data literacy

Vulnerability management as an integral part of cybersecurity

The Center for Internet Security (CIS) is responsible for identifying and developing standards, tools, and solutions in the information security field. The continuous vulnerability management process is included in the list of CIS recommendations and is an integral part of cybersecurity and network security. It is the responsibility of organizations to regularly collect, evaluate information regarding vulnerabilities and take prompt action to correct or minimize «opportunities» for criminal activity. This is due to the rapid growth of cybercrime, that forces organizations to pay more attention to information security. Vulnerability management should be part of an overall information risk management strategy.

A vulnerability is a certain flaw in an organization’s information system that can be used by a cybercriminal to gain access and perform unauthorized actions (running codes, gaining access to system memory, installing malware, stealing, destroying or changing company corporate data).

The most dangerous for the system security are computer worms. It is a malicious software that self-replicates, infects other computers, and remains active on infected systems. Vulnerabilities in network protocols, operating systems, and backdoors are often exploited to distribute such software.

Vulnerability management is the process of identifying, assessing, prioritizing, remediating (eliminating and preventing potential attacks, or minimizing attacks impact and scale), and reporting on security vulnerabilities in web applications, mobile devices, and software. As a result, organizations have the opportunity to receive up-to-date data on the state of the IT environment, the presence of vulnerabilities and the risks associated with them. Vulnerabilities cannot be ignored. The only way to reduce the risk of a cyberattack is to identify and fix each vulnerability.

The Vulnerability Management process is a cyclical process of identifying, classifying, fixing, and mitigating security vulnerabilities. Vulnerability discovery, assessment and reporting are important elements of the program.

Vulnerability detection is performed using a scanner, software that scans computers, networks, and applications for known vulnerabilities. The scan detects vulnerabilities that result from misconfiguration and erroneous network programming, and scans with or without authentication.

The essence of authenticated scanning is to provide access to low-level data (certain services, configuration details, precise information about operating systems, software, configuration issues, access controls, security controls, and patch management. Unauthenticated scanning does not provide access to network resources, that can lead to inaccurate information about operating systems and installed software.

Scanners can make mistakes and miss vulnerabilities, penetration testing (automated testing with software or mechanical testing of information technology to find vulnerabilities) should be used. The testing process involves collecting information, identifying possible attack vectors, making attempts to use them, and generating conclusions. Testing can also be used to test local security controls, compliance with security policies, employee susceptibility to social engineering attacks, and incident response strategies.

The vulnerability assessment process includes 5 steps:

  1. Vulnerability detection (analysis of network scans, penetration test results, firewall logs, etc.);
  2. Checking vulnerabilities (determining the possibility of vulnerability using, its severity to determine security risk level);
  3. Prioritization of vulnerabilities (vulnerability assessment, determination of the procedure for eliminating vulnerabilities);
  4. Planning for vulnerabilities elimination (determining the plan and measures of action to eliminate vulnerabilities, determining their effectiveness);
  5. Elimination of vulnerabilities (removal and correction of vulnerabilities to prevent possible use by cybercriminals).

The vulnerability remediation phase involves several options:

Data Governance: definition, goals and tasks

Data Governance is a rather capacious term that includes a strategy for managing the availability, usability, compliance with standards, consistency, integrity and security of data in organizations. Data management purpose is to ensure the effective use of corporate data. The main challenge is to determine how, where, why and under what circumstances data is collected and stored.

Digital transformation is happening very fast. This entails the need for new cybersecurity solutions and capabilities. At the moment, data security is an absolute priority. Companies that actively work with data are interested in finding ways to prevent data leakage and improve their operations.

Often Data Governance is used as a synonym for Data Management and Master Data Management. However, all these 3 concepts have a fundamental difference.

Data Management is the process of managing the full data cycle within an organization, i.e. the implementation of data management according to a specific strategy.

Data Governance is the core component of Data Management and is primarily focused on documentation, ownership, access delegation, data retrieval methods, regulatory compliance, and data security measures. Data Governance forms the data management strategy.

Master Data Management is the process of managing major data assets in order to identify key data entities (suppliers, stakeholders, customers, etc.).

Data Governance can also define requirements such as a Master Data Management model, assignment of roles and responsibilities for data creation, definition of data retention policies, data curation, and data access control. This, in turn, affects the effectiveness of Master Data Management.

The absence of an effective Data Governance program can lead to various errors and problems with data, inaccuracies in the system, and, as a result, negatively affect the company’s activities. For example, a registered customer may have a different name in different departments of the company. This leads to problematic data integration, data integrity issues, incorrect business intelligence, and inaccurate reporting.

Tasks and goals of Data Governance:

Benefits of Data Governance:

Basic methods to protect sensitive data

One of the main digital world tasks is confidential information protection. This is a large and complex task, that can also be complicated by poor data management, poor network security, endpoint protection, and encryption methods. To prevent the growing number of cyber-attacks, it is necessary to use more powerful cyber security methods.

Both organizations and individuals need to know the basic methods of protecting sensitive data to avoid leakage and loss. The loss of personal or corporate data can be devastating and have serious consequences.

Confidential information is sensitive information that requires a higher level of data security to prevent unauthorized access by hackers or malware. Such data is usually protected and inaccessible to unauthorized persons. There are cybersecurity and data protection standards that are set in the USA by the Federal Trade Commission (FTC), in Europe – by the General Data Protection Regulation (GDPR), Australia – by the Australian Cyber ​​Security Center (ACSC).

Confidential data may include:

Basic methods for protecting confidential information:

  1. Data classification and organization. Data classification refers to the process of organizing data into specific categories that make it easier to access, rank data by criticality, and reduce storage and backup costs. Data organization allows to determine data risk level (low, medium, high), determine public and private information, and apply appropriate security measures for each level of confidentiality. The classification policy allows to assess the use of sensitive data, ensure better privacy and data protection.
  2. Data encryption. The method is to encode the data by cryptographers using complex algorithms and ciphers to protect the data from theft or disclosure. If the encrypted data is stolen, it is almost impossible to decrypt it without the decryption key. Data encryption provides confidentiality during information transfer and allows for authentication processes. Companies that work with particularly sensitive data should use an encryption method.
  3. Personal Data Protection Impact Assessment (DPIA). These are operational tools to protect corporate information that carries a high risk of personal information disclosure. Under the DPIA, organizations must:
  1. Data masking (obfuscation) is one of the ways to protect data by replacing the original data with fictitious ones. Data masking is also used internally to hide information from developers, testers, and others.
  2. Multi-factor authentication. Using a password and authentication is one of the easiest security methods. The data of large corporations quite often end up on the dark web. Corporate users can use multi-factor authentication to protect sensitive information.
  3. Backups. The foundation of all security solutions is data management and backup. Backup should be performed at least once a week.
  4. Strong network security. This involves the use of many different security solutions to better protect sensitive data from theft and unauthorized access. Tools to improve security:

The most common types of phishing attacks and their signs

According to a Cisco report, 90% of data breaches are caused by phishing attacks. Millions of users are affected by malware and ransomware. However, phishing attacks are no less harmful. The availability of the latest security protocols and software cannot fully protect against cyber threats.  A low user knowledge level increases the risk of becoming a cybercriminals victim. It is important to ensure that all users are properly trained.

Phishing attack is a cyberattack that uses social engineering to illegally acquire sensitive data. Often the attack is carried out through malicious links and files that users are tricked into opening. Phishing attacks are also combined with malware to do more damage. To successfully implement an attack, a cybercriminal carefully studies user behavior. Thus, he selects the easiest and the most efficient way to achieve his goals.

Signs of phishing attempts:

Cybercriminals are constantly developing new phishing methods to obtain sensitive data.

The most common types of phishing attacks are:

  1. Email phishing is the oldest and most used type of phishing attack. Emails that imitate legitimate senders target corporate users and individuals. Using a malicious link, document, or image, an attacker forces the victim to download malicious code (for example, «verify» personal information by clicking on a link).

Signs: request for personal information; urgent problem; shortened links; suspicious URL; spelling and grammatical errors; nested files; empty image;

  1. Spear phishing is more targeted and focused on a specific person or company. Attackers collect information from open sources and attack entire enterprises and departments.

Signs: unusual requests, links to shared drives; suspicious and unsolicited emails; reference to personal data;

  1. Whaling – a targeted attack on a specific person or group of people from the senior management. Most often the CEO of the company becomes the victim.

Signs: invalid domain address, use of personal email; new contact requests;

  1. Business email compromise – attackers impersonate managers in order to gain access to his account with the ability to make decisions and send internal requests to employees.

Signs: urgency, unusual behavior, lack of lawyers in correspondence;

  1. Voice phishing – an attack using a phone to get information or money.

Signs: blocked and hidden number, requests for confidential information or money;

  1. HTTPS (a standard traffic encryption protocol that requires TSL/SSL certificates) phishing is a URL-based attack that aims to trick people into clicking on a malicious link.

Signs: shortened links, text with hyperlinks, spelling errors in the URL.

  1. Clone phishing – attackers copy a letter previously sent by a legitimate person or organization, forge the sender’s address and resend it to the victim with a malicious attachment or link.

Signs: duplicate emails, errors in the email address, hyperlinked text.

  1. SMS phishing – attacks through SMS messages with malicious attachments and links.

Signs: suspicious and unsolicited messages, messages from unknown numbers, authentication request.

  1. Pop-up phishing – an attack through pop-up windows. Attackers insert malware in the form of pop-up ads. A click starts the infection process.

Signs: Browser notifications, new tab or window, urgent message pop-ups (antivirus update, subscription renewal, etc.).

  1. Social media phishing – using information from social networks, attackers gain access with the help social engineering to the victim’s confidential data.

Signs: suspicious links, suspicious accounts.

  1. Angler phishing – attackers pose as customer service employees in a phishing attack by creating a fake account and contacting a potential victim. During the interaction, the cybercriminal specifies personal data, and then provides a link to solve the problem that contains malware.

Signs: unverified account, no profile history.

  1. Evil Twin phishing – attacks consist of creating an unsecured Wi-Fi hotspot and luring users into connecting. Once the victim has connected, all incoming and outgoing data (personal information, financial data, etc.) can be intercepted by attackers. This type of attack is more likely to occur in public places with free Wi-Fi (cafes, hotels, airports, etc.). The best way to avoid becoming a victim in this case is to use a VPN.

Signs: duplicate Wi-Fi hotspots, security alerts.

  1. Website spoofing – creation of a completely fake site identical to the legitimate one to obtain confidential information. Most often, the websites of organizations from finance, healthcare and social networks field are faked, as they contain important personal information.

Signs: errors in writing URLs, errors on the site.

  1. Email spoofing – creating a completely fake email domain.

Signs: suspicious and unsolicited emails, errors in email addresses.

  1. DNS spoofing (pharming attacks) is a technically more complex type of attack where a cybercriminal has to hack a domain name server (DNS) that converts domain names into IP addresses.

Signs: unsecured website, website errors.

  1. Image-based phishing – occurs through sending an email with an image that contains hyperlinks, malicious URLs, links to infected sites.

Signs: embedded link in image, spam, large call to action buttons.

  1. Search Engine Phishing – attackers create legitimate pages based on keywords and queries to rank in search engines (Google, Bing). The pages contain interesting suggestions to lure the victim into entering banking information. More often, such pages offer free vacations, products, investment opportunities, discounts, job offers, etc.

Signs: attractive offers that are hard to refuse, poorly designed sites.

  1. Watering Hole phishing – an attack is aimed at a specific company or group of people by infecting a site they frequently visit. Cybercriminals find site vulnerabilities, infect it, and lure potential victims with emails to that site.

Signs: security alerts, security testing.

  1. Man in the middle (MITM) – an attacker intercepts the communication chain, becomes an «intermediary», controls communication, intercepts data and has the ability to manipulate it to obtain personal information from both sides.

Signs: insecure sites, spelling errors in the URL, noticeably slow communication process.

Data literacy as the second business language

According to Gartner, data literacy is the second business language. By 2030, the ability to read, work, analyze and interpret data will be one of the most sought after.

Data literacy is the ability to work effectively with data: find information from different sources, access it, analyze, filter and use it.

Data literate organizations are more flexible, prepared, innovative, and have a more stable and loyal workforce. Over the past year, the number of employees who quit due to the inability to improve their skills and learn how to work with data amounted to 35%. Transformation to the status of an information literate company requires proper training, as well as a change in behavior, attitudes and thinking.

To successfully transformation to data literate company, you should adhere to the following principles:

Qlik offers an data literacy program for the effective use of data by employees, regardless of their level and role. The program contains a comprehensive training course, consulting services to develop skills in working with data.

DataLabs is a Qlik Certified Partner. A high level of team competence and an individual approach allows to find a solution in any situation. You can get additional information by filling out the form at the link

Social Engineering Attacks

One of the most popular attacks now is social engineering attack. Such attacks help cybercriminals gain effortlessly access to the network. The victim of the attack transfers all the keys into attacker’s hands.

Social engineering in the context of cybersecurity is the process of obtaining people’s personal information by deceiving them. There are many types of social engineering attacks: infected emails with links to malicious sites, a phone call from a cybercriminal who pretends to be a helpdesk and extorts confidential information etc. Social engineering is used not only in the digital realm, but in any other areas where specific information is required from the victim for malicious purposes.

Cybercriminals use social engineering techniques to hide their real identity. To do this, they present themselves as reliable organizations or individuals. The purpose of these actions is to obtain the necessary personal information to access the target network through deception and manipulation. Social engineering is used as the first stage of a major cyberattack to infiltrate a system, install malware, or expose sensitive data. The popularity of the method is due to the implementation ease. It is much easier to undermine cybersecurity using human weaknesses than using network vulnerabilities.

To carry out such an attack, it is necessary to collect targeted information (information about the corporate structure, internal operations, third-party vendors etc.). Public employees’ profiles in social networks can also become a target for malefactors. After data collecting, the cybercriminal chooses his first target to strike. Most often, this target is a low-level employee who is being manipulated into gaining access. It is rarely possible to instantly use confidential resources. Attackers roam the network to discover credentials with a higher level of access. Their activity is usually hidden behind legitimate processes to avoid detection by antivirus.

At the core of all social engineering tactics are aspects of human interaction and decision making known as cognitive biases. Such biases can be called vulnerabilities in human software, which are used to obtain the necessary access.

Basic social engineering principles:

  1. Reciprocity. Distribution of free samples is popular in marketing. This is due to the desire of people to return the favor. Therefore, attackers can provide the victim with a free service and then request access to sensitive information.
  2. Commitment and consistency. For example, an employee fulfills an attacker’s request for credentials, agreeing with this initially, although he understands that this should not be done.
  3. Social proof. People tend to repeat the actions of others, to do what others do. To do this, the perpetrator may provide false evidence of cooperation with victim’s colleague forcing him to comply.
  4. Authority. People often submit to more authoritative personalities and perform even undesirable actions. This explains the success of spear-phishing campaigns that pose as CEOs and target lower-level employees.
  5. Sympathy. People tend to succumb to influence and persuasion if they like the person.
  6. Scarcity. Perceived scarcity increases demand. This tactic makes the attacks relevant.

Ways to prevent social engineering attacks:

  1. Training employees on security issues, responding to hacking attempts, requests for personal information, etc.;
  2. Establishing a security policy that describes employees’ actions in certain incidents;
  3. Studying information. Employees should develop the habit of checking every email they receive and the device they plug into their computer;
  4. Security protocols establishment – an information risk management program with security protocols, policies, and procedures that describe data security;
  5. Testing resistance to attacks – organization testing, conducting controlled social engineering attacks as a test, sending pseudo-phishing emails, training employees who succumb to such provocations;
  6. Regularity of test attacks to increase stability;
  7. Checking protocols for responding to attacks, improving and supplementing them;
  8. Use of secure services for managing unnecessary information to prevent its use by criminals;
  9. Multi-factor authentication usage;
  10. Operational security methods (OPSEC) usage;
  11. Implementation of a third-party risk management system for processing large amounts of information that allows to identify a person;
  12. Detect data leaks by regularly scanning data for exposure and leaks.

Cyber threats types and sources

A cybersecurity threat is a malicious act that aims to damage or steal data and disrupt digital life in general. These threats include data breaches, computer viruses, distributed denial-of-service (DDoS) attacks, and other attack types. Cyber ​​threats also include obtaining unauthorized access to data, theft, damage or destruction of information technology resources, intellectual property and other forms of confidential information. Cyber ​​threats can come from within a company through trusted users, or from remote locations from unknown parties.

Sources of cyber threats can be:

Hostile Nation-States

National programs designed for cyberwar include cyber threats in the form of propaganda, website corruption, espionage, critical infrastructure destruction, and even death. The programs are state-sponsored and increasingly sophisticated, posing serious threats. Their active development can cause widespread and long-term damage to the national security of other countries.

Terrorist organizations

Terrorist organizations use cyberattacks to harm national interests. They use cyber defense systems less, which makes them more vulnerable. The threat of terrorist groups increases with the entry of a more competent generation into their ranks.

Corporate spies and organized crime

The main threat of corporate spies and organized crime lies in their ability to carry out industrial espionage in order to steal trade secrets or embezzle large amounts of money. The criminals’ main interest is in making a profit or disrupting the ability of the business to make a profit.


The main hacktivistsэ goal is to spread propaganda. They seek to support their political program.

Disgruntled Insider

Is a common source of cybercrime. Insiders do not need to have a high knowledge level to disclose confidential information, as they may have access to the data. Third party vendors and employees who inadvertently introduce malware into systems, upload sensitive data, and share it online also qualify as insider threats.


Cybercriminals can use a zero-day exploit to gain access to data. They also hack information systems to challenge or brag. Now, such attacks do not require a high level of knowledge and experience. Many automated attack scripts and protocols can be obtained from the Internet making it much easier to launch an attack.

Natural disasters

Natural disasters represent a cyber threat disrupting the infrastructure.

Random actions of authorized users

Incorrect S3 configuration by an authorized user can lead to data leakage. Some of the biggest data breaches were caused by bad configuration.

Major Cyber ​​Threats in 2021

Phishing attacks related to Covid-19

The attack was carried out using «harmless» emails or sites infected with malicious links. Interaction with such links will leak credentials. Because the topic of the pandemic aroused user interest and fear, the attacks had high success rates.

Insider threats

According to Verizon’s 2019 report, 57% of all database breaches were related to insider threats. Unfortunately, this type of cyber threat can’t be mitigated with a control strategy. To provide better protection against insider threats, it is worth restricting access to confidential information.

Ransomware attacks

This type of cyber threat is one of the most powerful. During such an attack sensitive data is encrypted by cybercriminals. It is possible to decrypt them only after paying the ransom.

Polyglot files

Such files may have multiple file type identifiers (for example, they may be classified as PPT and JS). Cybercriminals pack malicious code into a file, which helps bypass security controls.

DDoS attacks

As the adoption of IoT devices increases the risk of DoS attacks increases. The attack occurs because of sending many network requests from several compromised IoT devices to the site targets. As a result the servers are overloaded.


The attack occurs as a result of the introduction of malicious codes into advertising links. Such ads may be placed on sites that allow third-party advertising, even on social media feeds.

The Latin American Mlspadu is a prime example of an advertising attack. The malicious code was embedded in an advertising campaign for McDonald’s coupons on Facebook. While interacting with the ad a zip file was downloaded and installed on the user’s system, which contains a Trojan to steal banking credentials.

What is cybercrime?

Thanks to modern technologies information sharing between private and business users has become much easier and more convenient. But sometimes people trade convenience for privacy exchanging large amounts of corporate and personal information, paying with a single click, saving passwords etc. Such actions increase the risk of becoming a cybercriminals victim.

Cybercrime involves the use of computer technology to achieve illegal goals. This is any criminal activity that is related to a computer, network devices or network (fraud, data leakage, phishing attacks, clickjacking, typesquatting, DOS attack, etc.).

The main goal of cybercrime is the profit that cybercriminals will receive. However, the goal may also be to damage or disable computers and devices, use computers and networks to distribute malware, illegal information, videos, images and other materials, infect computers and networks with viruses. The «target audience» of cybercriminals can be both individuals (personal information) and organizations (corporate data). The large-scale transition of companies to a remote work mode due to the pandemic has contributed to an increase in cybercrimes number.

Although this type of crime does not affect the physical body of a person, it does affect the «digital body». In the digital age, each person is a set of numbers and identifiers in a multitude of databases owned by the government and various companies. This once again emphasizes the importance of networked computers in people’s lives.

One of the main features of cybercrime is its ubiquitous nature. Actions can take place in jurisdictions that are far away. This in turn entails serious problems for law enforcement agencies that require international cooperation.

Where does cybercrime take place?

All cybercrimes take place in cyberspace –  is a virtual world, an electronic environment. This space usually includes a large computer network and consists of many computer subnets. A key feature of cyberspace is an interactive and virtual environment for multiple participants.

5 common cybercrimes that affect individuals and businesses:

  1. Phishing Scams

91% of successful cyberattacks start with fear or interest in clicking on a link. Phishing emails mimic messages from a familiar person or trusted company. Their goal is to force a person to give up their personal data and follow a link that downloads a malicious program. About 1,000 phishing attacks are launched daily.

  1. Website spoofing

Website spoofing is a type of attack in where the site is as similar as possible to the real official site and makes users believe it. Fake sites use the name, corporate style, user interface. This makes them as believable as possible and forces users to enter logins and passwords. The purpose of the attack is to gain user trust, gain access to user systems, steal data, money, or distribute malware.

  1. Ransomware

Ransomware is a modern version of regular ransomware that has been around for a long time. How this virus works: criminals steal something of value, and demand payment for the return. For most organizations, this is about encrypting corporate data. A ransomware attack causes downtime and paralyzes the work of all employees.

Without restorable backups the company is effectively at the mercy of a cybercriminal. It will hold corporate data «hostage» until the organization redeems the decryption key. Ransomware has become one of the major problems and threats for organizations.

  1. Malware

It is specially designed software with the aim of gaining access to a computer or damaging it. The targets of a malware attack can be: power, influence, money, information. Recovery from this type of attack is usually time-consuming and costly.

Popular types of malware include:

  1. IoT hack

The Internet of Things provides access to everyday activities and business processes on the Internet. All Internet-connected entities collect and exchange data. Now data is one of the most valuable assets. It provokes hackers to constantly try to use all the devices that collect data.

Data Infrastructure and its key elements

Competent work with data brings business to a leading position. Incorporating data-driven innovation into operational business processes provides up-to-date information across all enterprise directions, leading to more efficient operations. During the 4th industrial revolution, data is the fuel for Artificial Intelligence, Machine Learning, robotics, the Internet of things, etc. According to forecasts, by 2025 the digital transformation wave will reach 3.7 trillion US dollars.

Data by itself has no value. It acquires value with the right working approach: having a data strategy, skills to work with it, a management process and an infrastructure that includes software and technical tools for collecting, storing, processing and transmitting data.

Although infrastructure is an important element of the data workflow, starting with infrastructure is not entirely correct. Sure, it will be necessary to invest into devices, applications, platforms and services that will provide efficient work with data. But the work begins with setting goals and developing a strategy, tailoring the tools to the strategy, challenges, and business issues.

With the increasing desire to capture data value and the growing demand for the technical means to enable it, the market for platform and solution providers has expanded significantly. This situation made it possible to reduce the entry barrier to work with advanced technologies and analytical solutions. Some of these offerings are called infrastructure as a service. Selecting the right product from a wide range of products requires doing a lot of research, understanding business needs, and identifying questions that need to be answered by introducing a new product.

Key functions that the infrastructure should provide:

  1. Data collection. Injecting internal (transactional data, customer feedback, cross-departmental data) and external data (data from social media, public sources, purchased third-party data) into the infrastructure stack. The process of collecting streaming data in real time must also be provided, which requires a reliable collection infrastructure.
  2. Data storage. Depending on data privacy level it’s possible to store it locally in own storage or in the cloud. Cloud storage providers provide free access to data for business users from anywhere. It also reduces the initial cost of setting up own servers, energy, and security.
  3. Data processing and analysis. At this stage work begins with machine learning, computer vision, speech processing, neural networks, etc. The main task here is to find a solution for preparing and cleaning data, building analytical models and extracting valuable information from unprocessed information.
  4. Obtaining information and disseminating it to business users. It is the stage of data visualization and reports creation with the help of which business users can make decisions, share information, improve internal processes efficiency, create improved products or services.

Qlik Enterprise Manager

Today every company has certain requirements for data processing. One of these requirements: the rapid  data and metadata integration in heterogeneous environments for analytics. Managing individual data streams across multiple endpoints can be quite inconvenient, inefficient, and time consuming. Qlik tools allow to centrally manage data pipelines at scale.

Qlik Enterprise Manager provides a control center for the tasks of setting up, running and monitoring replication and transformation throughout the enterprise. The tool provides an intuitive management interface for Qlik Data Integration. The graphical user interface simplifies the process of designing, executing and controlling Qlik Replicate and Qlik Compose tasks.


DataLabs is a Qlik Certified Partner. A high level of team competence and an individual approach allows to find a solution in any situation. You can get additional information by filling out the form at the link

Previous #fridaypost “Qlik Data Streaming”
GoUp Chat