What's going on

Stay up-to-date with the latest industry news, blog posts, and insights.

Placeholder for Tunnel traffic nightTunnel traffic night

Rapid international expansion thanks to specialisation

Interview with Infradata Group CEO Nino Tomovski. About the international growth of Infradata Group, Cyber ​​Security solutions and the importance of local expertise.

1 min. read
Placeholder for Palo alto networksPalo alto networks
Palo Alto Networks

Palo Alto Networks

Palo Alto Networks acquires Aporeto for cloud security

Palo Alto Networks announced that it has entered into a definitive agreement to acquire Aporeto Inc.

1 min. read
Placeholder for Elevator shaftElevator shaft
Juniper Networks

Juniper Networks Achieves Recommended Rating from NSS Labs for Data Center Security Gateway

Juniper Networks has achieved a “Recommended” rating from NSS Labs in this year's Data Center Security Gateway (DCSG) report. NSS Labs tested a Juniper SRX5400 firewall with one SPC3 service card, running Application Security and Intrusion Detection Prevention (IDP).

1 min. read
Placeholder for Colourful leaves macroColourful leaves macro
Arbor Networks

NetOps, SecOps, and DevOps: Merger material?

DevOps are critical to companies aiming to feed the insatiable appetites of today’s digital economy. At the same time, NetOps teams race to deliver flawless performance—in real time—across an ever-more complex environment of data centers, cloud, and virtualized environment.

1 min. read
Placeholder for Juniper nxtwork2018 las vegasJuniper nxtwork2018 las vegas

Juniper Networks

The week after: Key takeaways from Juniper NXTWORK 2019

Key takeaway from NXTWORK 2019, the annual Juniper Networks event, including: AI driven enterprise networks, Mist Systems' Marvis, threat aware networks and more.

1 min. read
Placeholder for Business woman 1Business woman 1
Fortinet

Using Advanced AI to Stay Ahead of Cybercriminals

As the threat landscape continues to evolve rapidly, it now includes increasingly sophisticated, zero-day malware that traditional security approaches can no longer keep pace with. As a result, security researchers estimate that the cost of cybercrime will outpace security spend by over 16X

1 min. read
Placeholder for Coffee meetingCoffee meeting
McAfee

Endpoint security

Maintaining effective endpoint security

With the threat landscape evolving every day, is there more these organizations can do to sustain an effective endpoint strategy while supporting enterprise expansion? Let’s take a look at how teams can bolster endpoint security strategy.

5 min. read
Placeholder for Girl listening to musicGirl listening to music
Juniper Networks

Would you like 5G or WiFi 6?

Peer insights from wireless industry experts on 5G and WiFi 6 from Mist's VP of Marketing.

1 min. read
Placeholder for Close up tabletClose up tablet
CrowdStrike

CrowdStrike Firewall

CrowdStrike introduces Falcon Firewall Management for cloud-native platform

Cloud-Native Falcon Firewall Management offers simple, cross-platform management of host/OS firewalls from the Falcon console, providing customers with enhanced protection from network threats.

1 min. read
Placeholder for Bird of preyBird of prey
Juniper Networks

Juniper Networks

Juniper Networks (Mist Systems) Named a Visionary in Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure

Mist is included in the 2019 Gartner Magic Quadrant for Wired and Wireless LAN Access Infrastructure. Juniper Networks also recognized by Gartner as one of the Best Wired and Wireless LAN Access Infrastructure vendors of 2019.

1 min. read
Placeholder for Feather macroFeather macro
Juniper Networks

Juniper introduces Mist Wired Assurance Service and Marvis Actions

Optimize experiences to network users with Mist Wired Assurance Service. It leverages Mist’s AI engine and microservices cloud to streamline IT operations and simplify troubleshooting across wired and wireless domains.

1 min. read
Placeholder for Team discussionTeam discussion
Fortinet

Security Multi-cloud

Overcoming security challenges impacting multicloud environments

Cloud adoption is increasing at a rapid pace as organizations look for new ways to process, store, and distribute information. For many organizations, deploying new cloud services is much easier than requesting a dedicated set of hardware from IT teams.

1 min. read
Placeholder for Street by night3Street by night3
Juniper Networks

Juniper Networks introduces Contrail Insights

Juniper Networks Contrail Insights enhances full stack data center monitoring and automation with single pane of glass visibility.

1 min. read
Placeholder for Under the bridgeUnder the bridge

Legacy laggards or transformation champions

Digital transformation is the new reality for all organisations, and the legal sector is no exception. How are law firms in the UK navigating the journey, and what are they doing to ensure that the opportunities digital delivers aren’t compromised by a lacklustre IT security stance?

1 min. read
Placeholder for Management meetingManagement meeting

A beginner’s cybersecurity guide for board members

Cybersecurity for a board member or business executive, starts by getting acquainted with the CIS Controls, commonly referred to as the CIS 20, says M.K. Palmore of Palo Alto Networks

1 min. read
Placeholder for Northern lightNorthern light
McAfee

Cybersecurity

Cybersecurity Platforms: 8 Must-Have Attributes

Eight key attributes that should be included in all RFIs/RFPs and become part of every cybersecurity technology platform.

1 min. read
Placeholder for DatacenterDatacenter
Cumulus Networks

Cumulus Networks Extends Data Center Innovation to Modernize Campus Networks

Cumulus Networks and Dell EMC extend joint benefits of open networking to campus networks and enable a single network OS across data center and campus environments.

1 min. read
Placeholder for Digital identityDigital identity

Top 5 mobile security threats and how to mitigate them

Some of the biggest mobile security threats companies are seeing recently include: phishing, mobile malware, fake public Wi-Fi connections, malicious apps and data leaks.

1 min. read

Sign up for our newsletter

Get the latest security news, insights and market trends delivered to your inbox.