RPO and RTO: what they are, why they matter, and why almost no company actually monitors them
IT infrastructure is now the true backbone of every company. In fact, the moment systems stop, IT ceases to be a technical issue and becomes…
IT Resiliency
The Risks of Non-proprietary Software & the Need to Bring Data Back Under Control
For years, the IT world’s mantra was singular: “Cloud-First.” We witnessed a mass migration toward the SaaS (Software as a Service) model, driven by the…
IT Resiliency
The Real Problems of the Backup World: Why Companies Are Never Truly Compliant
For corporates, prevention is often perceived as a cost rather than an investment. Consequently, anything that isn’t strictly mandatory tends to be postponed, or addressed…
IT Resiliency
Case Study – The Platform is Now Resilient & Scalable by Design
Disclaimer: Many of our clients have confidentiality agreements that restrict the use of their brand names for commercial purposes. Consequently, you may encounter the use…
IT Resiliency
Interview – DRaaS: the winning move for protection and savings?
We have collected some questions that will be answered by two SORINTians who are experts in Disaster Recovery and Security. The cue? Current events: from…
IT Resiliency
User and Entity Behavior Analytics : The security reporting tool developed by SORINTians
Background Some key points to consider: SORINTians solved a long-standing problem for a client in the banking and finance sector, achieving a major result in…
IT Resiliency
NIS2 Directive: a 3-minute overview of everything you need to know
In today’s digital world, cyber threats are multiplying rapidly and affecting all kinds of organizations. That’s where NIS2, the new European cybersecurity directive, comes in.…