Secure Access Service Edge (SASE) Jul 17, 2023 Author: Alon Josefsberg, Trustmarque cyber security pre-sales consultant Empowering your strategy with Secure Access Service Edge (SASE) Hybrid ... Cyber Security Technology Blogs Read article
What is Ransomware protection? Jul 17, 2023 Author: Alon Josefsberg, Trustmarque cyber security pre-sales consultant The effects of a ransomware attack, like any other cyber attack, can be ... Cyber Security Technology Blogs Read article
How we seamlessly integrated Agile into a former Waterfall team Jun 4, 2023 The Trustmarque Cloud Team’s journey from Waterfall to Agile, across 2 years, has resulted in zero delivery escalations across 120+ projects. We feel ... Microsoft Azure Technology Blogs Read article
Single Pane of Glass – Maximising the Value of Your Hybrid Cloud May 5, 2023 Businesses are increasingly adopting hybrid cloud environments to seamlessly combine on-premises infrastructure with cloud resources, optimising ... Microsoft Azure Technology Blogs Read article
Improve efficiency with Value Stream Mapping Apr 2, 2023 First of all, what is Value Stream Mapping? In fact, before that, what is a “stream”? A stream refers to the entire flow of work, activities, and ... Microsoft Azure Technology Blogs Read article
The big PSTN and ISDN switch off – what does it mean for you? Mar 6, 2023 In December 2025, the BT Openreach Public Switch Telephone Network (PSTN) will be switched off. This means that the old telephone network, that has ... Voice Network services Technology Blogs Read article
What is a data-driven NHS ‘war room’? Oct 21, 2022 NHS England has announced that 24/7 control centres are to be set up across England this winter and some are calling these data-driven ‘war rooms’. ... Data Technology Blogs Read article
How can the NHS use data and artificial intelligence (AI)? Sep 26, 2022 With the emergence of artificial intelligence (AI), Dick Wall (Healthcare BI Solutions Architect) discusses how NHS and healthcare providers can ... Data Technology Blogs Read article
Phishing: Stop spam emails and secure your cloud inbox Sep 8, 2022 Protect your cloud deployment with Proofpoint and block malicious activity, securing your Microsoft 365 environment against compromises. Most of us ... Cyber Security Technology Blogs Read article
Cyber security for the public sector Apr 6, 2022 In a time when the impact of the Covid-19 pandemic is still being felt, resources are being stretched thinly. Unfortunately, cybercriminals continue ... Cyber Security Technology Blogs Case Studies Read article