Blog Header

News

Identity and access management in Africa: SYLVERSYS & Atricore join forces
November 18, 2016

US-based Atricore, Inc. is teaming up with Sylversys, bundling top tier security auditing capabilities with enterprise level identity and access management…

Read More
atricore, identity and access management solutions
Identity and access management in Africa: SYLVERSYS & Atricore join forces
November 18, 2016

US-based Atricore, Inc. is teaming up with Sylversys, bundling top tier security auditing capabilities with enterprise level identity and access management…

Read More
5 Steps to Secure & Affordable Video Conferencing for SMBs
June 24, 2013

STEP #1: Get the Setup right You will need the following in your meeting room: 1x TV or Video Projector 1x…

Read More
5 Steps to Secure & Affordable Video Conferencing for SMBs
June 24, 2013

STEP #1: Get the Setup right You will need the following in your meeting room: 1x TV or Video Projector 1x…

Read More
BigData and Enterprise Data Warehouse not opposing concepts
March 22, 2013

The idea of writing this post came out to me yesterday after some email discussions at work around the options for…

Read More
BigData and Enterprise Data Warehouse not opposing concepts
March 22, 2013

The idea of writing this post came out to me yesterday after some email discussions at work around the options for…

Read More
BPM your next move as a Manager – Extract
July 11, 2012

This post is an extract of my recent post on BPMLeader.com. I just wanted to emphasize some points on it, if…

Read More
BPM your next move as a Manager – Extract
July 11, 2012

This post is an extract of my recent post on BPMLeader.com. I just wanted to emphasize some points on it, if…

Read More
Security considerations in Small and Medium Enterprises (SMEs)
June 27, 2012

When comparing SMEs and Large Enterprises on Security, one element is found to be common to the two: They both utilize…

Read More
Security considerations in Small and Medium Enterprises (SMEs)
June 27, 2012

When comparing SMEs and Large Enterprises on Security, one element is found to be common to the two: They both utilize…

Read More