Story image

CASE STUDY: How Ricoh avoided disruption by meeting changing business needs

28 Nov 18
Sponsored

Ricoh Hong Kong is a document management solutions and IT services provider that needed to evolve its product portfolio.

Find out how Ricoh implemented a hybrid, multi-cloud deployment to secure the large volumes of data transfer for its Smart Backup-as-a-Service.

Taking this step allowed Ricoh to transform its business towards building additional SaaS applications to meet changing market demands, scale its service delivery, and increase customer adoption of its new Backup-as-a-Service and Cloud Workflow services. 

HTC signs with 5G partners across the globe
Sprint and Telstra will both carry a 5G mobile smart hub built by HTC.
Dell EMC embeds security in latest servers
Dell EMC's 14th generation of PowerEdge servers has comprehensive management tools to provide security across hardware and firmware.
Soul Machines' virtual humans go mainstream
An Auckland AI firm renowned for its work creating ‘digital humans’ is now unleashing its creativity to the wider market.
Why data backups should be a part of daily operations
"Disaster recovery needs to address complete system failure and provide a set of security policies to govern disaster incidents."
Hands-on review: The Logitech R500 laser presentation remote
With a clever ergonomic design, you’ll never have to glance at the device, unless you deliberately look to use the built-in laser pointer to emphasise your presentation.
Businesses focusing on threats from within - survey
Over 50% of respondents reported that 100 days of dwell time or more was representative of their organisation.
GCSB welcomes Inspector-General's report on intelligence warrants
Intelligence warrants can include surveillance, private communications interception, searches of physical places and things, and the seizure of communications, information and things.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.