Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

OmniCenter from Netreo

Automation is vital, and OmniCenter from Netreo is devoted to this vital work. Rapid to deploy and..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Lansweeper 5.2 from Hemoco

Monitoring large networks can run into thousands of pounds, but Lansweeper Premium supports unlimited assets and yet costs a..

43

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

Monitoring the hybrid network

There has been a steady pattern of cloud adoption by organisations and according to the Cloud Industry Forum over..

Patch the hacker

The National Vulnerability Database reports approximately 70,000 software related risks, ranked at varying levels of severity. At a UK..

Domain name security

Recent research suggests that 30 per cent of organisations don't consider DNS as a critical business component. Yet, despite..

Verified identity

Identity and verification (ID&V) are closely linked concepts and they play an increasingly critical role in our daily lives...

Data centre security

Data centres are highly virtualised environments, densely packed and home to unparalleled levels of data. External data centres are..

The machinery of big data

Businesses are inundated by data, but those that gain advantage from it recognise that the key to success resides..

The rise of the bot

IT teams have been fighting malevolent actors flooding their IT infrastructure since the beginning of Internet time. There are..

New reality from virtualisation

Managing and protecting remote site data from a central location can be challenging. Inter-office bandwidth constraints and dependencies between..

Sharing the blame

In a recent survey over 90 per cent of executives said that they were unable to understand a cybersecurity..

People in the cloud

In 1937, the renowned anthropologist, Sir E.E. Evans-Pritchard, published his famous anthropological study, Witchcraft, Oracles and Magic among the..

Asleep at the wheel

At a recent investor briefing I attended, a major global telecoms firm expounded on its expertise in the cloud..

IoT spells danger

The catchy Hive jingle about controlling your heating at home is a great example of the benefits that IoT..

Hyper critical

There is a widespread growth of hyper-convergence taking place and it has led some vendors to opine that it..

Beyond today’s limit

Network testing and diagnostics is often thought of as a way to efficiently get packets from point A to..

Taming Dark data

With ongoing digital transformation meaning that businesses are handling ever-increasing volumes of documents and information, the issue of dark..

The cloaked network

Cybercrime has changed. Traditionally, skilful hackers would monetise the information they stole but now cybercrime is a full-blown money..

96

News in a connected context

Unless you’ve been isolated in the depths of Siberia recently you will no doubt have heard of the Russian website..

The Internet of Stuff...

As I try to make sense of the gargantuan volume of news, claims, assertions and downright rubbish that comes across..

17

Storage workflow

There are now more surveillance cameras in use than ever before. Research from IHS suggests that by 2020 over..

The A to Z of networking

It is well understood that cybercriminals will always look for the low hanging fruit of an easy win, and an..

The digital value platform

It is quite likely that many companies will not realise that the first stage of their digital transformation is..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

The A to Z of networking

It's not that long ago that the main IT disciplines were characterised by a mindset of implementing measures, often..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

Company Profile: Digital Pathways

Digital Pathways offer a full range of solutions to meet today’s complex demands for compliance and data privacy requirements..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Situationally aware

All organisations are faced with a growing and evolving cyber-threat landscape staffed by criminals, hacktivists and cyber-spies. Their complex..

Disambiguating real-time threats

Real-time threat detection is a commonly used term in cybersecurity. Typically, most organisations interpret this as a clear indication..

Line of Demarcation

Business Email Compromise (BEC), in which attackers seek to impersonate executives within a company, is one of the biggest..

The DNS attack vector

As a malicious actor or piece of malware inside your of your network, there's a good chance I'm going..

The security of things

Just five years ago BYOD (Bring Your Own Device) was the hottest topic in IT security. iPhone and Android..

The IoT security scandal

The Internet of Things has snowballed from a niche selection of connected devices in specific industries, to one of..

Storage with purpose

All organisations need to provide fast shared access to an ever-growing mountain of unstructured data. As small or medium..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

More of the same won't work

The structure of the storage market has traditionally led to many organisations having an accidental architecture of storage solutions..

Retaining digital talent

As the UK navigates through proceedings for an EU exit, many industries across the UK are left wondering how..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

Object lesson

The storage market is one to watch in 2017. While some traditional technologies, particularly the HDD and tape sectors..

The A to Z of networking

If the network perimeter is a thing of the past then so is the desk or office tethered digital..

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Preventing drive-by fraud

The observed behaviour seemed to be harmless. Two Internet-enabled devices had been submitting less than ten automotive insurance applications..

The IT skills shortage

While the UK is constantly being labelled as a skill-deprived nation, our latest data shows that the same cannot..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

The IoT security stand-off

In a world of interconnected devices it can be all too easy for consumers and businesses alike to focus..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

IP Expo Manchester

The IP Expo Event series returns to Manchester on 26th and 27th April. Named as a Core City in..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

High density intelligent power

Intelligent power management is critical for high-density applications if high levels of availability and efficiency are to be achieved...

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Carbanak: the risks

Even amid the maelstrom of regular high profile cyber incidents, the notorious Russian cybercrime gang Carbanak stands out. The..

A Grand Night for Networking

The presentation ceremony for the 2017 Network Computing Awards took place on 30th March at the De Vere Grand..

Not-built-here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

87

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Not-built-here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

The IoT security stand-off

In a world of interconnected devices it can be all too easy for consumers and businesses alike to focus..

High density intelligent power

Intelligent power management is critical for high-density applications if high levels of availability and efficiency are to be achieved...

The IT skills shortage

While the UK is constantly being labelled as a skill-deprived nation, our latest data shows that the same cannot..

Retaining digital talent

As the UK navigates through proceedings for an EU exit, many industries across the UK are left wondering how..

The A to Z of networking

If the network perimeter is a thing of the past then so is the desk or office tethered digital..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

A Grand Night for Networking

The presentation ceremony for the 2017 Network Computing Awards took place on 30th March at the De Vere Grand..

The IoT security scandal

The Internet of Things has snowballed from a niche selection of connected devices in specific industries, to one of..

Storage workflow

There are now more surveillance cameras in use than ever before. Research from IHS suggests that by 2020 over..

Object lesson

The storage market is one to watch in 2017. While some traditional technologies, particularly the HDD and tape sectors..

The A to Z of networking

It's not that long ago that the main IT disciplines were characterised by a mindset of implementing measures, often..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

Carbanak: the risks

Even amid the maelstrom of regular high profile cyber incidents, the notorious Russian cybercrime gang Carbanak stands out. The..

Preventing drive-by fraud

The observed behaviour seemed to be harmless. Two Internet-enabled devices had been submitting less than ten automotive insurance applications..

IP Expo Manchester

The IP Expo Event series returns to Manchester on 26th and 27th April. Named as a Core City in..

Company Profile: Digital Pathways

Digital Pathways offer a full range of solutions to meet today’s complex demands for compliance and data privacy requirements..

The security of things

Just five years ago BYOD (Bring Your Own Device) was the hottest topic in IT security. iPhone and Android..

Disambiguating real-time threats

Real-time threat detection is a commonly used term in cybersecurity. Typically, most organisations interpret this as a clear indication..

Situationally aware

All organisations are faced with a growing and evolving cyber-threat landscape staffed by criminals, hacktivists and cyber-spies. Their complex..

The DNS attack vector

As a malicious actor or piece of malware inside your of your network, there's a good chance I'm going..

More of the same won't work

The structure of the storage market has traditionally led to many organisations having an accidental architecture of storage solutions..

Storage with purpose

All organisations need to provide fast shared access to an ever-growing mountain of unstructured data. As small or medium..

The A to Z of networking

It is well understood that cybercriminals will always look for the low hanging fruit of an easy win, and an..

The digital value platform

It is quite likely that many companies will not realise that the first stage of their digital transformation is..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

Line of Demarcation

Business Email Compromise (BEC), in which attackers seek to impersonate executives within a company, is one of the biggest..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

87