July 2016 - Asystec

VxRail – The new standard in Hyper-Converged

VxRail is the only fully integrated, preconfigured, and pre-tested VMware hyper-converged infrastructure appliance family on the market. Based on VMware’s vSphere and Virtual SAN, and EMC software, VxRail delivers an all-in-one IT infrastructure transformation by leveraging a known and proven building block for the Software Defined Data Center (SDDC). With the power of a whole […]

Build your own briefing at Asystec!

2014 was the year that Asystec opened the doors to their first multi-technology briefing centre. We have since replicated this unique resource across our Cork and Dublin offices. Our Executive Briefing Centers were created entirely with the customer in mind – it is somewhere that you can go to discuss your business goals, meet with […]

What one piece of advice would you give an organisation that is embarking on a converged infrastructure deployment alongside existing IT infrastructure?

  The one piece of advice I would give is to start with smaller non-critical or developmental applications upfront. This allows all groups from storage, application, network and various support teams to become well versed and familiar in the management, deployment and performance of a converged infrastructure. This approach allows for the gradual movement or […]

A more detailed look at the Solvency II Directive

What does the directive mean for you?   Assessing a firm’s own risk and solvency Under article 45 your firm will be required to regularly assess your overall solvency needs based on risk profiles, risk appetites and business strategies, your compliance on a continuous basis with the Solvency II capital requirements and the significance with […]

Big Data Analytics – So what’s your secret sauce?

A partner colleague of mine was recently presenting his data & analytic platform with his delivery approach to an executive group at a meeting with a sales prospect. A recurring point made by one of the senior customer execs was they had similar pitches from other vendors and what he wanted to know was ‘What […]

User Behaviour Analytics is key to IT Security

Every cyber attack and potential data breach begins with some illicit activity. Of course the entire exploit, whether successful or not is illicit. But it is in detecting that first step, often tiny and apparently insignificant, at the earliest possible stage the all cyber security tools perform best in repelling attacks and preventing damage. There […]

After you have typed in some text, hit ENTER to start searching...