• Blog
  • Newsroom
  • (+30) 210 9910 552

logo

  • Home
  • Company
  • Solutions
    • Cybersecurity
      • Email and endpoint security
      • Incident response
      • Governance, risk & compliance
      • Cloud security
      • Application security
      • Data loss prevention
      • Privileged access management
      • Identity & access management
      • Vulnerability assessment & penetration testing
    • Data management and governance
      • Business intelligence & IT analytics
      • Big data and compliance
      • Virtualization
      • Archiving & compliance
      • High availability & disaster recovery
      • Backup and restore
    • Digital solutions and enablement services
      • Regulatory compliance services
      • Security infrastructure assessment services
      • Disaster recovery planning and design
      • Contingency planning
      • Design and implementation of data protection infrastructures
    • Cloud solutions
      • Cloud disaster recovery
      • Backup to cloud (BaaS)
      • Hybrid and multicloud solutions
      • Cloud transformation and migration
      • Cloud security
  • Services
    • Implementation services
    • Support services
    • Operational services
  • Case studies
  • Contact
  • SearchSearch

Case studies

Symantec DLP solutions: A simple way to drive total protection of your sensitive data

06-10-2022

Symantec DLP solutions: A simple way to drive total protection of your sensitive data

Accutech Team

3 min read

IBM FlashSystem 5200 series: A storage solution that can help you establish a dynamic cybersecurity strategy against ransomware

18-07-2022

IBM FlashSystem 5200 series: A storage solution that can help you establish a dynamic cybersecurity strategy against ransomware

Accutech Team

3 min read

When, why, and how should your cybersecurity take into account Privileged Access Management?

23-02-2022

When, why, and how should your cybersecurity take into account Privileged Access Management?

Christina Valvi

3 min read

Cyber Attacks and Data Protection: Challenges and path to follow!

24-11-2021

Cyber Attacks and Data Protection: Challenges and path to follow!

Nikos Anagnostopoulos

2 min read

Optimize your IT Business with Aptare IT Analytics

29-10-2021

Optimize your IT Business with Aptare IT Analytics

Nikos Anagnostopoulos

2 min read

Did you know that fixing application vulnerabilities at the coding stage can be 6x more cost saving?

20-10-2021

Did you know that fixing application vulnerabilities at the coding stage can be 6x more cost saving?

Alina Klonari

2 min read

4+1 reasons to drive total protection for your sensitive data in the Covid-19 era

05-10-2021

4+1 reasons to drive total protection for your sensitive data in the Covid-19 era

Christina Valvi

3 min read

Hackers and Ransomware: Are you protected?

27-07-2021

Hackers and Ransomware: Are you protected?

Nikos Anagnostopoulos

3 min read

Automate your DR process – Hints and Tips

01-06-2021

Automate your DR process – Hints and Tips

Nikos Anagnostopoulos

3 min read

Resiliency in Cloud Computing and Multi Cloud Computing

21-05-2021

Resiliency in Cloud Computing and Multi Cloud Computing

Accutech Technical Team

3 min read

Why Use Identity Access Management in Your Organization?

23-04-2021

Why Use Identity Access Management in Your Organization?

Accutech Technical Team

2 min read

  • logo

  • phone(+30) 210 9910 552
    mailThis email address is being protected from spambots. You need JavaScript enabled to view it.
    Follow us on LinkedIn Instagram Facebook
Stay up to date with us for our latest news and upcoming activities.
I agree with Terms of Use

Company

  • About Accutech
  • Our story
  • CSR
  • Careers
  • Information Security Policy

Solutions

  • Cybersecurity
  • Data management and governance
  • Digital solutions and enablement services
  • Cloud solutions

Services

  • Implementation services
  • Support services
  • Operational services
  • Copyright Accutech (C) 2021. All rights reserved. Privacy Policy.
    Website by ClickMedia