Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Enterprise AWS MAX from Loadbalancer.org

Digital transformation emphasises the critical importance of application high availability, including web services, databases and phone systems. Reliably provisioning these..

Lighthouse 5 from Opengear

Care is needed however, as high-level out-of-band (OOB) access to core devices is a major security issue for enterprises,..

Nexthink V6.8

This self-learning platform uses real-time behavioural analysis of all core systems, applications, workstations and end-users to provide advanced network..

Ruckus Cloud Wi-Fi

Its ubiquitous presence, business criticality and high user expectations belie the complex physics of radio communications. This doesn't mean..

NetCrunch 9.3 from AdRem

Not content to rest on its laurels, AdRem has launched a new version (9.3) that delivers over 30 new..

baramundi Management Suite 2016

It covers every angle and provides a wealth of endpoint management tools comprising 18 individual components. Its modular design..

Phishing mitigation from SpearSec

Technology averts the majority of attacks but the persistence, inventiveness and doggedness of cybercriminals, when combined with a sophisticated toolset,..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania PAWS Studio 2.4.4

Capable of auditing any Windows or Linux system, it offers an impressive range of highly detailed compliance reports and..

Titania Nipper Studio

There are a wide range of security auditing solutions available, but some can be prohibitively expensive, many rely only..

NetCrunch 9 from AdRem

Along with a highly scalable agent-less architecture, it provides slick automated network discovery and mapping, comprehensive alerting and swift..

AppGate XDP from Cryptzone

AppGate XDP has been designed to address the resulting gap, using policy-based access. Firewalls can run thousands..

Titania TEC

We've always been impressed with its Nipper Studio and PAWS Studio products, and TEC now brings them both under..

macmon NAC

NAC from German company macmon neatly avoids these pitfalls, as its minimal system requirements and agentless architecture means it..

32

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

Forget VPNs: the future is SDP

The VPN model of extending security through enterprise firewalls is dead, and the future now belongs to the Software Defined..

Testing more with less

Service delivery is a crucial business enabler. Yet, as the Internet of Things (IoT) grows rapidly, touching nearly every point..

IP KVM: the force that unites

Command and control room design has come a long way over the last three decades. Driven by changes in technology,..

The death of the signature

For decades, the entire anti-malware industry has been built on a reactionary sacrificial lamb, depending on the infection of patient-zero..

108
17

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

The AI Sanity Check

All of the commercial AI available today is the simplest and crudest manifestation imaginable. At a fundamental level it does..

Security Product of the Year 2018

RUNNER UP: Arbor Networks - Arbor Cloud

The cloud security solution TrustedGate enables companies to work securely in cloud computing environments..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

The reinforcing benefits of AI

Whichever way you look at it, the task of keeping networks safe from security breaches is becoming harder, perhaps even..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Currency minecraft

As cryptocurrency becomes more popular, threat actors have developed coin mining malware to take advantage. But what is coin mining..

The A to Z of networking

Cybersecurity terms are bandied about but all too often not really understood. The various methods that criminal actors use to..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

Rebuilding brand trust

Criminals have been exploiting email as a vector for fraud and cyber-attacks since its inception. Deceptive techniques have evolved rapidly..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Intelligence that is artificial

Forget everything you've seen in sci-fi movies or read in sci-fi books about Artificial Intelligence. Forget about all the amazing..

Trust that knows no bounds

Infrastructure as a Service (IaaS) platforms offered by the likes of Amazon Web Services (AWS) support the innovation and app-driven..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

IoT Network Management

The telecommunications industry has long anticipated the arrival of the Internet of Things (IoT). Based on the recent steady growth..

the AI power challenge

Fuelled by GPU (Graphics Processing Unit) deep learning, we're in the early stages of a new computing era: AI computing...

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

MI for the network?

There is currently little consistent definition of what Artificial Intelligence (AI) actually is. Many see Machine Intelligence (MI) as a..

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

Ringing the changes

When it comes to those working in the healthcare industry, lives are quite literally on the line. Businesses cannot afford..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

Software Product of the Year 2018

RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2

Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI,..

SD-WAN Vendor of the Year 2018

RUNNER UP: Silver Peak

Citrix aims to power a world where people, organisations and things are securely connected and accessible to..

An advanced defence

CHALLENGE
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organisations and..

Storage Product of the Year 2018

RUNNER UP: Lenovo - Storage DX8200D

BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal for businesses requiring..

Hardware Product of the Year 2018

RUNNER UP: WatchGuard - Firebox M5600

The IM7200 streamlines remote management of network, server and power infrastructure in data centre and..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

CRM Product of the Year 2018

RUNNER UP: Smarty Software - Smarty CRM

WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Distributor of the Year 2018

RUNNER UP: NBM Distribution

Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering a comprehensive range of..

The digital premium

The charitable sector is currently operating between five and ten years behind the commercial sector when it comes to digital..

A Big Night for Networking

The Network Computing Awards ceremony took place in London on 22nd March. Former cricketer, Graham Cowdrey, was Master of ceremonies..

Product of the Year 2018

RUNNER UP: Netreo - OmniCenter

Silver Peak’s Unity EdgeConnect SD-WAN solution
Delivered in both virtual and physical appliances, the Silver Peak Unity..

The Customer Service Award 2018

RUNNER UP: NBM Technology Solutions

Commenting on their win, Brookcourt CEO Phil Higgins said "As a true testament of customer service..

Company of the Year 2018

RUNNER UP: Brookcourt Solutions

Nuvias Group is the pan-EMEA, high value distribution business, which is redefining international, specialist distribution in IT...

Reseller of the Year 2018

RUNNER UP: Brookcourt Solutions

As an award-winning platform, data and services specialist, Q Associates are helping organisations across the commercial and..

Application security: designed in

DevSecOps can be confusing, but pioneering practitioners define very specific things which you'll want to embrace. To over simplify, consider..

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

Stop: don't drain the swamp

But the fact is that if you stop, just for a short while, and consider the evolution of your network-based..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

The Inspiration Award 2018

RUNNER UP: Ian Moyse

Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows
With over 25 years' design and management..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

86

The identity foundation

If you want a handy snapshot of the cybersecurity industry, its dynamics and issues, then there's no better place than..

The human element

At an event like Infosecurity Europe, it's easy to get swept up in the hype. Each year, hundreds of vendors..

Outsourcing the ‘S’

Every year, visitors and exhibitors come in their droves to Infosecurity Europe and ponder the question - what is this..

You see momentum…

Unified communications (UC) has been a talking point for years and en route it has encountered a number of false..

Automated patching

Contending with hackers is not a battle but a race. Whoever finds the needle in a haystack line of buggy..

Acting bad for good

A common visualisation used for the Internet is an iceberg. The indexed surface web is less than 10 per cent..

Multi-cloud simplicity

Anyone working in the world of cloud computing will be familiar with the term multi-cloud. It has rapidly become one..

Technology: the human perspective

Technology offers innumerable business benefits. The explosive growth of devices, applications and networks has not only changed our personal lives,..

Securely out-of-band

As network requirements change, driven by trends in Edge computing and the internet of things, there's a greater need for..

Security: the cost options

Nearly 40 years after the first computer rolled off the production line the hope was that, by now, companies would..

The IPv6 network effect

The message from the Internet community over the past 20 years or so has clearly been that the world needs..

Monitoring complexity

The ghost in the machine is a phrase that was first coined in 1949 by philosopher Gilbert Ryle to describes..

Machine data in real time

Ask any CIO what their biggest challenge is and the answer will likely be how to support business growth. Of..

Optical networking: automated

The trend towards automation continues apace, not least in the network, where enterprises and operators have been quick to recognise..

The mobile attack surface

Cybercrime is poised to push the illegal drug trade off the illicit profit pedestal. By 2021, this industry could be..

Network shadows

As we all know, data security incidents depend on darkness and secrecy. Malicious files lurk in the shadowy corners of..

Total encryption

It wasn't so long ago that most of an organisation's data was stored either on premise or in a dedicated..

Tunnelled vision

Based on some of our recent research, it is clear that cybercriminals are effortlessly gliding into networks, undetected by some..

An advanced defence

CHALLENGE
Advanced persistent threats (APTs) are stealthier and more spiteful than ever. Sophisticated techniques are used to quietly breach organisations and..

Ringing the changes

When it comes to those working in the healthcare industry, lives are quite literally on the line. Businesses cannot afford..

Stop: don't drain the swamp

But the fact is that if you stop, just for a short while, and consider the evolution of your network-based..

MI for the network?

There is currently little consistent definition of what Artificial Intelligence (AI) actually is. Many see Machine Intelligence (MI) as a..

IoT Network Management

The telecommunications industry has long anticipated the arrival of the Internet of Things (IoT). Based on the recent steady growth..

The API security gold rush

In today's era of hyper-connectivity, securing your organisation's systems, data and business-critical processes is harder than ever. As a result..

The digital premium

The charitable sector is currently operating between five and ten years behind the commercial sector when it comes to digital..

Redefining risk

Correctly calculating the risk probability is becoming critical. It's not just because it is essential and fundamental to good risk..

Internet due diligence

Time is money when it comes to internet outages, to say nothing of the decreased productivity, lost sales and increased..

Intelligent selling

According to research by the Economist Intelligence Unit, the UK is set to become the world's third slowest-growing retail market..

Failsafe SD-WAN from Talari Networks

Software-defined WANs (SD-WANs) are an attractive option, as they provide significant savings over MPLS and greater resilience by amalgamating multiple,..

Rebuilding brand trust

Criminals have been exploiting email as a vector for fraud and cyber-attacks since its inception. Deceptive techniques have evolved rapidly..

Currency minecraft

As cryptocurrency becomes more popular, threat actors have developed coin mining malware to take advantage. But what is coin mining..

Application security: designed in

DevSecOps can be confusing, but pioneering practitioners define very specific things which you'll want to embrace. To over simplify, consider..

UPS replacement

Reliability is often considered to be the key attribute for any UPS solution. However, a system can be reliable over..

The A to Z of networking

Cybersecurity terms are bandied about but all too often not really understood. The various methods that criminal actors use to..

The AI Sanity Check

All of the commercial AI available today is the simplest and crudest manifestation imaginable. At a fundamental level it does..

The reinforcing benefits of AI

Whichever way you look at it, the task of keeping networks safe from security breaches is becoming harder, perhaps even..

Intelligence that is artificial

Forget everything you've seen in sci-fi movies or read in sci-fi books about Artificial Intelligence. Forget about all the amazing..

the AI power challenge

Fuelled by GPU (Graphics Processing Unit) deep learning, we're in the early stages of a new computing era: AI computing...

Transparent IT

Once upon a time, IT existed to simply provision robust and reliable computing resources to the business. Today, information technology..

When storage becomes data

The terms legacy and emerging when combined with the word storage can seem either obvious or innocuous - perhaps both...

Smart connectivity by design

According to Cisco, global mobile data traffic will approach 50 exabytes per month by 2021. But before we consider how..

Networked audio

Video and audio conferencing has significantly evolved as it has moved from hardware to software based solutions. Google Hangouts and..

IoT security that works

Recently, the IoT has been hit by a number of security attacks, including denial of service operations and the hacking..

AirCheck G2 from NETSCOUT

Driven by convenience, wireless networks are everywhere, and while most require credentials for access, they can also adversely..

Trust that knows no bounds

Infrastructure as a Service (IaaS) platforms offered by the likes of Amazon Web Services (AWS) support the innovation and app-driven..

A Big Night for Networking

The Network Computing Awards ceremony took place in London on 22nd March. Former cricketer, Graham Cowdrey, was Master of ceremonies..

CRM Product of the Year 2018

RUNNER UP: Smarty Software - Smarty CRM

WebCRM is a cloud based, sophisticated CRM system for Small to Medium Enterprises, that..

Storage Product of the Year 2018

RUNNER UP: Lenovo - Storage DX8200D

BUFFALO's TeraStation 51210RH is a high performance 12-bay network storage solution ideal for businesses requiring..

Security Product of the Year 2018

RUNNER UP: Arbor Networks - Arbor Cloud

The cloud security solution TrustedGate enables companies to work securely in cloud computing environments..

SD-WAN Vendor of the Year 2018

RUNNER UP: Silver Peak

Citrix aims to power a world where people, organisations and things are securely connected and accessible to..

Hardware Product of the Year 2018

RUNNER UP: WatchGuard - Firebox M5600

The IM7200 streamlines remote management of network, server and power infrastructure in data centre and..

Software Product of the Year 2018

RUNNER UP: Rohde & Schwarz Cybersecurity - R&S PACE 2

Natterbox AVS offers the complete telephony solution, including Cloud PBX, CTI,..

The Customer Service Award 2018

RUNNER UP: NBM Technology Solutions

Commenting on their win, Brookcourt CEO Phil Higgins said "As a true testament of customer service..

The Inspiration Award 2018

RUNNER UP: Ian Moyse

Andy Hirst IEng, MIET, CDCDP, ATD - Technical Director, Sudlows
With over 25 years' design and management..

Distributor of the Year 2018

RUNNER UP: NBM Distribution

Nuvias is a fast-growing high value, solutions-defined EMEA distributor with a portfolio covering a comprehensive range of..

Reseller of the Year 2018

RUNNER UP: Brookcourt Solutions

As an award-winning platform, data and services specialist, Q Associates are helping organisations across the commercial and..

Product of the Year 2018

RUNNER UP: Netreo - OmniCenter

Silver Peak’s Unity EdgeConnect SD-WAN solution
Delivered in both virtual and physical appliances, the Silver Peak Unity..

Company of the Year 2018

RUNNER UP: Brookcourt Solutions

Nuvias Group is the pan-EMEA, high value distribution business, which is redefining international, specialist distribution in IT...

Containing expectations

With its performance, cost efficiency and scalability benefits, the use of container technology for running applications in the cloud is..

86