New research reveals wide gap between perception and reality of perimeter security effectiveness
By Staff Writer 15 April 2015Security company Gemalto, has released the latest findings of the 2015 Data Security Confidence Index (DSCI). The report reveals a widening gap emerging between the perception and the reality of perimeter security effectiveness amongst global IT decision makers. FULL STORY >
Technology maturity driven by the relentless efficiency lifecycle
By Staff Writer 15 April 2015For mining organisations to remain competitive in the digital era, a transformation needs to happen within the IT function. FULL STORY >
How Tech will change how work gets done
By Ryan Noik 15 April 2015Technology is set to change how work is done, according to Brendan McAravey, the country manager for Citrix South Africa. FULL STORY >
Why businesses should not be intimidated by data governance
By Staff Writer 15 April 2015Antionette Van Zyl, Senior Solution Manager: Data Management at SAS, believes that data governance need not create a headache for businesses. FULL STORY >
OTT’s value proposition for the enterprise grows says ttrumpet
By Staff Writer 15 April 2015While traditionally Over-the-Top (OTT) services focused predominantly on the consumer market, with an integrated approach, the enterprise market is fast realising the potential such platforms have to offer, says ttrumpet. FULL STORY >
Vodacom believes cloud services approaching tipping point in Africa
By Staff Writer 15 April 2015Faster connection speeds, lower data costs, and increased activity by international businesses are creating a perfect storm that is set to see cloud services take off in Africa, says Vodacom Business. FULL STORY >
Veeam Endpoint Backup Free now available
By Staff Writer 15 April 2015Endpoint backup has long been a tedious task that everyone knows they should be doing. FULL STORY >
Enterprise security threat level directly linked to user demographics, industry and geography
By Staff Writer 14 April 2015Global study by Aruba Networks shows more than half of South African workers are not concerned about an online security threat FULL STORY >
Vox Telecom brings first unlimited hosted backup service to SA
By Staff Writer 14 April 2015Storing photos, music and more, just became easier and safer FULL STORY >
Tips for SME survival during load shedding
By Staff Writer 14 April 2015Load shedding is here to stay, so every small business needs to take steps to protect its systems and data when the lights go out as well as from power surges when electricity is restored after an outage. FULL STORY >
Gartner says worldwide PC shipments declined 5.2 per cent in first quarter of 2015
By Staff Writer 14 April 2015Worldwide PC shipments totalled 71.7 million units in the first quarter of 2015, a 5.2 per cent decline from the first quarter of 2014, according to preliminary results by Gartner, Inc. FULL STORY >
No Ransom - how to escape from CoinVault
By Staff Writer 14 April 2015Victims of CoinVault ransomware have a chance to retrieve their data without paying the criminals, thanks to a repository of decryption keys and a decryption application made available online by Kaspersky Lab and the National High Tech Crime Unit (NHTCU)... FULL STORY >
New survey from Euromonitor International on consumer hyper-connectivity
By Staff Writer 14 April 2015Euromonitor International released a new survey focused on hyper-connected consumers and their use of technology, including shopping habits and attitudes toward online privacy and security. FULL STORY >
What does the Internet of Things mean for your business and your network?
By Staff Writer 13 April 2015Ensuring the business network is ready for the Internet of Things means ensuring it is scalable, reliable and secure, says Martin Walshaw, senior engineer at F5 Networks. FULL STORY >
Netshield provides complete data centre in one box
By Staff Writer 13 April 2015Local ICT developer and innovator, Netshield, is challenging the way the industry approaches IT with its Data Centre in a Box FULL STORY >
Protecting the enterprise from evolving cybercrime attacks
By Staff Writer 13 April 2015High profile cyber-attacks on blue-chip global companies have sent shockwaves around the technology industry. FULL STORY >
Most Read Articles

Have Your Say
What new tech or developments are you most anticipating this year?



