NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

OmniCenter from Netreo

Automation is vital, and OmniCenter from Netreo is devoted to this vital work. Rapid to deploy and..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

Lansweeper 5.2 from Hemoco

Monitoring large networks can run into thousands of pounds, but Lansweeper Premium supports unlimited assets and yet costs a..

Tufin Orchestration Suite 15.1

Orchestration Suite from Tufin responds by delivering a rapid response resource to automate security policy configuration across heterogeneous platforms,..

The WatchGuard Firebox M440

The M440 is very different to standard security appliances as it's designed to make light work of segmenting enterprise networks..

47

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

Monitoring the hybrid network

There has been a steady pattern of cloud adoption by organisations and according to the Cloud Industry Forum over..

Patch the hacker

The National Vulnerability Database reports approximately 70,000 software related risks, ranked at varying levels of severity. At a UK..

Domain name security

Recent research suggests that 30 per cent of organisations don't consider DNS as a critical business component. Yet, despite..

Verified identity

Identity and verification (ID&V) are closely linked concepts and they play an increasingly critical role in our daily lives...

Data centre security

Data centres are highly virtualised environments, densely packed and home to unparalleled levels of data. External data centres are..

The machinery of big data

Businesses are inundated by data, but those that gain advantage from it recognise that the key to success resides..

The rise of the bot

IT teams have been fighting malevolent actors flooding their IT infrastructure since the beginning of Internet time. There are..

New reality from virtualisation

Managing and protecting remote site data from a central location can be challenging. Inter-office bandwidth constraints and dependencies between..

Sharing the blame

In a recent survey over 90 per cent of executives said that they were unable to understand a cybersecurity..

People in the cloud

In 1937, the renowned anthropologist, Sir E.E. Evans-Pritchard, published his famous anthropological study, Witchcraft, Oracles and Magic among the..

Asleep at the wheel

At a recent investor briefing I attended, a major global telecoms firm expounded on its expertise in the cloud..

IoT spells danger

The catchy Hive jingle about controlling your heating at home is a great example of the benefits that IoT..

Hyper critical

There is a widespread growth of hyper-convergence taking place and it has led some vendors to opine that it..

Beyond today’s limit

Network testing and diagnostics is often thought of as a way to efficiently get packets from point A to..

Taming Dark data

With ongoing digital transformation meaning that businesses are handling ever-increasing volumes of documents and information, the issue of dark..

The cloaked network

Cybercrime has changed. Traditionally, skilful hackers would monetise the information they stole but now cybercrime is a full-blown money..

Optimising infrastructure

Most enterprise IT leaders are under pressure to deliver resources to the business faster and with the same level..

Strategic cloud adoption

The creation of a coherent cloud strategy remains a major challenge for many businesses. Despite widespread cloud computing acceptance..

Peer-to-peer storage

During the last 10 years cloud based file storage has become very popular, with hundreds of millions of consumers..

The gift that keeps on giving

A formal approach to management of the software asset pool has become essential because of the complexity caused by..

105

News in a connected context

Unless you’ve been isolated in the depths of Siberia recently you will no doubt have heard of the Russian website..

The Internet of Stuff...

As I try to make sense of the gargantuan volume of news, claims, assertions and downright rubbish that comes across..

14

Monitoring the hybrid network

There has been a steady pattern of cloud adoption by organisations and according to the Cloud Industry Forum over..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Device agnostic IoT security

If you consider the security attacks recently making the headlines they all follow a similar blueprint. Firstly the attacker..

The best of both worlds

Businesses need to be backed up. Hardware failures, malware and human error are just three of the many situations..

The abuse of DNS

DNS tunnelling isn't necessarily malicious, but even benign activity causes problems for cybersecurity teams. Malicious DNS tunnelling describes the..

Automation mindset

Based in Belgium, the Colruyt Group supermarket conglomerate has seen its business grow over the last 80 years. From..

Patch the hacker

The National Vulnerability Database reports approximately 70,000 software related risks, ranked at varying levels of severity. At a UK..

The digital value platform

It is quite likely that many companies will not realise that the first stage of their digital transformation is..

The A to Z of networking

It is well understood that cybercriminals will always look for the low hanging fruit of an easy win, and..

People in the cloud

In 1937, the renowned anthropologist, Sir E.E. Evans-Pritchard, published his famous anthropological study, Witchcraft, Oracles and Magic among the..

The A to Z of networking

The essential importance of connectivity is founded on a network component that is of critical importance. In part, this may..

Company Profile: Digital Pathways

Digital Pathways offer a full range of solutions to meet today’s complex demands for compliance and data privacy requirements..

Planning VDI nirvana

Virtual Desktop Infrastructure (VDI) promises greater efficiency and reduced operational IT costs. According to a recent report published by..

The machinery of big data

Businesses are inundated by data, but those that gain advantage from it recognise that the key to success resides..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

New reality from virtualisation

Managing and protecting remote site data from a central location can be challenging. Inter-office bandwidth constraints and dependencies between..

Situationally aware

All organisations are faced with a growing and evolving cyber-threat landscape staffed by criminals, hacktivists and cyber-spies. Their complex..

Line of Demarcation

Business Email Compromise (BEC), in which attackers seek to impersonate executives within a company, is one of the biggest..

Disambiguating real-time threats

Real-time threat detection is a commonly used term in cybersecurity. Typically, most organisations interpret this as a clear indication..

Government networks on the edge

As digital transformation sweeps across the workforce, end-users have come to expect complete connectivity on whatever device they choose...

The A to Z of networking

For those of us involved in IT and networking, data is an important constituent part, and we have all..

A cloud of uncertainty

There's a storm brewing with Europe at its epicentre and the rest of the world within its reach. The..

The human cloud

The scenes of Delta Air Lines passengers stranded in airports around the world following a data centre outage that..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

Domain name security

Recent research suggests that 30 per cent of organisations don't consider DNS as a critical business component. Yet, despite..

Seizing the GDPR advantage

Although enforcement of the EU GDPR (General Data Protection Regulation) is not expected until 2018, many businesses within the..

The DNS attack vector

As a malicious actor or piece of malware inside your of your network, there's a good chance I'm going..

The rise of the bot

IT teams have been fighting malevolent actors flooding their IT infrastructure since the beginning of Internet time. There are..

The analysed data dollar

No one is going to put off infrastructure upgrades that continue to make commercial sense, or ignore the imperative..

The security of things

Just five years ago BYOD (Bring Your Own Device) was the hottest topic in IT security. iPhone and Android..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Data centre security

Data centres are highly virtualised environments, densely packed and home to unparalleled levels of data. External data centres are..

Vacancy: Sheriff required

The upcoming European Union General Data Protection Regulation (EU GDPR) has such wide-reaching ramifications that many businesses are still..

Sharing the blame

In a recent survey over 90 per cent of executives said that they were unable to understand a cybersecurity..

Verified identity

Identity and verification (ID&V) are closely linked concepts and they play an increasingly critical role in our daily lives...

Storage with purpose

All organisations need to provide fast shared access to an ever-growing mountain of unstructured data. As small or medium..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

More of the same won't work

The structure of the storage market has traditionally led to many organisations having an accidental architecture of storage solutions..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

60

Company Profile: Digital Pathways

Digital Pathways offer a full range of solutions to meet today’s complex demands for compliance and data privacy requirements..

The security of things

Just five years ago BYOD (Bring Your Own Device) was the hottest topic in IT security. iPhone and Android..

Disambiguating real-time threats

Real-time threat detection is a commonly used term in cybersecurity. Typically, most organisations interpret this as a clear indication..

Situationally aware

All organisations are faced with a growing and evolving cyber-threat landscape staffed by criminals, hacktivists and cyber-spies. Their complex..

The DNS attack vector

As a malicious actor or piece of malware inside your of your network, there's a good chance I'm going..

More of the same won't work

The structure of the storage market has traditionally led to many organisations having an accidental architecture of storage solutions..

Storage with purpose

All organisations need to provide fast shared access to an ever-growing mountain of unstructured data. As small or medium..

The A to Z of networking

It is well understood that cybercriminals will always look for the low hanging fruit of an easy win, and..

The digital value platform

It is quite likely that many companies will not realise that the first stage of their digital transformation is..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

Line of Demarcation

Business Email Compromise (BEC), in which attackers seek to impersonate executives within a company, is one of the biggest..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Government networks on the edge

As digital transformation sweeps across the workforce, end-users have come to expect complete connectivity on whatever device they choose...

Device agnostic IoT security

If you consider the security attacks recently making the headlines they all follow a similar blueprint. Firstly the attacker..

The A to Z of networking

The essential importance of connectivity is founded on a network component that is of critical importance. In part, this may..

Monitoring the hybrid network

There has been a steady pattern of cloud adoption by organisations and according to the Cloud Industry Forum over..

Patch the hacker

The National Vulnerability Database reports approximately 70,000 software related risks, ranked at varying levels of severity. At a UK..

Domain name security

Recent research suggests that 30 per cent of organisations don't consider DNS as a critical business component. Yet, despite..

Verified identity

Identity and verification (ID&V) are closely linked concepts and they play an increasingly critical role in our daily lives...

Vacancy: Sheriff required

The upcoming European Union General Data Protection Regulation (EU GDPR) has such wide-reaching ramifications that many businesses are still..

Data centre security

Data centres are highly virtualised environments, densely packed and home to unparalleled levels of data. External data centres are..

The abuse of DNS

DNS tunnelling isn't necessarily malicious, but even benign activity causes problems for cybersecurity teams. Malicious DNS tunnelling describes the..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Automation mindset

Based in Belgium, the Colruyt Group supermarket conglomerate has seen its business grow over the last 80 years. From..

Seizing the GDPR advantage

Although enforcement of the EU GDPR (General Data Protection Regulation) is not expected until 2018, many businesses within the..

Planning VDI nirvana

Virtual Desktop Infrastructure (VDI) promises greater efficiency and reduced operational IT costs. According to a recent report published by..

A cloud of uncertainty

There's a storm brewing with Europe at its epicentre and the rest of the world within its reach. The..

The A to Z of networking

For those of us involved in IT and networking, data is an important constituent part, and we have all..

The human cloud

The scenes of Delta Air Lines passengers stranded in airports around the world following a data centre outage that..

The best of both worlds

Businesses need to be backed up. Hardware failures, malware and human error are just three of the many situations..

The analysed data dollar

No one is going to put off infrastructure upgrades that continue to make commercial sense, or ignore the imperative..

The machinery of big data

Businesses are inundated by data, but those that gain advantage from it recognise that the key to success resides..

The rise of the bot

IT teams have been fighting malevolent actors flooding their IT infrastructure since the beginning of Internet time. There are..

New reality from virtualisation

Managing and protecting remote site data from a central location can be challenging. Inter-office bandwidth constraints and dependencies between..

Sharing the blame

In a recent survey over 90 per cent of executives said that they were unable to understand a cybersecurity..

People in the cloud

In 1937, the renowned anthropologist, Sir E.E. Evans-Pritchard, published his famous anthropological study, Witchcraft, Oracles and Magic among the..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

60