Social Media

Even though the Syrex and Redstor partnership was formalised last year, the journey towards it began more than two decades ago. Part of this can be attributed to how technology has shifted towards off-premise environments and the importance of safeguarding the data residing there. “Over the past 23 years, Syrex has tried numerous technologies that
View Article
The partnership between Syrex and Check Point Software Technologies has gone from strength-to-strength over the past three years with the South African ICT solutions provider using it to provide local clients with a unique approach to next-generation firewalls. “At the time, we went to the CeBIT computer expo in Germany to evaluate different vendors. The
View Article
A relationship that began many years ago with the migration of the Syrex secure email gateway services to Mimecast has evolved into a partnership for the future as companies need to become increasingly cyber resilient to protect themselves against malicious email attacks, says Ralph Berndt, Director of Sales at Syrex. “The advanced product features of
View Article
Securing the end point with enterprise-ready technology was traditionally outside the budget of the SME, but that’s in the past, says Ralph Berndt, Director, Sales at Syrex. The enterprise has traditionally been the first served with a large variety of security services based on bigger budgets and plenty of functionality. It is to those with
View Article
With data being likened to the oil of the digital age, decision-makers cannot afford to ignore evolving cyber threats especially given recent examples of ransomware attacks targeting local companies. Ralph Berndt, Director of Sales at cyber resilience experts Syrex, examines the importance of thinking differently about cyber security. “International research shows that 54 percent of
View Article
Section 1 – Setting the scene SDN has become increasingly popular, but what does it actually do? The truth is, it means different things to different people. Although it’s a bit of an umbrella term, it essentially comes down to programmers configuring networks to send data down specific paths, rather than leaving it up to network protocols to show the way.
View Article

Copyright © 2019