Splunk Cloud Explained

Splunk Cloud is a service that delivers Splunk Enterprise in the cloud. With Splunk Enterprise, businesses are able to easily collect and evaluate data streaming from security systems, IT...

Splunk Performance Explained

Operational Intelligence, Getting from Data to Insights Businesses must become smarter, more intelligent. In order to keep up with the pace of competition, they need to be able to have full...


Third Platform Analytics Explained

The Third Platform is a term that refers to the current phase of the IT revolution in transforming the way people and businesses connect to technology. Unlike the first (computer mainframes) and...

Webscale Datacentre

Webscale converged infrastructure is an approach to designing and managing a datacentre infrastructure which is easy to deploy and manage. It gives the user the option to start small and scale...

Wi-fi Phishing Explained

Wifi Phishing is when cyber criminals create a malicious WiFi access point that appears similar or identical to a legitimate WiFi access point. This malicious WiFi access point is sometimes known...

Wireless Security Explained

Wireless Security is the prevention of unauthorised access to systems, data and applications via wireless networking. This is not limited to network infrastructure alone. Even companies that choose...

Zero Day Attack Explained

Despite the precautions you've taken to protect your network and sensitive data, you're still at risk of a zero-day attack. But what exactly is it? A zero-day vulnerability refers to an...

© Asia Online Publishing Group Sdn Bhd 2017
Powered by