Privileged Account Security from CyberArk
Many high profile hacking incidents result from the unauthorised use of privileged accounts and passwords
Axon from Spirent
Most IT engineers can only dream of having in-house network and application performance testing hardware because in reality it's..
SecurAccess 7.1 from SecurEnvoy
The use of two-factor authentication (2FA) for online security is growing exponentially as businesses move away from inherently..
Bandwidth Analyzer Pack from SolarWinds
SolarWinds offers one of the most comprehensive ranges of network monitoring solutions, and its latest Bandwidth Analyzer..
Location, location, location
Lisa Rhodes of Verne Global explains why data centre selection needs a new approach to ensure that business..
The cloud optimised network
David Barker, Technical Director at 4D Data Centres offers some guidance on what to consider when building a new..
Getting on the front foot for big data
Jeff Morris, Vice President at Actuate, the company behind BIRT Analytics, explains how network managers can deal..
The big data network
Big data is potentially both lucrative and disruptive. Jamal Elmellas, Technical Director at Auriga, looks at the considerations..
The business of big data
James Kretchmar of Akamai Technologies explores the potential of big data in the hyper-connected world
IP control for big data
Scott Breadmore of Efficient IP explains why the basics of network management will become even more important with the arrival..
Bryn Jones of CommScope explains why active infrastructure management in the data centre can help with management..
Software defined data
Peter Godden of Coraid explores the move from legacy storage to a software defined platform
Securing virtual desktop infrastructure
NetScaler provides a robust set of easily deployed network-layer security, application-layer security and advanced.. Click here to download the White Paper
In a state of denial?
The past few years have seen a marked resurgence of denial of service (DoS) attacks. Not only is this availability-threatening.. Click here to download the White Paper
Why policy management matters
From social media to drinking on the job, when it comes to corporate policy employers and employees need to be on the same page, writes Marissa Best..
A question of authenticity
Businesses are becoming increasingly concerned with the amount of personal and company data that is available to government authorities..
Is NASA's data lost in space?
A recent report has revealed that it’s not just the cloud over Cape Canaveral that’s been troubling NASA of late, writes Campbell Williams..
Pivotal Networks on track to achieve 20 per cent growth...
Pivotal Networks, a subsidiary of leading North East cloud consultancy SITS Group, specialises in advanced networking solutions for private and public sector..
Node4 extends cloud services range with CTERA...
Node4 continues to expand its range of cloud services by rolling out CTERA Networks’ cloud storage enablement platform
Aruba Networks appoints new EMEA VP
Aruba Networks has appointed Wolfram Fischer as Vice President EMEA. In his role, Fischer will work to grow market share and grow revenue with partners..
UK businesses may seek to store data outside of...
The fallout from the recent string of NSA revelations could have serious ramifications for US cloud providers
Are graduates lacking in Big Data skills?
Almost three-quarters of UK firms believe graduates lack the necessary skills to analyse data effectively, according to a survey conducted by Teradata
New scheme seeks to address cyber security skills gap
The Institution of Engineering and Technology (IET) has built an alliance with four other leading IT bodies, to create a Sponsorship Scheme which will facilitate..
Dedicated to securing the Cloud
K3 Business Technology Group (K3) has launched a new IT consultancy division to deploy and manage secure cloud services all over the world with access..
Hypercomplex, human proof networks
David Rubens, Director of The Security Institute muses on the implications of hypercomplexity in global IT networks..
The cloud symphony
Lee Fisher from Abiquo explains how mindless cloud adoption can undermine the benefits on offer and frustrate the journey..
Defence from strategic disorganisation
Professor dr. Marcel Creemers, Program Director of the Business & IT Executive MBA at Nyenrode Business University..
Crystal clear networks
Jane Craven from Sennheiser Communications explains the growing importance of headsets to the network
Drawing the cyber battle lines
When deeply considering the myriad of threats that networks face, the attached devices and the users, securing them can seem like an awesome task
Between the covers of this edition of Network Computing there is no shortage of evidence that IT vendors are continuing their perpetual stream of innovation..