Backups
Overcoming the Top Five Gaps in Office 365 Data Protection
Microsoft Office 365 is widely used. Whilst it does offer a variety of system availability and data protection...
Inside Complex Ransomware Operations and the Ransomware Economy
Ransomware operators have steadily become more sophisticated and more aligned with nation-state actors,...
Oracle Cloud@Customer Brings Full Cloud Experience On-Premises
Oracle Autonomous Database on Exadata Cloud@Customer and Dedicated Region Cloud@Customer powered by 2nd...
Incident Response Use Cases
According to an IBM study, the vast majority of organisations surveyed are unprepared to respond effectively...
Building Your MSP Security Offerings
As a managed service provider (MSP), your customers already expect you to keep their networks secure....
What You Don't Know About Office 365 and Azure AD
Moving to the Microsoft cloud? With this ebook, What You Don't Know about Office 365 and Azure AD, you...
User Risk Report 2018
Risky end-user behaviours are impacting organisations around the world, with implications that can be...
Microsoft Teams Backup - a Conversational Geek E-book
Learn everything you need to know about protecting Teams data from this Conversational Geek e-book by...
Nasuni for Rapid Ransomware Recovery
The FBI's Cyber Crime division defines ransomware as 'an insidious type of malware that encrypts, or...
Don't pay the ransom
In simple terms, ransomware is malicious software that either encrypts your data or otherwise stops you...
Real-world SLAs and Availability Requirements
Data protection technologies and processes are effective only when you establish clear objectives, then...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.