NewsFrom the team

Posts by Topic

see all

Upgrading security to embrace cloud

Posted by Vohkus on 27-Feb-2018 10:43:21
Cisco Cloud Security products maximise your existing investments Everyone recognises that old security models that concentrated solely on data within the perimeter are now obsolete. As more applications and servers move into the cloud to take advantage of cost savings, scalability, and accessibility, many organisations have lost some of the visibility and control they once had, and they don’t know who is doing what and when in the cloud. Read article

Cisco Email Security named Top Player on Radicati’s Market Quadrant for Secure Email Gateways 2017

Posted by Vohkus on 27-Feb-2018 10:13:31
Billions of corporate messages flow back and forth on a daily basis. And with over 90% of breaches starting with an email, organisations today face a daunting challenge when choosing the best email security solution to stop emails with phishing links or malicious attachments that unleash ransomware, phishing or business email compromise attacks. Securing the most important business communication tool is a tall order indeed. This is why we’re proud to share that Cisco Email Security has been named Top Player on Radicati’s Market Quadrant for Secure Email Gateways 2017 for the second consecutive year. Read article

What is intent-based networking (IBN) and why should I care about it?

They say IBN is the future. What’s the reality? Intent-based networking (IBN) systems are claimed by many to be the new emerging model for networks. It’s said they’ll monitor, identify and react in real time to changing network conditions, and that they’ll become increasingly essential as organisations digitise their operations because the sheer volume of connections, devices and users will make manual administration too time-consuming, costly and error-prone. Read article

Krackdown on the Krack security vulnerability

Posted by Consultant on 03-Nov-2017 11:42:38
WPA2 is the protocol that secures all modern protected Wi-Fi networks. Recently there’s been a great deal of concern after Mathy Vanhoef of KU Leuven published a microsite describing research that suggests an attacker within range of a victim can exploit certain weaknesses using key reinstallation attacks. Read article

Are managed networks right for your business?

Posted by Business Development Manager on 15-Jun-2017 17:04:50
Over the past five years huge developments have taken place in cloud managed networks. Read article