The world’s top three cloud services providers, Amazon Web Services, Microsoft Azure and Google Cloud (GCP) have all announced compliance with GDPR. But imagine a world where you can view all your geo-located online instances and protected assets across multiple public cloud platforms – all within a single user-friendly portal.more →
This month we are sharing a blog from our technology partner Akamai on the “Zero Trust” philosophy, a concept first coined by analysts at Forrester Research. Given the impact of several high-profile malware outbreaks, exploits and hacks over the past year, a key disruptor in 2018 is the re-emergence of the zero trust security model.more →
This month we are publishing a blog from cloud security partner, Zenedge. Here, we explore the evolution of the security threat landscape, from threat actors improving their hacking techniques to the increasingly daunting task of protecting public-facing web applications and API endpoints. Not only do organizations need to get to grips with reality and understand they are under attack nearly 100 percent of the time, they must also come to terms with the fact that their current approach to defending their applications and APIs is woefully deficient.more →
This month we share a blog from our Technology Partner Enghouse Systems on their 2018 Contact Centre Predictions.
How are Contact Centres going to evolve over the year? Will there be more focus on automation and self-service solutions? A change in the way we handle customer interactions?
The role of the contact centre agent will continue to evolve
We expect to see ongoing investment by businesses in self-service and automation solutions during 2018.more →
What will happen in cyberspace in 2018? How will technology impact the real world over the next year? To kick off 2018, we are sharing a cybersecurity predictions blog from technology partner Radware.
2016 was the Year of DDoS. 2017 was the Year of Ransom. Can we assess leading indicators of new attack techniques and motivations to predict what 2018 will bring?more →
This month we are sharing a blog originally written by our technology partner Semperis.
Active Directory® is heavily relied upon by many organizations and in today’s world dominated by technology it is important to always have a plan B if ever technology lets you down.
Here is a question, if everyone knows AD® uptime is critically important, why do so many experts agree to live with an under-performing AD Disaster Recovery plan?more →
This month we share an insight from our technology partner Akamai. We look at how traditional remote application access methods such as VPNs, RDP, and proxies are becoming outdated. It is time to adopt a simple and uncluttered approach.
We are all familiar with the enterprise security approach of treating an organization like a castle, and protecting it with a moat.more →
This month we share a blog article from our technology partner, Radware. Low and slow DDoS attack traffic is increasingly becoming a strain on business resources, consuming bandwidth and in turn, resulting in a poor customer experience and financial loss – in most instances the targeted organization will absorb such traffic without even noticing or knowing
You know when you get to a certain age, feeling ‘good’ just isn’t enough?more →