Red Hat Gluster Storage Explained

Red Hat Gluster Storage? Red Hat Gluster Storage is an open, software defined scale-out storage platform to easily manage unstructured data for physical, virtual, and cloud environments. Red Hat...

Red Teaming Explained

Red teaming is the organising of cybersecurity experts who simulate real-world attacks on the assets of enterprises. They utilise techniques and procedures disinterested parties or even adversaries...

Robotic Process Automation explained

Robotic Process Automation (RPA) is a technology that allows computer software to be configured to emulate a wide range of computer-centric processes or interact with applications the way humans...

Rogue Access Points Explained

A Rogue Access Point is defined as any wireless Access Point that are not part of the network. It might be operating on the same or an adjacent frequency, occupying the spectrum, raising the noise...

Ryuk Ransomware

What is Ryuk Ransomware?  Ryuk has not grabbed the mainstream headlines in the same way as wannabe or Petya but arguably it is much more significant. First reported in August 2018,...

SANtricity Explained

To enable businesses to keep up with the competition and the pace of digitization, NetApp announced last year their new SANtricity software for both its EF-series all-flash and E-Series storage...

SD-WAN Appliance Explained

SD-WAN is a virtual Wide Area Network (WAN) architecture that is designed to allow businesses to leverage networks to meet the growth of cloud computing and other mobile devices. SD-WAN leverages on...

Secure SD-WAN Explained

A secure SD-WAN is as the name suggests: A Software-Defined Wide Area Network that is protected across the multiple branch locations it covers. Now, an SD-WAN is typically designed to include...

Security-Driven Networking Explained

Security-driven networking is a modern approach in network infrastructure where security should be inherent within the environment. In this approach, importance is placed on both security and...

Social Engineering Explained

Social engineering refers to a variety of tactics that can be used to trick people into becoming a victim of cybercrime, for example, by opening a malicious attachment, clicking on an unsafe link or...

© Asia Online Publishing Group Sdn Bhd 2021
Powered by