Preparing for GDPR with Tata Communications Cloud Services

October 5, 2018

More data has been created in the past two years than in the entire previous history of the human race1. The total volume of data in the world is predicted to reach 44 trillion gigabytes1 by 2020 and it’s stored in multiple diverse locations – from smartphones to servers in the cloud. Instances of misuse of this data have also increased phenomenally. In fact, IDC predicts that by 2020, more than 1.5 billion people,2 or roughly a quarter of the world’s population, will be affected by data breaches. Recent breaches have necessitated a comprehensive reform of the data protection regulations for organisations who have access to, store or process such data.

Spotlight

Tamkeen Technologies

A Saudi company (established in 2013) owned by multiple government and private sectors to serve the IT needs of the market focused on labor market as the preferred government choice. Its meant to be the main provider of labor market services, and key player in the Saudi IT market.

OTHER WHITEPAPERS
news image

Who Owns Security in the Cloud?

whitePaper | September 27, 2022

Businesses once doubted the long-term benefits of moving their traditional, on-premises workloads to the cloud. But those doubts didn’t last long. The ROI of cloud migration was realized quickly and decisively. Businesses eagerly shifted their workloads to the cloud and realized the financial benefits of doing so. However, in the rush to the cloud, clarity on security — and who is responsible for it — is often lost.

Read More
news image

Exadata Cloud@Customer Security Controls

whitePaper | February 2, 2022

Exadata Cloud@Customer (ExaC@C) provides Oracle's public Exadata Cloud Service at a customer's data center using Oracle-owned and managed infrastructure located at a customer's data center.

Read More
news image

Data Sovereignty and the VMware Sovereign Cloud Initiative

whitePaper | June 16, 2022

An overarching aspiration of digital sovereignty represents the need to ensure a national (or regional), sovereign end-to-end digital capability and control. Such an aspiration is not only concerned with the sovereign protection of data, but going beyond such data sovereignty concerns and ensuring access to sovereign digital tools to develop applications.

Read More
news image

Cloud Privilege Broker 22.1 Security Whitepaper

whitePaper | September 15, 2022

There is complete end-to-end encryption from BeyondInsight with Cloud Privilege Broker through to the Cloud Platform Infrastructure. Cloud Privilege Broker services communicate with each other through distributed queues over TLS encryption.

Read More
news image

vSRX Deployment Guide for Private and Public Cloud Platforms

whitePaper | August 8, 2022

Juniper Networks, the Juniper Networks logo, Juniper, and Junos are registered trademarks of Juniper Networks, Inc. in the United States and other countries. All other trademarks, service marks, registered marks, or registered service marks are the property.

Read More
news image

Edge computing and deployment strategies for communication service providers

whitePaper | February 26, 2020

Communication Service Providers (CSP) are looking for new revenue sources to grow their businesses, especially in the enterprise area which will be increasingly important in the future. According to the Ericsson report “5G for business: a 2030 market compass”, by 2030 up to USD 700 billion of the 5G-enabled, business-to-business value could be addressed by CSPs. With the introduction of 5G and edge computing, they are now in a better position to provide new offerings both to enterprises that need to automate industrial processes and to consumers who require improved user experiences for on-line gaming. Edge computing provides distributed computing and storage resources closer to the location where it is needed and targets new business opportunities that provide support for specific application use cases. Some examples of use case areas are augmented and virtual reality, manufacturing and automotive. The innovation rate in this part of the application ecosystem will be significant going forward. The edge opportunity should be seen in a larger context of the enterprise opportunity, where edge computing will be an enabler for many broader use cases, for example within the Internet of Things (IoT) and potentially bundled with other enterprise offerings such as 5G private networks.

Read More

Spotlight

Tamkeen Technologies

A Saudi company (established in 2013) owned by multiple government and private sectors to serve the IT needs of the market focused on labor market as the preferred government choice. Its meant to be the main provider of labor market services, and key player in the Saudi IT market.

Events