NEWS
Public Wi-Fi - is it secure enough?
  • Posted on 2nd August 2019 in by Phil Alsop

While many of people use Wi-Fi when they are out an about, there is much precautionary advice about using unsecured public Wi-Fi, which could allow a hacker sitting either a few yards away from them, or even miles away to gain access to their laptops, tablets and smartphones to steal passwords and...

Read More
NEWS
7 Ways TAPs Enable Enhanced Network Monitoring and Visibility
  • Posted on 2nd August 2019 in by Phil Alsop

Corporate networks are being forced to reckon with amplified levels of traffic as technology changes and advances. In addition to monitoring and fortifying the network against possible cyberattacks, IT departments have to factor in the growing use of personal devices in the workplace, and...

Read More
NEWS
Seven pillars for constructing a modern data centre network
  • Posted on 23rd July 2019 in by Phil Alsop

Designing and deploying a new or modernised data centre is a rewarding endeavour; both for the engineers and architects, and also for the businesses that reap the benefits of agility, scalability, and performance that come along with it. By JR Rivers, Co-founder and CTO, Cumulus Networks.

Read More
NEWS
The new networking approach: SD-WAN
  • Posted on 23rd July 2019 in by Phil Alsop

As enterprise IT estates adopt cloud services, enterprise networking has become an increasingly complex challenge. Moving to the cloud provides greater agility, scalability and flexibility for networking environments. However, there is a need to maintain application speed and agility in the cloud...

Read More
NEWS
Seven pillars for building a modern data centre network

Designing and deploying a new or modernised data centre is a rewarding endeavour; both for the...

Read More
NEWS
Networks of the future will be fuelled by analytics, AI, and 5G

Artificial Intelligence (AI) and 5G are red hot topics today. However, despite all the hype and...

Read More
NEWS
Four cloud principles that can improve your network

Digital transformation continues to be a top business initiative in 2019. At the same time,...

Read More
NEWS
Why Public Wi-Fi Isn’t Secure Enough

While many of people use Wi-Fi when they are out an about, there is much precautionary advice about...

Read More
NEWS
Embracing the Intelligent Edge

The large and complex datacentre has, for many years, been the backbone of computing networks - a...

Read More
NEWS
Transforming Networking to Accelerate Connected Industries

Legacy networking is focused on connecting the user, but the future of networking is in connecting...

Read More
NEWS
5G and the evolution of mobile networks

Fifth generation networks, just like the preceding 4G LTE and WiMAX networks, are expected to...

Read More
NEWS
How cloud and mobility are disrupting 30 years of network and security history

The internet is disrupting industries and business models, fundamentally changing the way we live...

Read More

Videos

Nicolas Leszczynski, Principal Solutions Engineer at Riverbed Technology, discusses the findings of the company’s 2025 Future of IT Operations in the AI Era report. Despite record investments, only 12% of AI...
Dan Schiappa, President of Technology and Services at Arctic Wolf, discusses the results of the company’s 2025 AI report, which reveals that AI is rapidly becoming a cornerstone of modern cybersecurity, but...
Data Centre World Madrid 2025
Mark Wilson, CEO of ILI Group, discusses the ILI Group’s plans for three new hyperscale data centres across Scotland, creating what it calls The Stoics – a £15 billion Green Digital Network spanning the...

News

CrowdStrike unveils Falcon AIDR, a unified platform to secure AI interactions, marking a new era in enterprise AI security.
Cognizant partners with Microsoft to infuse AI across enterprises, propelling innovation and enhancing operational efficiency.
Skillsoft partners with edX to enrich its platform with university courses, bridging skills gaps in the evolving workforce.
Trellix unveils innovations in cybersecurity, bolstering the convergence of OT-IT environments and enhancing perimeter defence against sophisticated threats.