Network and Endpoint Security - Further Information
This page shows up to 100 pieces of content (newest at the top):
The Criticality of the Network in the Future of Business - Managing your networks for success
Transparency and metrics, provided to all stakeholders, are essential for good network management.
Edge Network Interconnection Platforms
A secure, managed platform that enables connectivity from Edge locations to the Cloud or other specific public sector and enterprise networks.
Managed Detection and Response Services - Key to Winning Today's Security Battles
Managed detection and response services provide access to advanced tech and skilled resources to ensure businesses can achieve their objectives.
State of Industrial and OT Security Report 2018
Bloor Research undertook a survey of 370 industrial organisations to ascertain what security measures they are taking to secure their operational technology (OT) networks.
Overcoming the complexity gap - the role of automation in optimising network performance and security
This document describes how the complexity gap has come about and how it is impacting organisations. It then describes how automation of network security ...
Evolving uses of the kill chain framework - using threat lifecycle management to defeat insider threats and ransomware
The use of a threat lifecycle management technology will provide organisations with the visibility that they need throughout all
stages of the cyber kill chain
The promise of managed endpoint security - ...the need for an integrated suite of cloud-based services
Endpoint security is a pressing concern for all organisations and is an area that is growing in importance.
Turning the tables on cyber criminals - using the cyber kill chain framework to protect your organisation
This document describes what options are available for disrupting attackers at each stage of the kill chain.
The need for active response to advanced threats - passive remediation is insufficient
Today's advanced attacks are increasingly pernicious. Organisations need to be proactive in seeking out incidents that have occurred and in actively removing threats.
Solving the puzzle for actionable insight
Reducing the time it takes to detect and respond to cyber threats.
Advanced threat protection and remediation
Attacks cannot be defeated with protective technologies alone, given today's technology and the sophistication of attackers, some attacks will always get through.
Defending against the rogue - unwanted users, devices and applications
Next-generation NAC technologies are essential tools in the security arsenal of any organisation for protecting the network from harm and keeping data safe.
Hexis Cyber Solutions: a new entrant to the NAC market
New product offerings from Hexis Cyber Solutions
Technology evolution & its impact on security - why the endpoint must be the new focus
Organisations will benefit from investing in security technologies that provide greater insight into activity occurring on both their networks and the systems.
FireMon Security Manager Platform
FireMon is an enterprise security management technology vendor. Its technology helps organisations to visualise, analyse and automate security management processes.
Enhancing security through a trust-based approach - advanced threats require advanced weapons
By creating a trusted environment in which only known good applications can run, control is handed back to the IT department.
Challenges and opportunities in the telecommunications sector
Transformation and consolidation are two of the key challenges, but also opportunities, for telecommunications providers.
Architecting the security of the next-generation data centre - Why security needs to be a key component early in the design phase
This document is aimed at those looking at data centre builds, upgrades or consolidation. It provides an introduction to some of the new security challenges of such environments and provides recommendations for implementing security in next-generation dat
Taking back control in today’s complex threat landscape - using application and change control to thwart attackers
The security threats that we face are getting ever more harmful. Attacks launched en-masse are no longer the order of the day.
The state of internet infrastructure security - ... a primer for organisations
With cyberattacks escalating and becoming increasingly sophisticated and targeted, the race is on for organisations to ensure that their networks, the sensitive information that they contain and their valuable website resources are protected from compromi
Optimising security in the enterprise - moving from reactive to optimised network security
Organisations should investigate the options that are available in terms of an optimised network security platform, with centralised management capabilities and backed up by global threat intelligence services based in the cloud.