Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

37

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

Home working: the security risk

Where we work is no longer restricted to the office, thanks to improvements in Internet access, remote access solutions and..

The GDPR information audit

According to research undertaken jointly by Experian and Ponemon Institute - Data Protection Risks & Regulations in the Global Economy..

IoT at scale

The Internet of Things (IoT) is potentially on the brink of mass deployment - but some help is needed...

Careful sharing

We share information with customers, suppliers and partners every day, but sometimes we are asked for too much information,..

The SME risk

With the headlines repeatedly dominated by serious security incidents at large well-known companies, including the likes of Equifax and..

Industrial network security

Supervisory control and data acquisition (SCADA) environments have typically been separated from traditional computer networks, which has secured them..

Digital communication: the next step

DLT (Distributed Ledger Technology) is a new concept for decentralising digital transactions across a network of untrusted computers. Although..

Licensed to trade

The software industry contributes more than £826bn to the EU's GDP, and this establishes software as an important business..

104
16

The SD-WAN challenge

The software-defined wide area network (SD-WAN) market has grown significantly. Bringing the world of software defined networking (SDN) to the..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

The AI Sanity Check

All of the commercial AI available today is the simplest and crudest manifestation imaginable. At a fundamental level it does..

Security Product of the Year 2018

RUNNER UP: Arbor Networks - Arbor Cloud

The cloud security solution TrustedGate enables companies to work securely in cloud computing environments..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

The cloud generation firewall

Traditionally, the daily operation of securing an organisation's network was orchestrated by a firewall located exclusively on premise. However, in..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

Starting your AI roadmap

AI has been a buzzword for the last few years, but increasingly I meet people who don't know what it..

Home working: the security risk

Where we work is no longer restricted to the office, thanks to improvements in Internet access, remote access solutions and..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

The reinforcing benefits of AI

Whichever way you look at it, the task of keeping networks safe from security breaches is becoming harder, perhaps even..

The GDPR information audit

According to research undertaken jointly by Experian and Ponemon Institute - Data Protection Risks & Regulations in the Global Economy..

The A to Z of networking

Cybersecurity terms are bandied about but all too often not really understood. The various methods that criminal actors use to..

Currency minecraft

As cryptocurrency becomes more popular, threat actors have developed coin mining malware to take advantage. But what is coin mining..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

Rebuilding brand trust

Criminals have been exploiting email as a vector for fraud and cyber-attacks since its inception. Deceptive techniques have evolved rapidly..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

The A to Z of networking

With BYOD rarely spoken of, is it possible that organisations continue to overlook the risk that is posed by people..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Intelligence that is artificial

Forget everything you've seen in sci-fi movies or read in sci-fi books about Artificial Intelligence. Forget about all the amazing..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Trust that knows no bounds

Infrastructure as a Service (IaaS) platforms offered by the likes of Amazon Web Services (AWS) support the innovation and app-driven..

Digital hand-wringing

Today's private networks are complex. The time and money involved in implementing and managing the modern WAN is not to..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

AI: A practical guide

WHAT IS AI?
You'd be hard pressed to have missed the acronym AI recently. Artificial Intelligence crops up in topics as..

the AI power challenge

Fuelled by GPU (Graphics Processing Unit) deep learning, we're in the early stages of a new computing era: AI computing...

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

Ringing the changes

When it comes to those working in the healthcare industry, lives are quite literally on the line. Businesses cannot afford..

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

IoT Network Management

The telecommunications industry has long anticipated the arrival of the Internet of Things (IoT). Based on the recent steady growth..

MI for the network?

There is currently little consistent definition of what Artificial Intelligence (AI) actually is. Many see Machine Intelligence (MI) as a..

An advanced defence

CHALLENGE
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organisations and..

Software Product of the Year 2018

RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2

Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI,..

Storage Product of the Year 2018

RUNNER UP: Lenovo - Storage DX8200D

BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal for businesses requiring..

CRM Product of the Year 2018

RUNNER UP: Smarty Software - Smarty CRM

WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that..

SD-WAN Vendor of the Year 2018

RUNNER UP: Silver Peak

Citrix aims to power a world where people, organisations and things are securely connected and accessible to..

Hardware Product of the Year 2018

RUNNER UP: WatchGuard - Firebox M5600

The IM7200 streamlines remote management of network, server and power infrastructure in data centre and..

The digital premium

The charitable sector is currently operating between five and ten years behind the commercial sector when it comes to digital..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

A Big Night for Networking

The Network Computing Awards ceremony took place in London on 22nd March. Former cricketer, Graham Cowdrey, was Master of ceremonies..

Distributor of the Year 2018

RUNNER UP: NBM Distribution

Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering a comprehensive range of..

The Customer Service Award 2018

RUNNER UP: NBM Technology Solutions

Commenting on their win, Brookcourt CEO Phil Higgins said "As a true testament of customer service..

Product of the Year 2018

RUNNER UP: Netreo - OmniCenter

Silver Peak’s Unity EdgeConnect SD-WAN solution
Delivered in both virtual and physical appliances, the Silver Peak Unity..

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

Company of the Year 2018

RUNNER UP: Brookcourt Solutions

Nuvias Group is the pan-EMEA, high value distribution business, which is redefining international, specialist distribution in IT...

Reseller of the Year 2018

RUNNER UP: Brookcourt Solutions

As an award-winning platform, data and services specialist, Q Associates are helping organisations across the commercial and..

The Inspiration Award 2018

RUNNER UP: Ian Moyse

Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows
With over 25 years' design and management..

Stop: don't drain the swamp

But the fact is that if you stop, just for a short while, and consider the evolution of your network-based..

Application security: designed in

DevSecOps can be confusing, but pioneering practitioners define very specific things which you'll want to embrace. To over simplify, consider..

85

An advanced defence

CHALLENGE
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organisations and..

Ringing the changes

When it comes to those working in the healthcare industry, lives are quite literally on the line. Businesses cannot afford..

Stop: don't drain the swamp

But the fact is that if you stop, just for a short while, and consider the evolution of your network-based..

MI for the network?

There is currently little consistent definition of what Artificial Intelligence (AI) actually is. Many see Machine Intelligence (MI) as a..

IoT Network Management

The telecommunications industry has long anticipated the arrival of the Internet of Things (IoT). Based on the recent steady growth..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

The digital premium

The charitable sector is currently operating between five and ten years behind the commercial sector when it comes to digital..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

Rebuilding brand trust

Criminals have been exploiting email as a vector for fraud and cyber-attacks since its inception. Deceptive techniques have evolved rapidly..

Currency minecraft

As cryptocurrency becomes more popular, threat actors have developed coin mining malware to take advantage. But what is coin mining..

Application security: designed in

DevSecOps can be confusing, but pioneering practitioners define very specific things which you'll want to embrace. To over simplify, consider..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

The A to Z of networking

Cybersecurity terms are bandied about but all too often not really understood. The various methods that criminal actors use to..

The AI Sanity Check

All of the commercial AI available today is the simplest and crudest manifestation imaginable. At a fundamental level it does..

The reinforcing benefits of AI

Whichever way you look at it, the task of keeping networks safe from security breaches is becoming harder, perhaps even..

Intelligence that is artificial

Forget everything you've seen in sci-fi movies or read in sci-fi books about Artificial Intelligence. Forget about all the amazing..

the AI power challenge

Fuelled by GPU (Graphics Processing Unit) deep learning, we're in the early stages of a new computing era: AI computing...

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Trust that knows no bounds

Infrastructure as a Service (IaaS) platforms offered by the likes of Amazon Web Services (AWS) support the innovation and app-driven..

A Big Night for Networking

The Network Computing Awards ceremony took place in London on 22nd March. Former cricketer, Graham Cowdrey, was Master of ceremonies..

CRM Product of the Year 2018

RUNNER UP: Smarty Software - Smarty CRM

WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that..

Storage Product of the Year 2018

RUNNER UP: Lenovo - Storage DX8200D

BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal for businesses requiring..

Security Product of the Year 2018

RUNNER UP: Arbor Networks - Arbor Cloud

The cloud security solution TrustedGate enables companies to work securely in cloud computing environments..

SD-WAN Vendor of the Year 2018

RUNNER UP: Silver Peak

Citrix aims to power a world where people, organisations and things are securely connected and accessible to..

Hardware Product of the Year 2018

RUNNER UP: WatchGuard - Firebox M5600

The IM7200 streamlines remote management of network, server and power infrastructure in data centre and..

Software Product of the Year 2018

RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2

Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI,..

The Customer Service Award 2018

RUNNER UP: NBM Technology Solutions

Commenting on their win, Brookcourt CEO Phil Higgins said "As a true testament of customer service..

The Inspiration Award 2018

RUNNER UP: Ian Moyse

Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows
With over 25 years' design and management..

Distributor of the Year 2018

RUNNER UP: NBM Distribution

Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering a comprehensive range of..

Reseller of the Year 2018

RUNNER UP: Brookcourt Solutions

As an award-winning platform, data and services specialist, Q Associates are helping organisations across the commercial and..

Product of the Year 2018

RUNNER UP: Netreo - OmniCenter

Silver Peak’s Unity EdgeConnect SD-WAN solution
Delivered in both virtual and physical appliances, the Silver Peak Unity..

Company of the Year 2018

RUNNER UP: Brookcourt Solutions

Nuvias Group is the pan-EMEA, high value distribution business, which is redefining international, specialist distribution in IT...

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

The A to Z of networking

With BYOD rarely spoken of, is it possible that organisations continue to overlook the risk that is posed by people..

Starting your AI roadmap

AI has been a buzzword for the last few years, but increasingly I meet people who don't know what it..

AI: A practical guide

WHAT IS AI?
You'd be hard pressed to have missed the acronym AI recently. Artificial Intelligence crops up in topics as..

Digital hand-wringing

Today's private networks are complex. The time and money involved in implementing and managing the modern WAN is not to..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

The SD-WAN challenge

The software-defined wide area network (SD-WAN) market has grown significantly. Bringing the world of software defined networking (SDN) to the..

The cloud generation firewall

Traditionally, the daily operation of securing an organisation's network was orchestrated by a firewall located exclusively on premise. However, in..

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

Home working: the security risk

Where we work is no longer restricted to the office, thanks to improvements in Internet access, remote access solutions and..

The GDPR information audit

According to research undertaken jointly by Experian and Ponemon Institute - Data Protection Risks & Regulations in the Global Economy..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

85