The company ranked number one for revenue in managed detection and response for managed security services.
The critical measure of data resilience is how fast the company can spring back from a disruption to resume normal operations, says Loophold Security Distribution.
Data subjects say the watchdog takes far too long to resolve time-sensitive issues around unauthorised disclosure of personal information.
ITWeb, in partnership with Veeam, is running a survey on data resilience readiness among businesses in Africa.
The survey aims to explore just how prepared these businesses are to recover from a ransomware or cyber attack, as well as the resources they have at their disposal to help them recover.
In this survey, we examine, among other things:
By completing the questionnaire, you stand a chance to win a Takealot or Amazon gift voucher to the value of R5 000.
The detailed results of the survey and the winner of the lucky prize draw will be published on ITWeb.
Thank you for participating!
According to IDC, CrowdStrike owned 12.6% of the corporate endpoint security market in 2021.
The research analyses encryption trends and versions based on real-world North-South and East-West traffic.
The company was recently appointed as a Cloudflare managed services partner for sub-Saharan Africa.
Cyber crime has increased in tandem with technological developments, and attackers often have the upper hand, says Bevan Lock, senior sales engineer at Lenovo.
Matter Manager acts as a central hub that communicates requests, case status and workflows, and allows for reporting and supply budgetary overviews.
Artificial intelligence and its subset machine learning are now key technology partners in the search for improved and faster cyber security processes.
Awardees are chosen by readers of Nigeria Communications Week through a transparent voting process.
Stay on top of your data – this has become a critical business priority not only for security, but for extracting value and improving decision-making.
Data-centric security must be embedded across hybrid IT, so that risk to sensitive data is reduced and safe migration to cloud environments is accelerated.