LEARN, CONNECT AND GET INSPIRED BY OUR EXPERTS, CUSTOMERS AND PARTNERS

At WHISHWORKS, we have spent countless hours refining our specialised knowledge and skills in Salesforce, MuleSoft and Data & Analytics. Discover our latest insights and best practices, and find out how we’ve helped businesses like yours to achieve their goals.
Azure security best practices
Blogs

Security best practices in Microsoft Azure

Security best practices in Microsoft Azure ensure your infrastructure is resilient while safeguarding user access and protecting customer data.

Implementing your APIs with zero trust
Blogs

Implementing your APIs with zero trust

Under the zero trust model, we need to protect every single endpoint that we expose, and apply the right security model directly to the API.

Blogs

How to securely connect CloudHub VPC with your data centre

Key points to consider in order to achieve secure connectivity between CloudHub VPC and your data centre.

Why Local Governments need Digital Transformation
Blogs

Why Local Governments need Digital Transformation

Local Governments can’t afford to wait any longer to move away from legacy infrastructures, become more digitally enabled and provide better services.

Events & Webinars

Past event: MapR Convergence

Join us at Convergence, and learn from executives, practitioners, myth busters, and technical experts how to solve real-world problems by harnessing disruptions in data, artificial intelligence, cloud, containers, and edge technologies.

Blogs

WHISHWORKS Partners with Dataguise to Deliver Sensitive Data Security and GDPR Compliance to Organisations Throughout EMEA

WHISHWORKS Partners with Dataguise to Deliver Sensitive Data Security and GDPR Compliance to Organisations throughout EMEA

Blogs

The 4 Steps to GDPR Compliance Webinar

Nearly every week high profile security breaches happen, and they can happen to any organisation, at any time, anywhere in the world

Blogs

What does it mean to be a data driven organisation?

Most companies today claim to be fluent in data, but as with most new business initiatives, these claims can sometimes be slightly exaggerated.

Blogs

Data driven security: Machine data is the first line of defence

Digitalisation of customer interactions has open the organisations to a more diverse and threatening set of risks. Big Data brings in data driven security.

Blogs

Spring Security in Mule

Spring Security in Mule provides different options for securing mule applications. To secure Mule based HTTP/REST endpoints then leverage Spring Security

Blogs

Web services security with Mule

Web services based integration facilitates the composition of services across heterogeneous software systems whether new or old, between different departments, organisations, platforms, modernising of the old systems, devices, PCs, mobiles, etc.