Insights

Featured article

The Art of (Cyber) War: Prevailing threats and effective defences

In our first of this two-part blog (Know thy enemy), we referenced Sun Tzu (771–256 BC), a brilliant Chinese military… ...

Read more

All Amidata articles

Hybrid cloud data management – in search of that silver lining.

Hybrid cloud is here to stay. According to the recent Global Hybrid Cloud Trends Report, an impressive 82% of IT…...

Read more

How can AI and machine learning enhance data backup and recovery?

Artificial intelligence (AI) has made significant advancements in many applications, from revolutionising industries to speeding up our daily operations. Australian…...

Read more

How Can Businesses Reduce Risk with People-Centric Cybersecurity Awareness?

With so many businesses now housing assets and data online, cyber-attacks have come at a high cost if their networks…...

Read more

What Could Your Business Lose Without a Disaster Recovery Strategy?

We have witnessed seismic disruptions shake the stability of global e-commerce trade in recent years. As we have grown so…...

Read more

Know thy enemy: Traversing the 2024 global threat landscape.

Sun Tzu (771–256 BC), a Chinese military general, strategist, and philosopher, showed remarkable prescience when he said, “Know thy enemy…...

Read more

Will AI stab your cybersecurity efforts in the back?

There’s no doubt that AI is going to be a powerful force for good in cybersecurity. But (and there is…...

Read more

Cybercriminals: 2023 was not the year of rest for the wicked

Make no mistake, 2023 was a big year for cybercriminals targeting Australian businesses. So much so that you may be…...

Read more

RaaS: The hot revenue stream for bad actors

We all understand and embrace the easy, affordable, and convenient benefits of as-a-Service solutions. And the baddies are no exception.…...

Read more

Hybrid multi-clouds are ripe for ransomware attacks. So, what can you do?

The word ransomware strikes fear into the hearts of most businesses, and justifiably so. Ransomware attacks are a major concern…...

Read more

What is ransomware?

Ransomware is malicious software that infects a computer and restricts access to crucial user data until a ransom is paid…...

Read more

VoIP monitoring software shouldn’t be hard

VOIP and network Quality Manager Have you considered a more effective and affordable way to monitor your voice and video…...

Read more

Microsoft Teams backup and recovery in NEW Veeam Backup for Microsoft Office 365 v5

For years, Veeam has established itself as the #1 Office 365 backup. This will be further solidified with version 5 of…...

Read more

Office 365 Backup Policies & How to Fully Protect Your Data

Microsoft Office 365 prides itself on enabling dynamic, collaborative workplaces for its customers. Industry leading security measures, and attention to privacy, compliance, and…...

Read more

Considerations for Protecting Large Scale-Out NAS Clusters

We recently published a solution page that focuses on a new way to protect large scale-out NAS clusters.  As with all solutions…...

Read more

Data security – Veeam

There are many risks to data: from the IT admins worst nightmare, ransomware, to a company's worst nightmare, a malicious…...

Read more

How Service Providers protect your data against common cybersecurity threats

Security challenges for IT professionals and organizations today are multitudinous. Every day we learn of an organization that became a…...

Read more

What Matters in Storage

The past few decades have brought a series of innovations to the storage industry, such as tiering, snapshots, deduplication, replication,…...

Read more

3 Tips to Protect Essential Data in a Multi-cloud Environment

Cloud usage was on the rise even before recent events made the rapid shift to remote work imperative for many…...

Read more

Back-up and Data Recovery – the best Ransomware Protection

Ransomware attacks on small and large businesses since 2017, show that 5% of these businesses fell victim to these attacks.…...

Read more

Network Performance Monitoring

Multi-vendor network monitoring, that scales and expands with the needs of your network Key Features Multi-vendor network monitoring Network Insights…...

Read more

HPE Nimble Storage dHCI – What is it?

At Discover 2019 recently, Hewlett Packard Enterprise (HPE) announced their new Nimble Storage dHCI solution. An “intelligent platform with the…...

Read more

4 Reasons to make the move to HPE GreenLake

As your business grows, it needs IT infrastructure that allows it to remain competitive while meeting the demands of end-users.…...

Read more

Data Protection: How do you combat such a complex and varying challenge?

Data Protection Businesses are being reimagined by the day. We live in an era that is quickly becoming defined by…...

Read more

What’s the Best Solution For You – Public, Private or Hybrid Cloud?

Cloud storage is becoming an integral component of the modern-day business. From accessibility to security, cloud computing offers an array…...

Read more
Load more