Upcoming Events

Tips for Non-Disruptive Enterprise Storage Upgrades – II

The first part of this blog post explained the common design approaches used for a non-disruptive upgrade in enterprise storage. Further to the discussion, there are some unique approaches for a risk-free enterprise storage upgrade, which we will detail in this blog post.    Innovative Hardware Redundancy  Most enterprise array architectures are...

Tips for Non-Disruptive Enterprise Storage Upgrades – I

Throughout the lifecycle of an enterprise storage platform, administrators may upgrade the platform periodically. When we say ‘upgrade’, we refer to within-system upgrades that consist of firmware and software upgrades, software patches, and various hardware upgrades wherever applicable.    For storage platforms that host vital workloads,...

THE BENEFITS OF USING OBJECT STORAGE SYSTEM

Access to the right data is a critical mandate for IT professionals to maintain application ecosystems. While it’s easy to have distributed frontends on-premises, efficient and cost-effective ways to ensure scalability and data locality are close to zilch. Besides, practised application architecture is transforming. This means object storage...

Cybersecurity in Patient Safety

Patient safety is crucial in healthcare. Companies have different policies in place to safeguard patients. The patient safety process may consist of procedures to ensure regular treatment and proper medication, environmental safety measures, guidelines for proper communication of patient information. Most organisations may not look at...

Security in a 5G World

The forthcoming 5G is expected to bring devices with convenience, comfort and safety – in the process of which we need secure wireless controls as not to become a threat to us. Let’s take a closer look at the future of 5G – the benefits, risks and the security measures we need to take. According to The New Yorker, 5G will pump twelve...

What is the Difference between Reliability, Availability and Data Integrity?

Reliability, availability and data integrity are generally considered synonymous when, in reality, they are not. Knowing the difference between these helps organisations understand how safe their data is. Reliability determines the frequency of system repairs. Reliability is also said to be MTBF (Mean Time Between Failure). Mathematically it is...

Fraud Detection and Prevention in Digital Workflows

It is not a surprise that identity theft is a threat and a source of frustration for everyone. As a result of living in a digital era, identity theft can be destructive. Broken credit sources can stop you from accessing loans, basic needs and even employment. This is why Fraud Detection is extremely important. Businesses suffer the consequences...

What is Synthetic Monitoring – An Overview

While the cloud infrastructure technology is very useful to enterprises, the cloud is not a solution for all the problems—especially to maintain visibility across a hybrid IT landscape. An ideal solution is to boost agility while we continue to maintain stability. However, the distribution of applications across cloud and SaaS adds new...

Inflow Technology Bolsters Security Portfolio with Cyber Exposure Solutions from Tenable

Inflow Technologies today announced that it has entered into an agreement with Tenable®, Inc., the Cyber Exposure company, to be a distributor of the company’s Cyber Exposure solutions. The Tenable Cyber Exposure platform is the industry’s first solution to holistically assess, manage and measure cyber risk across the modern attack surface. The...

Past Events

Tips for Non-Disruptive Enterprise Storage Upgrades – II

The first part of this blog post explained the common design approaches used for a non-disruptive upgrade in enterprise storage. Further to the discussion, there are some unique approaches for a risk-free enterprise storage upgrade, which we will detail in this blog...

Tips for Non-Disruptive Enterprise Storage Upgrades – I

Throughout the lifecycle of an enterprise storage platform, administrators may upgrade the platform periodically. When we say ‘upgrade’, we refer to within-system upgrades that consist of firmware and software upgrades, software patches, and various hardware upgrades...

THE BENEFITS OF USING OBJECT STORAGE SYSTEM

Access to the right data is a critical mandate for IT professionals to maintain application ecosystems. While it’s easy to have distributed frontends on-premises, efficient and cost-effective ways to ensure scalability and data locality are close to zilch. Besides,...

Cybersecurity in Patient Safety

Patient safety is crucial in healthcare. Companies have different policies in place to safeguard patients. The patient safety process may consist of procedures to ensure regular treatment and proper medication, environmental safety measures, guidelines for proper...

Security in a 5G World

The forthcoming 5G is expected to bring devices with convenience, comfort and safety – in the process of which we need secure wireless controls as not to become a threat to us. Let’s take a closer look at the future of 5G – the benefits, risks and the security...

What is the Difference between Reliability, Availability and Data Integrity?

Reliability, availability and data integrity are generally considered synonymous when, in reality, they are not. Knowing the difference between these helps organisations understand how safe their data is. Reliability determines the frequency of system repairs....

Fraud Detection and Prevention in Digital Workflows

It is not a surprise that identity theft is a threat and a source of frustration for everyone. As a result of living in a digital era, identity theft can be destructive. Broken credit sources can stop you from accessing loans, basic needs and even employment. This is...

What is Synthetic Monitoring – An Overview

While the cloud infrastructure technology is very useful to enterprises, the cloud is not a solution for all the problems—especially to maintain visibility across a hybrid IT landscape. An ideal solution is to boost agility while we continue to maintain stability....

Inflow Technology Bolsters Security Portfolio with Cyber Exposure Solutions from Tenable

Inflow Technologies today announced that it has entered into an agreement with Tenable®, Inc., the Cyber Exposure company, to be a distributor of the company’s Cyber Exposure solutions. The Tenable Cyber Exposure platform is the industry’s first solution to...

HPe Partner Enablement Session

Minimize Complexity: Maximize Speed

HPE Interactive Session in association with Inflow Technologies conducted on 28th Novmember 2018