Email Borne Threat Explained

For most enterprises, email continues to be a primary channel of communication. According to a  study by the Radicati Group , the total volume of worldwide emails sent and received per day is...

Endpoint Isolation Explained

Endpoint isolation is a technique used by cybersecurity solutions to segregate at-risk computers or other endpoint devices from the rest of the network in order to effectively remove the threat, run...

Endpoint Remediation Explained

Endpoint Remediation is the process of resolving a cybersecurity threat once it has been identified to have infiltrated an endpoint device, such as a PC, laptop, mobile phone, tablet or even IoT...

Enterprise Cloud

We all think we know what cloud computing is, but when you ask different people to provide a definition it’s interesting to see the different responses that come back. Cloud Computing is...

Evil Twin Attacks Explained

An evil twin attack is a hacking method in which an attacker purposely sets-up a Wi-Fi network that has the same name or SSID (sometimes even the same MAC address) as a legitimate one in order to...

Explainable AI Explained

Explainable AI, in simple terms, is the application of artificial intelligence and its subsets in processes in which the outputs or insights given should be understandable and trusted by human...

Extreme Data Economy Explained

The era of Extreme Data Economy is where businesses are challenged to deal with operating at extreme scales, at extreme speeds involving extreme complexities and extreme amounts of data. When...

Flash Business Benefits Explained

When people think of enterprise flash storage they talk about technical features like performance but actually that is not as important as the business outcomes that flash delivers. The reason why...

Fortinet Security Fabric Explained

The Fortinet Security Fabric is a security infrastructure that encompasses the entire network, providing security capabilities to mitigate any and all potential attack vectors within an...

GDPR Compliance

GDPR Compliance explained   General Data Protection Regulation is a European Union (EU) initiative which comes into effect in May 2018. It is being put in place to strengthen...

© Asia Online Publishing Group Sdn Bhd 2022
Powered by