Category: Networking

5 Things Retail CEOs should know about Security and Optimising Business Results

As large, embarrassing data breaches continue to expose big box and e-commerce retailers around the world, retail CEOs and line-of-business executives can no longer afford to ignore security. Hits to reputation, PCI compliance fines, bank fees, incident response and lawsuits add up fast when organisations fail to comply with PCI and secure their IT assets.
Here are 5 things to help […] Read more…

As large, embarrassing data breaches continue to expose big box and e-commerce retailers around the world, retail CEOs and line-of-business executives can no longer afford to ignore security. Hits to reputation, PCI compliance fines, bank fees, incident response and lawsuits add up fast when organisations fail to comply with PCI and secure their IT assets. Here are 5 things to help […]

Read more…

A dive into SD WAN

Written by Paul Bonner, Group Head of Technology.
Things have changed. There I said it. Gone are the days when it was just hardware that was needed to run applications and to connect users to them.  In today’s technology landscape we have seen an explosion in the term ‘Software Defined’ which has now prepended many things from datacentre, through networking and […] Read more…

Written by Paul Bonner, Group Head of Technology. Things have changed. There I said it. Gone are the days when it was just hardware that was needed to run applications and to connect users to them.  In today’s technology landscape we have seen an explosion in the term ‘Software Defined’ which has now prepended many things from datacentre, through networking and […]

Read more…

Your Path to the Cloud Will Define Your Organisation

Digital transformation is a business led decision but there is no doubt that technology knowhow will drive the pace of change. It’s easy to say the cloud will solve everything but what does that actually mean? Your path to the cloud will define your business today, tomorrow and for years to come.
For your cloud to work for you, your data […] Read more…

Digital transformation is a business led decision but there is no doubt that technology knowhow will drive the pace of change. It’s easy to say the cloud will solve everything but what does that actually mean? Your path to the cloud will define your business today, tomorrow and for years to come. For your cloud to work for you, your data […]

Read more…

Preparing your organisation for GDPR

From 25 May 2018, the EU General Data Protection Regulation (GDPR) will affect the way that all organisations manage their data. There are big changes ahead – data protection will become harder, there will be more audits and there will be large fines for not reporting breaches within 72 hours.
With so many businesses operating across borders, international consistency around data […] Read more…

From 25 May 2018, the EU General Data Protection Regulation (GDPR) will affect the way that all organisations manage their data. There are big changes ahead – data protection will become harder, there will be more audits and there will be large fines for not reporting breaches within 72 hours. With so many businesses operating across borders, international consistency around data […]

Read more…

Will you be ready for GDPR and NIS?

According to research conducted by Palo Alto Networks and IDC, most organisations think that they are already compliant with NIS directives, with just eight per cent believing that they won’t be ready in time. However, as it is still possible that the directive may change as it is adopted by member states legal frameworks, nobody can be sure that they […] Read more…

According to research conducted by Palo Alto Networks and IDC, most organisations think that they are already compliant with NIS directives, with just eight per cent believing that they won’t be ready in time. However, as it is still possible that the directive may change as it is adopted by member states legal frameworks, nobody can be sure that they […]

Read more…

How will your business be affected by the NIS directive?

The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. For NIS, companies providing what the law describes as essential or digital services will be affected by these changes. All companies processing personal data of EU residents must comply […] Read more…

The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. For NIS, companies providing what the law describes as essential or digital services will be affected by these changes. All companies processing personal data of EU residents must comply […]

Read more…

How will you define ‘state-of-the-art’?

With the May 2018 implementation date fast approaching, all organisations should be carefully considering what ‘state-of-the-art’ means to their organisation. The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks.
The NIS Directive introduces the concept of “state of the […] Read more…

With the May 2018 implementation date fast approaching, all organisations should be carefully considering what ‘state-of-the-art’ means to their organisation. The Network and Information Security (NIS) Directive and General Data Protection Regulation (GDPR) require businesses in the EU to have regard to ‘state-of-the-art’ cyber security when adopting appropriate protection against cyber-attacks. The NIS Directive introduces the concept of “state of the […]

Read more…

Using multiplexing to solve business challenges

We live in an information age and need constant access to our data, be it via the internet or across our corporate campus.  We are currently being asked for faster and more reliable connectivity between the users and the residence of the data which can often prove problematic.
To increase capacity we could purchase more managed data circuits from connectivity providers, […] Read more…

We live in an information age and need constant access to our data, be it via the internet or across our corporate campus.  We are currently being asked for faster and more reliable connectivity between the users and the residence of the data which can often prove problematic. To increase capacity we could purchase more managed data circuits from connectivity providers, […]

Read more…

What is holding you back from being IPv6 capable?

IPv6 (Internet Protocol version 6) is very important for the long-term health of the internet as it will provide us with a significantly larger pool of IP addresses. Currently we have around 4.3billion IPv4 addresses (or 4,294,967,296 to be precise) which may sound a lot, but we have more than 7 billion people in the world.
IPv6 will offer us 7.9×1028 […] Read more…

IPv6 (Internet Protocol version 6) is very important for the long-term health of the internet as it will provide us with a significantly larger pool of IP addresses. Currently we have around 4.3billion IPv4 addresses (or 4,294,967,296 to be precise) which may sound a lot, but we have more than 7 billion people in the world. IPv6 will offer us 7.9×1028 […]

Read more…

Network Security – A top down approach

The Product
Every so often I see interesting new products from network and security vendors which provide innovative answers to particular security issues. Then I consider how an organisation would procure and deploy these new solutions, given the existing range of security products from multiple vendors and a certain degree of product overlap.
There are plenty of point products around and a […] Read more…

The Product Every so often I see interesting new products from network and security vendors which provide innovative answers to particular security issues. Then I consider how an organisation would procure and deploy these new solutions, given the existing range of security products from multiple vendors and a certain degree of product overlap. There are plenty of point products around and a […]

Read more…