Ravi Rajendran, vice president and managing director of Asia South Region, Veritas Ransomware has become big business Cybercriminals have long relied on social engineering as one of their most...

Silver Peak CEO Predictions for 2020

Authored By: David Hughes, Founder and CEO of Silver Peak Enterprises Prioritize WAN Transformation to Realize a Multiplier Effect on Cloud Investments Most early SD-WAN implementations were justified based on cost...

Powering up Businesses with ERP Systems

Authored by: Peter Lees, Chief Technologist, SUSE Asia Pacific & Japan In a world in which organisations are becoming more digitally driven and transforming like never before, the Enterprise Resource Planning (ERP)...

Zerto’s New CRO Appointment Overdue and Badly Needed

Full disclosure, I served nearly four years as Zerto’s Vice President for Asia Pacific & Japan and remain a Zerto shareholder. Thus, my assessment of this announcement cannot be described as impartial. While it has been...

Three ways automation can help service providers digitally transform

As telecommunication service providers (SPs) look to stave off competitive threats from over the top (OTT) providers, they are digitally transforming their operations to greatly enhance customer experience and relevance by...

Endpoint Remediation Explained

Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT device. Today,...

Endpoint Isolation Explained

Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run remediation and investigation...

Layered endpoint protection explained

Layered endpoint protection is a cybersecurity platform that integrates multiple layers of protection with a combination of rule-based techniques as well as static and dynamic threat detection technologies to protect an...

Future-Proofing Data Centres to Meet Future Capacity Demands

By Dennis Kom, Director, Global & Strategic Accounts, Enterprise Networks, Corning Optical Communications The data centre industry in Malaysia is worth an estimated US$229.5 million (RM950 million) according to...