Infrastructure



ACaaS should be on your radar
SMART Access & Identity 2023, Access Control & Identity Management
Access Control-as-a-Service provides many benefits and can reduce CAPEX costs without compromising security when handled correctly and with the right partner.

Read more...
Five IT trends to watch in 2023
Issue 8 2022
The efforts made by South African companies in 2021 and 2022 have positioned them well for the next wave of growth and innovation — or for continued economic disruption.

Read more...
Boost enterprise data resilience
Issue 8 2022, Security Services & Risk Management
Arcserve Unified Data Protection 9.0 offers unified, multi-tenant cloud-based management, enhanced data availability, durability, and scalability with Cloud Object Storage, and expanded support for Oracle DB and Microsoft SQL Server.

Read more...
SAN market set for growth
Issue 8 2022, Technews Publishing, News & Events
Storage-area network (SAN) market to hit US$ 26,86 billion in revenue by the end of 2029 due to factors like widespread adoption of Hybrid SAN-NAS solutions.

Read more...
Advanced server performance and energy efficient design
Issue 8 2022, Editor's Choice, Products & Solutions
Dell PowerEdge server portfolio expansion offers more performance, including up to 2.9x greater AI inferencing while Dell Smart Flow design and Dell Power Manager software advancements deliver greater energy efficiency.

Read more...
CA Southern Africa unmasks container security
Issue 8 2022, Technews Publishing, Information Security
Adoption of software containers has risen dramatically as more organisations realise the benefits of this virtualised technology.

Read more...
Best practices for cybersecurity and network health in 2023
Issue 8 2022, Axis Communications SA
Securing a network from outside threats while making it easily accessible to employees can be challenging. What are the tell-tale signs of poor network security, and what should organisations do to secure their networks?

Read more...
ALM a key element of data security
Issue 8 2022
ALM is core to any data security framework in the digital age and it is an element that no business can afford to be careless with.

Read more...
Integrate, integrate, integrate
Issue 8 2022
Security and speed will always war for dominance in DevOps but it’s time to integrate the two as the landscape becomes increasingly fractious and complex.

Read more...
The benefits of Managed File Transfer
Issue 7 2022, Products & Solutions
Blue Turtle Technologies looks into how a Managed File Transfer platform benefits businesses, as opposed to the usual FTP or SFTP suspects.

Read more...
Accelerating your Zero Trust journey in manufacturing
Issue 7 2022, Information Security, Industrial (Industry), IoT & Automation
Francois van Hirtum, CTO of Obscure Technologies, advises manufacturers on a strategic approach to safeguarding their businesses against cyber breaches.

Read more...
Cyber resilience is more than cybersecurity
Issue 7 2022, Technews Publishing, Wolfpack Information Risk, Editor's Choice, Information Security, Integrated Solutions
Hi-Tech Security Solutions held a round-table discussion focusing on cyber resilience and found that while the resilience discipline includes cybersecurity, it also goes much further.

Read more...
Keeping devices in check
Issue 7 2022, Information Security, Asset Management
Kaspersky patents new technology for analysing relationships between electronic devices to counter cyberattacks launched through connected IoT devices.

Read more...
IQ WiFi 6 supporting users and security installers
Issue 8 2022, Products & Solutions
The IQ WiFi 6 is a new purpose-built mesh router solution for homes and businesses with security, automation and Wi-Fi devices.

Read more...
Considering cloud downtime insurance?
Issue 7 2022, Information Security, Security Services & Risk Management
Byron Horn-Botha, business unit head, Arcserve Southern Africa, reveals three vital steps that you must consider to ensure business continuity before you buy insurance.

Read more...
A robust OT cybersecurity strategy
Issue 7 2022, Editor's Choice, Information Security, Industrial (Industry), IoT & Automation
Cyber experts are still struggling to convince senior management to spend money to protect their control system assets, resulting in a lack of even basic measures to protect control systems.

Read more...
IT security at the core of smart cities
Issue 7 2022, Information Security, Government and Parastatal (Industry)
The success of service delivery and public access to universal Wi-Fi, home automation and smart sensors is based on increased IT security.

Read more...
Securing IoT devices to maximise their value
Issue 7 2022, Information Security
Anything that is connected to the Internet is a potential security vulnerability, and IoT devices are increasingly targets through which cybercriminals infiltrate networks.

Read more...
Axora launches Metals and Mining Innovation Forecast 2022/23
Issue 7 2022, Security Services & Risk Management
Miners making super-slow progress towards digital transformation despite universally designating it ‘critical to survival’, with cybersecurity one of the concerns hindering progress.

Read more...
The rise of edge computing: What does it mean for cybersecurity?
Issue 7 2022, Information Security
Edge computing reduces response times, decreases bandwidth usage and maximises the real-time value of data for applications, processing or storage, by bringing it all closer to the source.

Read more...



<< First   < Previous   Page 8 of 68   Next >   Last >>