VENDORiQ: Cado Security Partners with Cosive in Australia
Cado Security has selected a channel partner in Australia, aiming to bolster its presence in the Asia-Pacific region.
Cado Security has selected a channel partner in Australia, aiming to bolster its presence in the Asia-Pacific region.
YubiKeys remains a highly effective and secure form of authentication and is now being used by the Austrian government. Will this influence other countries to follow suit?
Jamf has introduced Jamf Executive Threat Protection, an advanced detection and response tool for mobile devices, to support government agencies, media and entertainment. Jamf is better known for its iOS device management solution and strong position within education. Does Jamf have what it takes to move into the end-point protection space – especially for highly sensitive organisations?
Does your organisation need a critical data vault? When is on-premise a good idea?
Having a cyber incident response plan is not enough. The plan needs to be backed up with tools and processes to ensure it is well-executed and secure, even while other parts of the business are being hacked. In this IBRS Radar, IBRS explores Cydarm, a unique Australian vendor with a planning and collaboration platform developed solely to support cyber incidents.
Australia’s Cydarm Technologies is expanding to the United States after being admitted to the iCyberCenter global incubator program. What’s behind the growing popularity of cyber security companies when it comes to enterprise incident response?
The Optus and now Medibank data breaches have grabbed the attention of customers, media, government and regulators. Executives and boards are now asking for updates from their responsible officers. Download our presentation kit to help you prepare.
The disaster recovery (DR) plan and DR preparedness can not be set and forget. This is as important when your ICT services are delivered in the Cloud as much as it is on-premise.
The Cloud may have high-availability, and play a role in most organisations’ business continuity plans, but it also demands its own disaster recovery strategy.