Infoblox Threat Intelligence Data Exchange is a cost-effective solution to simplify and consolidate management of threat intel data, says Prakash Nagpal, Community Manager, Infoblox.
There's been a fundamental shift from using data to run the business to recognising that data is the business, says Mark Bregman, SVP and CTO at NetApp.
In collaboration with Precision Collect, TransUnion has created a solution to maximise collections effectiveness for credit providers.
ITWeb, in partnership with Veeam, is running a survey on data resilience readiness among businesses in Africa.
The survey aims to explore just how prepared these businesses are to recover from a ransomware or cyber attack, as well as the resources they have at their disposal to help them recover.
In this survey, we examine, among other things:
By completing the questionnaire, you stand a chance to win a Takealot or Amazon gift voucher to the value of R5 000.
The detailed results of the survey and the winner of the lucky prize draw will be published on ITWeb.
Thank you for participating!
Customers can add Commvault to applications bought through the AWS Marketplace to direct data storage to specific AWS services.
The breakfast will launch a three-day education event emphasising the importance of becoming an insight-driven organisation in today's data landscape.
BI lets insurance companies analyse their customers' propensity to buy, sell, claim or lapse their policy, says Kelly Preston, data analytics manager at SilverBridge.
The two became a single company today, focused on helping businesses analyse, protect, and store their data.
Internet users are increasingly aware of online security risks, but hold businesses responsible for data breaches.
Government insists the Cyber Security Bill will not empower it to control the Internet but others see it as a power grab to clamp down on South African cyberspace.
Big data is becoming fundamental to healthcare, starting with insurance and working its way through healthcare delivery, says IDC.
Gartner predicts that in 2015, 80% of successful hacks will succeed by using known exploits.