Our site uses cookies to make it work and to help us give you the best possible user experience. By using our site, you agree to our use of cookies. To find out more about cookies and how you can disable them, please read our cookies statement. 

Cookie Settings

You can manage your cookie settings by turning cookies on and off.

Click on the different cookie  headings to find out more about the types of cookies we use on this site and to change your settings. Please be aware that if you choose to turn off  cookies, certain areas of our site may not work and your browsing experience may be impacted.

For further information on how we use cookies, please see our cookies statement. 

Strictly Necessary Cookies

(Req)

These cookies are essential for the technical operation of and proper functioning of our site  and enable you to register and login, to easily move around our site, and to access secure areas. Without these cookies our site won't function properly.  

These cookies are required

Performance Cookies

Performance cookies allow us to collect aggregated and anonymous data on how our site is used, such as the number of visitors to our site, how you navigate around and the time spent on our site and also to identify any errors in functionality. These cookies also help us to improve the way our site works by ensuring that you can find what you’re looking for easily, to better understand what you are interested in and to measure the effectiveness of the content of our site. 

Marketing Cookies

These cookies allow us to advertise our products to you and allow us to pass this information on to our trusted third parties so that they can advertise our products to you on our behalf. All information these cookies collect is aggregated and therefore anonymous. No personal information is shared to third parties. Any personal information collected while using our website could be used for direct marketing from Dimension Data only.

Dimension Data Blog

Lighthouse Featured
Blog

Navigating compliance while your data scales

Hybrid storage models including managed storage are essential in ensuring compliance and scale in an age of increasing regulation.

Read blog
Rocky ocean
Blog

What I learned from hacking the Winter Olympics

I used to think that technology was the answer to all security questions, but my experience post 9/11 taught me that governance should always be the starting point for security discussions.

Read blog
Cityscape
Blog

The two-way conversation you need to have with your CEO on cybersecurity

With cyberattacks featuring regularly in mainstream news, it’s good to see that Boards and CEOs are becoming more cybersecurity conscious.

Read blog
City
Blog

Balancing risk and innovation

There’s no question that digital is the way forward. It offers tremendous benefits to your business: faster speed to market, more business intelligence and improved customer relationships.

Read blog
Cityscape
Blog

Securing the multi-cloud

As economic and operational benefits of the cloud became clearer, business units aggressively drove cloud services adoption across the business.

Read blog
Computers
Blog

Now’s the time to engage a Managed Security Services provider

There are now more reasons than ever to engage a managed security services provider (MSSP).

Read blog
Blog

Automation and orchestration: transforming how cybersecurity teams work

It’s an exciting time to be in cybersecurity, as automation and orchestration help to transform how Cybersecurity teams operate on a day-to-day basis.

Read blog
colourful graph
Blog

Do the flow-bot: applying machine learning to internet-scale security analytics

The analysis of network flows for security is not new and has been adopted in both network and security industries for more than a decade.

Read blog
Roads
Blog

SDN is redefining the data centre

To understand how the data centre is changing within the enterprise, it’s important to recognise that its essential functions are not changing.

Read blog
Robot hand
Blog

Behavioural analytics and artificial intelligence demand a relook at identity

The reignition of interest in and the acceleration of the capabilities of artificial intelligence (AI) are providing security professionals with an expanded toolbox.

Read blog

Recent tweets