What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Juniper Leader Gartner MQ wired and wireless LANJuniper Leader Gartner MQ wired and wireless LAN

Juniper Networks

Juniper Networks Leader in Gartner's MQ for enterprise wired and wireless LAN infrastructure

We are proud to say that our partner Juniper Networks is positioned furthest in both ability to execute and completeness of vision in the MQ for enterprise wired and wireless LAN infrastructure.

7 min. read
Placeholder for Verne ho GJL L3 Tq K0 unsplashVerne ho GJL L3 Tq K0 unsplash

NDR

What is NDR?

Network detection and response, more commonly called NDR, is a network solution that uses a combination of machine learning and advanced AI to detect suspicious activity on your network. As part of Nomios 101, we spoke to Fraser Kyne from Arista Networks about the importance of NDR, especially in an age of increasingly complex networks.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

2 min. read
Placeholder for Futuristic microchipFuturistic microchip

Cybersecurity

5 things you need to know about Cyber Essentials

We’re really passionate about making cyber security accessible to all organisations so we’ve put together a list of the 5 key technical controls needed for Cyber Essentials.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

8 min. read
Placeholder for Cybersecurity engineers project desktopCybersecurity engineers project desktop

MDR

Why MDR services are essential to modern cybersecurity efforts

Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.

Erik Biemans
Placeholder for Erik biemansErik biemans

Erik Biemans

7 min. read
Placeholder for Rainbow housesRainbow houses

API security

API security, are you prepared?

The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.

Matthieu Millot
Placeholder for Matthieu MilotMatthieu Milot

Matthieu Millot

4 min. read
Placeholder for Christian wiediger 6t8 PM Ifq N Vg unsplashChristian wiediger 6t8 PM Ifq N Vg unsplash

ZTNA

Zero Trust Network Access (ZTNA)

Zero Trust Network Access solutions aim to continually verify who and what is using network resources. All endpoint devices are identified and made secure, while IT staff can get detailed visibility into and control over what devices are doing on the network.

Dave Humphrey
Placeholder for DH 1DH 1

Dave Humphrey

3 min. read
Placeholder for Outsource network managementOutsource network management

Network management

Top 5 reasons to outsource network management

Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

3 min. read
Placeholder for Disaggregated networkDisaggregated network

Disaggregated Networks

What is a Disaggregated Network?

There is a current trend within the networking industry of network disaggregation, but what is it? And how can it help to move your business forward? Together let’s explore the wonders of a disaggregated network and why you’re missing out if you don’t have one.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

3 min. read
Placeholder for Male and female engineer discussionMale and female engineer discussion

Network automation

Wifi networks and the rise of ai

Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.

3 min. read
Placeholder for Shark threatShark threat

Cyber attacks Cloud security

Top cybersecurity threats to be aware of

Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.

6 min. read
Placeholder for Retail shopper bags smartphoneRetail shopper bags smartphone

Zero-Trust

The password problem

What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.

Rachid Groeneveld
Placeholder for Rachid GroeneveldRachid Groeneveld

Rachid Groeneveld

8 min. read
Placeholder for Engineers manufacturingEngineers manufacturing

OT security

Top five OT security threats

These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.

9 min. read
Placeholder for Problem managementProblem management

Problem management ITIL

Problem management: tools cannot give you wisdom

As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.

Tom Jansen
Placeholder for Tom JansenTom Jansen

Tom Jansen

4 min. read
Placeholder for Barcelona streets from aboveBarcelona streets from above
Kenna Security

Cisco

CVE security & management: vulnerability management by Cisco Kenna Security

Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.

Nicolas Tarenne
Placeholder for Nicolas TarenneNicolas Tarenne

Nicolas Tarenne

2 min. read
Placeholder for Two network engineers datacenterTwo network engineers datacenter
Juniper Networks

Mist AI Enterprise networking

Back to the office with a strong Wi-Fi connection

With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?

3 min. read
Placeholder for Night city streetNight city street

Managed services SOC

5 reasons to consider a managed SOC service provider

When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.

Erik Biemans
Placeholder for Erik biemansErik biemans

Erik Biemans

8 min. read
Placeholder for Hetportretbureau LR T1 A5975Hetportretbureau LR T1 A5975

ITIL

Why ITIL can be applied at any level

Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.

Tom Jansen
Placeholder for Tom JansenTom Jansen

Tom Jansen

3 min. read
Placeholder for Explaining the importance of Zero TrustExplaining the importance of Zero Trust
Palo Alto Networks

Zero-Trust Palo Alto Networks

Why Zero Trust is essential in a post-pandemic world

The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.

Kumar Ramachandran from Palo Alto
Placeholder for Kumar RamachandranKumar Ramachandran

Kumar Ramachandran from Palo Alto

5 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.