skip to Main Content

Network and Endpoint Security - Further Information

This page shows up to 100 pieces of content (newest at the top):

The criticality of the network in the future of business (White Paper) cover thumbnail

The Criticality of the Network in the Future of Business - Managing your networks for success

Transparency and metrics, provided to all stakeholders, are essential for good network management.
EDGE NETWORK INTERCONNECTION PLATFORMS HotReport cover thumbnail

Edge Network Interconnection Platforms

A secure, managed platform that enables connectivity from Edge locations to the Cloud or other specific public sector and enterprise networks.
MDR Spotlight cover

Managed Detection and Response Services - Key to Winning Today's Security Battles

Managed detection and response services provide access to advanced tech and skilled resources to ensure businesses can achieve their objectives.
Cover for State of Industrial and OT Security Report 2018

State of Industrial and OT Security Report 2018

Bloor Research undertook a survey of 370 industrial organisations to ascertain what security measures they are taking to secure their operational technology (OT) networks.
Cover for Overcoming the complexity gap

Overcoming the complexity gap - the role of automation in optimising network performance and security

This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
Cover for Evolving uses of the kill chain framework

Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware

The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all stages of the cyber kill chain
Cover for The promise of managed endpoint security

The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services

Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.
Cover for Turning the tables on cyber criminals

Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation

This document describes what options are available for disrupting attackers at each stage of the kill chain.
Cover for The need for active response to advanced threats

The need for active response to advanced threats - passive remediation is insufficient

Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.
post (Icon)

Solving the puzzle for actionable insight

Reducing the time it takes to detect and respond to cyber threats.
Cover for Advanced threat protection and remediation

Advanced threat protection and remediation

Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.
Cover for Defending against the rogue

Defending against the rogue - unwanted users, devices and applications

Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.
post (Icon)

Hexis Cyber Solutions: a new entrant to the NAC market

New product offerings from Hexis Cyber Solutions
Cover for Technology evolution & its impact on security

Technology evolution & its impact on security - why the endpoint must be the new focus

Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.
Cover for FireMon Security Manager Platform

FireMon Security Manager Platform

FireMon is an enterprise security management technology vendor. Its technology helps organisations to visualise, analyse and automate security management processes.
Cover for Enhancing security through a trust-based approach

Enhancing security through a trust-based approach - advanced threats require advanced weapons

By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.
Cover for Challenges and opportunities in the telecommunications sector

Challenges and opportunities in the telecommunications sector

Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.
Cover for Architecting the security of the next-generation data centre

Architecting the security of the next-generation data centre - Why security needs to be a key component early in the design phase

This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in next-generation dat
Cover for Taking back control in today's complex threat landscape

Taking back control in today’s complex threat landscape - using application and change control to thwart attackers

The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.
Cover for The state of internet infrastructure security

The state of internet infrastructure security - ... a primer for organisations

With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi
Cover for Optimising security in the enterprise

Optimising security in the enterprise - moving from reactive to optimised network security

Organisations should investigate the options that are available in terms of an optimised network security platform, with centralised management capabilities and backed up by global threat intelligence services based in the cloud.
Back To Top