<
>

Posts in Data Protection

Infographic to The Email Threat Surface

Email is the number one exploited vector for cyber attacks. It is therefore important for your organisation to understand the types of email-borne threats that are out there. There are a wide variety...

John Abel from Veritas Explains How the CIO Role Has Evolved in the Digital Transformation Era

If digital transformation is “the process of exploiting the latest digital technologies and practices to create a new sustainable digital business model”, John Abel, Senior Vice...

The Next Data Decade

In his keynote at the Dell Technologies Summit in Austin, Texas, Michael Dell, CEO of Dell Technologies, spoke about how 2020 will mark the beginning of the next data decade. He said, “In the...

Dell EMC PowerOne automates infrastructure

Data flows across entire systems in dynamic ways. Today we are connected everywhere in any way possible, and the AI-powered experience is making our lives better. However, to truly get the value of...

King of Data Protection Veritas Targeting Cloud Relevance Through Complexity Abstraction for Data Availability, Protection and Insights

The pursuit of digital transformation has resulted in a steady rise in infrastructure complexity, said Veritas Technologies Managing Director for the Asia South Region, Ravi Rajendran, as businesses...

Choosing the Right Endpoint Security Solution

With the growing number of connected devices and workplace mobility becoming a common practice in most organisations, businesses need to ensure their devices are always secure. Unsecured endpoint...

Endpoint Isolation Explained

Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run...

Layered endpoint protection explained

Layered endpoint protection is a cybersecurity platform that integrates multiple layers of protection with a combination of rule-based techniques as well as static and dynamic threat detection...

Is Upgrading Your Endpoint Security Software Necessary?

There’s a slew of growing problems that modern businesses are facing – cybercrime is on the rise, targeted attacks and data breaches are becoming more common (and not to mention costly),...

Harnessing the Power of Data: Making sense of the chaos with a comprehensive data strategy

Author: Mr.Fitri Abdullah, Managing Director, Oracle Malaysia Data tells important stories, and understanding those insights can positively impact a business’ bottom line, its operations...

Pages

Subscribe to RSS - Data Protection