You've requested...

Share this with your colleagues:

Download this next:

CW ASEAN: European data law - be aware and prepare

Organisations across the ASEAN region will soon have to comply with another piece of data protection legislation – the General Data Protection Regulation (GDPR) that will apply to any company that collects the personal data of Europeans. In this month’s edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and law’s impact on businesses.

Also in this issue:

  • Personal data of 46.2 million Malaysian mobile subscribers leaked in huge breach: The potential record data breach is only the latest example of the dangers of ‘low and slow’ attacks, which remain dormant inside networks for years without anyone noticing before doing any damage.
  • Veritas takes stock of data management position with more offerings in pipeline: Software supplier Veritas says it has delivered on its promises, but there is still work to do in realizing its data management vision before the upcoming European Union General Data Protection Regulation.
  • Hong Kong cloud firm tests Excelero NVMe for video analytics: Vivavo claims to be running Excelero NVMesh NVMe storage at near-bare metal performance to support real-time analytics for facial and behavioral recognition on closed-circuit television.

These are also closely related to: "3 cloud migration tips"

  • CW ASEAN: Hyper-convergence offers simple yet scalable storage

    In this month’s CW ASEAN, we take a look at how TAL Apparel has reaped significant savings in storage and server resources by switching to hyper-converged systems. We will also explore the key drivers for the development of hyper-converged solutions and how they will transform the way applications are delivered.

    Also in this issue: 

    From backup to data management: Beyond data backup, extracting more metadata to improve business processes and data management will become more important, says a senior Veritas executive 

    Veritas expands partnership with Google: Enterprises can now deploy NetBackup and Backup Exec on the Google Cloud Platform, among other capabilities

    Private cloud: Orchestration, storage and containers: We look at the key requirements and components of private cloud – including the use of container platforms – and the impact of private cloud on storage in the datacenter.

  • October ezine: Tap into wearables

    Managing the MSP and SME relationship

    Billy MacInnes looks at how managed service providers can avoid the one-size-fits-all approach to the growing small business customer base

    Partner programmes could lose relevance if reseller concerns are not resolved

    A survey by analyst house Canalys has discovered that an increasing number of resellers are dissatisfied with the programmes they are offered by vendors, with consistency being the top complaint. Simon Quicke reports

    Wearables could be well worth your while

    Billy MacInnes looks at the opportunities for resellers in selling and supporting wearable devices

Find more content like what you just read:

  • CW ANZ June 2017: Flash makes a spash

    Find out why more Australian enterprises are now turning to all-flash storage technology to replace spinning disk storage systems, thanks to lower costs and reduced complexity. Sensing this business opportunity, Optus Business has teamed up with storage supplier Pure Storage to offer on-premise and cloud-based all-flash storage and services.

    Download

  • 10 data backup and resiliency vendors, ranked

    What should you look for in a data resiliency solution provider? According to this Forrester Research report, there are three critical aspects your data resiliency vendor should have mastered: policy-based execution, recoverability, and secure backup infrastructure and data. Access the report to identify the right vendor for your business needs.

    Download

  • Best practices for remote data backups

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

    Download

  • The benefits of security-embedded storage

    Download this datasheet to discover a solution that integrates security and compliance, data management workflows, and high-performance storage to neutralize threats in every area of the infrastructure.

    Download

  • CW Special report on Symantec

    This in-depth profile from Computer Weekly, updated for 2013, gives you the key facts on Symantec's products, financial performance and strategy.

    Download

  • The WORM approach for ransomware defense: write once, read many

    With the WORM approach, once data is written, it cannot be changed or deleted until a certain amount of time has passed, and because the data cannot be modified, it cannot be encrypted, making malware ineffective. Check out this datasheet to learn the 3 ways that WORM-equipped storage can be deployed to protect your apps.

    Download

  • Commvault vs. Cohesity vs. Unitrends: Cloud backup battle

    This DCIG buyer's guide is designed to help remove the mystery surrounding today's cloud data protection services, and explore which ones are ideal for which purposes.

    Download

  • CW ASEAN: Juggling in the cloud

    In this month's issue of CW ASEAN, we take a look at what organisations need to do to overcome the complex task of pulling together a seamlessly integrated data management strategy.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • Computer Weekly – 30 July 2019: Digital takes the racing line in Formula One

    In this week's Computer Weekly, we talk to the CIO of Formula One racing team Haas F1 to find out how technology is helping to compete with better-funded rivals. We examine the latest best practice advice on disaster planning. And we look at what the troubles at Deutsche Bank tell us about the rise of fintech startups. Read the issue now.

    Download

  • CW APAC: Expert Advice on data management

    In this handbook, Computer Weekly looks at how companies and data management experts are tackling data challenges, and finds out how organisations are augmenting data management through artificial intelligence and machine learning.

    Download

  • 3 foundational IT elements to quality healthcare

    Download this case study to see how a Georgia hospital migrated towards a hybrid cloud for to achieve a centralized imaging system with faster speeds, and learn the 3 most important IT elements to high-quality healthcare.

    Download

  • Analyst's take: Foglight helps telecomms company find savings and boost efficiencies

    After implementing Foglight, a major telecommunications company gained the ability to monitor and control its entire IT applications infrastructure in greater depth avoiding downtime and extra support staff, while boosting efficiencies of business-critical applications and staff productivity.

    Download

  • Keep the (IT) faith: Data, storage, and the GDPR countdown

    An e-zine looking at the issues around flash storage, EU General Data Protection Regulation (GDPR), hardware as a service, and cloud platforms. Here's all the channel news you need to know.

    Download

  • 7-step plan for building a scalable archiving strategy

    Highlighted in this resource is a 7-step plan for building a long-term, secure, scalable archiving strategy. Continue reading for insight on determining what data should be archived, how to reduce pressure on backup windows, and more.

    Download

  • Why folks are reintroducing tape to their backup systems

    Download this detailed white paper to learn why businesses are reintroducing tape to their data protection strategies, with special attention given to: how does tape work in the modern infrastructure, myth busting tape’s perceived shortcomings, and comparing the performance of tape to disk.

    Download

  • Unix-to-Linux Migration

    Get a step-by-step approach for data center managers that covers everything from making the business case to getting the best training. Sections in this IT Handbook include training staff to manage linux environments and much more.

    Download

  • Computer Weekly – 22 May 2018: GDPR is here – are you ready?

    In this week's Computer Weekly, the EU's new GDPR rules come into force this week – we ask if companies are ready and look at what happens if you're not compliant. Our latest buyer's guide examines digital transformation and the role of the CIO. And we find out how technology is changing the traditional sport of cricket. Read the issue now.

    Download

  • Buyer's Guide to EU General Data Protection

    The race is on to get ready for GDPR next year. In this 16-page buyer's guide, Computer Weekly looks at how to deal with data under the regulation, how compliance will affect businesses, and what organizations should do to prepare.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • MicroScope – February 2020: The power to transform

    In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments

    Download

  • Multi cloud backup and recovery best practices

    User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.

    Download

  • Cyber Threats: A perfect storm about to hit Europe?

    As the internet of things becomes increasingly popular, some European countries lack the capabilities to defend against cyber security threats. Meanwhile, in the private sector, hackers are stepping up attacks on manufacturing and telecommunications companies, this report from Marsh & McLennan reveals.

    Download

  • Essential Guide: Securing hybrid IT infrastructure

    In this essential guide, we examine the key security considerations for infrastructure, networks, data and hybrid cloud.

    Download

  • Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race

    In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.

    Download

  • CW Benelux August 2017

    The Netherlands is building itself a bit of a reputation when it comes to applying the latest technologies to some of the challenges facing people and businesses today.

    Download

  • CW Benelux May 2018

    GDPR becomes law at the end of this month, so we take a look at how organisations in the Netherlands are preparing for it. Cover your eyes if you are squeamish as you only have days left to get things right.We lead this issue with a story published in February, so perhaps things have changed. But if not, some organisations should be concerned.

    Download

  • A Computer Weekly Buyer's Guide to Data Management

    Organisations have an ever-increasing amount of data at their disposal. In this 13-page buyer's guide, Computer Weekly looks at what the future holds for data management, how the Met Office is opening up large volumes of data, and why business outcomes should be the focus for data use.

    Download

  • Computer Weekly – 25 June 2019: Saving bees with the internet of things

    In this week's Computer Weekly, we find out how internet of things technologies and "smart hives" are helping bee conservation. We examine Facebook's new digital currency, Libra, and analyse its pros and cons. And we look at how IT leaders are rising to the challenge of delivering ethics and sustainability in tech. Read the issue now.

    Download

  • Making multi-cloud work

    In this e-guide, read more about the tools you can use to manage multiple cloud services, the mistakes to avoid in multi-cloud storage management and tips to rein in costs in your multi-cloud strategy.

    Download

  • CW Benelux ezine August 2016

    In this issue of CW Benelux we describe how data scientists in the Netherlands have applied technology to art.

    Download

  • Data privacy under the GDPR, machine learning, and more

    In this week's Computer Weekly, we take an in-depth look at GDPR – the new EU data protection regulation - with only 12 months left to prepare, we hear how one firm is using machine learning to revolutionise online fashion retail, and we examine how CIOs can apply lessons from buying software to improve digital transformation.

    Download

  • 7 guidelines for modern enterprise file sharing & content collaboration

    Learn about enterprise file sync and share (EFSS) platforms and find out how they have evolved into powerful tools that drive business operations and innovation.

    Download

  • Buyer's Guide: Applications of next generation networking

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses

    Download

  • Buyer's Guide: Applications of next generation networking

    The race is on for businesses to adopt next-generation networking to stay ahead of their rivals. In this 14-page buyer's guide, Computer Weekly looks at how close we are to software-controlled networks becoming commonplace, assesses the current state of software-defined networking and explores the challenges a software-defined future poses.

    Download

  • Ransomware, technology, and healthcare trends

    The typical healthcare environment is a perfect storm of vulnerabilities, making it attractive to ransomware attacks. In this white paper, learn how BlackBerry Cylance helps strengthen cybersecurity in healthcare organizations with a prevention-first, predictive security approach.

    Download

  • Data protection in the age of Brexit and GDPR

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download

  • Discover the most successful types of cyberattacks

    As technology continues to advance, cybercriminals are leveraging new capabilities into more sophisticated cyberattacks. PandaLabs, Panda Security's anti-malware laboratory, tracks threat data in real time and has compiled it into a report. Download the report for highlights of 2018's cybersecurity trends, as well as emerging threats for 2019.

    Download

  • Why critical national infrastructures (CNIs) need adequate security

    In the public sector, ensuring the security and availability of critical national infrastructures (CNIs) is paramount. CNI providers maintain key functions ranging from energy to healthcare to transportation, and everything in-between. In this white paper, learn why CNI providers need CNI-ready security and discover how to address this need.

    Download

  • Unix-to-Linux Migrations Handbook

    This IT handbook provides expert tips on ensuring a successful Unix-to-Linux migration. Discover common mistakes to avoid and review the advantages Linux can offer.

    Download

  • Computer Weekly – 30 January 2018: Davos debates global tech risks

    In this week's Computer Weekly, world leaders at Davos discussed the growing reliance on technology and how to tackle the political and economic threats of the digital age. Our latest buyer's guide examines mobile app development. And we look at the biggest challenges facing CIOs in 2018. Read the issue now.

    Download

  • Reinforce your ransomware protection with 4 technologies

    Read this report from Forrester Research to learn how you can deploy four key technologies to improve your organization’s resilience against ransomware and to boost your detection, remediation, protection, and recovery from this growing threat.

    Download

  • Reinforce your ransomware protection with 4 technologies

    As ransomware attacks continue to rise, IT needs to not only ensure that they can recover in a timely manner post-attack, but also that they are recovering from an uninfected copy. Read this report from Forrester Research to learn how you can deploy four key technologies to improve your organization’s resilience against ransomware.

    Download

  • Explore how endpoint detection and response can supplement your security defenses

    Conventional security solutions are useful and provide some level of protection. However, surveys find that the current level of protection is simply not adequate. In this Osterman Research report, explore why many organizations are deploying endpoint detection and response technologies as a supplement to their existing security defenses.

    Download

  • Cloud security: Providing security in the age of cyberattacks

    Cyberattacks are predicted to be one of the most prominent global threats in the coming years. In fact, in the past year there has been a 17% rise in attack volume and 30% rise in attack severity. Luckily, organizations who adopt cloud platforms are seeing improved security. Read on to learn more about the rise of cloud security.

    Download

  • Best practices to defend against top security threats

    Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats. In this white paper, learn about the top concerns of decision makers, the growing success of cyberthreats, security's need to improve and best practices to consider.

    Download