- How we help
- Who we’ve helped
- About Us
Diversus Group & VMware understand both private and public cloud environments & combined can create a software-defined data centre solution extending to and leveraging the cloud platform …
The Fourth Industrial Revolution: Robotic Process Automation (RPA) As we approach the end of the third industrial revolution or the digital age, it is vital to be …
We hear a fair bit when talking to customers, statements like the following “We’ll just move this to the cloud, they will do security better than us …
In my previous blog “Fear of the Unknown: Navigating Tools of the New Digital Age”, I touched on the speed and scale of technological change. It is …
Guest Blog with Zerto by Matthew Agoni, CTO Diversus Group Zerto is one of those vendors that I have been aware of for a while and has …
There have been significant moments in the history of the enterprise that have revolutionised the game. With technology rapidly progressing since the invention of the wheel, my …
Advancements in cybersecurity have been growing exponentially, increasingly though we are fighting an automated adversary who is benefiting from the falling costs of compute to launch attacks.
For a number of years now, cloud computing has been one of the most hyped subjects from the board room to IT operations. The extremely security-conscious or risk adverse have been hesitant to move their data and workloads into the cloud while others have embraced the public cloud.
Traditional enterprise data protection focused on a strong perimeter fence – storing, managing and protecting data (often across multiple sites).
This approach worked when the data was stored inside our own network. We held the keys to the door and our business applications and data didn’t need to leave our own environment.
Converged Infrastructure (CI) combines and optimizes multiple information technology components – compute, networking and storage – so they operate as a cohesive whole.
As you begin to move your company away from a physical infrastructure and into the cloud, it’s important to make sure that proper security policies are in place. While you may have a general information security policy, don’t think that absolves your organisation from the need for a specific cloud security policy. The dangers that come along with using cloud software or infrastructure are markedly different than those of the typical security concerns encountered by most organisations.
Microsoft announced temporary adjustments to Office 365 to accommodate new growth and demand
” To best support our Microsoft 365 customers worldwide and accommodate new growth and demand during these unprecedented times, we’re making temporary adjustments to select non-essential capabilities. We do not expect these changes to have significant impact on the end users experience but wanted to make you aware.
Examples of changes we may make include:
We will provide further updates to this Message center post should the situation change. “
With over 13 years’ experience in designing, deploying and supporting business technology solutions built on NetApp, nobody knows NetApp and The Cloud like the team at Diversus Group.
Solve your data management problems with Diversus Group and NetApp Cloud Data Services.
As NetApps’ largest sub-contracted professional services delivery partner in Australia, Diversus Group has been recognised as a NetApp Cloud First partner.
Ensure that your organisation is compliant with, and meets the requirements of The Privacy Act (Australia)
Keeping students and staff safe while maintaining a modern & engaging learning environment.
Partner with one of Australia’s leading business and technology consulting organisations.
Protect your organisations Microsoft Office 365 data from threats or accidental deletion.
Preserving working capital and cash for investment in core business activity while providing dynamic IT services and solutions to end users.
Five Criteria for Making a Informed Investment
Maximise the ROI and minimise operational risk by including Managed Services from Diversus Group
Detecting and responding to cyber security incidents
Extend & Enhance your NetApp Data Management Capabilities