The webinar on 9 November will outline the trends and challenges in data loss prevention.
Consideration must be given to the right technologies for business outcomes while balancing existing infrastructure and assets, such as mainframes, cloud services and data.
Gijima leverages IBM Qradar for its security information and event management platform, adding IBM Resilient and IBM QRadar Advisor with Watson.
ITWeb, in partnership with Veeam, is running a survey on data resilience readiness among businesses in Africa.
The survey aims to explore just how prepared these businesses are to recover from a ransomware or cyber attack, as well as the resources they have at their disposal to help them recover.
In this survey, we examine, among other things:
By completing the questionnaire, you stand a chance to win a Takealot or Amazon gift voucher to the value of R5 000.
The detailed results of the survey and the winner of the lucky prize draw will be published on ITWeb.
Thank you for participating!
The American multinational technology company offers businesses and individuals around the world free online cyber security training.
Exponant chose this tool from Meeting Decisions because it empowers leaders to drive a successful meeting culture in their organisations.
The platform offers more flexibility and twice the performance to simplify, protect and automate the edge.
Call centres are only allowed to use data for the purpose for which it was collected.
With an IT asset tracking solution like V-Track, you can simplify the task of navigating remote work and effectively manage your ITAM and business objectives, says David Buck, CIO of V-Track.
The co-managed extended detection and response service is cross-product, cross-customer and cross-partner to help mitigate the threats faced by businesses today.
Even though there’s been a wave of data centre infrastructure investment in parts of Sub-Saharan Africa, the region as a whole still faces a big capacity deficit.
According to the 2021 Data Breach Investigations Report, 85% of data breaches involve a human element such as phishing, stolen credentials or simply human error.