Your data has left the building: don’t let it take you on a bumpy ride
The rise of cloud and remote working means more of a company’s business is happening outside the corporate infrastructure, creating lost visibility and an increased risk of data loss.
Rubrik for Microsoft 365 delivers faster, simpler recoveries at scale
Rubrik offers a policy-based SLA enforcement and uses Microsoft Azure as the storage location for backups.
Fixing cyber security issues one next-generation firewall at a time to prevent ‘broken window’ scenario
Networks Unlimited Africa's Stefan van de Giessen asks if have you considered the ‘broken window’ principle when looking at your internal cyber security posture.
Tintri drives intelligent infrastructure so you can ‘let go of the wheel’
Tintri says intelligent infrastructure needs to acquire knowledge and then apply that knowledge to optimise its own performance, settings or configurations.
How the ‘broken window’ theory affects cyber security matters
As a first step to ensure you cover all bases, ascertain whether there are any cracks in your cyber security posture – in essence, a ‘broken window’, says Stefan van de Giessen: GM: Cybersecurity at Networks Unlimited Africa.
Unsung emergency scene heroes
Uplogix provides out-of-band integrated remote management solutions that allow IT staff to manage remote networks as if they were onsite.
Networks Unlimited Africa brings festive season cheer to Tembisa school
A team from Networks Unlimited has assisted Nokuphila School with the donation of 32 grocery food packs, including everyday essentials.
ProStream partners with Hitachi Vantara
The company has become a member of the Hitachi Vantara Partner Program in order to strengthen its range of offerings.
DDOS ‘tax’ adds to an organisation’s attack burden, says NETSCOUT
DDOS attacks by threat actors don’t only have a negative effect on businesses and their customers – they also take up quantities of Internet bandwidth without paying for it.
Cyber hygiene for system health and online security
Implementation of two-factor and multi-factor authentication is necessary to create strong access management, particularly when it comes to sensitive network areas, says Stefan van de Giessen, GM: Cybersecurity at Networks Unlimited Africa.
DDOS extortion attacker impersonates well-known threat actors
A relatively prolific threat actor initiated a global campaign of DDOS extortion attacks that were mainly directed towards regional financial and travel industry targets.