Untitled Document
PRTG Network Monitor 14 from Paessler AG
Paessler's PRTG Network Monitor has always been a firm favourite for keeping an eye on the lab...

The NG Firewall F380 from Barracuda
Barracuda's NG Firewall portfolio just got a whole lot tougher with the v6.0 update, which introduces the Advanced Threat Detection (ATD) feature...

The WD Sentinel DS6100 Windows Server...
For smaller businesses some IT resources are out of reach, even though they can be justified through business need
The WD Sentinel DX4200 Windows...
Not all organisations require an application server, but most have enterprise class storage requirements...

ENTERPRISE R320 Load Balancer from...
Application server load balancing was essentially a server upgrade before Application...

SANsymphony-V and Virtual SAN...
Enterprise storage virtualisation offers many advantages over proprietary hardware...

Cloud Management Suite from Verismic...
There are plenty of endpoint management products available, but over time many have become unwieldy to use...
SANsymphony-V and Virtual SAN...
Enterprise storage virtualisation offers many advantages over proprietary hardware solutions including cost effectiveness
Virtualization Manager 6.1 from SolarWinds
SolarWinds Virtualization Manager (VMan) aims to bring order to chaos by providing all of the tools required...
PST Enterprise from C2C
PST files are a challenge for network administrators for numerous reasons. They're difficult to find, virtually impossible to manage...
The Barracuda Load Balancer ADC 540
Mid-range application delivery controllers (ADCs) can be expensive, but Barracuda's latest Load Balancer...
SOLIDserver 5.0.3 from EfficientIP
Often taken for granted, networks are the engines that drive businesses - and they need to be managed effectively.
WhatsUpGold v16.2 Premium from Ipswitch
In the intensely competitive world of network monitoring few products can match WhatsUpGold (WUG)...
EverDesk Google Edition 5.1
There is undoubtedly a wide choice of email clients available, but none of them can offer the functionality of EverDesk.
Network Configuration Manager 7.2...
Network security best practises demand that critical devices are protected by using a sound configuration management strategy
EndaceFlow 3040 from Emulex
Enterprises now rely heavily on NetFlow data for their essential network analysis. However, as speeds increase to 10-Gigabit...
Bandwidth Analyzer Pack from SolarWinds
SolarWinds offers one of the most comprehensive ranges of network monitoring solutions, and its latest Bandwidth Analyzer..
Barracuda Backup Appliance 390
No right-thinking business would intentionally avoid their data backup obligations, but the management overheads...
The elements of effective network monitoring
Networks are getting faster and more complex - but have network monitoring and diagnostics kept up? Rony Kay, CEO of cPacket Networks thinks not...
Navigating GRC: do not pass Go...
Stephen Midgley of Absolute Software offers an approach to handling Governance, Risk Management and Compliance obligations.
Web legal
Lawyer Nichola Jenkins, from law firm SGH Martineau, sets out some important basics for creating a legally compliant web site
The disaster default
Sonia Blizzard, Managing Director at Beaming shares some ideas to help ensure that a business is always protected against data loss...
My network: everyone's stuff
Ray Smyth, Editor of Network Computing and Business Technology Mentor, considers some of the challenges concerning industrial scale network connectivity.
The Element of business security
Russell Horton, COO of Elitetele.com considers the importance of securing your business in an increasingly complex IT landscape.
Data recovery: where do you start?
When you consider the advances and changes around the network, it can be all too easy to overlook the data. Russel Ridgley, head of cloud services at Pulsant share his thoughts
512K: Full up and nowhere to go
Alex Cruz Farmer, Technical Director of C4L gives a timely insight into the BGP table , with the recent 512k...
XP: RIP?
Russ Spitler, VP of Product Strategy at AlienVault explains how to start navigating the Windows XP...
Emulation, emulation, emulation
jim swepson of iTrinegy explains the compelling need for pre-deployment insight into Application performance...
The Hybrid Cloud: Application Load Balancing
Atchison Frazer of KEMP Technologies explains why businesses should use the hybrid cloud for agile provisioning...
Virtualised storage for enterprise IT
Jeremiah Dooley, Cloud Architect at SolidFire, explains why virtualised storage may unlock the true potential...
Reliability through Diversity
Martin Langmaid, Solution Architect and Technology Evangelist at Peplink, explains why connection...
The Security of Things
Alex Chapman, Principal Security Consultant at Context Information Security, shares his research into...
It's private so keep out
If your data was lost, what would you do? Sonia Blizzard, MD of broadband solution specialist Beaming...
WAN-as-a-Service: ready for take off
Network-as-a-Service and SDN are set to feature prominently at IP EXPO Europe running from...
Move down the bus...
Steve Rawlinson, managing director of Tagadab explains why the internet is almost full - and what needs...
When trouble comes calling
A multi-discipline team of employees needs to know how it will respond when trouble actually comes knocking. Jaime Blasco of AlienVault Labs explains.
The Help Desk: the business
Have IT professionals lost sight of the end-user? Mark Keepax of ASG Software thinks innovation is needed if IT is to survive...
Hypervisor connected storage
Founder of Maxta inc. Yoram Novick advocates thinking outside of the storage box to secure the many benefits of public cloud-style storage.
The secure data centre
Matt Lovell, CTO at Pulsant, explains why the secure data centre is more than information security, offering some advice on the bit that is often overlooked.
When flash won't do...
Jeramiah Dooley of SolidFire explains why performance alone is not enough, and why storage must be placed at the heart...
Application equality
Rob Commins of Tegile Systems explains the benefits of well deployed hybrid storage arrays.

The future and you
Ray Smyth, editor of Network Computing and Business Technology mentor considers the shape of things to come - and the challenges that may exist.
Blending security
Louise T. Dunne, Managing Director of Auriga explains how Business process modelling can be used as the missing ingredient to inform...
The Infosec imperative: squaring the circle
With the season of IT shows upon us, Network Computing Editor and Business Technology Mentor Ray Smyth...
The big data network
Karl Jackson, Technology Officer at Prodec Networks share his thoughts on planning network security...
Infosecurity Europe - 2014
It's that time of the year again, and with the rate of cyber-attacks growing and the post Snowden effect taking hold...
When Network operations meet security
As threat vectors evolve there is an increasing crossover of responsibilities between network operations and network security.
Infrastructure insight
Bryn Jones of CommScope explains why active infrastructure management in the data centre can help with management..
The dynamics of the data centre
Matt Lovell, CTO of Pulsant, explains what is at the heart of keeping the data centre effective and efficient
Deliver Enterprise Mobility with Citrix XenMobile...
Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility.Click here to download the White Paper
Solving the ADC Market Share Riddle...
Quarterly market share reports usually make for dry reading, but Gartner Inc.’s recent application delivery controller market share report was something of an exception. Click here to download the White Paper
Magic Quadrant for Application Delivery Controllers. Click here to download the White Paper
Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center. Click here to download the White Paper
NetScaler White Paper: A foundation for next-generation datacenter security. Click here to download the White Paper
Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScale. Click here to download the White Paper
The Active Advantage: Why Networking Leaders are Embracing ADC Clustering. Click here to download the White Paper
Securing virtual desktop infrastructure
NetScaler provides a robust set of easily deployed network-layer security, application-layer security and advanced.. Click here to download the White Paper
In a state of denial?
The past few years have seen a marked resurgence of denial of service (DoS) attacks. Not only is this availability-threatening.. Click here to download the White Paper
A question of authenticity
Businesses are becoming increasingly concerned with the amount of personal and company data that is available to government authorities..
Is NASA's data lost in space?
A recent report has revealed that it’s not just the cloud over Cape Canaveral that’s been troubling NASA of late, writes Campbell Williams..
New Barracuda Security Suite tackles three common threat vectors
Total Threat Protection for email, web browsing and the network.
SME IT budgets continue to rise in 2015, according to Node4 research
Over 60% of UK SMEs expect their IT budget to increase in 2015, according to independent research by Cloud and Data Centre specialist, Node4...
Byte Night 2015: building a network for young homeless people
By Ken Deeks, director, Amber Group and founder of Byte Night
What would a ban on encryption mean for UK businesses?
Following David Cameron’s recent comments which proposed a ban on encryption in the UK, Alex Plaskett, Head of Mobile at MWR InfoSecurity has said the following...
Managed failovers to overtake traditional Disaster Recover testing...
Adoption of managed cloud disaster recovery services will continue to grow in 2015. This is according to Peter Groucutt, managing director at Databarracks, who recently outlined his trends and predictions for the cloud industry in 2015....
What's in store for 2015?
Rob Commins, VP of marketing at Tegile, gives us five storage predictions for 2015.
Third edition of Wick Hill Guardian available now
Publication helps IT security managers understand current security issues.
New Application Firewall Pack (AFP) for Kemp LoadMaster
KEMP Technologies has launched a new Application Firewall Pack (AFP) for its LoadMaster range of load balancers and Application Delivery Controllers (ADCs).
Elitetele.com launches specialist BYOD division
New BYOD division will ensure its customers are able to implement cost effective BYOD strategies across their business...
Do IT decision makers have the Infrastructure Performance...
Virtual Instruments has released the results of a survey of European IT decision makers, revealing that European CIOs and IT managers lack the technical capabilities to administer infrastructure performance...
Cisco announces all-in-one collaboration platform
In an attempt to improve collaboration for midsized companies, Cisco has announced the Business Edition 6000S, which it describes as an all-in-one collaboration platform, built into an integrated Cisco router...
Rackspace predictions for 2015
Nigel Beighton, VP Technology, Rackspace and CTO John Engates, offer their predictions for 2015...
News in a connected context
Editor Ray Smyth considers the human element of cyber security.

Tufin releases version R14-3 of the Tufin Orchestration Suite
Security Policy Orchestration company Tufin has announced version R14-3 of the Tufin Orchestration Suite
1E integrates Nomad with NightWatchman
IT efficiency software company, 1E have announced a "seamless integration" of its software deployment solution Nomad, and its PC power management software, NightWatchman.
Wedge Networks previews Cloud Network Defense
Security company Wedge Networks has been discussing its new Cloud Network Defense (CND) offering...
Emulex optimises cloud connectivity
A new range of Universal Multi-Channel (UMC) Network Interface Cards, ExpressConfig Solutions, designed specifically to optimise I/O connectivity for cloud, hyperscale and enterprise environments, have been unveiled by Emulex.
tolomy launches suite of secure cloud services
Secure cloud provider tolomy has launched a suite of secure cloud services offering government-level accredited cloud services.
Molecular-level flash memory
Flash memory, regularly used for electronic data storage in smartphones, cameras and memory sticks, uses metal-oxide-semiconductor (MOS) components.
UK IT decision makers are missing security threats...
Research commissioned by McAfee, part of Intel Security, and undertaken by Vanson Bourne, has revealed 39% of organisations’ IT departments are spending too much time managing their security network and manually tackling threats.
Connect Psychotherapy Practice selects Egress...
Egress Switch Secure Email and Switch Secure File Transfer have been implemented by Connect Psychotherapy Practice to protect confidential client data shared electronically...
New Avere cloud storage forecast: outlook is sunny...
Avere System's new cloud adoption survey of over 200 cloud and storage professionals at the 2014 Cloud Expo New York and the 2014 Amazon Web Services (AWS)
Time to plan for software-defined data centres?
Dimension Data says organisations need to prepare now for software-defined data centres (SDDC), as virtualisation at every level of the IT landscape is inevitable.
Controlling mobile data loss
Security evangelist Mike Raggo from MobileIron explains the options available to protect an organisations data and compliance...
Exciting times for the network manager
David Belson, editor of Akamai's quarterly State of the Internet report, highlights some key findings currently affecting network managers...
The Third Network...
Chris Purdy, CTO at CENX outlines a network that does the thinking for you, freeing up innovation, and explains the MEF's Third Network vision
Applications and data for all
Stuart Wright, Senior Product Marketing Manager for WD explains how a new breed of Enterprise-class Application and Storage Servers are enhancing...
Managing your home network
By Alessandro Porro, VP of International Sales at Ipswitch.
Identity and security get married
Mike Ellis, CEO of ForgeRock explains why when it comes to Cyber-Attacks...


Virtually real
Ennio Carboni, president at Ipswitch Network Management, explores the challenges of the modern data centre
Privileged Identity Management in the Cloud
Jess A. Richter of Lieberman Software explains the security issues that arise when managing privileged...
UC: on premise and in the cloud
Roger Jones, CTO at Sonus explains why anticipated issues in implementing cloud...
Voice, the network, and the human
Patrick McKinney, VP Sales at SolarWinds reflects on the glorious past...
Reducing Endpoint management bloatware
Ashley Leonard, President and CEO of Verismic explains his view...
Battle-test and involve
Panos Dimitriou, CTO & Co-Founder of Encode Group, encourages organisations...
Howzat!
Barmak Meftah, CEO of AlienVault Labs, explains why sharing what you know can actually improve your security effectiveness.
Quality aligned IT
Ben Fry and David Rigler of SQS consider how to take the risk out of adopting new IT technology for maximum low risk business gain.
Beyond inevitability
Paul Le Messurier, Programme and Operations manager at Kroll Ontrack takes us back to storage basics, explaining how to protect data...
Going the extra mile
John Dickey, CTO of Talari Networks explains why organisations need to do much more to improve the efficiency of their WANs...
Read all about it
Joshua Shaul, Director of Product Management at Trustwave explains why you need to know that your database is not exposed.
Big data’s hidden problem
Why ‘big data’ is smaller than ‘copy data’, and what it means for your business. By Ash Ashutosh, CEO Actifio.
Taking control of your Cloud
Lilac Schoenbeck, VP of Product Management and Marketing at iland provides a clearer view of the often nebulous cloud
Unified Access: The key to a successful BYOD strategy
There are many challenges in an enterprise network, not least the need for capacity and security, but the convergence of personal...
The smart desk for help
Traditionally the last port of call for user problems, Poul Nielsen of Nexthink discusses salvation for the service desk...
Curing the PST blues
End user-created email archives present a number of challenges for organisations trying to manage storage performance...
Chasing network capacity
Network capacity is a fundamental requirement to ensure service performance according to Victor Kuarsingh...
Things ain't what they used to be
Dave Chester of smart automation specialists Custom Controls looks at the reality of some of the predictions being made...
The Truly Open Cloud
Boris Renski, co-founder of OpenStack vendor Mirantis, explains what is needed to secure the vendor-agnostic cloud...
The web and you
As you may have noticed IP EXPO Europe is upon us once again, and the promise of hearing...
IT security: it's just one part of the network
As you might imagine I am sent, no bombarded would be a better word, with no end of press releases and telephone calls representing companies...
Watch out, it's started...
Moving around and doing my work as Editor of Network Computing I am picking up a firm sense of change that is more than the usual springtime stirring.
The human security sensor
TITUS secures documents for Morpho - and takes employees with them as part of the solution
Saudi Petroleum chooses Tegile...
London based Saudi Petroleum (SPOL) is the European marketing office of the Saudi Arabian Oil Company, the state-owned oil company of the Kingdom of Saudi Arabia...
Canadian bank sees the savings
Jameson Bank, a Canadian FOREX Bank, has reduced its IT administrative overhead by 25% with help from Paessler PRTG