Hit enter to search

Dirk Slechten

Executive System Engineer, EASI
Author Avatar

Where are you with your ransomware recovery strategy? Step 1: Perimeter strategy

Only with a good IT strategy with a proactive security strategy and a proactive disaster recovery plan you can increase your chances of withstanding a ransomware attack. Discover how.

Read More
Author Avatar

Onboarding of a client on the safe2be platform

We're quite proud of our latest onboarding project. Let's have look at the implementation process and the results.

Read More
Author Avatar

How to speed up your application backups

Significantly speed up your backups and lower the bandwith send between your backup server and your Data Domain System? We have the solution.

Read More
Author Avatar

3 Reasons Why You Should Discover The Cloud2be Self Service Portal

We've recently introduced the Cloud2be Self Service Portal. That's why we're highlighting the most interesting advantages for you.

Read More
Author Avatar

Introducing: the Cloud2be Self Service Portal

Discover it's advantages, why it will improve your flexibility and the answers to frequently asked questions.

Read More
Author Avatar

End of Extended Support for Microsoft Products

Microsoft announced the end of support for Windows 7, Windows Server 2008, Windows Server 2008 R2, Exchange 2010, Sharepoint 2010, and Office 2010. This is a handy overview about what it means for...

Read More
Author Avatar

Backup, your last line of defense!

Everybody knows that backups are important. This article will tell you more about how secure you need to store and handle your backups.

Read More
Author Avatar

Step 4: Start the journey to Micro-Segmentation

Micro-Segmentation you said? What is that?

Read More
Author Avatar

Step 3: The Journey to a Secure Environment

Step 3: Protect your Virtual Machines from the Hyper-Visor. In legacy server environments, we install anti-virus agents on the servers. These anti-virus agents need to be upgraded on a regular basis,...

Read More
Author Avatar

The Journey to a Secure Environment: Step 2

Every week, new security vulnerabilities get discovered. Scanning the perimeter will give you a report of your environment against these vulnerabilities.

Read More

Current job openings

We are constantly looking for new colleagues!

If you share our values and you're looking for a challenging job in Belgium's Best Workplace, visit our website.

Apply now

Get our top stories in your inbox every month

Follow us

  

Share this article