
Juniper Networks
Juniper Networks Leader in Gartner's MQ for enterprise wired and wireless LAN infrastructure
We are proud to say that our partner Juniper Networks is positioned furthest in both ability to execute and completeness of vision in the MQ for enterprise wired and wireless LAN infrastructure.

NDR
What is NDR?
Network detection and response, more commonly called NDR, is a network solution that uses a combination of machine learning and advanced AI to detect suspicious activity on your network. As part of Nomios 101, we spoke to Fraser Kyne from Arista Networks about the importance of NDR, especially in an age of increasingly complex networks.

Alix Ingram

Cybersecurity
5 things you need to know about Cyber Essentials
Weāre really passionate about making cyber security accessible to all organisations so weāve put together a list of the 5 key technical controls needed for Cyber Essentials.

Alix Ingram

MDR
Why MDR services are essential to modern cybersecurity efforts
Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.

Erik Biemans

API security
API security, are you prepared?
The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.

Matthieu Millot

ZTNA
Zero Trust Network Access (ZTNA)
Zero Trust Network Access solutions aim to continually verify who and what is using network resources. All endpoint devices are identified and made secure, while IT staff can get detailed visibility into and control over what devices are doing on the network.

Dave Humphrey

Network management
Top 5 reasons to outsource network management
Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.

Alix Ingram

Disaggregated Networks
What is a Disaggregated Network?
There is a current trend within the networking industry of network disaggregation, but what is it? And how can it help to move your business forward? Together letās explore the wonders of a disaggregated network and why youāre missing out if you donāt have one.

Alix Ingram

Network automation
Wifi networks and the rise of ai
Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.

Cyber attacks Cloud security
Top cybersecurity threats to be aware of
Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.

Zero-Trust
The password problem
What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.

Rachid Groeneveld

OT security
Top five OT security threats
These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.

Problem management ITIL
Problem management: tools cannot give you wisdom
As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.

Tom Jansen

Cisco
CVE security & management: vulnerability management by Cisco Kenna Security
Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.

Nicolas Tarenne

Mist AI Enterprise networking
Back to the office with a strong Wi-Fi connection
With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?

Managed services SOC
5 reasons to consider a managed SOC service provider
When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.

Erik Biemans

ITIL
Why ITIL can be applied at any level
Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.

Tom Jansen

Zero-Trust Palo Alto Networks
Why Zero Trust is essential in a post-pandemic world
The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.

Kumar Ramachandran from Palo Alto
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.