Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

30

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

111
18

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

IoT in the shadows

With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices..

Giving WAN an edge

In recent years, the software-defined WAN (SD-WAN) market has experienced significant growth around the world, with new SD-WAN acquisitions,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

The currency of blockchain

Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

The server threat exposed

Servers are the crown jewels in the IT estate of any organisation. They represent a large target with a..

Resilient connectivity

The business landscape is moving at pace, driven by the need for flexibility and the increasing adoption of cloud..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

The black market block

It is shocking how counterfeiters will go to any length to make money, even if it can potentially result..

Blockchain takes off

According to a recent Accenture report entitled 'Launchpad to Relevance: Aerospace & Defense Technology Vision 2018', 86 per cent..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Mine your own business?

Cybercriminals are always on the lookout for new technology to exploit for easy profits. Accordingly, the increasingly high profile..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Preparing for lift-off...

IP EXPO Europe, which is colocated with Digital Transformation EXPO 2018, returns to London on the 3rd and 4th..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

44

Giving WAN an edge

In recent years, the software-defined WAN (SD-WAN) market has experienced significant growth around the world, with new SD-WAN acquisitions,..

The black market block

It is shocking how counterfeiters will go to any length to make money, even if it can potentially result..

The currency of blockchain

Blockchain was invented in 2008 by Satoshi Nakamato. He is thought to be a man living in Japan, born..

Blockchain takes off

According to a recent Accenture report entitled 'Launchpad to Relevance: Aerospace & Defense Technology Vision 2018', 86 per cent..

IoT in the shadows

With the Internet of Things (IoT) continuing to grow, and with employees connecting an increasing number of consumer devices..

Resilient connectivity

The business landscape is moving at pace, driven by the need for flexibility and the increasing adoption of cloud..

Digital visibility

When a software application is performing poorly or stops working, the network usually gets blamed, but it's not usually..

Networking fast

We increasingly see deployment of applications and services provisioned using underlying gigabit broadband infrastructure. This is enabling people, machines..

Moving recovery to the cloud

The use of cloud-based applications continues to grow at pace. Microsoft's Office 365 now has over 135 million active..

Digital wisdom

American scientist E.O. Wilson observed that, ''We are drowning in information, while starving for wisdom.'' This statement is as..

IP CCTV: the network challenge

Because IP CCTV cameras connect to an Ethernet LAN, business users often install camera systems onto their existing network..

Stitching up the cloud

Cloud computing is now so pervasive for individuals and organisations, especially those whose operations depend upon the likes of..

The currency threat

There is no doubt that the cryptocurrency landscape is booming, but with the massive growth in the value of..

Take it on the chin?

We all know that humans are invariably the weakest security link, and data breach after data breach reminds us..

Ominous clouds

Now in its eleventh year, the State of the Network is conducted annually amongst enterprise network engineers, IT directors..

The server threat exposed

Servers are the crown jewels in the IT estate of any organisation. They represent a large target with a..

Mine your own business?

Cybercriminals are always on the lookout for new technology to exploit for easy profits. Accordingly, the increasingly high profile..

Preparing for lift-off...

IP EXPO Europe, which is colocated with Digital Transformation EXPO 2018, returns to London on the 3rd and 4th..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

44