We hear a fair bit when talking to customers, statements like the following “We’ll just move this to the cloud, they will do security better than us …
In my previous blog “Fear of the Unknown: Navigating Tools of the New Digital Age”, I touched on the speed and scale of technological change. It is …
Guest Blog with Zerto by Matthew Agoni, CTO Diversus Group Zerto is one of those vendors that I have been aware of for a while and has …
There have been significant moments in the history of the enterprise that have revolutionised the game. With technology rapidly progressing since the invention of the wheel, my …
Advancements in cybersecurity have been growing exponentially, increasingly though we are fighting an automated adversary who is benefiting from the falling costs of compute to launch attacks.
For a number of years now, cloud computing has been one of the most hyped subjects from the board room to IT operations. The extremely security-conscious or risk adverse have been hesitant to move their data and workloads into the cloud while others have embraced the public cloud.
Traditional enterprise data protection focused on a strong perimeter fence – storing, managing and protecting data (often across multiple sites).
This approach worked when the data was stored inside our own network. We held the keys to the door and our business applications and data didn’t need to leave our own environment.
Converged Infrastructure (CI) combines and optimizes multiple information technology components – compute, networking and storage – so they operate as a cohesive whole.
As you begin to move your company away from a physical infrastructure and into the cloud, it’s important to make sure that proper security policies are in place. While you may have a general information security policy, don’t think that absolves your organisation from the need for a specific cloud security policy. The dangers that come along with using cloud software or infrastructure are markedly different than those of the typical security concerns encountered by most organisations.
Five Criteria for Making a Informed Investment
Maximise the ROI and minimise operational risk by including Managed Services from Diversus Group
Detecting and responding to cyber security incidents
Extend & Enhance your NetApp Data Management Capabilities