SANtricity Explained

To enable businesses to keep up with the competition and the pace of digitization, NetApp announced last year their new SANtricity software for both its EF-series all-flash and E-Series storage...

SD-WAN Appliance Explained

SD-WAN is a virtual Wide Area Network (WAN) architecture that is designed to allow businesses to leverage networks to meet the growth of cloud computing and other mobile devices. SD-WAN leverages on...

Secure Authentication Explained

Accredited to: Dr. Dzaharudin Mansor Authentication is the process of correctly verifying a user’s identity. It answers the question of, “who are you?” when a person...

Secure SD-WAN Explained

A secure SD-WAN is as the name suggests: A Software-Defined Wide Area Network that is protected across the multiple branch locations it covers. Now, an SD-WAN is typically designed to include...

Security Posture Explained

Security posture is a measure of the cybersecurity strength of an organisation’s network, information, and systems. This includes an enterprise’s threat management and response...

Security-Driven Networking Explained

Security-driven networking is a modern approach in network infrastructure where security should be inherent within the environment. In this approach, importance is placed on both security and...

Sentiment Analysis Explained

Sentiment analysis is the process or technique of identifying the underlying emotions or feelings—whether positive, negative, or neutral—within text data using Natural Language...

Serverless Computing Explained

Serverless computing is an approach in cloud computing wherein an application is run using third-party services, client-side logic and cloud-hosted remote procedure calls (Functions-as-a-Service)...

Service Level Agreement (SLA) Explained

In today's service-driven economy, anyone who avails of any service would naturally want that service to be exceptional. But the question is, how does one measure service quality? How can one...

Shadow IT Explained

Shadow IT refers to the usage of applications, devices, software, and other IT services outside the approval and guidance of the IT department. While it poses risks for employees and their...

© Asia Online Publishing Group Sdn Bhd 2022
Powered by