UK Leading Global Improvements in Security Maturity

Add to favorites Micro Focus survey finds “much higher degree of operational sophistication”. The fifth annual State of Security Operations Report from LSE listed security specialist Micro Focus finds the UK leading the global pack in improved cyber defence capabilities. Continue reading UK Leading Global Improvements in Security Maturity

Cisco Adds Workload Protection To Tetration

Cisco has announced new capabilities for its Tetration platform. Originally released as a data center visibility product, Tetration can now monitor applications for known vulnerabilities and anomalous behavior. Cisco places software agents on application hosts to monitor application processes, system Continue reading Cisco Adds Workload Protection To Tetration

How to choose the right SD-WAN transport and why it matters

Businesses and their distributed enterprise locations grow more dependent on connected resources every day. That’s because employee and customer expectations and behaviors are evolving and having quick access to business information or constant connection to personal applications is changing the Continue reading How to choose the right SD-WAN transport and why it matters

Sometimes When It’s Not Broken, You Should Fix It

Businesses sometimes are not too keen on switching to newer software. There is the expense of spending money on the software, the implementation, and the training that is necessary. It takes up a lot of time and energy and could Continue reading Sometimes When It’s Not Broken, You Should Fix It

The time is now for a comprehensive, risk-based approach to build cyber resilience

As one who attends many industry conferences, it’s almost a guarantee that you will hear the cliché question “What issue keeps you up at night?” posed to enterprise security executives on stage. While the question may be monotonous, the responses Continue reading The time is now for a comprehensive, risk-based approach to build cyber resilience

DIY Not the Best Approach to SD-WAN

Wide area networks (WANs) were not designed for the load that most enterprises need them to handle today. Demand for data across the distributed enterprise is growing exponentially; virtually all enterprises are using cloud technology in some form; and the Continue reading DIY Not the Best Approach to SD-WAN

What is a SAN and how does it differ from NAS?

A storage area network (SAN) is a dedicated, high-speed network that provides access to block-level storage. SANs were adopted to improve application availability and performance by segregating storage traffic from the rest of the LAN.  SANs enable enterprises to more Continue reading What is a SAN and how does it differ from NAS?

LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)

With Paul Offord of Advance7 hosting, Keith Bromley from Keysight Technologies (formerly Ixia) and Bill Coon from Riverbed will be talking about how to use network visibility to improve troubleshooting. According to an Enterprise Management Associates report (Network Management Megatrends Continue reading LMTV LIVE | How to Improve Network Troubleshooting (with Keith Bromley and Bill Coon)

Micron sets its sights on quad-cell storage

Micron is the latest NAND flash memory maker to announce plans for quadruple-level cell (QLC) flash memory, following similar announcements from Toshiba and Western Digital. It’s a very technical story with a very real impact. NAND flash memory stores data Continue reading Micron sets its sights on quad-cell storage

What is an intrusion detection system (IDS)? A valued capability with serious management challenges

An intrusion detection system, or IDS, monitors traffic moving on networks and through systems to search for suspicious activity and known threats, sending up alerts when it finds such items. Enterprise IT departments deploy intrusion detection systems to gain visibility Continue reading What is an intrusion detection system (IDS)? A valued capability with serious management challenges