Media

CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations

CA Southern Africa delivers Symantec Enterprise Cloud to SA’s largest corporations

Symantec Enterprise Cloud, a Broadcom cyber security solution, brings data-centric hybrid security for the largest and most complex organisations in the world. It enables enterprises to meet legal, regulatory and corporate data compliance requirements. Symantec Enterprise Cloud also empowers today’s modern workforce to securely access sensitive company assets from anywhere. “It unifies intelligence across control points, enabling... Continue reading

Rock-solid data resilience is the only option

Rock-solid data resilience is the only option

Why backups, high availability and immutability should be the foundation of all companies’ cyber security strategy. Let’s kick off by answering the question – why should backup, high availability and immutability be the foundation of cyber security strategies? In a nutshell, because together they provide a rock-solid comprehensive cyber security strategy that delivers resilience against a... Continue reading

Why zero trust needs an integrated platform

Why zero trust needs an integrated platform

Successful zero trust can only be accomplished through the construction of an integrated platform that shares information across different security technologies. To reach this level of security, it is essential to have an integrated platform that can centralise and correlate information from various security technologies and tools that have traditionally operated in their own silos. To achieve... Continue reading

Denodo Technologies CASE STUDY

Revolutionizing Data Management: How iOCO and Denodo’s Data Virtualisation Delivered Time and Cost Savings for Coca-Cola Peninsula Beverages

ABOUT THE CLIENT Our client is a provincial soft drink bottling operation in the beverage industry, within the Western and Northern Cape provinces of South Africa. INDUSTRY Beverages, manufacturing, and distribution. BUSINESS CHALLENGE Multiple data silos, lengthy and complex manual reporting processes, the business found it difficult to easily report on data between their various... Continue reading

Why Zero Trust must be an essential part of cybersecurity strategy

Why Zero Trust must be an essential part of cybersecurity strategy

In the early days of computing, security was relatively simple since computers were isolated entities. Physical security was sufficient, with authorised users being granted access to a computer room. However, with the advent of computer networking and the internet, security became more complex. The concept of a physical perimeter protecting the network emerged, one could... Continue reading