Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

30

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

112
18

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

Currency minecraft

As cryptocurrency becomes more popular, threat actors have developed coin mining malware to take advantage. But what is coin mining..

The A to Z of networking

Cybersecurity terms are bandied about but all too often not really understood. The various methods that criminal actors use to..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

IoT in the shadows

With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices..

Giving WAN an edge

In recent years, the software-defined WAN (SD-WAN) market has experienced significant growth around the world, with new SD-WAN acquisitions,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

Rebuilding brand trust

Criminals have been exploiting email as a vector for fraud and cyber-attacks since its inception. Deceptive techniques have evolved rapidly..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

IoT Network Management

The telecommunications industry has long anticipated the arrival of the Internet of Things (IoT). Based on the recent steady growth..

MI for the network?

There is currently little consistent definition of what Artificial Intelligence (AI) actually is. Many see Machine Intelligence (MI) as a..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

Ringing the changes

When it comes to those working in the healthcare industry, lives are quite literally on the line. Businesses cannot afford..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

An advanced defence

CHALLENGE
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organisations and..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

The digital premium

The charitable sector is currently operating between five and ten years behind the commercial sector when it comes to digital..

Application security: designed in

DevSecOps can be confusing, but pioneering practitioners define very specific things which you'll want to embrace. To over simplify, consider..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

Stop: don't drain the swamp

But the fact is that if you stop, just for a short while, and consider the evolution of your network-based..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

The currency of blockchain

Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Resilient connectivity

The business landscape is moving at pace, driven by the need for flexibility and the increasing adoption of cloud..

The black market block

It is shocking how counterfeiters will go to any length to make money, even if it can potentially result..

Blockchain takes off

According to a recent Accenture report entitled 'Launchpad to Relevance: Aerospace & Defense Technology Vision 2018', 86 per cent..

The server threat exposed

Servers are the crown jewels in the IT estate of any organisation. They represent a large target with a..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Mine your own business?

Cybercriminals are always on the lookout for new technology to exploit for easy profits. Accordingly, the increasingly high profile..

Preparing for lift-off...

IP EXPO Europe, which is colocated with Digital Transformation EXPO 2018, returns to London on the 3rd and 4th..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

66

Giving WAN an edge

In recent years, the software-defined WAN (SD-WAN) market has experienced significant growth around the world, with new SD-WAN acquisitions,..

The black market block

It is shocking how counterfeiters will go to any length to make money, even if it can potentially result..

The currency of blockchain

Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born..

Blockchain takes off

According to a recent Accenture report entitled 'Launchpad to Relevance: Aerospace & Defense Technology Vision 2018', 86 per cent..

IoT in the shadows

With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices..

Resilient connectivity

The business landscape is moving at pace, driven by the need for flexibility and the increasing adoption of cloud..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

The server threat exposed

Servers are the crown jewels in the IT estate of any organisation. They represent a large target with a..

Mine your own business?

Cybercriminals are always on the lookout for new technology to exploit for easy profits. Accordingly, the increasingly high profile..

Preparing for lift-off...

IP EXPO Europe, which is colocated with Digital Transformation EXPO 2018, returns to London on the 3rd and 4th..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

An advanced defence

CHALLENGE
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organisations and..

Ringing the changes

When it comes to those working in the healthcare industry, lives are quite literally on the line. Businesses cannot afford..

Stop: don't drain the swamp

But the fact is that if you stop, just for a short while, and consider the evolution of your network-based..

MI for the network?

There is currently little consistent definition of what Artificial Intelligence (AI) actually is. Many see Machine Intelligence (MI) as a..

IoT Network Management

The telecommunications industry has long anticipated the arrival of the Internet of Things (IoT). Based on the recent steady growth..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

The digital premium

The charitable sector is currently operating between five and ten years behind the commercial sector when it comes to digital..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

Rebuilding brand trust

Criminals have been exploiting email as a vector for fraud and cyber-attacks since its inception. Deceptive techniques have evolved rapidly..

Currency minecraft

As cryptocurrency becomes more popular, threat actors have developed coin mining malware to take advantage. But what is coin mining..

Application security: designed in

DevSecOps can be confusing, but pioneering practitioners define very specific things which you'll want to embrace. To over simplify, consider..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

The A to Z of networking

Cybersecurity terms are bandied about but all too often not really understood. The various methods that criminal actors use to..

66