Untitled Document
Unified Security Service from CensorNet
Companies depending on web and cloud applications for their business operations are going to have to rethink their security strategies...


Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Titania Nipper Studio
Total compliance with data protection regulations is now essential, and without it businesses could find themselves faced with hefty fines...

Freedome for Business from F-Secure
Mobile devices present a major security challenge for businesses and yet it seems that their employees just can't do without them - even though they are vulnerable to so many threats...

NetCrunch 9 from AdRem
NetCrunch from AdRem scores over the majority of network monitoring tools for a number of sound reasons...

AppGate XDP from Cryptzone
We typically approach network security using a network construct that includes a perimeter and user groups. The cloud, VLANs, mobile endpoints, Wi-Fi, advanced threats and user mobility have undermined this network-centric model. Additionally, devices such as the firewall are stretched beyond their design objectives....

Titania TEC
UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

OmniCenter from Netreo
Network engineers cannot ignore indications of potential network problems and yet somehow they need to be filtered, analysed, prioritised, grouped, categorised and assessed for network - therefore business - impact...

UniPrint Infinity 9 from UniPrint.net
Network printing is a constant pain point for support departments and even more trying for businesses running core services such as thin client computing, remote desktop and VDI...

The CryptoFlow App from Certes Networks
Certes Networks has an enviable reputation in the data security world. Its enterprise products are deployed in over 80 countries and they have not once been hacked in an impressive 15 years of service...

Resilience Gateway from Opengear
Support professionals working in large distributed networks depend heavily on remote access to critical infrastructure devices, but this can present problems...

Tripwire IP360 vulnerability and risk management
It's an accepted fact that enterprise networks are constantly attacked as cyber criminals probe them mercilessly to identify weaknesses that they can exploit, allowing them to steal and ransom confidential data...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

Cloud Security from iSheriff
The uptake of cloud-based security services across SMBs and enterprises is growing exponentially and it's easy to see why, as they are so much simpler to deploy and manage than on-premise solutions...

The NE-ONE network emulator and profiler from iTrinegy
It was once the case that to be certain that a user's experience of an application was acceptable required nothing more than a reliable network: this is no longer true...

The LoadMaster LM-4000 from Kemp Technologies
Kemp Technologies is a well-established name in the application delivery market and has built up a solid reputation for soundly beating its competition on value...

Lansweeper 5.2 from Hemoco
There is a huge range of IT asset monitoring solutions on the market, but Lansweeper stands out by a mile for its extreme value...

Tufin Orchestration Suite 15.1
As enterprise networks become ever more complex, administrators struggle to find a balance between a timely response to changes in business demands and ever stricter data protection...

The CR1000iNG-XP Next-Generation firewall from Cyberoam
Cyberoam is setting exciting new standards for its competition to aspire to as its latest next-generation firewall appliances represent remarkable value...

Privacy by design
Ross Woodham, Director of Legal Affairs and Privacy at Cogeco Peer 1 explains the importance of addressing privacy at the design stage of products and services...


Taming the GDPR
If you have taken the appropriate measures to protect your data, and have considered all of the relevant legislation, then you have nothing to fear from the EU GDPR, writes Brian Chappell, Director of Technical Services for BeyondTrust ...

GDPR and personal data
With GDPR inevitable for all EU member states, urgent action and mindful preparation is an essential imperative. James Wickes, CEO and co-founder of Cloudview explains...

The NAC of GDPR readiness
What role might existing technology play as the GDPR unfolds? Paul Donovan of Pulse Secure considers how NAC can help to protect corporate data and help compliance with the new legislation...

Infosec 2016: where to next?
With Infosecurity 2016 now firmly in the past, where should professional visitors be engaging their minds? Our Editor, Ray Smyth, offers a view - with the help of some key vendors...

The IoT security challenge
IoT deployment increases the potential network attack surface. Kathy Schneider of Level 3 Communications says that we need to address this before adopting it...

With great data comes…
The Internet of Things promises great data, but it also brings substantial responsibility. Larry Augustin, CEO of SugarCRM considers the way businesses understand and service their consumers...

Rigorous audit
Whatever the impact of BREXIT on EU legislation, Roman Foeckl, CEO at CoSoSys explains why a 'by the book' audit is the essential first step to data compliance...

An IoT ecosystem
Ryan Lester, Director of IoT Strategy at Xively offers some practical guidance for successfully implementing IoT...

Losing network control
IT teams fear losing control of business transactions, apps and infrastructure. Michael Hack, Senior VP at Ipswitch explores the challenge of controlling IT complexity...

A promising trajectory
Christos Dimitriadis, chair of ISACA's board of directors and group director of information security for INTRALOT explains the case for skills-based training in cybersecurity...

The key to securing IoT data
CEO of Covata, Trent Telford, explains why key management is critical to securing the Internet of Things...

Sustainable IoT
Technology is often blamed for environmental damage. Daryl Miller, Vice President of Engineering at Lantronix explains how the internet of things can enable sustainability and fight back...

CCTV: come on in
IoT capability is reinvigorating CCTV systems, making them more useful and better at their given task, But without the correct action they also create a cyber-attack target, as James Wickes, CEO and co-founder of Cloudview explains ...

Network Managers and network security
Leon Adato, Head Geek at SolarWinds, suggests that network managers get involved in network security...

Soft networks, hard reality
Managing networks within an SDN/NFV environment requires a change in mindset. Tom Griffin, Managing Director, EMEA at SevOne explains why...

Network diversity
Dual infrastructure and diverse fibre links help to increase redundancy. However thorough evaluation and careful management are essential. John Volanthen, Technical Director at Hub Network Services explains...

Failure: designed in
With the network accepted as a critical element of business operations, preparing for failure is also critical. Derek Watkins of Opengear explains...

Designing your Wi-Fi future
Wi-Fi access has become a utility to its users, but work is needed. Perry Correll, Principal Technologist at Xirrus explains how to design in what is required...

Application delivery orchestration
Klaus Gheri, VP Network Security at Barracuda Networks explains why a firewall alone just will not do...

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility....


Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
Quarterly market share reports usually make for dry reading, but Gartner Inc.’s recent application delivery controller market share report was something of an exception. ...

Magic Quadrant for Application Delivery Controllers
Application delivery controllers (ADCs) provide asymmetric functions that optimize enterprise applications as they are delivered to users across various internal and external networks and access methods....

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
Few people outside IT know much about application delivery controllers, the Swiss army knife appliances that perform load balancing, caching, SSL offloading, and a host of other vital data center tasks....

NetScaler White Paper: A foundation for next-generation datacenter security
The need for robust datacenter security has never been greater...

Securing Virtual Desktop Infrastructure with Citrix NetScaler
NetScaler can be easily and cost-effectively deployed as a front-end to today's virtual desktop solutions. It provides a robust set of network-layer security, application-layer security and advanced access and data control capabilities to extend the benefits organisations have come to expect when embracing desktop virtualisation...

In a state of denial?
The past couple of years have seen a marked resurgence of denial of service (DoS) attacks. Not only is this availability-threatening class of attack firmly back on the radar screens of today’s network and security operations teams, but the nature of the threat has changed as well. The largest Internet companies are no longer the primary targets. ...

Is NASA's data lost in space?
A recent report has revealed that it’s not just the cloud over Cape Canaveral that’s been troubling NASA of late, writes Campbell Williams, group strategy and marketing director, Six Degrees Group...


SMBs losing out in the connected generation by hesitating to join the 10 Gigabit revolution
A new study from NETGEAR has found that three quarters of SMBs are failing to implement 10 Gigabit into their business networks despite urgent need for business continuity and progression, ...


NetVizura - Free NetFlow Analyzer for Academic Institutions
NetVizura was originally developed in close relation with academic environment in the area of research and testing...

Capita to provide IT services to Young Enterprise Northern Ireland
Capita Managed IT Solutions has announced that it will provide IT services and advice to Young Enterprise Northern Ireland. The one year agreement will see Capita provide advice on IT infrastructure and support requirements, and technical support services for the charity’s offices in Belfast. ...

A Privilege to do business: Foursys partners with Thycotic
New partnership allows Foursys to offer privileged account management....

Brexit and GDPR - there’s no room for complacency, warn Ground Labs
Britain’s decision to leave the European Union has led some data professionals to think that they will no longer be affected by EU’s General Data Protection Regulation (GDPR) due to come into force in 2018. ...

Cloud Adoption in 2016 - the story so far
As we reach the halfway mark of 2016, Extreme Networks has conducted a survey of cloud users to get their thoughts on the state of the market and to find out what trends they are most interested in. ...

NetVizura - Free NetFlow Analyzer for Academic Institutions
NetVizura was originally developed in close relation with academic environments in the area of research and testing. It was tailored to support flexible monitoring of large, complex and high-speed National Research and Education Networks (NRENs), which consists of many universities, faculties and research institutions, with numbers of smaller departments....

Bridging the visibility gap of hybrid IT
SolarWinds has announced a revolutionary release of SolarWinds Network Performance Monitor (NPM), which features NetPath and Network Insight. ...

Unlocking the Power of Digital Transformation
Brocade has launched the results of its latest global study ‘Unlocking the Power of Digital Transformation: Freeing IT from Legacy Constraints’, which identifies that businesses are missing opportunities to unlock innovation more quickly and more effectively due to legacy technology and historical misperceptions about the role of IT departments. ...

QA launches Cyber Training Lab
Custom-built facility enables enterprises to simulate a cyber-attack and learn to practice defending their systems and data ...

New EMC survey identifies CIO pressures to keep IT at the heart of business
New research from EMC has found a concern among CIOs that their current IT infrastructure and the skills of their IT professionals may not be enough to meet long-term needs as technology becomes embedded across the business. ...

Avere introduces new entry-level model to FXT 5000 series product line
The FXT 5200 Edge Filer creates Cloud Gateway Into Object Storage, Supports Remote Office Collaboration Through WAN Caching for centralised data access...

Nexthink raises $40 million gearing up for IPO
Nexthink has raised $40 million in new investment, led by Highland Europe, a leading global venture capital firm. This is the largest round of funding to date for Nexthink and includes participation from the Bertarelli family’s Waypoint Capital and existing investors Auriga Partners and Galeo Ventures. ...

NETGEAR expands 1oGbe smart switch line
Three new 10-Gigabit Ethernet Copper Switches to address bandwidth bottlenecks created by IoT, video streaming, and cloud services....

2016 Network Computing Awards - the winners!
The 2016 Network Computing Awards were held on March 17th at the Hotel Russell in London. Congratulations again to all of this year's winners and runners-up!...

ProLabs launches new SFP+ module that extends the life of Switch Hardware
The new 10GBASE-T SFP+ transceiver from ProLabs gives data centre and network managers the ability to extend the life of their cabling infrastructure with a simple, cost effective upgrade. This is the first in the range of ProLabs’ copper products - 2.5/5G Copper SFP transceivers for the data centre and G.Fast copper transceivers for the telecom industry, which interface with a standard Ethernet switch, will also be launched later in the year....

Extreme Networks appoints John Morrison to Vice President Sales and Services for EMEA Region
Extreme Networks has appointed John Morrison to the position of vice president, EMEA sales and services. Based at the company’s UK headquarters in Reading, John will assume responsibility for overseeing EMEA sales, services and strategy. ...

Former MI5 Director General Dame Stella Rimington to open IP EXPO Manchester 2016
Dame Stella Rimington, former Director General of MI5 and the real-life inspiration for ‘M’ in the James Bond series, will be the opening keynote speaker at this year’s event. ...

Version X - March/April 2016
With product announcements ranging from the trivial to the bizarre, the Editor distils the essence of those that are of interest to the Networking community...

Network Computing Awards 2016 - Storage Product Of The Year
WINNER: FalconStor - FalconStor FreeStor...

Asleep at the wheel
With a few exceptions, telecoms firms have been slow to address the IoT business opportunity, in particular the resulting data analytics and customer insight, according to Homan Haghighi, Managing Director at Alsbridge ...


IoT spells danger
By any measure IoT is new, but could a lack of experience combined with poor software design create the perfect security storm? Amit Ashbel, cyber security evangelist at Checkmarx, explores the issues...

Hyper critical
Hyper-convergence is gaining traction. Sushant Rao, Director of Product and Solutions Marketing at DataCore considers its effect on storage infrastructure...

Beyond today’s limit
Network testing and diagnostics needs a rethink as engineers require greater visibility, according to Tyson Supasatit, Product Marketing Manager at ExtraHop ...

Taming Dark data
Managing data is a growing challenge and the spectre of dark data is particularly troubling. Julian Cook, Director of UK Business at M-Files explains how ECM can help...

Implementing DRaaS to avoid losing your business
By Peter Hannah, Regional Director of UK, Ireland and Nordics, NETGEAR...

The Agile Journey for all Testers
By Cassy Calvert, Test Services Manager, BJSS...

The cloaked network
Jason Garbis, VP of Products at Cryptzone, claims that traditional network security is failing, and that it is time to take a new approach...

Optimising infrastructure
There are hidden dangers in reactive IT control systems, and automation alone won't help. Ayman Gabarin, Senior Vice President of Cirba Inc. explains why...

Infosecurity Europe 2016 - a guide to getting started
Tailored security measures require understanding, knowledge, resource and planning. With Infosecurity Europe 2016 upon us and with some help from the vendors, Ray Smyth explores some topics that should be considered...

Strategic cloud adoption
New Research by Adapt confirms that UK cloud adoption is thriving, but Director of Strategy and Architecture, Kevin Linsell, underlines a distinct lack of strategy...

Peer-to-peer storage
Frank Bruegmann, CEO of cloudplan, outlines the transition from centralised cloud file storage to P2P file storage...

The gift that keeps on giving
Cloud adoption does not remove the need for software license management. Alex Hilton, CEO of the Federation Against Software Theft (FAST) claims that in fact, it has made it even more complex...

Patch or be damned
All too often we hear that a breach has resulted from a known vulnerability. How serious can it get? Mariano Nunez, CEO of Onapsis explores the issues...

Why people are the key to cybersecurity
By Sean Paxton, Product Manager of Networks at Redcentric...

50 Shades of PaaS and why it remains at an early stage of adoption
The dividing lines between Platform-as-a-Service (PaaS) and Infrastructure-as-a-Service (IaaS) are blurring. But according to Phil Brindley, CTO, The Bunker, the dominance of the latter belies the importance of the former in the Cloud Computing arena and there are several reasons why both will remain as distinct layers and product sets....

Women are the biggest disruptors of technology
By Cassy Calvert, Test Services Manager at BJSS....

Making sure your infrastructure is secure for the Connected World
By Monica Brink, EMEA Marketing Director, iland...

Why Cloud security is more important than ever
By Monica Brink, Director EMEA Marketing at iland...

EU Data: in or out?
Alessandro Porro, senior vice president at Ipswitch, comments on the three building blocks to consider when preparing your business for GDPR...

#Techxit or opportunity?
Well, it happened. On the 23rd of June 2016, the United Kingdom, through a national referendum, voted to leave the EU...


Step up and make your view count
If there was one piece of advice I would offer to IT and networking professionals at this precise time, it would be these two things [sic]...

Customer adaptive networks
In the last issue of the magazine I suggested that IT and network professionals need to step up and take a leadership role in the use of IoT in their own organisation - but I didn\'t mention customers...

IoT: move fast and take a leadership role
Just as the network perimeter has vanished, much the same has happened to the ownership of IT and the organisation’s network...

Creating the next generation network professional
If, as it is suggested, IT technology is in some way to blame for a botched high profile football transfer, it once again illustrates the dependency organisations have placed upon the IT network...

IT people: step up to the plate and advance
At first reading I thought it was good news that IT spending is forecast by Gartner to reach $3.5 trillion during 2015...

Every day’s a data day
Have you noticed that the subject of data is rapidly rising up through the noise level of IT discussions? Have you noticed people who (and I generalise) know nothing about IT giving forth on the importance of data to the future of the business, or the effectiveness of the organisation? Whichever way you are responding, I think that it's a very good moment for IT and Networking professionals to start thinking, talking, and acting data...

A modern it curse is invented
As you may know, it is now thought that the so-called ancient Chinese curse, "May you live in interesting times" may not be either Chinese or even all that old. In fact if anything it would appear to be a modern IT curse...

Direction of travel
Welcome to a new year with Network Computing - and perhaps a new network…...

The web and you
As you may have noticed IP EXPO Europe is upon us once again, and the promise of hearing Sir Tim Berners-Lee's 2050 vision for the web is enthralling...

IT security: it's just one part of the network
As you might imagine I am sent, no bombarded would be a better word, with no end of press releases and telephone calls representing companies who all have the best, biggest, and most effective, whatever it is they sell...

Watch out, it's started...
Moving around and doing my work as Editor of Network Computing I am picking up a firm sense of change that is more than the usual springtime stirring. None of its scientific, but to me it does seem very real...

Security begins at home
By Ray Smyth, Editor, Network Computing...

Don't fall into the network abyss
There is still a gap and it needs to change. Dependence has increased to addictive, even survival levels and yet, there is still a gap...

Avoiding network driven business meltdown
In many respects and relatively speaking, the IT sector and its customers have been going through a stable, possibly stale period of steady innovation at the vendor level, and evolving deployment at the end-user level...

Socratic IT security, people and government
Change of any kind has a habit of creeping up and stealthily taking hold...

preparing for the future: technology not required
As we continue to witness super-rapid change not in convenient bite-size episodes, but continually and relentlessly in our networks and IT infrastructures, it is difficult to stop, take a breath and reflect...

The morning after: the fragmented network
As I wend my way around trade shows, I am so often amazed at the things technology can do and sometimes confounded as to why anyone would want to. ...

Security: can humans help?
I have been thinking a lot about IT and Network security recently...

For those of a cloudy disposition
It is impossible not to have heard the news that 2012 will be the year of the cloud...

Hot network access
Redstone has helped Aon to create agile, cost saving ICT access for its UK employees...


The network that rocked
With massive up scaling and no room for complacency Roskilde Festival depends on WhatsUp Gold network monitoring to keep performers, festival goers, event teams, the press and commercial partners connected...

Mutiny creates a true Vue
Monitoring network performance doesn't get any tougher than in a live cinema complex. Mutiny technology created the means for Vue Entertainment to monitor over 5,000 devices accross their UK cinemas...

The right move for web security
The UK's largest property website, Rightmove, explains how WhiteHat has helped them to improve and underpin their web application security...

End user analytics at the cutting edge
University College London Hospital's IT services transforms many aspects of the IT estate using Nexthink end-user analytics...

The human security sensor
TITUS secures documents for Morpho - and takes employees with them as part of the solution...

Saudi Petroleum chooses Tegile to handle storage needs
London based Saudi Petroleum (SPOL) is the European marketing office of the Saudi Arabian Oil Company, the state-owned oil company of the Kingdom of Saudi Arabia, providing marketing services to Saudi Aramco in Europe, Africa and South America. ...

Canadian bank sees the savings
Jameson Bank, a Canadian FOREX Bank, has reduced its IT administrative overhead by 25% with help from Paessler PRTG...

The university challenge
Oxford University's Advanced Research Computing (ARC) facility relies on hybrid scale-out NAS solutions to provide fast, reliable, and easy-to-administer storage around the clock to support researchers' diverse work flows...

Wire data analysis proves a sure thing for bet365
With help from ExtraHop, bet365 is using innovative wire data analysis to improve application delivery, network performance and strengthen anti-fraud defences...

ExtraHop delivers visible change for Portsmouth Hospitals NHS Trust
Portsmouth Hospitals NHS Trust (PHT) has selected the ExtraHop EH2000v virtual appliance to gain unprecedented visibility into clinical and administrative applications, including its core Citrix-based virtualisation platforms....

Networking on an Olympian scale
Avaya raises the network bar at the Sochi Winter Games...

Credit where credit’s due with AppQoS
International Personal Finance plc (IPF) is a leading international home credit business with more than 200 branches throughout Europe and Mexico, serving 2.4 million customers ...

Credit where credit's due with AppQoS
Resolving application performance issues alleviated the need for wan optimisation for IPF ...

Dixon City Academy saves with Barracuda
Barracuda Backup and Barracuda SSL VPN line up to defend against malicious hackers ...

Putting IT management to bed
Trinity Mirror turns to SolarWinds to simplify and improve its IT management ...

Hearing is believing
Being in the headset technology business means that sound quality is crucial to Plantronics. Deploying the Interoute IP-voice solution, they have increased conference call volume at 50% less cost...

Data acceleration beats bandwidth addiction
During 2012 United Drug had some challenging it problems - but Silver Peak were able to deliver the right medicine...

Zycko takes its own medicine
When global IT distributor Zyko needed a better network for its Unified communications, it turned to Riverbed...

Federated security
With help from Varonis, healthcare provider Mercy Health has enabled data owners in a bid to improve control over data access...

The Network Computing Awards 2016
The results from the 2016 Network Computing Awards were revealed at an evening ceremony at the Hotel Russell in London on 17th March...


Network Computing Awards 2016 - Infrastructure Product Of The Year
WINNER: Cradlepoint - ECM ...

Network Computing Awards 2016 - Data Centre Product Of The Year
WINNER: SUSE - SUSE OpenStack Cloud 6...

Network Computing Awards 2016 - Cabling Supplier Of The Year
WINNER: Excel...

Network Computing Awards 2016 - Contact Centre Product Of The Year
WINNER: VoiceSage - VoiceSage Contact...

Networking Computing Awards 2016 - CRM Product Of The Year
WINNER: SugarCRM - Sugar Enterprise...

Networking Computing Awards 2016 - Network Management Product Of The Year
WINNER: Paessler - PRTG...

Network Computing Awards 2016 - IT Optimisation Product Of The Year
WINNER: F5 Networks - Application Acceleration Manager ...

Network Computing Awards 2016 - Testing /Monitoring Product Of The Year
WINNER: Netreo - Omnicenter...

Security Product Of The Year – Networking 2016
WINNER: Check Point - SandBlast...

Network Computing Awards 2016 - Education And Training Award
WINNER: Global Knowledge...

Network Computing Awards 2016 - Hardware Product Of The Year
WINNER: WatchGuard - M500...

Software Product Of The Year – Networking 2016
WINNER: Extreme Networks - ExtremeAnalytics (Formerly Purview) ...

Service Provider Of The Year – Networking 2016
WINNER: AirWatch...

Distributor Of The Year – Networking 2016
WINNER: Wick Hill...

Reseller Of The Year – Networking 2016
WINNER: Brookcourt...

Bench Tested Hardware Product Of The Year - Hardware Category – Networking 2016
WINNER: iTrinegy - NE-ONE Network Emulator and Profiler...

Bench Tested Product Of The Year - Software And Services Category – Networking 2016
WINNER: Cryptzone - AppGate XDP...

Network Project Of Year - Public Sector – Networking 2016
WINNER: Portsmouth Grammar School / WatchGuard...

Network Project Of The Year - Private Sector – Networking 2016
WINNER: Imagination Group / Cohesive Networks...