Blog

How To Achieve GDPR Compliance in the Cloud – Across AWS, Microsoft Azure and Google Cloud

The world’s top three cloud services providers, Amazon Web Services, Microsoft Azure and Google Cloud (GCP) have all announced compliance with GDPR. But imagine a world where you can view all your geo-located online instances and protected assets across multiple public cloud platforms – all within a single user-friendly portal.

more →

Blog

Stand-alone Web Application Firewalls are not enough!

This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.

more →

Blog

2018 Contact Centre Predictions: It’s All About the Customer

This month we share a blog from our Technology Partner Enghouse Systems on their 2018 Contact Centre Predictions.

How are Contact Centres going to evolve over the year? Will there be more focus on automation and self-service solutions? A change in the way we handle customer interactions?

Contact Centre Predictions 2018

The role of the contact centre agent will continue to evolve

We expect to see ongoing investment by businesses in self-service and automation solutions during 2018.

more →

Blog

2018 Cybersecurity Predictions – Big Bad Attacks on Automation

What will happen in cyberspace in 2018? How will technology impact the real world over the next year? To kick off 2018, we are sharing a cybersecurity predictions blog from technology partner Radware.

2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring?

more →

Blog

Top 6 Considerations For Choosing An Active Directory Disaster Recovery Solution

This month we are sharing a blog originally written by our technology partner Semperis.

Active Directory® is heavily relied upon by many organizations and in today’s world dominated by technology it is important to always have a plan B if ever technology lets you down.

Here is a question, if everyone knows AD® uptime is critically important, why do so many experts agree to live with an under-performing AD Disaster Recovery plan?

more →

Blog

Say Goodbye To Moats And Castles With A New Approach To Remote Application Access

This month we share an insight from our technology partner Akamai. We look at how traditional remote application access methods such as VPNs, RDP, and proxies are becoming outdated. It is time to adopt a simple and uncluttered approach.

We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat.

more →

Blog

My Network Has High Cholesterol: The Danger Of Low And Slow Attacks

This month we share a blog article from our technology partner, Radware. Low and slow DDoS attack traffic is increasingly becoming a strain on business resources, consuming bandwidth and in turn, resulting in a poor customer experience and financial loss – in most instances the targeted organization will absorb such traffic without even noticing or knowing

You know when you get to a certain age, feeling ‘good’ just isn’t enough?

more →