Networks Unlimited Africa
  • Home
  • /
  • Topics
  • /
  • Networks Unlimited Africa

Your data has left the building: don’t let it take you on a bumpy ride

The rise of cloud and remote working means more of a company’s business is happening outside the corporate infrastructure, creating lost visibility and an increased risk of data loss.


Rubrik for Microsoft 365 delivers faster, simpler recoveries at scale

Rubrik offers a policy-based SLA enforcement and uses Microsoft Azure as the storage location for backups.


Fixing cyber security issues one next-generation firewall at a time to prevent ‘broken window’ scenario

Networks Unlimited Africa's Stefan van de Giessen asks if have you considered the ‘broken window’ principle when looking at your internal cyber security posture.

Mar 12, 2021

Tintri drives intelligent infrastructure so you can ‘let go of the wheel’

Tintri says intelligent infrastructure needs to acquire knowledge and then apply that knowledge to optimise its own performance, settings or configurations.


How the ‘broken window’ theory affects cyber security matters

As a first step to ensure you cover all bases, ascertain whether there are any cracks in your cyber security posture – in essence, a ‘broken window’, says Stefan van de Giessen: GM: Cybersecurity at Networks Unlimited Africa.


Unsung emergency scene heroes

Uplogix provides out-of-band integrated remote management solutions that allow IT staff to manage remote networks as if they were onsite.

Dec 14, 2020

Networks Unlimited Africa brings festive season cheer to Tembisa school

A team from Networks Unlimited has assisted Nokuphila School with the donation of 32 grocery food packs, including everyday essentials.

Dec 11, 2020

ProStream partners with Hitachi Vantara

The company has become a member of the Hitachi Vantara Partner Program in order to strengthen its range of offerings.

Dec 1, 2020

DDOS ‘tax’ adds to an organisation’s attack burden, says NETSCOUT

DDOS attacks by threat actors don’t only have a negative effect on businesses and their customers – they also take up quantities of Internet bandwidth without paying for it.


Cyber hygiene for system health and online security

Implementation of two-factor and multi-factor authentication is necessary to create strong access management, particularly when it comes to sensitive network areas, says Stefan van de Giessen, GM: Cybersecurity at Networks Unlimited Africa.

Nov 18, 2020

DDOS extortion attacker impersonates well-known threat actors

A relatively prolific threat actor initiated a global campaign of DDOS extortion attacks that were mainly directed towards regional financial and travel industry targets.


ProLabs enables networking upgrades

Hospitals accelerating their network capabilities should close these gaps by building on infrastructure that is already in place, says ProLabs. [Local rep: Networks Unlimited Africa]

Related topics