Security & Backup

Cover: White Paper: Assessing the TCO of Unified vs. Parallel Backup Solutions for Virtual  Environments
3 years 9 months ago
0
This whitepaper first discusses what to look for in a virtualization protection solution and then considers the merits of a separate solution for protecting one’s virtual environment, compared with...
Year of Publication: 
Location: 

Fortinet End - User Breakfast Presentation on Fortinet's Next Generation Firewalling

Advanced Targeted Attacks. Botnets. Hackers. Sophisticated Malware. Today, your network is under constant siege from ever-increasing, multi-vector attacks.The decisions you make regarding security products have far-reaching impacts on your enterprise. Can you really rely on vendors' next-generation...
Date: 
15 November 2013
Name of Organisation: 
Cover: Office 365 vs. Google Apps
4 years 1 month ago
0
The benefits of moving to the cloud are numerous. Someone else now handles server and application setup, configuration, and system management, reducing personnel costs and increasing convenience and...
Year of Publication: 
Author(s): 
Location: 
Cover: White Paper: 8 Strategies for Building a Modern Datacenter
4 years 5 months ago
0
Enterprise datacenters are straining to keep pace with dynamic business demands, as well as to incorporate advanced technologies and architectures that aim to improve infrastructure performance,...
Year of Publication: 
Cover: White Paper: Monitoring Physical Threats - Owning vs. outsourcing
4 years 5 months ago
0
When faced with the decision of upgrading an existing data center, building new, or leasing space in a colocation data center, there are both quantitative and qualitative differences to consider. The...
Year of Publication: 
Location: 
Cover: Status of IT controls in municipalities
5 years 4 days ago
4
Status of IT controls in municipalities Auditor General of South Africa - Sisanda Mneno 15 October 2012
Year of Publication: 
Author(s): 
Publishing House: 
Municipal Functions: 
Location: 
5 years 3 months ago
0
Hackers in the criminal underground are selling an exploit that extracts the master password needed to control Parallels’ Plesk Panel, a software suite used to remotely administer hosted servers at a...
Location: 

Public Sector Security Workshop

Cyber crime: a new breed of guerrilla warfare With Monitor reporting that at least 58 highly publicised hacking attacks occurred in 2011 alone, it is clear that cyber-crime has come of age. Victims include everyone from law enforcement agencies and Fortune 500 companies to governments and military...
Date: 
15 August 2012
Name of Organisation: 
Target Group: 

Government CIO Summit

Strategic Insight for Government Technology Leaders The Government CIO Summit, an initiative led by the Government IT Officers Council, aims to gather intelligence in support of the GITOC task team-led development of a government-wide ICT strategy. On 6 September 2010, the Minister for Public...
Date: 
31 March 2011 to 03 April 2011
Target Group: 
Location: