Untitled Document
NetCrunch 9.3 from AdRem
There may be a huge choice of network monitoring products on the market today, but few can match NetCrunch from AdRem for its features and affordability...


baramundi Management Suite 2016
Enterprises concerned about losing control of their network can rest easy with baramundi Management Suite (bMS)...

Information Security Enforcer from GhangorCloud
It's generally accepted that first lines of defence such as firewalls do not prevent data exfiltration...

The SolarWinds Network Performance Monitor 12
SolarWinds consistently shows that network monitoring shouldn't cost a king's ransom and its Network Performance Monitor (NPM) 12 delivers even more valuable features with that sharp focus on value...

Phishing mitigation from SpearSec
Phishing comes in a variety of forms and just like the best Saville Row suits it is made to measure. The variants are unimportant; it is Social Engineering, the art of psychological manipulation to entice people to render their confidential information. ...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Unified Security Service from CensorNet
Companies depending on web and cloud applications for their business operations are going to have to rethink their security strategies...

Titania PAWS Studio 2.4.4
SMBs that want to show compliance with data protection regulations will like Titania's PAWS Studio a lot...

Titania Nipper Studio
Total compliance with data protection regulations is now essential, and without it businesses could find themselves faced with hefty fines...

Freedome for Business from F-Secure
Mobile devices present a major security challenge for businesses and yet it seems that their employees just can't do without them - even though they are vulnerable to so many threats...

NetCrunch 9 from AdRem
NetCrunch from AdRem scores over the majority of network monitoring tools for a number of sound reasons...

AppGate XDP from Cryptzone
We typically approach network security using a network construct that includes a perimeter and user groups. The cloud, VLANs, mobile endpoints, Wi-Fi, advanced threats and user mobility have undermined this network-centric model. Additionally, devices such as the firewall are stretched beyond their design objectives....

Titania TEC
UK-based Titania has a sharp focus on data security compliance and its latest TEC aims to make regulatory auditing on all network devices a breeze...

macmon NAC
Network access control has traditionally had a mixed reception in enterprises, as all too many solutions are notoriously difficult to install, complex to manage and expensive...

OmniCenter from Netreo
Network engineers cannot ignore indications of potential network problems and yet somehow they need to be filtered, analysed, prioritised, grouped, categorised and assessed for network - therefore business - impact...

UniPrint Infinity 9 from UniPrint.net
Network printing is a constant pain point for support departments and even more trying for businesses running core services such as thin client computing, remote desktop and VDI...

The CryptoFlow App from Certes Networks
Certes Networks has an enviable reputation in the data security world. Its enterprise products are deployed in over 80 countries and they have not once been hacked in an impressive 15 years of service...

Resilience Gateway from Opengear
Support professionals working in large distributed networks depend heavily on remote access to critical infrastructure devices, but this can present problems...

Tripwire IP360 vulnerability and risk management
It's an accepted fact that enterprise networks are constantly attacked as cyber criminals probe them mercilessly to identify weaknesses that they can exploit, allowing them to steal and ransom confidential data...

IP Expo Europe - 7th & 8th October
Update your cloud and infrastructure expectations at this year’s IP EXPO Europe at ExCel london...

Disambiguating real-time threats
Eyal Benishti, CEO of IRONSCALES, says that effective detection of imminent security threats should be collaborative and multi-tiered...


Situationally aware
Sun Tzu articulated the merits of knowing both enemy and self. Reggie Best, Chief Product Officer at Lumeta explains why real-time network visibility is the first step in bolstering network security and breach detection...

The DNS attack vector
DNS is an essential network infrastructure component. Dr Malcolm Murphy, Technology Director at Infoblox, explains what action is required to make DNS secure and visible...

The security of things
Ready or not, the internet of things is coming. In fact the demand for IoT devices is outstripping the technology's ability to be secure. John Smith, Principal Solutions Architect for Security at ExtraHop, explores the issues...

More of the same won't work
Storage solutions are at breaking point. Tarkan Maner, CEO of Nexenta explains the benefits of a radical but well considered storage shake-up...

Storage with purpose
Adopting a lifecycle approach to data storage using media tiers could save money, according to Stephane Estevez, Backup and DR product marketing manager at Quantum ...

The A to Z of networking
With contributions from leading industry figures and commentary from our Editor, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda...

The digital value platform
A lack of platform integration standards will impede digital transformation. Chris Harding, Director for Interoperability at The Open Group explains...

Digital Transformation: the mobility catalyst
Kia Behnia, CEO of PowWow Mobile, explains why a successful digital transformation program starts and finishes with establishing a mobile-first culture...

Government networks on the edge
A lack of infrastructure investment is making public sector branch offices the weak link in the public sector's digital chain. John Street, Regional Director, Public Sector UK and Ireland for Riverbed Technology explains...

Innovation and regulation in IoT
The impact of IoT is pushing best practice into the shadows. Art Swift, President of prpl Foundation, explains how to create effective, open, hardware based IoT Security...

IoT security: using what we know
Peter Martin, MD of RelianceACSN, explains how to tackle the IoT security challenge - and why it is not as new as some might think...

Device agnostic IoT security
With more unmanaged and seldom-updated devices connecting to our networks, behaviour-based security is an essential line of defence. Matt Walmsley, EMEA Director at Vectra Networks makes the case...

The A to Z of networking
With contributions from leading industry figures and commentary from our Editor, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda...

Vacancy: Sheriff required
Technology helps security, but not exclusively. Paul Sexby, Managing Consultant and Head of Strategic Practice for IRM asks, "do you need a Data Protection Officer?"...

Seizing the GDPR advantage
The EU referendum has created uncertainty. However, Louise Bulman, Vice President & General Manager EMEA at Vormetric, explains why early GDPR adoption could give your business an advantage...

Planning VDI nirvana
A move to VDI should be well planned. Atchison Frazer, CMO at Xangati explains the essentials for a successful virtual desktop infrastructure...

A cloud of uncertainty
Preparing for Brexit is fraught with problems. Nick Brackney, product marketer at ExtraHop explores the Brexit climate change challenge...

The A to Z of networking
With contributions from leading industry figures and commentary from our Editor, we try and update on both new and well established terms to enhance understanding and consistency and to drive the networking agenda...

The human cloud
It's easy to blame technology when a business goes dark. Matt Kingswood, Head of Managed Services at ITS explains why the human touch is more likely to be the cause...

Deliver Enterprise Mobility with Citrix XenMobile and Citrix NetScaler
Mobility and the consumerization of IT pose key challenges for IT around scalability, security and application visibility....


Solving the ADC Market Share Riddle: Why Citrix NetScaler is Winning the Data Center
Quarterly market share reports usually make for dry reading, but Gartner Inc.’s recent application delivery controller market share report was something of an exception. ...

Magic Quadrant for Application Delivery Controllers
Application delivery controllers (ADCs) provide asymmetric functions that optimize enterprise applications as they are delivered to users across various internal and external networks and access methods....

The Active Advantage: Why Networking Leaders Are Embracing ADC Clustering
Few people outside IT know much about application delivery controllers, the Swiss army knife appliances that perform load balancing, caching, SSL offloading, and a host of other vital data center tasks....

NetScaler White Paper: A foundation for next-generation datacenter security
The need for robust datacenter security has never been greater...

Securing Virtual Desktop Infrastructure with Citrix NetScaler
NetScaler can be easily and cost-effectively deployed as a front-end to today's virtual desktop solutions. It provides a robust set of network-layer security, application-layer security and advanced access and data control capabilities to extend the benefits organisations have come to expect when embracing desktop virtualisation...

In a state of denial?
The past couple of years have seen a marked resurgence of denial of service (DoS) attacks. Not only is this availability-threatening class of attack firmly back on the radar screens of today’s network and security operations teams, but the nature of the threat has changed as well. The largest Internet companies are no longer the primary targets. ...

Is NASA's data lost in space?
A recent report has revealed that it’s not just the cloud over Cape Canaveral that’s been troubling NASA of late, writes Campbell Williams, group strategy and marketing director, Six Degrees Group...


SolarWinds gets SaaSy with some key tech buzzwords for 2017
When it comes to communicating new technologies and processes to other parts of the business, IT professionals need to be careful to translate these buzzwords into human-speak. Last year we finally began to grasp Hybrid IT, SDN and Big Data… so what should we look out for next?...


UKFast sets sights on new apprenticeship intake
UKFast has announced the creation of a raft of new places on its popular IT and software development apprenticeship programmes, with applications for the IT scheme opening this week. ...

Over half of London boroughs are planning to update their outdated IT infrastructure
Increasing need to move from legacy solutions paves the way for consumption-based models....

The Internet of Things takes centre stage at CeBIT 2017
This year’s CeBIT will take a look at current and emerging IoT applications with a line-up of showcases by big-name players, exclusive previews of the latest research and a host of top-notch in-show events....

Rackspace give their cloud forecasts for 2017
Senior leaders at Rackspace have glanced into their crystal balls and made their cloud predictions for the year ahead....

UK businesses targeted 230,000 times each by cyber criminals in 2016
UK businesses were, on average, subjected to almost 230,000 cyber attacks each day during 2016, according to new analysis from Beaming, the specialist business ISP. The volume of attacks hitting individual company firewalls passed the 1,000 per day mark, on average, for the first time in November last year....

Legal sector to benefit from cloud innovations through iland and Wavex partnership
Partnership will provide SMBs in the legal and other sectors with end-to-end IT services that include iland’s cloud hosting and DRaaS solutions. ...

ExtraHop Predicts 2017 Trends in IT, Security, and DevOps
ExtraHop has announced its top predictions for enterprise IT in 2017, based on insight from customers, partners, and industry analysts and insiders....

Nexthink appoints Chief Revenue Officer to drive next stage of growth
Kevin Tumulty joins Nexthink from ServiceNow....

Version X
With product announcements ranging from the trivial to the bizarre, the Editor distils the essence of those that are of interest to the Networking community...

Network News - Moves, adds and changes
A regular look at the stories involving people, companies and solutions...

Market Dynamics: Making Sense of the Market
In a regular look at results and key business announcements for suppliers into the Networking and IT market, Network Computing summarises the Editors selections...

Nexthink announces new End-User Feedback Module
End-User Feedback module provides contextual insight to prioritise what the business needs and improve productivity ...

Half of hiring managers expect demand for tech professionals to rise in 2017
A recent survey from specialist recruiter Robert Walters and leading British job board Jobsite has found that 47% of managers in technology expect to increase hiring in 2017. The ‘Technology & Recruitment – The Landscape for 2017’ campaign surveyed over 700 senior technology professionals from across the UK to gain insights into how demand for tech specialists will develop in 2017, the challenges employers will face and what strategies they can use to attract top talent....

Glenfield selects NaviSite for migration and management of Microsoft Office 365
Glenfield Business Solutions has selected NaviSite as its managed Microsoft Office 365 provider to help implement the cloud-based business application both internally and to four of its customers. NaviSite was selected due to its leading support services for managed applications and proven track record as a longstanding Microsoft partner of 15 years. ...

Top IT trends for 2017 – SolarWinds’ head geeks speak!
From FaaS to the expansion of Blockchain, the Head Geeks at SolarWinds make their predictions for the New Year ...

A farewell to paper: CeBIT 2017
CeBIT 2017 will present everything businesses need in order to make the transition from paper-based to digital office processes. The technologies on show range from software for managing vacation requests and billing to systems for securely archiving emails and storing mission-critical documents. The digital office solutions on show at CeBIT 2017 will be clustered in Hall 3. ...

SolarWinds' top security tips for National Cyber Security Awareness Month
With October being National Cyber Security Awareness Month, Mav Turner, Senior Director of Product Management at SolarWinds, has put together some top tips in order to help IT professionals succeed at securing their IT infrastructure....

85% of ManageEngine users believe ITSM analytics will enhance IT service delivery
ManageEngine has announced the results of its survey, "Everything you need to know about ITSM analytics: Industry Insight 2016."...

BullGuard’s free online IoT scanner highlights DDoS vulnerabilities
The latest data from BullGuard’s IoT Scanner, a free tool that allows consumers to check if their connected devices are secure, suggests the recent DDoS attack could be just the tip of the iceberg....

Insuring a safe future
Anamika Kumari at Allied Analytics LLP explores the present and future scope for evolution in the cyber insurance market....


When Brexit and Big Data collide
By Jack Bedell-Pearce, Managing Director, 4D...

Top Five Networking Predictions for 2017
David Galton-Fenzi, CEO of Zycko, specialists in advanced networking, and CCO of Nuvias Group (of which Zycko is part), gives his top five networking predictions for the year ahead...

The reinvention of the Network Monitoring Engineer
By Patrick Hubbard, Head Geek, SolarWinds...

Predictive analytics and the IT Professional
Automated predictive analytics, designed to extract value from heterogeneous data, is on the way. Dan Somers, CEO of Warwick Analytics explains its possible interaction with IT...

The policy on cyber insurance
Much is said about cybercrime and its avoidance but Little is said about it as an insured loss. Graeme Newman, Chief Innovation Officer at CFC Underwriting discusses the rise of cyber insurance...

Exposing the true cost of cloud
Public cloud prices seem to be on a continuous downward spiral, but there can be hidden costs. Drew Markham, Service Strategist at Fordway sets out the challenge...

IP networks: changing economics
The Telecom sector has added IP expertise to its repertoire. Olivier Suard from Nevion says that telcos can now help the broadcast sector to do the same...

Managed IaaS: the way forward?
With the big names moving in, is the domestic infrastructure as a service provider dead? Adam Eaton, sales director at Pulsant provides some insight ...

Factotum Monitoring
With IT architectures becoming more hybrid and individual Patrick Hubbard, Head Geek at SolarWinds, says it is time for the invention of the network monitoring engineer and the establishment of monitoring as a discipline...

Is anybody there?
At one time the sandbox was a safe haven. Dick Bussiere, Technical Director at Tenable Network Security provides some insight into what might be lurking there...

The naming of risk
Accurate definition is essential To defend against known risks. Tod Beardsley, Research Director at Rapid7 explains how the industry is organising around CVE and CNA....

Monitoring the hybrid network
A hybrid cloud environment presents new risks to services and data. Rob Farmer, Senior Director at Ipswitch explains how network monitoring can help...

Patch the hacker
with threat sophistication continuing to grow, failure to effectively deal with software patching could be catastrophic. Jonathan Lange, International Sales Manager at baramundi software explains the challenge...

Domain name security
With DNS-based attacks back in the news, Hervé Dhélin, Worldwide Marketing Director of EfficientIP explains the risks...

Verified identity
Identity and verification are closely linked and vital to digital security. David Poole, Head of Growth at MYPINPAD, looks at the future of digital ID&V...

Modelling visible security
Comprehensive network modelling can improve risk visibility across hybrid networks. Ravid Circus, VP Products at Skybox explains security through visibility...

Data centre security
With more data residing in data centres than ever before, Matt Walmsley, EMEA Director at Vectra Networks asks "how safe is your data?"...

How do you protect your perimeter when you've blown it to pieces?
By Ian Kilpatrick, Executive Vice President Cyber-Security, Nuvias Group and Chairman Wick Hill Group ...

UK data centres - the unsung heroes of the tech revolution?
By Jack Bedell-Pearce, Managing Director, 4D...

Changing the basis of competition
Considering my introduction to the final edition of Network Computing for 2016 ("Don't wait for change, cause it") I want to start this edition by reassuring readers that you will not be subjected to any Mystic Meg-style predictions for 2017, despite the annual deluge of offers from around the world...


Don't wait for change, cause it
I am writing this introduction on a cold but sunny November day having just learned the outcome of the American Presidential Election...

The analysed data dollar
As the politicians of the UK and EU exchange banter and even plan for what seems to be the inevitable exit of the UK from the EU, life goes on...

#Techxit or opportunity?
Well, it happened. On the 23rd of June 2016, the United Kingdom, through a national referendum, voted to leave the EU...

Step up and make your view count
If there was one piece of advice I would offer to IT and networking professionals at this precise time, it would be these two things [sic]...

Customer adaptive networks
In the last issue of the magazine I suggested that IT and network professionals need to step up and take a leadership role in the use of IoT in their own organisation - but I didn't mention customers...

IoT: move fast and take a leadership role
Just as the network perimeter has vanished, much the same has happened to the ownership of IT and the organisation’s network...

Creating the next generation network professional
If, as it is suggested, IT technology is in some way to blame for a botched high profile football transfer, it once again illustrates the dependency organisations have placed upon the IT network...

IT people: step up to the plate and advance
At first reading I thought it was good news that IT spending is forecast by Gartner to reach $3.5 trillion during 2015...

Every day’s a data day
Have you noticed that the subject of data is rapidly rising up through the noise level of IT discussions? Have you noticed people who (and I generalise) know nothing about IT giving forth on the importance of data to the future of the business, or the effectiveness of the organisation? Whichever way you are responding, I think that it's a very good moment for IT and Networking professionals to start thinking, talking, and acting data...

A modern it curse is invented
As you may know, it is now thought that the so-called ancient Chinese curse, "May you live in interesting times" may not be either Chinese or even all that old. In fact if anything it would appear to be a modern IT curse...

Direction of travel
Welcome to a new year with Network Computing - and perhaps a new network…...

The web and you
As you may have noticed IP EXPO Europe is upon us once again, and the promise of hearing Sir Tim Berners-Lee's 2050 vision for the web is enthralling...

IT security: it's just one part of the network
As you might imagine I am sent, no bombarded would be a better word, with no end of press releases and telephone calls representing companies who all have the best, biggest, and most effective, whatever it is they sell...

Watch out, it's started...
Moving around and doing my work as Editor of Network Computing I am picking up a firm sense of change that is more than the usual springtime stirring. None of its scientific, but to me it does seem very real...

Security begins at home
By Ray Smyth, Editor, Network Computing...

Don't fall into the network abyss
There is still a gap and it needs to change. Dependence has increased to addictive, even survival levels and yet, there is still a gap...

Drawing the cyber battle lines
When deeply considering the myriad of threats that networks face, the attached devices and the users, securing them can seem like an awesome task ...

Network personality
by Ray Smyth, Editor ...

Think the plan: Plan the think
by Ray Smyth, Editor ...

PRTG Network Monitor keeps the ball rolling at Fulham FC
Founded in 1879, Fulham Football Club is the oldest London football team to have played in the Premier League. As a club that welcomes in the region of 25,000 people to its stadium, Craven Cottage, for home games, a fully functioning IT network that adequately supports all facets of the business is match-critical, from the technology required to put on major sporting events to everyday administration...


Automation mindset
With business growth driving network complexity, Infoblox stepped in to help the Colruyt Group automate its network processes...

Hot network access
Redstone has helped Aon to create agile, cost saving ICT access for its UK employees...

The network that rocked
With massive up scaling and no room for complacency Roskilde Festival depends on WhatsUp Gold network monitoring to keep performers, festival goers, event teams, the press and commercial partners connected...

Mutiny creates a true Vue
Monitoring network performance doesn't get any tougher than in a live cinema complex. Mutiny technology created the means for Vue Entertainment to monitor over 5,000 devices accross their UK cinemas...

The right move for web security
The UK's largest property website, Rightmove, explains how WhiteHat has helped them to improve and underpin their web application security...

End user analytics at the cutting edge
University College London Hospital's IT services transforms many aspects of the IT estate using Nexthink end-user analytics...

The human security sensor
TITUS secures documents for Morpho - and takes employees with them as part of the solution...

Saudi Petroleum chooses Tegile to handle storage needs
London based Saudi Petroleum (SPOL) is the European marketing office of the Saudi Arabian Oil Company, the state-owned oil company of the Kingdom of Saudi Arabia, providing marketing services to Saudi Aramco in Europe, Africa and South America. ...

Canadian bank sees the savings
Jameson Bank, a Canadian FOREX Bank, has reduced its IT administrative overhead by 25% with help from Paessler PRTG...

The university challenge
Oxford University's Advanced Research Computing (ARC) facility relies on hybrid scale-out NAS solutions to provide fast, reliable, and easy-to-administer storage around the clock to support researchers' diverse work flows...

Wire data analysis proves a sure thing for bet365
With help from ExtraHop, bet365 is using innovative wire data analysis to improve application delivery, network performance and strengthen anti-fraud defences...

ExtraHop delivers visible change for Portsmouth Hospitals NHS Trust
Portsmouth Hospitals NHS Trust (PHT) has selected the ExtraHop EH2000v virtual appliance to gain unprecedented visibility into clinical and administrative applications, including its core Citrix-based virtualisation platforms....

Networking on an Olympian scale
Avaya raises the network bar at the Sochi Winter Games...

Credit where credit’s due with AppQoS
International Personal Finance plc (IPF) is a leading international home credit business with more than 200 branches throughout Europe and Mexico, serving 2.4 million customers ...

Credit where credit's due with AppQoS
Resolving application performance issues alleviated the need for wan optimisation for IPF ...

Dixon City Academy saves with Barracuda
Barracuda Backup and Barracuda SSL VPN line up to defend against malicious hackers ...

Putting IT management to bed
Trinity Mirror turns to SolarWinds to simplify and improve its IT management ...

Hearing is believing
Being in the headset technology business means that sound quality is crucial to Plantronics. Deploying the Interoute IP-voice solution, they have increased conference call volume at 50% less cost...

Data acceleration beats bandwidth addiction
During 2012 United Drug had some challenging it problems - but Silver Peak were able to deliver the right medicine...

The Network Computing Awards 2016
The results from the 2016 Network Computing Awards were revealed at an evening ceremony at the Hotel Russell in London on 17th March...


Network Computing Awards 2016 - Infrastructure Product Of The Year
WINNER: Cradlepoint - ECM ...

Network Computing Awards 2016 - Data Centre Product Of The Year
WINNER: SUSE - SUSE OpenStack Cloud 6...

Network Computing Awards 2016 - Cabling Supplier Of The Year
WINNER: Excel...

Network Computing Awards 2016 - Contact Centre Product Of The Year
WINNER: VoiceSage - VoiceSage Contact...

Networking Computing Awards 2016 - CRM Product Of The Year
WINNER: SugarCRM - Sugar Enterprise...

Networking Computing Awards 2016 - Network Management Product Of The Year
WINNER: Paessler - PRTG...

Network Computing Awards 2016 - IT Optimisation Product Of The Year
WINNER: F5 Networks - Application Acceleration Manager ...

Network Computing Awards 2016 - Testing /Monitoring Product Of The Year
WINNER: Netreo - Omnicenter...

Security Product Of The Year – Networking 2016
WINNER: Check Point - SandBlast...

Network Computing Awards 2016 - Education And Training Award
WINNER: Global Knowledge...

Network Computing Awards 2016 - Hardware Product Of The Year
WINNER: WatchGuard - M500...

Networking Computing Awards 2016 - Software Product Of The Year
WINNER: Extreme Networks - ExtremeAnalytics (Formerly Purview) ...

Networking Computing Awards 2016 - Service Provider Of The Year
WINNER: AirWatch...

Networking Computing Awards 2016 - Distributor Of The Year
WINNER: Wick Hill...

Network Computing Awards 2016 - Reseller Of The Year
WINNER: Brookcourt...

Network Computing Awards 2016 - Bench Tested Hardware Product Of The Year: Hardware Category
WINNER: iTrinegy - NE-ONE Network Emulator and Profiler...

Network Computing Awards 2016 - Bench Tested Product Of The Year: Software And Services Category
WINNER: Cryptzone - AppGate XDP...

Network Project Of Year - Public Sector – Networking 2016
WINNER: Portsmouth Grammar School / WatchGuard...

Network Computing Awards 2016: Network Project Of The Year - Private Sector
WINNER: Imagination Group / Cohesive Networks...