We`re just sending through your details

Please give us a few moments whilst we get your account ready.

OKAY

Redstor Prepare For The 2018 Cloud Conference

Redstor Prepare For The 2018 Cloud Conference

posted in Redstor ● 29 May 2018

Continuing a busy events schedule for 2018, on June 13th Redstor will be exhibiting at the South African event, Cloud Conference 2018.  The event held at the Gallagher Estate in Gauteng will see top cloud, hosting and security executives and IT professionals come together for a fantastic day.

The estimated 1500 attendees will have the opportunity to network, exhibit and attend talks by keynote and guest speakers. Keynote speakers include Jan Hnizdo, CFO of Terako, Aki Anastasiou, Host of Technobyte and Tech Busters.

The main agenda of the day will begin at 9 am with topics covered throughout the day covering cloud data management, hosting and data centre technologies.

Redstor will be exhibiting at the show demonstrating expertise in data management and protection including archiving, backup and recovery and disaster recovery solutions. In addition, we’ll also be discussing:

  • Unified data protection
  • How to reduce downtime
  • POPI compliance

If you’re at the show, make sure to stop by and see us.

Vital new role of AI in keeping backup data safe from malware

Vital new role of AI in keeping backup data safe from malware

Every day more than 350,000 new types of malware are unleashed on the internet. The scale of the problem is so massive, it is no longer enough to have traditional anti-virus software, solely defending against known threats.

Continue reading
Xero Data Backup

Why you should consider Xero Data Backup for your accountancy firm

Ignoring the need for a third-party backup is a major gamble. Xero’s own Services Agreement states: “You must maintain copies of all data inputted into the service. Xero expressly excludes liability for any loss of data no matter how caused.”
Continue reading

Survey on risk of data loss and cybercrime

Wondering how best to fend off new cyber threats? Curious about what your peers are doing?

Continue reading