Juniper Networks Leader in Gartner's MQ for enterprise wired and wireless LAN infrastructure
We are proud to say that our partner Juniper Networks is positioned furthest in both ability to execute and completeness of vision in the MQ for enterprise wired and wireless LAN infrastructure.
What is NDR?
Network detection and response, more commonly called NDR, is a network solution that uses a combination of machine learning and advanced AI to detect suspicious activity on your network. As part of Nomios 101, we spoke to Fraser Kyne from Arista Networks about the importance of NDR, especially in an age of increasingly complex networks.
5 things you need to know about Cyber Essentials
We’re really passionate about making cyber security accessible to all organisations so we’ve put together a list of the 5 key technical controls needed for Cyber Essentials.
Why MDR services are essential to modern cybersecurity efforts
Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.
API security, are you prepared?
The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.
Zero Trust Network Access (ZTNA)
Zero Trust Network Access solutions aim to continually verify who and what is using network resources. All endpoint devices are identified and made secure, while IT staff can get detailed visibility into and control over what devices are doing on the network.
Top 5 reasons to outsource network management
Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.
What is a Disaggregated Network?
There is a current trend within the networking industry of network disaggregation, but what is it? And how can it help to move your business forward? Together let’s explore the wonders of a disaggregated network and why you’re missing out if you don’t have one.
Wifi networks and the rise of ai
Wi-Fi has been undergoing major changes recently, partly due to working from home. We compare 4 major Wi-Fi vendors and the use of AI.
Cyber attacks Cloud security
Top cybersecurity threats to be aware of
Cybersecurity threats are part of everyday life, such as attacks on IoT, phishing scams and ransomware attacks. Make sure your business is safe from these threats.
The password problem
What do these numbers and letters have in common? 123456, 123456789, picture1, password, 12345678, 111111.
Top five OT security threats
These OT security threats provide an overview of critical and most common cyber threats to Operational Technology.
Problem management ITIL
Problem management: tools cannot give you wisdom
As long as there are no tools that think for us, problem management will largely be a human activity, where the combination of technical skills and soft skills is greater than ever.
CVE security & management: vulnerability management by Cisco Kenna Security
Kenna Security's technology focuses on the different risks in order to better understand vulnerability management by prioritising them in order of importance.
Mist AI Enterprise networking
Back to the office with a strong Wi-Fi connection
With hybrid working, the use of workstations is becoming increasingly flexible. One consequence is that the existing Wi-Fi network is more heavily loaded than before. Is the network ready for this?
Managed services SOC
5 reasons to consider a managed SOC service provider
When dealing with security threats, organisations could opt for a managed SOC (Security Operations Center). We provide five managed SOC service provider benefits.
Why ITIL can be applied at any level
Many organisations struggle with a proper ITIL implementation. But this best practice offers a range of solutions that can partly be implemented at one's own discretion.
Zero-Trust Palo Alto Networks
Why Zero Trust is essential in a post-pandemic world
The rapid transformation to hybrid work and hybrid networks/clouds has exposed weaknesses in the first ZTNA approaches in this post-pandemic world.
Kumar Ramachandran from Palo Alto
Sign up for our newsletter
Get the latest security news, insights and market trends delivered to your inbox.