Untitled Document
NetCrunch 9.3 from AdRem
There may be a huge choice of network monitoring products on the market today, but few can match NetCrunch from AdRem for its features and affordability...


baramundi Management Suite 2016
Enterprises concerned about losing control of their network can rest easy with baramundi Management Suite (bMS)...

Information Security Enforcer from GhangorCloud
It's generally accepted that first lines of defence such as firewalls do not prevent data exfiltration...

The SolarWinds Network Performance Monitor 12
SolarWinds consistently shows that network monitoring shouldn't cost a king's ransom and its Network Performance Monitor (NPM) 12 delivers even more valuable features with that sharp focus on value...

Phishing mitigation from SpearSec
Phishing comes in a variety of forms and just like the best Saville Row suits it is made to measure. The variants are unimportant; it is Social Engineering, the art of psychological manipulation to entice people to render their confidential information. ...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Unified Security Service from CensorNet
Companies depending on web and cloud applications for their business operations are going to have to rethink their security strategies...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Titania Nipper Studio
Total compliance with data protection regulations is now essential, and without it businesses could find themselves faced with hefty fines...

Freedome for Business from F-Secure
Mobile devices present a major security challenge for businesses and yet it seems that their employees just can't do without them - even though they are vulnerable to so many threats...

NetCrunch 9 from AdRem
NetCrunch from AdRem scores over the majority of network monitoring tools for a number of sound reasons...

AppGate XDP from Cryptzone
We typically approach network security using a network construct that includes a perimeter and user groups. The cloud, VLANs, mobile endpoints, Wi-Fi, advanced threats and user mobility have undermined this network-centric model. Additionally, devices such as the firewall are stretched beyond their design objectives....

Titania TEC
UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

OmniCenter from Netreo
Network engineers cannot ignore indications of potential network problems and yet somehow they need to be filtered, analysed, prioritised, grouped, categorised and assessed for network - therefore business - impact...

UniPrint Infinity 9 from UniPrint.net
Network printing is a constant pain point for support departments and even more trying for businesses running core services such as thin client computing, remote desktop and VDI...

The CryptoFlow App from Certes Networks
Certes Networks has an enviable reputation in the data security world. Its enterprise products are deployed in over 80 countries and they have not once been hacked in an impressive 15 years of service...

Resilience Gateway from Opengear
Support professionals working in large distributed networks depend heavily on remote access to critical infrastructure devices, but this can present problems...

Tripwire IP360 vulnerability and risk management
It's an accepted fact that enterprise networks are constantly attacked as cyber criminals probe them mercilessly to identify weaknesses that they can exploit, allowing them to steal and ransom confidential data...

IP Expo Europe - 7th & 8th October
Update your cloud and infrastructure expectations at this year’s IP EXPO Europe at ExCel london...

Government networks on the edge
A lack of infrastructure investment is making public sector branch offices the weak link in the public sector's digital chain. John Street, Regional Director, Public Sector UK and Ireland for Riverbed Technology explains...


Innovation and regulation in IoT
The impact of IoT is pushing best practice into the shadows. Art Swift, President of prpl Foundation, explains how to create effective, open, hardware based IoT Security...

IoT security: using what we know
Peter Martin, MD of RelianceACSN, explains how to tackle the IoT security challenge - and why it is not as new as some might think...

Device agnostic IoT security
With more unmanaged and seldom-updated devices connecting to our networks, behaviour-based security is an essential line of defence. Matt Walmsley, EMEA Director at Vectra Networks makes the case...

The A to Z of networking
With contributions from leading industry figures and commentary from our Editor, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda...

Seizing the GDPR advantage
The EU referendum has created uncertainty. However, Louise Bulman, Vice President & General Manager EMEA at Vormetric, explains why early GDPR adoption could give your business an advantage...

Planning VDI nirvana
A move to VDI should be well planned. Atchison Frazer, CMO at Xangati explains the essentials for a successful virtual desktop infrastructure...

A cloud of uncertainty
Preparing for Brexit is fraught with problems. Nick Brackney, product marketer at ExtraHop explores the Brexit climate change challenge...

The A to Z of networking
With contributions from leading industry figures and commentary from our Editor, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda...

The human cloud
It's easy to blame technology when a business goes dark. Matt Kingswood, Head of Managed Services at ITS explains why the human touch is more likely to be the cause...

The best of both worlds
Andrew Stuart, Managing Director EMEA business at Datto, explains why hybrid cloud adoption is both a necessity and the best solution...

Privacy by design
Ross Woodham, Director of Legal Affairs and Privacy at Cogeco Peer 1 explains the importance of addressing privacy at the design stage of products and services...

Taming the GDPR
If you have taken the appropriate measures to protect your data, and have considered all of the relevant legislation, then you have nothing to fear from the EU GDPR, writes Brian Chappell, Director of Technical Services for BeyondTrust ...

GDPR and personal data
With GDPR inevitable for all EU member states, urgent action and mindful preparation is imperative. James Wickes, CEO and co-founder of Cloudview explains...

The NAC of GDPR readiness
What role might existing technology play as the GDPR unfolds? Paul Donovan of Pulse Secure considers how NAC can help to protect corporate data and help compliance with the new legislation...

Infosecurity Europe 2016: where to next?
With Infosecurity Europe now behind us where should professional visitors be engaging their minds? Our Editor, Ray Smyth, offers a view - with the help of some key vendors...

The IoT security challenge
IoT deployment increases the potential network attack surface. Kathy Schneider of Level 3 Communications says that we need to address this before adopting it...

With great data comes…
The Internet of Things promises great data, but it also brings substantial responsibility. Larry Augustin, CEO of SugarCRM considers the way businesses understand and service their consumers...

Rigorous audit
Whatever the impact of BREXIT on EU legislation, Roman Foeckl, CEO at CoSoSys explains why a 'by the book' audit is the essential first step to data compliance...

An IoT ecosystem
Ryan Lester, Director of IoT Strategy at Xively offers some practical guidance for successfully implementing IoT...

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility....


Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
Quarterly market share reports usually make for dry reading, but Gartner Inc.’s recent application delivery controller market share report was something of an exception. ...

Magic Quadrant for Application Delivery Controllers
Application delivery controllers (ADCs) provide asymmetric functions that optimize enterprise applications as they are delivered to users across various internal and external networks and access methods....

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
Few people outside IT know much about application delivery controllers, the Swiss army knife appliances that perform load balancing, caching, SSL offloading, and a host of other vital data center tasks....

NetScaler White Paper: A foundation for next-generation datacenter security
The need for robust datacenter security has never been greater...

Securing Virtual Desktop Infrastructure with Citrix NetScaler
NetScaler can be easily and cost-effectively deployed as a front-end to today's virtual desktop solutions. It provides a robust set of network-layer security, application-layer security and advanced access and data control capabilities to extend the benefits organisations have come to expect when embracing desktop virtualisation...

In a state of denial?
The past couple of years have seen a marked resurgence of denial of service (DoS) attacks. Not only is this availability-threatening class of attack firmly back on the radar screens of today’s network and security operations teams, but the nature of the threat has changed as well. The largest Internet companies are no longer the primary targets. ...

Is NASA's data lost in space?
A recent report has revealed that it’s not just the cloud over Cape Canaveral that’s been troubling NASA of late, writes Campbell Williams, group strategy and marketing director, Six Degrees Group...


Nexthink appoints Chief Revenue Officer to drive next stage of growth
Kevin Tumulty joins Nexthink from ServiceNow....


Version X
With product announcements ranging from the trivial to the bizarre, the Editor distils the essence of those that are of interest to the Networking community...

Network News - Moves, adds and changes
A regular look at the stories involving people, companies and solutions...

Market Dynamics: Making Sense of the Market
In a regular look at results and key business announcements for suppliers into the Networking and IT market, Network Computing summarises the Editors selections...

Nexthink announces new End-User Feedback Module
End-User Feedback module provides contextual insight to prioritise what the business needs and improve productivity ...

Half of hiring managers expect demand for tech professionals to rise in 2017
A recent survey from specialist recruiter Robert Walters and leading British job board Jobsite has found that 47% of managers in technology expect to increase hiring in 2017. The ‘Technology & Recruitment – The Landscape for 2017’ campaign surveyed over 700 senior technology professionals from across the UK to gain insights into how demand for tech specialists will develop in 2017, the challenges employers will face and what strategies they can use to attract top talent....

Glenfield selects NaviSite for migration and management of Microsoft Office 365
Glenfield Business Solutions has selected NaviSite as its managed Microsoft Office 365 provider to help implement the cloud-based business application both internally and to four of its customers. NaviSite was selected due to its leading support services for managed applications and proven track record as a longstanding Microsoft partner of 15 years. ...

Top IT trends for 2017 – SolarWinds’ head geeks speak!
From FaaS to the expansion of Blockchain, the Head Geeks at SolarWind make their predictions for the new year ...

A farewell to paper: CeBIT 2017
CeBIT 2017 will present everything businesses need in order to make the transition from paper-based to digital office processes. The technologies on show range from software for managing vacation requests and billing to systems for securely archiving emails and storing mission-critical documents. The digital office solutions on show at CeBIT 2017 will be clustered in Hall 3. ...

SolarWinds' top security tips for National Cyber Security Awareness Month
With October being National Cyber Security Awareness Month, Mav Turner, Senior Director of Product Management at SolarWinds, has put together some top tips in order to help IT professionals succeed at securing their IT infrastructure....

85% of ManageEngine users believe ITSM analytics will enhance IT service delivery
ManageEngine has announced the results of its survey, "Everything you need to know about ITSM analytics: Industry Insight 2016."...

BullGuard’s free online IoT scanner highlights DDoS vulnerabilities
The latest data from BullGuard’s IoT Scanner, a free tool that allows consumers to check if their connected devices are secure, suggests the recent DDoS attack could be just the tip of the iceberg....

SolarWinds Invites IT Pros to Fifth Annual THWACKcamp Virtual IT Conference
SolarWinds has announced its fifth edition of THWACKcamp is scheduled for September 14-15, 2016. ...

Two thirds of SMEs are set for the Digital Workplace, but company strategy is struggling to keep up
The leadership of Europe’s small and medium enterprises (SME) are keen to integrate digital and mobile technologies into the workplace, but over half of the same organisations do not have a strategy in place to achieve this, new research suggests....

Barnardo’s Selects Nexthink to Improve IT Operations and Support
Barnardo’s, one of the UK’s leading children’s charities, has selected Nexthink to provide greater insight into its IT infrastructure. By utilising IT analytics, the charity aims to accurately measure the end-user experience to improve the efficiency of incident management and service delivery....

SolarWinds IT is Everywhere Surveys Shed Light on Expanding Borders of IT
SolarWinds has announced the findings of its IT is Everywhere surveys. The results showcase how the realm of IT is expanding beyond the traditional borders of company-owned devices and on-premises technology, thereby placing greater demand on IT professionals to manage technology outside their traditional scope of control. ...

CityFibre acquires Redcentric’s duct and fibre networks
CityFibre has completed the acquisition of all metropolitan local access duct and fibre network assets of leading IT Managed Services provider Redcentric. These assets total at least 137km. The deal accelerates CityFibre’s recent growth still further as it now owns 40 major UK metro networks, becoming an increasingly powerful national competitor to BT Openreach....

John Lewis, Tesco and BMW to take to the stage at Internet of Things World Europe
Household brands John Lewis, Tesco, BMW and MasterCard will reveal how the Internet of Things (IoT) is transforming their businesses as part of Europe’s Internet of Things World event....

Next Tech Girls celebrates 100 work experience placements
The Next Tech Girls initiative, which is working to improve female talent pipelines within STEM (Science, Technology, Engineering and Mathematics) by providing access to work experience, is celebrating reaching its target of placing 100 year 10 students before the 2016 summer break....

Spiceworks releases free tools to help IT professionals spot network vulnerabilities
New online tools help IT professionals more effectively manage their network and identify vulnerabilities to external attacks....

Monitoring the hybrid network
A hybrid cloud environment presents new risks to services and data. Rob Farmer, Senior Director at Ipswitch explains how network monitoring can help...


Patch the hacker
with threat sophistication continuing to grow, failure to effectively deal with software patching could be catastrophic. Jonathan Lange, International Sales Manager at baramundi software explains the challenge...

Domain name security
With DNS-based attacks back in the news, Hervé Dhélin, Worldwide Marketing Director of EfficientIP explains the risks...

Verified identity
Identity and verification are closely linked and vital to digital security. David Poole, Head of Growth at MYPINPAD, looks at the future of digital ID&V...

How do you protect your perimeter when you've blown it to pieces?
By Ian Kilpatrick, Executive Vice President Cyber-Security, Nuvias Group and Chairman Wick Hill Group ...

UK data centres - the unsung heroes of the tech revolution?
By Jack Bedell-Pearce, Managing Director, 4D...

The machinery of big data
Big data can be challenging. Serge Haziyev, VP of technology services at SoftServe, considers the opportunities and pain points, and what the future holds...

The rise of the bot
Advanced Persistent Bots use deception and evasion to avoid detection. Distil Networks CEO Rami Essaid explains how to protect your web application infrastructure against automated attacks ...

New reality from virtualisation
Remote site disaster recovery rarely goes to plan. Stuart Gilks, Solutions Architect Director at SimpliVity explains how entrenched roadblocks are being overcome through advances in data virtualisation and hyperconvergence...

Sharing the blame
Alina Stancu, Marketing Coordinator at Titania explains why the cybersecurity industry needs to return to the basics...

People in the cloud
Technology can sometimes seem other-worldly. Alex Taylor, PhD student of social anthropology at the University of Cambridge offers an anthropological perspective on 'Cloudcraft' among Data Centre Professionals...

Going for Gold at work?
Mav Turner, Director of Product Management at SolarWinds, explains how IT professionals can keep the business ticking over by ensuring that video streaming of the Olympics doesn’t have a detrimental effect on the network. ...

Demystifying the migration to 10G
Why do only a third of SMBs currently have 10 Gigabit switching in place? Tris Simmons, director, global product marketing, NETGEAR, explores the issues involved in making the switch to 10G ...

Asleep at the wheel
With a few exceptions, telecoms firms have been slow to address the IoT business opportunity, in particular the resulting data analytics and customer insight, according to Homan Haghighi, Managing Director at Alsbridge ...

IoT spells danger
By any measure IoT is new, but could a lack of experience combined with poor software design create the perfect security storm? Amit Ashbel, cyber security evangelist at Checkmarx, explores the issues...

Hyper critical
Hyper-convergence is gaining traction. Sushant Rao, Director of Product and Solutions Marketing at DataCore considers its effect on storage infrastructure...

Beyond today’s limit
Network testing and diagnostics needs a rethink as engineers require greater visibility, according to Tyson Supasatit, Product Marketing Manager at ExtraHop ...

Taming Dark data
Managing data is a growing challenge and the spectre of dark data is particularly troubling. Julian Cook, Director of UK Business at M-Files explains how ECM can help...

Implementing DRaaS to avoid losing your business
By Peter Hannah, Regional Director of UK, Ireland and Nordics, NETGEAR...

The Agile Journey for all Testers
By Cassy Calvert, Test Services Manager, BJSS...

Don't wait for change, cause it
I am writing this introduction on a cold but sunny November day having just learned the outcome of the American Presidential Election...


The analysed data dollar
As the politicians of the UK and EU exchange banter and even plan for what seems to be the inevitable exit of the UK from the EU, life goes on...

#Techxit or opportunity?
Well, it happened. On the 23rd of June 2016, the United Kingdom, through a national referendum, voted to leave the EU...

Step up and make your view count
If there was one piece of advice I would offer to IT and networking professionals at this precise time, it would be these two things [sic]...

Customer adaptive networks
In the last issue of the magazine I suggested that IT and network professionals need to step up and take a leadership role in the use of IoT in their own organisation - but I didn't mention customers...

IoT: move fast and take a leadership role
Just as the network perimeter has vanished, much the same has happened to the ownership of IT and the organisation’s network...

Creating the next generation network professional
If, as it is suggested, IT technology is in some way to blame for a botched high profile football transfer, it once again illustrates the dependency organisations have placed upon the IT network...

IT people: step up to the plate and advance
At first reading I thought it was good news that IT spending is forecast by Gartner to reach $3.5 trillion during 2015...

Every day’s a data day
Have you noticed that the subject of data is rapidly rising up through the noise level of IT discussions? Have you noticed people who (and I generalise) know nothing about IT giving forth on the importance of data to the future of the business, or the effectiveness of the organisation? Whichever way you are responding, I think that it's a very good moment for IT and Networking professionals to start thinking, talking, and acting data...

A modern it curse is invented
As you may know, it is now thought that the so-called ancient Chinese curse, "May you live in interesting times" may not be either Chinese or even all that old. In fact if anything it would appear to be a modern IT curse...

Direction of travel
Welcome to a new year with Network Computing - and perhaps a new network…...

The web and you
As you may have noticed IP EXPO Europe is upon us once again, and the promise of hearing Sir Tim Berners-Lee's 2050 vision for the web is enthralling...

IT security: it's just one part of the network
As you might imagine I am sent, no bombarded would be a better word, with no end of press releases and telephone calls representing companies who all have the best, biggest, and most effective, whatever it is they sell...

Watch out, it's started...
Moving around and doing my work as Editor of Network Computing I am picking up a firm sense of change that is more than the usual springtime stirring. None of its scientific, but to me it does seem very real...

Security begins at home
By Ray Smyth, Editor, Network Computing...

Don't fall into the network abyss
There is still a gap and it needs to change. Dependence has increased to addictive, even survival levels and yet, there is still a gap...

Drawing the cyber battle lines
When deeply considering the myriad of threats that networks face, the attached devices and the users, securing them can seem like an awesome task ...

Network personality
by Ray Smyth, Editor ...

Think the plan: Plan the think
by Ray Smyth, Editor ...

People and the network
With such a high level of dependency on IT across an extremely broad spectrum, it is easy to overlook one important dependency for its success - people...

Automation mindset
With business growth driving network complexity, Infoblox stepped in to help the Colruyt Group automate its network processes...


Hot network access
Redstone has helped Aon to create agile, cost saving ICT access for its UK employees...

The network that rocked
With massive up scaling and no room for complacency Roskilde Festival depends on WhatsUp Gold network monitoring to keep performers, festival goers, event teams, the press and commercial partners connected...

Mutiny creates a true Vue
Monitoring network performance doesn't get any tougher than in a live cinema complex. Mutiny technology created the means for Vue Entertainment to monitor over 5,000 devices accross their UK cinemas...

The right move for web security
The UK's largest property website, Rightmove, explains how WhiteHat has helped them to improve and underpin their web application security...

End user analytics at the cutting edge
University College London Hospital's IT services transforms many aspects of the IT estate using Nexthink end-user analytics...

The human security sensor
TITUS secures documents for Morpho - and takes employees with them as part of the solution...

Saudi Petroleum chooses Tegile to handle storage needs
London based Saudi Petroleum (SPOL) is the European marketing office of the Saudi Arabian Oil Company, the state-owned oil company of the Kingdom of Saudi Arabia, providing marketing services to Saudi Aramco in Europe, Africa and South America. ...

Canadian bank sees the savings
Jameson Bank, a Canadian FOREX Bank, has reduced its IT administrative overhead by 25% with help from Paessler PRTG...

The university challenge
Oxford University's Advanced Research Computing (ARC) facility relies on hybrid scale-out NAS solutions to provide fast, reliable, and easy-to-administer storage around the clock to support researchers' diverse work flows...

Wire data analysis proves a sure thing for bet365
With help from ExtraHop, bet365 is using innovative wire data analysis to improve application delivery, network performance and strengthen anti-fraud defences...

ExtraHop delivers visible change for Portsmouth Hospitals NHS Trust
Portsmouth Hospitals NHS Trust (PHT) has selected the ExtraHop EH2000v virtual appliance to gain unprecedented visibility into clinical and administrative applications, including its core Citrix-based virtualisation platforms....

Networking on an Olympian scale
Avaya raises the network bar at the Sochi Winter Games...

Credit where credit’s due with AppQoS
International Personal Finance plc (IPF) is a leading international home credit business with more than 200 branches throughout Europe and Mexico, serving 2.4 million customers ...

Credit where credit's due with AppQoS
Resolving application performance issues alleviated the need for wan optimisation for IPF ...

Dixon City Academy saves with Barracuda
Barracuda Backup and Barracuda SSL VPN line up to defend against malicious hackers ...

Putting IT management to bed
Trinity Mirror turns to SolarWinds to simplify and improve its IT management ...

Hearing is believing
Being in the headset technology business means that sound quality is crucial to Plantronics. Deploying the Interoute IP-voice solution, they have increased conference call volume at 50% less cost...

Data acceleration beats bandwidth addiction
During 2012 United Drug had some challenging it problems - but Silver Peak were able to deliver the right medicine...

Zycko takes its own medicine
When global IT distributor Zyko needed a better network for its Unified communications, it turned to Riverbed...

The Network Computing Awards 2016
The results from the 2016 Network Computing Awards were revealed at an evening ceremony at the Hotel Russell in London on 17th March...


Network Computing Awards 2016 - Infrastructure Product Of The Year
WINNER: Cradlepoint - ECM ...

Network Computing Awards 2016 - Data Centre Product Of The Year
WINNER: SUSE - SUSE OpenStack Cloud 6...

Network Computing Awards 2016 - Cabling Supplier Of The Year
WINNER: Excel...

Network Computing Awards 2016 - Contact Centre Product Of The Year
WINNER: VoiceSage - VoiceSage Contact...

Networking Computing Awards 2016 - CRM Product Of The Year
WINNER: SugarCRM - Sugar Enterprise...

Networking Computing Awards 2016 - Network Management Product Of The Year
WINNER: Paessler - PRTG...

Network Computing Awards 2016 - IT Optimisation Product Of The Year
WINNER: F5 Networks - Application Acceleration Manager ...

Network Computing Awards 2016 - Testing /Monitoring Product Of The Year
WINNER: Netreo - Omnicenter...

Security Product Of The Year – Networking 2016
WINNER: Check Point - SandBlast...

Network Computing Awards 2016 - Education And Training Award
WINNER: Global Knowledge...

Network Computing Awards 2016 - Hardware Product Of The Year
WINNER: WatchGuard - M500...

Networking Computing Awards 2016 - Software Product Of The Year
WINNER: Extreme Networks - ExtremeAnalytics (Formerly Purview) ...

Networking Computing Awards 2016 - Service Provider Of The Year
WINNER: AirWatch...

Networking Computing Awards 2016 - Distributor Of The Year
WINNER: Wick Hill...

Network Computing Awards 2016 - Reseller Of The Year
WINNER: Brookcourt...

Network Computing Awards 2016 - Bench Tested Hardware Product Of The Year: Hardware Category
WINNER: iTrinegy - NE-ONE Network Emulator and Profiler...

Network Computing Awards 2016 - Bench Tested Product Of The Year: Software And Services Category
WINNER: Cryptzone - AppGate XDP...

Network Project Of Year - Public Sector – Networking 2016
WINNER: Portsmouth Grammar School / WatchGuard...

Network Computing Awards 2016: Network Project Of The Year - Private Sector
WINNER: Imagination Group / Cohesive Networks...