Open post
iOCO becomes African partner for Jedox EPM software

iOCO becomes African partner for Jedox EPM software

Jedox, Germany-based provider of performance management software, has appointed iOCO Software Distribution as its African channel partner. According to Jedox, it serves 2 500 organisations acrosss 140 countries and South Africa is its biggest market in Africa. Its s enterprise performance management (EPM) SaaS platfom helps customers with budgeting, planning, forecasting and reporting, giving them […]

Continue readingMore Tag
Open post
CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations

CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations

Symantec Enterprise Cloud, a Broadcom cyber security solution, brings data-centric hybrid security for the largest and most complex organisations in the world. It enables enterprises to meet legal, regulatory and corporate data compliance requirements. Symantec Enterprise Cloud also empowers today’s modern workforce to securely access sensitive company assets from anywhere. “It unifies intelligence across control points, enabling […]

Continue readingMore Tag
Open post
Rock-solid data resilience is the only option

Rock-solid data resilience is the only option

Why backups, high availability and immutability should be the foundation of all companies’ cyber security strategy. Let’s kick off by answering the question – why should backup, high availability and immutability be the foundation of cyber security strategies? In a nutshell, because together they provide a rock-solid comprehensive cyber security strategy that delivers resilience against a […]

Continue readingMore Tag
Open post
Why zero trust needs an integrated platform

Why zero trust needs an integrated platform

Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve […]

Continue readingMore Tag
Open post
Why Zero Trust must be an essential part of cybersecurity strategy

Why Zero Trust must be an essential part of cybersecurity strategy

In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could […]

Continue readingMore Tag
Open post
The-Distributors-Silver-Bullet

The Distributors Silver Bullet: Offering Value-Added Services

Offering value-added services should be integral to any distribution company’s business model. Value-added services go beyond the immediate delivery of goods and provide additional customer benefits. With manufacturers deploying disintermediation strategies, the emergence and growth of large e-commerce platforms, and larger competitors, competition is fierce. A company can stand out from the competition by providing […]

Continue readingMore Tag
Open post
Technology Trends for the Enterprise – What’s in Store for the Rest of 2023?

Technology Trends for the Enterprise – What’s in Store for the Rest of 2023?

As we usher in the second half of 2023, enterprise cloud solution providers are looking to expand their focus to business buyers, not just IT/development teams.   Interestingly, Gartner® notes in its Top Strategic Technology Trends for 2023 presentation[1], given by Gartner analysts at its 2022 IT Symposia globally, “senior IT and business leaders need […]

Continue readingMore Tag

Posts navigation

1 2 3 4 5