Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

OmniCenter from Netreo

Automation is vital, and OmniCenter from Netreo is devoted to this vital work. Rapid to deploy and..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

46

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

Monitoring the hybrid network

There has been a steady pattern of cloud adoption by organisations and according to the Cloud Industry Forum over..

Patch the hacker

The National Vulnerability Database reports approximately 70,000 software related risks, ranked at varying levels of severity. At a UK..

Domain name security

Recent research suggests that 30 per cent of organisations don't consider DNS as a critical business component. Yet, despite..

Verified identity

Identity and verification (ID&V) are closely linked concepts and they play an increasingly critical role in our daily lives...

Data centre security

Data centres are highly virtualised environments, densely packed and home to unparalleled levels of data. External data centres are..

101

News in a connected context

Unless you’ve been isolated in the depths of Siberia recently you will no doubt have heard of the Russian website..

18

A revolution in data storage

What is the current state of storage tape technology?

Richard Alderson: We are in quite a surprising situation right now...

The A to Z of networking

One of the big challenges for many network professionals is to gain full and contextual visibility of their network, and..

Retaining digital talent

As the UK navigates through proceedings for an EU exit, many industries across the UK are left wondering how..

The A to Z of networking

If the network perimeter is a thing of the past then so is the desk or office tethered digital..

Not built here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Putting the customer first

Digital transformation was a hot topic throughout 2016 and as pervasive access to new digital technology grows, this will no..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

The IT skills shortage

While the UK is constantly being labelled as a skill-deprived nation, our latest data shows that the same cannot..

The IoT security stand-off

In a world of interconnected devices it can be all too easy for consumers and businesses alike to focus..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

High density intelligent power

Intelligent power management is critical for high-density applications if high levels of availability and efficiency are to be achieved...

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

A Grand Night for Networking

The presentation ceremony for the 2017 Network Computing Awards took place on 30th March at the De Vere Grand..

Cyber-insanity

From claims of fake news to allegations of state-sponsored hacks, the role of data security is on stark display. We're..

Scamming the Scammers

Criminals have had years to refine their playbook, with many relying on low-tech techniques that are simple to execute,..

Adapt or die

As technology in the data centre evolves, the role of people working in Network Operations (NetOps) must adapt. This..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Transforming security

The use of cloud, social and mobile technologies has permeated the enterprise to such an extent that a term..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Closing the detection gap

Organisations continue to invest heavily in defensive cybersecurity solutions, but for many, the results are disappointing. Preventive measures provide little..

The hacker crowd

Whatever your do to defend against hackers, there's a good chance it's not working as you would like. Worse still,..

Internet stressors

This year is set to be one of the most interesting and tumultuous so far in terms of cyber security...

WAN congestion

Explosive growth in real time applications, distributed enterprises and cloud computing is placing growing strain on network infrastructure. This..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Not built here…

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

Transforming with SDN

Unlike most components of the IT estate, the price and performance attributes of WAN services have not obeyed Moore's..

Network fluidity

Worldwide spending on digital transformation technologies is set to reach more than $1.2 trillion by the end of 2017...

New field of operations

T H White Group is a UK-based, privately-owned, multi-site agricultural supplier with a fascinating history. It was founded..

Skills creation

With university fees on the increase, many secondary school graduates are looking for a less expensive and more practical..

Outcome driven networking

Software Defined Wide Area Networking (SD-WAN) is disruptive and a business enabler. It is already transforming traditional networks such..

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

A living security policy

As more of us become cybercrime targets, the need to embed a culture of security into every business becomes..

Connectivity's new clothes?

Changing at pace, the IT industry is driven largely by user demand and massive growth in the adoption and..

The people premium

High profile cyber-attacks, such as WannaCry and Petya, have compromised the activities of both big brands and governments. All..

89

A revolution in data storage

What is the current state of storage tape technology?

Richard Alderson: We are in quite a surprising situation right now...

New field of operations

T H White Group is a UK-based, privately-owned, multi-site agricultural supplier with a fascinating history. It was founded..

Transforming security

The use of cloud, social and mobile technologies has permeated the enterprise to such an extent that a term..

Skills creation

With university fees on the increase, many secondary school graduates are looking for a less expensive and more practical..

Adapt or die

As technology in the data centre evolves, the role of people working in Network Operations (NetOps) must adapt. This..

Transforming with SDN

Unlike most components of the IT estate, the price and performance attributes of WAN services have not obeyed Moore's..

Connectivity's new clothes?

Changing at pace, the IT industry is driven largely by user demand and massive growth in the adoption and..

Network fluidity

Worldwide spending on digital transformation technologies is set to reach more than $1.2 trillion by the end of 2017...

WAN congestion

Explosive growth in real time applications, distributed enterprises and cloud computing is placing growing strain on network infrastructure. This..

Outcome driven networking

Software Defined Wide Area Networking (SD-WAN) is disruptive and a business enabler. It is already transforming traditional networks such..

A living security policy

As more of us become cybercrime targets, the need to embed a culture of security into every business becomes..

Seismic cyber aftershock

Effective cyber security is in large part making sure that nothing sinister infiltrates the network. Thinking about the fallout..

DNS: safety in numbers

For many enterprises, avoiding single points of failure only becomes a priority when something unexpected happens. This is a..

Scamming the Scammers

Criminals have had years to refine their playbook, with many relying on low-tech techniques that are simple to execute,..

The people premium

High profile cyber-attacks, such as WannaCry and Petya, have compromised the activities of both big brands and governments. All..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Not built here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Putting the customer first

Digital transformation was a hot topic throughout 2016 and as pervasive access to new digital technology grows, this will no..

Not built here…

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Closing the detection gap

Organisations continue to invest heavily in defensive cybersecurity solutions, but for many, the results are disappointing. Preventive measures provide little..

The A to Z of networking

One of the big challenges for many network professionals is to gain full and contextual visibility of their network, and..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

Internet stressors

This year is set to be one of the most interesting and tumultuous so far in terms of cyber security...

Cyber-insanity

From claims of fake news to allegations of state-sponsored hacks, the role of data security is on stark display. We're..

The hacker crowd

Whatever your do to defend against hackers, there's a good chance it's not working as you would like. Worse still,..

The IoT security stand-off

In a world of interconnected devices it can be all too easy for consumers and businesses alike to focus..

High density intelligent power

Intelligent power management is critical for high-density applications if high levels of availability and efficiency are to be achieved...

The IT skills shortage

While the UK is constantly being labelled as a skill-deprived nation, our latest data shows that the same cannot..

Retaining digital talent

As the UK navigates through proceedings for an EU exit, many industries across the UK are left wondering how..

The A to Z of networking

If the network perimeter is a thing of the past then so is the desk or office tethered digital..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

A Grand Night for Networking

The presentation ceremony for the 2017 Network Computing Awards took place on 30th March at the De Vere Grand..

89