ThousandEyes Network Intelligence

It's more straightforward when you own the network and define its boundary, but cloud computing, virtualisation and WAN connectivity have..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

28

ISDN is dead: long live IP

Soon enough, the UK's leading telco provider, BT, will phase out ISDN, forcing organisations to update their existing communication infrastructure...

The email attack vector

Technology continuously evolves as does the severity and frequency of security threats. Despite an increase in available communication platforms, including..

An information security partnership

Within the contemporary climate of information security there are continuously evolving changes to regulation and compliance. Many organisations may find..

The fibre deception

The past 18 months have seen a step change in the way that our decision makers and regulators view digital..

AI impacts wireless

With a growing number of mobile devices and an onslaught of new apps that organisations repeatedly encounter on their wireless..

Securing operational technology

Historically, cybersecurity practices within industrial networks depended on air gapping to isolate assets from the internet. However this approach is..

The risk of cyber insurance

Given the growing number of organisations likely to suffer from a data breach and the resulting post-breach struggle to manage..

Hardware as a service?

After choosing the right hardware for each workload, there remains an equally important decision: how to maintain the equipment to..

A ticking time bomb…

The technology industry is one of the most dynamic in the UK, and demand for IT professionals is skyrocketing. Whilst..

The true value of data

Joining the likes of agile and innovative, the term data-centric has become part of the modern business lexicon. Whilst the..

Always-on resilience

Almost all businesses (93 per cent) have experienced a tech-related disruption in the last two years, according to some research..

Firewall granularity

The corporate firewall is more critical now than it's ever been, and this is confirmed in our latest (2018) State..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

118
19

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

IoT in the shadows

With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Giving WAN an edge

In recent years, the software-defined WAN (SD-WAN) market has experienced significant growth around the world, with new SD-WAN acquisitions,..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

The currency of blockchain

Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Focusing SD-WAN deployment

Many top athletes will follow their coach's training regime and they can achieve stunning results, but sometimes, they can lose..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The server threat exposed

Servers are the crown jewels in the IT estate of any organisation. They represent a large target with a..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

The true value of data

Joining the likes of agile and innovative, the term data-centric has become part of the modern business lexicon. Whilst the..

Firewall granularity

The corporate firewall is more critical now than it's ever been, and this is confirmed in our latest (2018) State..

ThousandEyes Network Intelligence

It's more straightforward when you own the network and define its boundary, but cloud computing, virtualisation and WAN connectivity have..

The black market block

It is shocking how counterfeiters will go to any length to make money, even if it can potentially result..

Resilient connectivity

The business landscape is moving at pace, driven by the need for flexibility and the increasing adoption of cloud..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

The risk of cyber insurance

Given the growing number of organisations likely to suffer from a data breach and the resulting post-breach struggle to manage..

Blockchain takes off

According to a recent Accenture report entitled 'Launchpad to Relevance: Aerospace & Defense Technology Vision 2018', 86 per cent..

Mine your own business?

Cybercriminals are always on the lookout for new technology to exploit for easy profits. Accordingly, the increasingly high profile..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Preparing for lift-off...

IP EXPO Europe, which is colocated with Digital Transformation EXPO 2018, returns to London on the 3rd and 4th..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

The network clean sweep

Nilfisk is a global supplier of professional cleaning solutions with products and services sold in more than 100 countries. They..

Hardware as a service?

After choosing the right hardware for each workload, there remains an equally important decision: how to maintain the equipment to..

Unblocking the supply chain

The sheer number of headlines being written about blockchain has grown dramatically as more and more organisations across various sectors..

Programmable Networking

Programmable networking is an emerging technology with vendors and service providers working to simplify network consumption. It requires a separation..

Layer X: the visibility layer

According to Gartner, "The need for tools that require packet data shows a steady upward trajectory as network bandwidth and..

Always-on resilience

Almost all businesses (93 per cent) have experienced a tech-related disruption in the last two years, according to some research..

The GDPR opportunity

It is essential for organisations to have a comprehensive understanding of all the data that they hold. There is just..

Network Computing Awards 2019

The Awards also provide opportunities for suppliers, their solutions and their customer success stories to be noticed and honoured by..

A ticking time bomb…

The technology industry is one of the most dynamic in the UK, and demand for IT professionals is skyrocketing. Whilst..

The email attack vector

Technology continuously evolves as does the severity and frequency of security threats. Despite an increase in available communication platforms, including..

Securing operational technology

Historically, cybersecurity practices within industrial networks depended on air gapping to isolate assets from the internet. However this approach is..

The fibre deception

The past 18 months have seen a step change in the way that our decision makers and regulators view digital..

ISDN is dead: long live IP

Soon enough, the UK's leading telco provider, BT, will phase out ISDN, forcing organisations to update their existing communication infrastructure...

An information security partnership

Within the contemporary climate of information security there are continuously evolving changes to regulation and compliance. Many organisations may find..

AI impacts wireless

With a growing number of mobile devices and an onslaught of new apps that organisations repeatedly encounter on their wireless..

Build a new wall

Threats have evolved but legacy firewalls were designed to prevent attacks at the port/protocol level. They had no ability to..

Consistent architecture

Hybrid seems to be the buzzword du jour, from cars to bonds and now data architectures. Organisations across all sectors..

68

Network Computing Awards 2019

The Awards also provide opportunities for suppliers, their solutions and their customer success stories to be noticed and honoured by..

The network clean sweep

Nilfisk is a global supplier of professional cleaning solutions with products and services sold in more than 100 countries. They..

Unblocking the supply chain

The sheer number of headlines being written about blockchain has grown dramatically as more and more organisations across various sectors..

The GDPR opportunity

It is essential for organisations to have a comprehensive understanding of all the data that they hold. There is just..

Programmable Networking

Programmable networking is an emerging technology with vendors and service providers working to simplify network consumption. It requires a separation..

Focusing SD-WAN deployment

Many top athletes will follow their coach's training regime and they can achieve stunning results, but sometimes, they can lose..

ISDN is dead: long live IP

Soon enough, the UK's leading telco provider, BT, will phase out ISDN, forcing organisations to update their existing communication infrastructure...

The email attack vector

Technology continuously evolves as does the severity and frequency of security threats. Despite an increase in available communication platforms, including..

An information security partnership

Within the contemporary climate of information security there are continuously evolving changes to regulation and compliance. Many organisations may find..

The fibre deception

The past 18 months have seen a step change in the way that our decision makers and regulators view digital..

AI impacts wireless

With a growing number of mobile devices and an onslaught of new apps that organisations repeatedly encounter on their wireless..

Securing operational technology

Historically, cybersecurity practices within industrial networks depended on air gapping to isolate assets from the internet. However this approach is..

The risk of cyber insurance

Given the growing number of organisations likely to suffer from a data breach and the resulting post-breach struggle to manage..

Hardware as a service?

After choosing the right hardware for each workload, there remains an equally important decision: how to maintain the equipment to..

A ticking time bomb…

The technology industry is one of the most dynamic in the UK, and demand for IT professionals is skyrocketing. Whilst..

The true value of data

Joining the likes of agile and innovative, the term data-centric has become part of the modern business lexicon. Whilst the..

Always-on resilience

Almost all businesses (93 per cent) have experienced a tech-related disruption in the last two years, according to some research..

ThousandEyes Network Intelligence

It's more straightforward when you own the network and define its boundary, but cloud computing, virtualisation and WAN connectivity have..

Firewall granularity

The corporate firewall is more critical now than it's ever been, and this is confirmed in our latest (2018) State..

Build a new wall

Threats have evolved but legacy firewalls were designed to prevent attacks at the port/protocol level. They had no ability to..

Consistent architecture

Hybrid seems to be the buzzword du jour, from cars to bonds and now data architectures. Organisations across all sectors..

Layer X: the visibility layer

According to Gartner, "The need for tools that require packet data shows a steady upward trajectory as network bandwidth and..

Giving WAN an edge

In recent years, the software-defined WAN (SD-WAN) market has experienced significant growth around the world, with new SD-WAN acquisitions,..

The black market block

It is shocking how counterfeiters will go to any length to make money, even if it can potentially result..

The currency of blockchain

Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born..

Blockchain takes off

According to a recent Accenture report entitled 'Launchpad to Relevance: Aerospace & Defense Technology Vision 2018', 86 per cent..

IoT in the shadows

With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices..

Resilient connectivity

The business landscape is moving at pace, driven by the need for flexibility and the increasing adoption of cloud..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

The server threat exposed

Servers are the crown jewels in the IT estate of any organisation. They represent a large target with a..

Mine your own business?

Cybercriminals are always on the lookout for new technology to exploit for easy profits. Accordingly, the increasingly high profile..

Preparing for lift-off...

IP EXPO Europe, which is colocated with Digital Transformation EXPO 2018, returns to London on the 3rd and 4th..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

68