TelcoNews Asia - Telecommunications news for ICT decision-makers

Stories by Staff - Page 11

Cyber hack pattern

The surprisingly scary patterns revealed in hack attacks

Thu, 3rd Mar 2016
#
cybersecurity
#
software development
#
hackers
When analysing multi-attack campaigns against industrial and government interests, patterns emerge. Scary patterns.
Vintage telephone

Embrace VoIP and help customers escape the clutches of large telcos

Thu, 3rd Mar 2016
#
uc
#
conversant
#
partners
Rescuing customers from the high cost and inflexibility of traditional telecommunications services presents IT resellers with great new opportunities.
Sync and share cloud

Is there a way to sync, share and control data securely?

Wed, 2nd Mar 2016
#
storage
#
data protection
#
dr
As employees and partners collaborate through file sync and sharing services, sensitive data is often put at risk of compromise and non-compliance.
Byod blue background

Going mobile: How to have secure file-sharing, backup recovery and access

Tue, 1st Mar 2016
#
storage
#
dr
#
endpoint protection
How do you maintain the security of your organisation's data in a world where your employees, contractors and partners are working on mobile devices?.
Eye data drawing

Endpoint data protection: A buyer's checklist

Mon, 29th Feb 2016
#
storage
#
data protection
#
dr
Endpoint data is often one of the most forgotten aspects of an enterprise data protection strategy, yet it is among the most valuable to a company.
Fallback

Can one security solution protect two very different people?

Thu, 25th Feb 2016
#
cybersecurity
#
dicker data
#
distributors
Picture two people from a large organisation. They have different needs and completely different levels of access to their network. Can it work?.
Digital abstract business

The Digital Workplace Conference: Helping your business go digital

Thu, 25th Feb 2016
#
microsoft
#
sharepoint
#
sharethepoint
Over 500 attendees expected at Australia's premier Digital Workplace Conference, offering key insights into digital business transformation.
Free wifi sign

Network security and tips for using free WIFI

Thu, 25th Feb 2016
#
wireless networks
#
cybersecurity
#
cloud services
Wireless networks can be left vulnerable if you have an old router with poor security. Likewise, free WiFi can be used to intercept your transactions.
Building digital tablets

When to expect devices and connected 'things' to start talking to one another

Tue, 23rd Feb 2016
#
iot
#
smart home
#
healthtech
After eight years of searching for, downloading and using smartphone apps, users are maturing in their usage behaviours.
Dynamic fractal waves

Determining the impact of dynamic VNF deployment in NFV

Tue, 23rd Feb 2016
#
network infrastructure
#
sdn
#
naas
NFV facilitates new revenue streams for service providers, since virtualisation of network functions paves the way for innovative services.
The boy and the beast

Eyes-on review: The Boy and the Beast

Tue, 9th Feb 2016
#
gaming
#
digital entertainment
#
film review
The Boy and the Beast is a coming-of-age Japanese animation film that is proving popular world-wide after a July 2015 release in Japan.
Dc storm

Don't let virtualisation threaten your data center security

Tue, 2nd Feb 2016
#
malware
#
virtualisation
#
hyperscale
Virtualisaton shouldn't threaten your data center's security says ESET's Nick FitzGerald. He outlines how to avoid an AV storm.
Man looking 2016

Surfing the Crest: Top Technology Trends in 2016

Fri, 29th Jan 2016
#
smart cities
#
paas
#
data analytics
The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. Here are six predictions for 2016.
Bd1

Big data gets even bigger - so what lies ahead?

Mon, 25th Jan 2016
#
data analytics
#
martech
#
planning
2016 will see a wider shift towards data-driven decision making in businesses, according to Daniel Ng, Senior Director at Cloudera.
Firewall security

If opportunity makes a thief, what stops one?

Mon, 25th Jan 2016
#
firewalls
#
network security
#
breach prevention
Cisco's Marc Solomon outlines the questions security professionals should ask when evaluating next-gen firewalls.
Iot card

How IoT primes a new smart product economy

Mon, 25th Jan 2016
#
iot
#
supply chain
#
healthtech
Cognizant's Euan Davis looks at how your company can benefit from the growth of smart products – and the prizes of the smart product economy.
Crystal ball1

2016 Crystal Ball – the future of networking

Mon, 25th Jan 2016
#
network infrastructure
#
sd-wan
#
sdn
In 2016, SD-WAN will dominate networking with cost-effective, robust links and regionalised services, shaping the future of connectivity.
Future

The 2016 data center: On-demand, on the edge and hyperscale

Wed, 20th Jan 2016
#
hyperscale
#
dc
#
commscope
John Schmidt, CommScope data center solutions lead, offers up his view on the shifts happening in the data center market.
Security data padlock

Fortinet's competitive edge: The security-centric network

Mon, 18th Jan 2016
#
firewalls
#
network infrastructure
#
network security
Protecting your network is your number one responsibility, as all of the work that you do every day can be wiped out in a heartbeat.
Security productivity

Fortinet: Securing your wireless network at the access layer

Mon, 18th Jan 2016
#
firewalls
#
network infrastructure
#
network security
Securing your wireless network just got a whole lot easier with Fortinet's new Secure Access Architecture (SAA).