Why backups, high availability and immutability should be the foundation of all companies’ cyber security strategy. Let’s kick off by answering the question – why should backup, high availability and immutability be the foundation of cyber security strategies? In a nutshell, because together they provide a rock-solid comprehensive cyber security strategy that delivers resilience against a […]
Continue readingMore TagCategory: Blogs
Why zero trust needs an integrated platform
Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve […]
Continue readingMore TagAssessing data literacy in companies, sales teams
In my first article in this series, I established the critical importance for every sales leader to have effective sales reporting, analytics and eventually advanced analytics. In this article, I will firstly explore building data culture and literacy, and what benefits can be gained by a more data-driven decision-making approach. This relates to the fact that […]
Continue readingMore TagFarewell DBA, it’s the age of the DDA
Accelerated cloud adoption means many of the tasks traditionally assigned to the database administrator can now be done at the click of a button. But while the traditional DBA role may be on its way out, there’s a growing need for the Digital Database Administrator or DDA, the next generation database curator who is also […]
Continue readingMore TagGetting to grips with data
The success or failure of a data project relies on the organisation’s ability to move from raw data to an analytics-ready state. By Kevin van der Merwe, Sales Director at iOCO Qlik. In this second article on data literacy and its importance, I will look at the data lifecycle and then how to integrate the […]
Continue readingMore TagWhy Zero Trust must be an essential part of cybersecurity strategy
In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could […]
Continue readingMore TagPowering resilience
In 2022, South Africans experienced 205 days of load-shedding,(1) with a CSIR report stating that businesses and individuals had no electricity for 43% of the hours in the year.(2) January 2023 saw predictions of the same amount of load-shedding this year, but the reality has been far worse. 21 March marked the first full-day suspension […]
Continue readingMore TagSASE versus Zero Trust: Removing the mud from the water
The Zero Trust network access approach gains popularity with security professionals, as it addresses many of the shortcomings of the traditional method. According to Gartner, Security Service Edge (SSE) secures access to the web, cloud services and private applications. Capabilities include access control, threat protection, data security, security monitoring and acceptable-use control enforced by network-based and API-based integration. SSE […]
Continue readingMore TagUnstructured data is hidden gold mine
Harnessing the power of unstructured data allows companies to discover hidden insights, uncover trends and make data-driven decisions. At the best of times, there is a fair amount of market confusion surrounding general technology terminology, and the analytics of text mining is no exception. So, let’s kick-off with a definition of unstructured data analytics – […]
Continue readingMore TagWhat’s next for the global ERP industry?
The past few years have lacked stability and clarity. As we move into the second half of 2023, businesses across the globe have largely accepted the new normal, preparing to weather new storms, and build resiliency. The pandemic, geopolitical dynamics, wars, and talent struggles have offered many lessons, and we’re bringing those learnings into the […]
Continue readingMore Tag