Feature

Securing the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

How to secure the endpoint

Endpoint security management is a policy-based approach to network security that requires endpoint devices to comply with specific criteria before they are granted access to network resources. Endpoints can include...

Designing robust Business Continuity policies

The goal of a Business Continuity policy is to document what is needed to keep an organisation running on ordinary business days as well as times of emergency. When the policy is well-defined and clearly adhered to,...

Disaster planning in the wake of increased threat vectors

Typically, Disaster Recovery planning involves an analysis of business processes and continuity needs. Before generating a detailed plan, an organisation often performs a business impact analysis (BIA) and risk...

How are data centre leaders optimising their infrastructure to meet Digital...

Digital Realty, a leading global provider of carrier and cloud-neutral data centre, colocation and interconnection solutions, recently announced the opening of its third data centre in Singapore. The multi-story,...

Why business analytics matters

Business analytics (BA) is the iterative, methodical exploration of an organisation’s data, with an emphasis on statistical analysis. Successful business analytics depends on data quality, skilled analysts who...

Browse our latest issue

Intelligent CIO Africa

View Magazine Archive