<
>

Endpoint Isolation Explained

Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run remediation and investigation...

Layered endpoint protection explained

Layered endpoint protection is a cybersecurity platform that integrates multiple layers of protection with a combination of rule-based techniques as well as static and dynamic threat detection technologies to protect an...

Future-Proofing Data Centres to Meet Future Capacity Demands

By Dennis Kom, Director, Global & Strategic Accounts, Enterprise Networks, Corning Optical Communications The data centre industry in Malaysia is worth an estimated US$229.5 million (RM950 million) according to...

Private Email Server Explained

A private email server is an email system that’s offered via a private server for better functionality, privacy and security. Most public email providers like Google and Hotmail use their own servers to host your emails....

5G and the Transformative Possibilities for Enterprise Apps

By Azrin Abd Shukor, Country Manager, NetApp Malaysia   It’s 2019, and it’s safe to say that almost everyone knows what an ‘app’ is. This is in no small part due to the arrival of sophisticated...

Cloud Native Disaster Recovery Explained

Cloud-native disaster recovery is a modern approach of DR that is low-cost and on-demand as it is optimised to make the best use of cloud resources for guaranteed business continuity, scalability and...

Integrated Data Protection Explained

Data protection refers to the safeguarding of information from being affected by losses, stolen, compromise or corrupted systems. With data coming from various sources today, data protection is becoming more important as the...

Backup Appliance Explained

A backup appliance, sometimes referred to as a purpose-built backup appliance (PBBA), is a hardware device pre-installed with backup software and preconfigured with hardware and connectivity optimised for running backup loads...

Cloud Continuity Explained

There is no universally accepted definition of “Cloud Continuity”, with multiple IT vendors in the high-availability and data protection space utilising the term to describe aspects of their own...

Five Flash Storage Array Use Cases For Business in The Digital Economy

Placing SSD inside enterprise arrays has been one of the enablers of the digital and data-driven economies. It’s not overstating to say that without enterprise flash arrays, much of the disruptive technologies that are...