The history of cloud technology is not particularly vast in terms how long it has existed. But the amount it has changed and advanced in that relatively short space of time is staggering.
And with that, the level of understanding around what can be achieved through deploying a cloud environment has also grown at a...
Published: Nov 30, 2020
The coronavirus pandemic has left the world looking very different at the end of the quarter than it did at the beginning. For starters, millions of workers are out of the office and working from their homes. This change in scenery, combined with safe social distancing efforts that help prevent the spread of COVID-19,...
Published: Nov 09, 2020
Data protection technologies and processes are effective only when you establish clear objectives, then measure and improve them over time. Even more importantly, you must ensure that they’re aligned with your business and IT objectives. ESG Research surveyed 378 IT professionals who are responsible for or involved...
Published: Dec 08, 2020
It may historically have only served as a simple extension to data storage for organisations, but cloud technology now brings with it endless potential in terms of the functionality it can offer to modern businesses.
As such, cloud utilisation is on the up across all industries, with finance and insurance no exception....
Published: Dec 22, 2020
Ransomware attacks continue to be top-of-mind for business and IT leaders. And for good reason. Ransomware compromises access to your organization’s lifeblood—data. Consequences can be dire: Pay perpetrators to (maybe) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups....
Published: Nov 27, 2020
Cloud technology hasn’t been around for long, but it’s evolution in that time has been nothing less than staggering. And with that, the level of understanding around what can be achieved through deploying a cloud environment has also grown at a rapid pace, particularly in the past five years.
No longer...
Published: Dec 22, 2020
Gone are the days when IT operated in a dark, back-office environment, where they had little to no impact on the business or the employees they serve. IT leaders now see themselves as fundamental pillars of the business, moving from simple IT operation to the more complex IT orchestration, where they are actively serving...
Published: Nov 03, 2020
Ransomware attacks continue to be top of mind for business and IT leaders. And for good reason. They compromise access to your organization’s lifeblood—data. Consequences can be dire: Pay perpetrators to (maybe) unencrypt your data, stumble with decryption tools, or gamble on recovering from backups. With millions...
Published: Nov 27, 2020
Even with a comprehensive multi-layered protection solution in place, no organisation can prevent every endpoint attack. When an attack occurs, security operations centre (SOC) teams need fast, effective response actions to mitigate the damage from a breach. A key factor in improving incident response processes is lowering...
Published: Dec 02, 2020
The pandemic is fast tracking the digital transformation of organisations in China (and the region) as an increasing number of companies commit more resources to DX, to not only remain resilient during the pandemic, but to thrive after the crisis. The lesson from the China story is that despite the gloom and doom brought...
Published: Nov 16, 2020
Citrix and Microsoft shape modern workplaces that unite the essential elements of today’s distributed business environment to increase employee engagement and productivity.
Download our new Citrix e-book: Mobilizing employee productivity in the distributed workplace.
Discover how flexible virtualisation...
Published: Dec 03, 2020
Digital transformation, and especially cloud adoption, has accelerated due to the global pandemic. Needing to support widespread remote working, enterprises are creating more data and facing a business imperative to move their applications out of their own data centers to the cloud.
A new global survey of nearly 2,700...
Published: Dec 22, 2020
Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...
Published: Nov 24, 2020
Global business is interspersed with a diversity of industrial sectors, united by a single, common communication thread that is key to any business: email connectivity.
Email continues to be the most popular attack vector, via organizations at their email perimeters, from inside the organization (through compromised...
Published: Oct 26, 2020