Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

OmniCenter from Netreo

Automation is vital, and OmniCenter from Netreo is devoted to this vital work. Rapid to deploy and..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

44

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

The policy on cyber insurance

THE CHANGING CRIMESCAPE
In 2016 the National Crime Agency revealed that cybercrime had officially overtaken traditional crime in the UK...

Factotum Monitoring

The days of highly specialised network engineers are seemingly coming to an end. Instead of being, say, a router..

Is anybody there?

As the security arms race continues, the IT security industry is constantly trying to stay one step ahead of..

The naming of risk

Common Vulnerabilities and Exposures, or more simply CVE, is an international project that is built to catalogue and define..

Monitoring the hybrid network

There has been a steady pattern of cloud adoption by organisations and according to the Cloud Industry Forum over..

Patch the hacker

The National Vulnerability Database reports approximately 70,000 software related risks, ranked at varying levels of severity. At a UK..

Domain name security

Recent research suggests that 30 per cent of organisations don't consider DNS as a critical business component. Yet, despite..

Verified identity

Identity and verification (ID&V) are closely linked concepts and they play an increasingly critical role in our daily lives...

Data centre security

Data centres are highly virtualised environments, densely packed and home to unparalleled levels of data. External data centres are..

The machinery of big data

Businesses are inundated by data, but those that gain advantage from it recognise that the key to success resides..

The rise of the bot

IT teams have been fighting malevolent actors flooding their IT infrastructure since the beginning of Internet time. There are..

New reality from virtualisation

Managing and protecting remote site data from a central location can be challenging. Inter-office bandwidth constraints and dependencies between..

Sharing the blame

In a recent survey over 90 per cent of executives said that they were unable to understand a cybersecurity..

People in the cloud

In 1937, the renowned anthropologist, Sir E.E. Evans-Pritchard, published his famous anthropological study, Witchcraft, Oracles and Magic among the..

Asleep at the wheel

At a recent investor briefing I attended, a major global telecoms firm expounded on its expertise in the cloud..

95

News in a connected context

Unless you’ve been isolated in the depths of Siberia recently you will no doubt have heard of the Russian website..

17

A revolution in data storage

What is the current state of storage tape technology?

Richard Alderson: We are in quite a surprising situation right now...

Storage workflow

There are now more surveillance cameras in use than ever before. Research from IHS suggests that by 2020 over..

The A to Z of networking

One of the big challenges for many network professionals is to gain full and contextual visibility of their network, and..

The A to Z of networking

It's not that long ago that the main IT disciplines were characterised by a mindset of implementing measures, often..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

The IoT security scandal

The Internet of Things has snowballed from a niche selection of connected devices in specific industries, to one of..

Retaining digital talent

As the UK navigates through proceedings for an EU exit, many industries across the UK are left wondering how..

The A to Z of networking

If the network perimeter is a thing of the past then so is the desk or office tethered digital..

Object lesson

The storage market is one to watch in 2017. While some traditional technologies, particularly the HDD and tape sectors..

Not built here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Putting the customer first

Digital transformation was a hot topic throughout 2016 and as pervasive access to new digital technology grows, this will no..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

The IT skills shortage

While the UK is constantly being labelled as a skill-deprived nation, our latest data shows that the same cannot..

Preventing drive-by fraud

The observed behaviour seemed to be harmless. Two Internet-enabled devices had been submitting less than ten automotive insurance applications..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

The IoT security stand-off

In a world of interconnected devices it can be all too easy for consumers and businesses alike to focus..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

IP Expo Manchester

The IP Expo Event series returns to Manchester on 26th and 27th April. Named as a Core City in..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

High density intelligent power

Intelligent power management is critical for high-density applications if high levels of availability and efficiency are to be achieved...

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Carbanak: the risks

Even amid the maelstrom of regular high profile cyber incidents, the notorious Russian cybercrime gang Carbanak stands out. The..

A Grand Night for Networking

The presentation ceremony for the 2017 Network Computing Awards took place on 30th March at the De Vere Grand..

Cyber-insanity

From claims of fake news to allegations of state-sponsored hacks, the role of data security is on stark display. We're..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Closing the detection gap

Organisations continue to invest heavily in defensive cybersecurity solutions, but for many, the results are disappointing. Preventive measures provide little..

The hacker crowd

Whatever your do to defend against hackers, there's a good chance it's not working as you would like. Worse still,..

Internet stressors

This year is set to be one of the most interesting and tumultuous so far in terms of cyber security...

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Not built here…

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

86

A revolution in data storage

What is the current state of storage tape technology?

Richard Alderson: We are in quite a surprising situation right now...

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Not built here...

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Filling the Void

Traditionally, cyber security has rested on two pillars. At one end of the spectrum are the tools preventing known attacks..

Putting the customer first

Digital transformation was a hot topic throughout 2016 and as pervasive access to new digital technology grows, this will no..

Not built here…

You may think that digital transformation is just another IT buzzword but it is much more meaningful than that. It..

Closing the detection gap

Organisations continue to invest heavily in defensive cybersecurity solutions, but for many, the results are disappointing. Preventive measures provide little..

The A to Z of networking

One of the big challenges for many network professionals is to gain full and contextual visibility of their network, and..

The risk of liberated data

With reports that nearly half of all UK businesses suffered at least one cybersecurity breach or attack in the past..

Bending networks

With predications of 20 billion connected devices by 2020, the demands on mobile network infrastructure are set to grow at..

Bare metal: contained

Automation now wields a huge influence in the server industry as robots are increasingly used to deploy server and cloud..

Memory in the cloud

A recent analyst report values the in-memory database market at $4 billion by 2021. This popularity perhaps underlines the increased..

Data and the human touch

Customer experience and customer service are two of the most important aspects in the context of data centres, even if..

Internet stressors

This year is set to be one of the most interesting and tumultuous so far in terms of cyber security...

Cyber-insanity

From claims of fake news to allegations of state-sponsored hacks, the role of data security is on stark display. We're..

The hacker crowd

Whatever your do to defend against hackers, there's a good chance it's not working as you would like. Worse still,..

The IoT security stand-off

In a world of interconnected devices it can be all too easy for consumers and businesses alike to focus..

High density intelligent power

Intelligent power management is critical for high-density applications if high levels of availability and efficiency are to be achieved...

The IT skills shortage

While the UK is constantly being labelled as a skill-deprived nation, our latest data shows that the same cannot..

Retaining digital talent

As the UK navigates through proceedings for an EU exit, many industries across the UK are left wondering how..

The A to Z of networking

If the network perimeter is a thing of the past then so is the desk or office tethered digital..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

A Grand Night for Networking

The presentation ceremony for the 2017 Network Computing Awards took place on 30th March at the De Vere Grand..

The IoT security scandal

The Internet of Things has snowballed from a niche selection of connected devices in specific industries, to one of..

Storage workflow

There are now more surveillance cameras in use than ever before. Research from IHS suggests that by 2020 over..

Object lesson

The storage market is one to watch in 2017. While some traditional technologies, particularly the HDD and tape sectors..

The A to Z of networking

It's not that long ago that the main IT disciplines were characterised by a mindset of implementing measures, often..

The big data advantage

As data continues to grow at an explosive rate, it is conspiring to dramatically change the way that we..

The Internet of communications

Smart devices might be grabbing the headlines with seemingly trivial use cases, but IoT connected applications have been used..

Securing software-based IP

The task of internally securing software-based intellectual property (IP) and confidential product data against the insider threat is a..

Lean wireless networks

Our always-on culture is demanding and as mobile device usage increases, demand for connectivity follows. Wi-Fi users expect high-performance..

Controlling borders today

In 2015, BT announced that it would switch off its UK integrated services digital network (ISDN) by 2025, reflecting..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

Carbanak: the risks

Even amid the maelstrom of regular high profile cyber incidents, the notorious Russian cybercrime gang Carbanak stands out. The..

Preventing drive-by fraud

The observed behaviour seemed to be harmless. Two Internet-enabled devices had been submitting less than ten automotive insurance applications..

IP Expo Manchester

The IP Expo Event series returns to Manchester on 26th and 27th April. Named as a Core City in..

86