What are you looking for?

white decorative stripes white decorative stripes
About Pedab

Pedab blog

Welcome to our world

Container-based software

In the blog Modern IT – Containers, we focused on Red Hat OpenShift and the IBM Cloud Paks story. In this blog we focus on the software itself and new kind of flexibility in the…

Why the cheapest cyber security is the most important security

Solutions for cyber security come in many makes and models but all of them have traditionally had a hefty price tag in either costs or time consumed. Hence, it is mainly the larger organizations that…

Modern IT – Containers

We need to offer our customers flexible solutions that will help them succeed in the hybrid world as well. Efficient resource management, easier maintenance, and faster deployment. IBM’s answer to this are called Cloud Paks…

Huawei OptiXtrans 908 – the optical interconnection of data centers at the speed of light

Many people probably remember the time not so long ago when the interconnection of different data centers was mainly about security and accessibility, or Disaster Recovery and Business Continuity. With today’s complex DC environments and…

Do you know how vulnerable your business is?

The first commercial computer, introduced by Lyons Electronic Office, was the start of a revolution in simplifying routine tasks. In recent years, our dependence on modern IT systems has, to a greater extent, also demonstrated…

5 Basic IT-security tips you must follow

We have previously written about 7 smart IT security tips you should read before you go on vacation, but it is so important to protect your own and your company’s data during the workday as…

How to reduce your company’s business risk

Digitization has led to major skill gaps around organizations’ awareness of IT security. Managers have been neglecting their own as well as the organization’s education in raising the awareness of the individual’s responsibilities. This responsibility…

This is how much your business will loose from being hacked

Cyber-attacks occur more frequently and in different forms. The fact is that cyber attacks can cause financial losses and affect reputations for several years.

8 signs that you have been hacked

To discover cybercriminals can be a challenge. After all, one of their focus areas is to not be discovered. There are, however, some signs you can be on the lookout for to discover if unauthorized people have looked at your data.

Do you trust your email?

90% of all security attacks start with phishing. A successful phishing attack is just the beginning of your problem. These types of attacks are more often than not used so the hacker get a foot in the…

7 types of hackers you should know about

Hackers’ motivation can be anything from idealists to industrial espionage and organized crime. Thus, the term hacker does not mean a criminal or irresponsible person. Some have good intentions and tell companies if they come through systems, while others hack for their own financial gain. By understanding the different types ofhackersexist out there,you can also […]

What are the most commonly used cyberattacks?

On a daily basis, we read the news about large and small organizations that are exposed to seriouscyber-attacks. The common denominator is that the attacks come just as surprisingly and unexpectedly on all of them. Below you can read more about the most common cyber-attacks that can hit your business.

What is data security?

Cybersecurity is about protecting your data from cyberattacks. All data should be stored securely and transmitted over networks between several possible storage locations without any information being lost, read, copied or changed by unauthorized persons.

What is Cyber Security Month?

National Cyber Security Month was first started in the early 2000s in the United States by the National Cyber Security Division within Homeland Security, along with the Cyber Security Alliance.

7 tips for maintaining security while working from home

These past 7-8 months have brought some changes with them, one of them being working from home. When you are not used to doing so, you risk not maintaining your security in the midst of it all. Cybercriminals can expose the weaknesses that arise and it is therefore especially important to remember your online digital […]

HUAWEI SWITCH S5732-H

Huawei CloudEngine S5732-H Multi-GE Switches – with 24 or 48 licensed ports, up to 10 Gbit / s!

Sharp turns and steep slopes

Your business is ready for digital transformation. The strategic vision is approved, and everybody is excited about the endless possibilities, enabled by the new technology. Now what? When will we hear the big bang?

Advance your data-driven journey – improve data literacy

“By 2023, data literacy will become an explicit and necessary driver of business value, demonstrated by its formal inclusion in over 80% of data and analytics strategies and change management programs.  Gartner 2019 In a…

SAP BusinessObjects 4.3 is now available

In the new release of BusinessObjects BI 4.3 you will find a new and modern user interface and a number of new features. With SAP BusinessObjects BI 4.3, you can now fulfil your on-premise needs…

Taking full responsibility for the customers IT-security

Tussa and Pedab with unique security service for the business community in Møre og Romsdal.

7 security tips you should know about before you go on holiday

The summer holidays are a time for relaxation with friends and family, whether you are at home or exploring exotic places. No matter what plans you have for the summer, it is a time for…

New sharp products from Huawei

Huawei Wi-Fi 6 Solution, the market’s first comprehensive network solution for Wi-Fi 6, has now become even sharper, with the introduction of the AirEngine new range of access points, providing double signal strength and greater…

THE INTENT-DRIVEN HUAWEI CLOUDCAMPUS

Real-time mobile access has reshaped our daily lives. Everybody – at home as well as in offices, production facilities, hospitals, schools, etc. – expects to access cloud-based applications and resources from anywhere, using any device.…

Wi-Fi-as-a-Service enables fast, digital transformation

Wi-Fi 6 is now a reality. Being four times faster than Wi-Fi 5, this new standard for enterprise Wi-Fi is good news for all types of organizations – big or small. We all use more…

Takeaways from the IBM worldwide storage launch

For the first time, IBM hosted a worldwide Storage Launch in the Nordics. More than 300 customers, partners, and IBM’ers came to the At Six Hotel in Stockholm, and more than 2000 were watching the live…

FINANCIAL PERFORMANCE – THE MEASURE OF YOUR PROGRESS

Use my list of ten sources with links below to get a better idea of how much succeeding in your data-driven digital journey can improve your financial performance.  1. All roads lead to the data-driven…

Full-scale automation is the next step in the AI revolution

AI is on everyone’s lips today, but so far it’s mostly about different types of decision support. The next step is to automate transaction management, IBM’s Bill Lobig says. When Pedab’s partner Apendo invited IBM’s…

LIST: 10 sources that show that data drives Financial performance

There’s a wealth of research and anecdotal evidence showing that financial outperformers are more advanced in their data-driven digital journey than financial underperformers.Use my list of ten sources with links below to get a better…

Digital Transformation is not about technology

Recent research by McKinsey and Company, shows that 70 percent of all digital transformation projects do not reach their goals. Highly concerning of course. The good news is that the researchers know why.The fundamental difference…

LEVERAGE DATA AND DATA FLOWS

Companies with traditional business models have been challenged with the exceptional growth of data intensive platform-based companies, powered by online technologies. Many companies with a more traditional business model have been told that if your…

Behind the scenes

Behind the scenes: The Intent-Driven Huawei CloudCampus

Wi-Fi-as-a-Service enables fast, digital transformation

Takeaways from the IBM worldwide storage launch

Takeaways from the IBM worldwide storage launch

Telemedicine. The future of patient monitoring takes the health care system.

Intelligent Technologies - Pedab Content Analytics Service

This is how much your business will loose from being hacked

5 Basic IT-security tips you must follow

This is how we discovered a cyber attack before it was too late

Security

These are the security trends for 2020!

About Pedab

IT-security: – Most companies waste their money

These are the security trends for 2020!

GDPR has been extremely important in the year that passed and provoked some changes in how we work. Simultaneously, Cybercrime has grown bigger. Cyberattacks are more common and affect organizations more frequently. Therefore, it becomes…

Leverage data and data flows

Leverage data and data flows

Full-scale automation is the next step in the AI revolution

Full-scale automation is the next step in the AI revolution

Digital Transformation is not about technology

Digital Transformation is not about technology

Financial performance – the measure of your progress

Financial performance – the measure of your progress

IT-Security: – Most companies waste their money

Today, the awareness and expertise on the area of IT-security is not good enough. A data breach can hit anyone at any time. The consequences are often massive, both in regards with economy and reputation. …

This is how we discovered a cyber attack before it was too late

In early September 2019, our security analysts discovered suspicious traffic patterns in one of our customers network. On closer examination, unencrypted web traffic was observed against an external IP with a negative reputation, where one…

What are this years hacker trends?

Companies are constantly exposed to cyberattacks on the digital infrastructure, but few of them are detected. Malware, ransomware, social engineering and phishing are the most commoncyber attacksthat can hit businesses. Now in 2019, with cybercriminals…

Security

Do you know how vulnerable your business is?

Security

Digitization and IT security awareness

Telemedicine – The future of patient monitoring takes the health care system

Imagine you have a chronic disorder, COPD, diabetes or heart failure, and need regular medical follow-up. Imagine being able to get the necessary medical supervision at your home, every day. Imagine what security it would…

Handling a cyber attack should be routine

It is important to handle IT security the same as all other operational risk. This means putting cyber security on the leadership agenda. A common challenge is easier to deal with, and reduce, than a disaster.

8 cyber security challenges leaders face

Working for a management that has not put cyber security high on the agenda is demanding. Depending on the industry and how digitally vulnerable a business is, it is a responsibility to know about risk…

FINANCIAL PERFORMANCE – THE MEASURE OF YOUR PROGRESS (Clone)

Use my list of ten sources with links below to get a better idea of how much succeeding in your data-driven digital journey can improve your financial performance.  1. All roads lead to the data-driven…