Get in touch
Get in touch


BThought Leadership & Technology Insights

“My Clouds’ Secure and Compliant”…. really?

We hear a fair bit when talking to customers, statements like the following “We’ll just move this to the cloud, they will do security better than us …

Reducing Risk: Understanding the Five Most Common Cyber-Security Attacks and How to Combat them

In my previous blog “Fear of the Unknown: Navigating Tools of the New Digital Age”, I touched on the speed and scale of technological change. It is …

Diversus Group’s CTO Test Drives Zerto

Guest Blog with Zerto  by Matthew Agoni, CTO Diversus Group Zerto is one of those vendors that I have been aware of for a while and has …

Fear of the Unknown: Navigating Tools of the New Digital Age

There have been significant moments in the history of the enterprise that have revolutionised the game. With technology rapidly progressing since the invention of the wheel, my …

How to: Stop Underestimating Employees and Stop Overestimating the System

Advancements in cybersecurity have been growing exponentially, increasingly though we are fighting an automated adversary who is benefiting from the falling costs of compute to launch attacks.

What do you want to do with your data?

For a number of years now, cloud computing has been one of the most hyped subjects from the board room to IT operations. The extremely security-conscious or risk adverse have been hesitant to move their data and workloads into the cloud while others have embraced the public cloud.

Data Protection in a Cloud Based Economy

Traditional enterprise data protection focused on a strong perimeter fence – storing, managing and protecting data (often across multiple sites).
This approach worked when the data was stored inside our own network. We held the keys to the door and our business applications and data didn’t need to leave our own environment.

The benefits of Converged Infrastructure (CI)

Converged Infrastructure (CI) combines and optimizes multiple information technology components – compute, networking and storage – so they operate as a cohesive whole.

How to create a cloud policy for your small business

As you begin to move your company away from a physical infrastructure and into the cloud, it’s important to make sure that proper security policies are in place. While you may have a general information security policy, don’t think that absolves your organisation from the need for a specific cloud security policy. The dangers that come along with using cloud software or infrastructure are markedly different than those of the typical security concerns encountered by most organisations.

To learn more about how we can help your business
Contact us today