Rubrik and NetApp Data Protection Summit showcase benefits of this channel partnership
Rubrik and NetApp have been collaborating since 2019 to enable channel partners of both companies to attach Rubrik's data management offerings to NetApp's hybrid multicloud platform.
ProLabs explains why 5G mobile networks are ‘fibre networks in disguise’
5G is the newest iteration of mobile data standards, with its faster speeds, better reliability and higher device capacity, especially in urban settings and areas with high device concentrations.
Double bullseye for SentinelOne
The company came out on top among endpoint vendors in the latest ATT&CK Evaluation performed by MITRE Engenuity and was named a leader in Gartner's 2021 Magic Quadrant for Endpoint Protection Platforms.
Digitally protecting intellectual property helps safeguard future business success
In today’s information age, intellectual property can represent a competitive advantage and should be carefully protected by the companies by which it is owned, says Richard Broeke, MD, Securicom.
NETSCOUT visibility enhanced by AWS expanded support for VPC traffic mirroring
As a result of this expansion, NETSCOUT is enabled to provide end-to-end visibility for security and service assurance of even more applications and services that are used in AWS.
Security, service assurance must rule financial services
Service assurance requirements mean companies must test and monitor new digital transformation projects over both wired and wireless networks to assure a quality user experience.
Your data has left the building: don’t let it take you on a bumpy ride
The rise of cloud and remote working means more of a company’s business is happening outside the corporate infrastructure, creating lost visibility and an increased risk of data loss.
Rubrik for Microsoft 365 delivers faster, simpler recoveries at scale
Rubrik offers a policy-based SLA enforcement and uses Microsoft Azure as the storage location for backups.
Fixing cyber security issues one next-generation firewall at a time to prevent ‘broken window’ scenario
Networks Unlimited Africa's Stefan van de Giessen asks if have you considered the ‘broken window’ principle when looking at your internal cyber security posture.
Tintri drives intelligent infrastructure so you can ‘let go of the wheel’
Tintri says intelligent infrastructure needs to acquire knowledge and then apply that knowledge to optimise its own performance, settings or configurations.
How the ‘broken window’ theory affects cyber security matters
As a first step to ensure you cover all bases, ascertain whether there are any cracks in your cyber security posture – in essence, a ‘broken window’, says Stefan van de Giessen: GM: Cybersecurity at Networks Unlimited Africa.