What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Digital experience monitoring benefits e-commerceDigital experience monitoring benefits e-commerce

NetOps

Digital Experience Monitoring (DEM) and its benefit for e-commerce organisations.

Digital Experience Monitoring (DEM) is a critical process that enables organisations to measure, track, and analyse user interactions with their digital services and applications.

Harper Simone
Placeholder for Artboard 2Artboard 2

Harper Simone

4 min. read
Placeholder for Cloud architect high level designCloud architect high level design

SIEM EDR

How SIEM, EDR and NDR complement each other

We will take a closer look at SIEM, EDR and NDR and show you how the three solutions have the potential to effectively complement each other.

3 min. read
Placeholder for Cloud architect developer implementing ddos protectionCloud architect developer implementing ddos protection

Anti-DDoS

Top DDoS protection solutions that should be on your radar

Overview of DDoS protection solutions to protect enterprises against these bigger, smarter and more diverse DDoS attacks. These should be on your radar!

8 min. read
Placeholder for Pierre chatel innocenti Uk RSG521 I1 I unsplashPierre chatel innocenti Uk RSG521 I1 I unsplash

Cloud networking Cloud security

Could greater reliance on cloud computing mean a cyber security risk for businesses?

Cloud services are fast becoming an essential part of any organisation’s network. With more people working remotely the ability to collaborate with a dispersed team and access documentation from anywhere is vital to the success of the business.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

3 min. read
Placeholder for CISO and lawyer office discussionCISO and lawyer office discussion

NIS2

NIS2 advice to CISOs

As a CISO, it is important to understand the requirements of the NIS2 Directive and ensure that your company is compliant in a timely manner.

5 min. read
Placeholder for Microsoft Teams image 28Microsoft Teams image 28

Fortinet Cybersecurity

Could Fortinet be the answer to your organisation’s cybersecurity?

Cyber security is now essential for any organisation, and as you may know, our passion for it here at Nomios has led us to create the Nomios Cyber Maturity Curve.

Harper Simone
Placeholder for Artboard 2Artboard 2

Harper Simone

4 min. read
Placeholder for I Stock 994866328I Stock 994866328

Mist AI AI-driven enterprise

The rise of AI and what it means for cybersecurity

It seems we can’t escape mentions of the advancements in Artificial Intelligence (AI) in the news recently. With the much-lauded chatbots, virtual assistants and an increase in automation in almost every area of life and work. But what do these advances in machine learning and AI mean for the security of your networks and virtual assets?

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

4 min. read
Placeholder for Adobe Stock 105368170Adobe Stock 105368170

Company

Nomios Group expands in Southern Europe with leading Italian cybersecurity expert Aditinet

The acquisition of Aditinet strengthens Nomios’ European position as one of the leading cybersecurity service companies.

Sébastien Kher
Placeholder for Sebastien KherSebastien Kher

Sébastien Kher

2 min. read
Placeholder for Silicon chip shortageSilicon chip shortage

Network automation

Automation now: Why the silicon shortage is an opportunity, not a crisis

While it’s easy to view the silicon chip shortage as a massive headache, long production waiting times could actually be a significant opportunity for your business to innovate.

Adam Kirchberger
Placeholder for Adam KirchbergerAdam Kirchberger

Adam Kirchberger

6 min. read
Placeholder for Nomios Juniper partner of the yearNomios Juniper partner of the year
Juniper Networks

Juniper Networks Award

Nomios wins Juniper Networks Worldwide Partner of the Year award

On 2 February 2023, during the Juniper Networks Partner Executive Summit in Madrid, Nomios was named Juniper Networks Partner of the Year award for 2022.

2 min. read
Placeholder for Hetportretbureau LR T1 A5873Hetportretbureau LR T1 A5873
Juniper Networks

SASE Juniper Networks

Simplifying the SASE experience with Juniper Networks

With the addition of Cloud Access Security Broker (CASB) and Data Loss Prevention (DLP), Juniper Secure Edge now provides full-stack SSE capabilities, simplifying the SASE experience for customers.

Samantha Madrid
Placeholder for Samantha MadridSamantha Madrid

Samantha Madrid

5 min. read
Placeholder for Juniper Leader Gartner MQ wired and wireless LANJuniper Leader Gartner MQ wired and wireless LAN

Juniper Networks

Juniper Networks Leader in Gartner's MQ for enterprise wired and wireless LAN infrastructure

We are proud to say that our partner Juniper Networks is positioned furthest in both ability to execute and completeness of vision in the MQ for enterprise wired and wireless LAN infrastructure.

7 min. read
Placeholder for Verne ho GJL L3 Tq K0 unsplashVerne ho GJL L3 Tq K0 unsplash
Arista Networks

NDR

What is NDR?

Network detection and response, more commonly called NDR, is a network solution that uses a combination of machine learning and advanced AI to detect suspicious activity on your network. As part of Nomios 101, we spoke to Fraser Kyne from Arista Networks about the importance of NDR, especially in an age of increasingly complex networks.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

2 min. read
Placeholder for Adobe Stock 775719473Adobe Stock 775719473

Cybersecurity

5 things you need to know about Cyber Essentials

We’re really passionate about making cyber security accessible to all organisations so we’ve put together a list of the 5 key technical controls needed for Cyber Essentials.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

8 min. read
Placeholder for Cybersecurity engineers project desktopCybersecurity engineers project desktop

MDR

Why MDR services are essential to modern cybersecurity efforts

Want to counter cybersecurity threats, have an intel agency at your disposal, and do all of this at a predictable cost? Then MDR security services are the solution for you.

Erik Biemans
Placeholder for Erik biemansErik biemans

Erik Biemans

7 min. read
Placeholder for Rainbow housesRainbow houses

API security

API security, are you prepared?

The use of APIs has evolved in recent years, especially through smartphone use, making API security essential.

Matthieu Millot
Placeholder for Matthieu MilotMatthieu Milot

Matthieu Millot

4 min. read
Placeholder for Christian wiediger 6t8 PM Ifq N Vg unsplashChristian wiediger 6t8 PM Ifq N Vg unsplash

ZTNA

What does ZTNA stand for?

Zero Trust Network Access solutions aim to continually verify who and what is using network resources. All endpoint devices are identified and made secure, while IT staff can get detailed visibility into and control over what devices are doing on the network.

Dave Humphrey
Placeholder for DH 1DH 1

Dave Humphrey

3 min. read
Placeholder for Outsource network managementOutsource network management

Network management

Top 5 reasons to outsource network management

Network management is probably one of the most important components when mapping your organisation's IT infrastructure. Outsourcing is a great way to free up your internal IT team to focus on day-to-day operations and strategic goals.

Alix Ingram
Placeholder for Female5Female5

Alix Ingram

3 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.