AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

43

Transparent I.T.

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

Home working: the security risk

Where we work is no longer restricted to the office, thanks to improvements in Internet access, remote access solutions and..

The GDPR information audit

According to research undertaken jointly by Experian and Ponemon Institute - Data Protection Risks & Regulations in the Global Economy..

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

Atypical security

Fuzz testing or fuzzing refers to a form of software testing with deliberately malformed or unexpected inputs to see..

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

114
18

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

The A to Z of networking

While it is true that, generally speaking, more people know more about IT and its subordinate disciplines than ever..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

The SD-WAN challenge

The software-defined wide area network (SD-WAN) market has grown significantly. Bringing the world of software defined networking (SDN) to the..

The dark web intelligence

The dark web can seem confusing and there has been much speculation and mystery around it, but could it..

The sin of ignorance

Ransomware is wreaking havoc across small UK businesses, leaving many in a perilous position and in some cases causing..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

The cloud generation firewall

Traditionally, the daily operation of securing an organisation's network was orchestrated by a firewall located exclusively on premise. However, in..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

Home working: the security risk

Where we work is no longer restricted to the office, thanks to improvements in Internet access, remote access solutions and..

Is anybody there?

Following the huge DDoS events of 2016, it's easy to become complacent about the small, well-hidden DDoS attacks that..

The Ghost in the Machine

Artificial intelligence has been a hot technology for 2017. It can enhance applications ranging from storage optimisation through to..

Weaponised data

Credential compromise encompasses the theft, spilling and stuffing of user account information. In effect it is an end-to-end cycle..

The GDPR information audit

According to research undertaken jointly by Experian and Ponemon Institute - Data Protection Risks & Regulations in the Global Economy..

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

Atypical security

Fuzz testing or fuzzing refers to a form of software testing with deliberately malformed or unexpected inputs to see..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

Digital hand-wringing

Today's private networks are complex. The time and money involved in implementing and managing the modern WAN is not to..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

The A to Z of networking

With BYOD rarely spoken of, is it possible that organisations continue to overlook the risk that is posed by people..

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

Starting your AI roadmap

AI has been a buzzword for the last few years, but increasingly I meet people who don't know what it..

AI: A practical guide

WHAT IS AI?
You'd be hard pressed to have missed the acronym AI recently. Artificial Intelligence crops up in topics as..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

The Reinforcing benefits of AI

Whichever way you look at it, the task of keeping networks safe from security breaches is becoming harder, perhaps even..

Intelligence that is artificial

Forget everything you've seen in sci-fi movies or read in sci-fi books about Artificial Intelligence. Forget about all the amazing..

Trust that knows no bounds

Infrastructure as a Service (IaaS) platforms offered by the likes of Amazon Web Services (AWS) support the innovation and app-driven..

The AI Sanity Check

All of the commercial AI available today is the simplest and crudest manifestation imaginable. At a fundamental level it does..

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

SD-WAN Vendor of the Year 2018

RUNNER UP: Silver Peak

Citrix aims to power a world where people, organisations and things are securely connected and accessible to..

the AI power challenge

Fuelled by GPU (Graphics Processing Unit) deep learning, we're in the early stages of a new computing era: AI computing...

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Software Product of the Year 2018

RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2

Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI,..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

A Big Night for Networking

The Network Computing Awards ceremony took place in London on 22nd March. Former cricketer, Graham Cowdrey, was Master of ceremonies..

Hardware Product of the Year 2018

RUNNER UP: WatchGuard - Firebox M5600

The IM7200 streamlines remote management of network, server and power infrastructure in data centre and..

CRM Product of the Year 2018

RUNNER UP: Smarty Software - Smarty CRM

WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that..

Security Product of the Year 2018

RUNNER UP: Arbor Networks - Arbor Cloud

The cloud security solution TrustedGate enables companies to work securely in cloud computing environments..

Transparent I.T.

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

Product of the Year 2018

RUNNER UP: Netreo - OmniCenter

Silver Peak’s Unity EdgeConnect SD-WAN solution
Delivered in both virtual and physical appliances, the Silver Peak Unity..

Storage Product of the Year 2018

RUNNER UP: Lenovo - Storage DX8200D

BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal for businesses requiring..

The Customer Service Award 2018

RUNNER UP: NBM Technology Solutions

Commenting on thei win, Brookcourt CEO Phil Higgins said "As a true testament of customer service..

The Inspiration Award 2018

RUNNER UP: Ian Moyse

Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows With over 25 years' design and management..

Reseller of the Year 2018

RUNNER UP: Brookcourt Solutions

As an award-winning platform, data and services specialist, Q Associates are helping organisations across the commercial and..

Company of the Year 2018

RUNNER UP: Brookcourt Solutions

Nuvias Group is the pan-EMEA, high value distribution business, which is redefining international, specialist distribution in IT...

Distributor of the Year 2018

RUNNER UP: NBM Distribution

Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering a comprehensive range of..

83

The AI Sanity Check

All of the commercial AI available today is the simplest and crudest manifestation imaginable. At a fundamental level it does..

The Reinforcing benefits of AI

Whichever way you look at it, the task of keeping networks safe from security breaches is becoming harder, perhaps even..

Intelligence that is artificial

Forget everything you've seen in sci-fi movies or read in sci-fi books about Artificial Intelligence. Forget about all the amazing..

the AI power challenge

Fuelled by GPU (Graphics Processing Unit) deep learning, we're in the early stages of a new computing era: AI computing...

Transparent I.T.

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Trust that knows no bounds

Infrastructure as a Service (IaaS) platforms offered by the likes of Amazon Web Services (AWS) support the innovation and app-driven..

A Big Night for Networking

The Network Computing Awards ceremony took place in London on 22nd March. Former cricketer, Graham Cowdrey, was Master of ceremonies..

CRM Product of the Year 2018

RUNNER UP: Smarty Software - Smarty CRM

WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that..

Storage Product of the Year 2018

RUNNER UP: Lenovo - Storage DX8200D

BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal for businesses requiring..

Security Product of the Year 2018

RUNNER UP: Arbor Networks - Arbor Cloud

The cloud security solution TrustedGate enables companies to work securely in cloud computing environments..

SD-WAN Vendor of the Year 2018

RUNNER UP: Silver Peak

Citrix aims to power a world where people, organisations and things are securely connected and accessible to..

Hardware Product of the Year 2018

RUNNER UP: WatchGuard - Firebox M5600

The IM7200 streamlines remote management of network, server and power infrastructure in data centre and..

Software Product of the Year 2018

RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2

Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI,..

The Customer Service Award 2018

RUNNER UP: NBM Technology Solutions

Commenting on thei win, Brookcourt CEO Phil Higgins said "As a true testament of customer service..

The Inspiration Award 2018

RUNNER UP: Ian Moyse

Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows With over 25 years' design and management..

Distributor of the Year 2018

RUNNER UP: NBM Distribution

Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering a comprehensive range of..

Reseller of the Year 2018

RUNNER UP: Brookcourt Solutions

As an award-winning platform, data and services specialist, Q Associates are helping organisations across the commercial and..

Product of the Year 2018

RUNNER UP: Netreo - OmniCenter

Silver Peak’s Unity EdgeConnect SD-WAN solution
Delivered in both virtual and physical appliances, the Silver Peak Unity..

Company of the Year 2018

RUNNER UP: Brookcourt Solutions

Nuvias Group is the pan-EMEA, high value distribution business, which is redefining international, specialist distribution in IT...

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

The A to Z of networking

With BYOD rarely spoken of, is it possible that organisations continue to overlook the risk that is posed by people..

Starting your AI roadmap

AI has been a buzzword for the last few years, but increasingly I meet people who don't know what it..

AI: A practical guide

WHAT IS AI?
You'd be hard pressed to have missed the acronym AI recently. Artificial Intelligence crops up in topics as..

Digital hand-wringing

Today's private networks are complex. The time and money involved in implementing and managing the modern WAN is not to..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

The SD-WAN challenge

The software-defined wide area network (SD-WAN) market has grown significantly. Bringing the world of software defined networking (SDN) to the..

The cloud generation firewall

Traditionally, the daily operation of securing an organisation's network was orchestrated by a firewall located exclusively on premise. However, in..

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

Home working: the security risk

Where we work is no longer restricted to the office, thanks to improvements in Internet access, remote access solutions and..

The GDPR information audit

According to research undertaken jointly by Experian and Ponemon Institute - Data Protection Risks & Regulations in the Global Economy..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

The Ghost in the Machine

Artificial intelligence has been a hot technology for 2017. It can enhance applications ranging from storage optimisation through to..

Is anybody there?

Following the huge DDoS events of 2016, it's easy to become complacent about the small, well-hidden DDoS attacks that..

The sin of ignorance

Ransomware is wreaking havoc across small UK businesses, leaving many in a perilous position and in some cases causing..

The A to Z of networking

While it is true that, generally speaking, more people know more about IT and its subordinate disciplines than ever..

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Weaponised data

Credential compromise encompasses the theft, spilling and stuffing of user account information. In effect it is an end-to-end cycle..

The dark web intelligence

The dark web can seem confusing and there has been much speculation and mystery around it, but could it..

Atypical security

Fuzz testing or fuzzing refers to a form of software testing with deliberately malformed or unexpected inputs to see..

83