Industry insider news for Australia's technology resellers
These search results are from across the Techday Network of sites
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
How network visibility tools are changing the security game
Without visibility into the behaviours occurring within a network, it’s almost impossible to detect if what’s happening is out of the ordinary.
Gartner names Sophos leader in Unified Threat Management
“We develop our cybersecurity products to work together as a system, enabling our defences to be as coordinated as cyber attacks.”
WatchGuard launches multi-factor authentication solution aimed at SMBs
WatchGuard’s AuthPoint solution is a cloud service that can be deployed and managed from any location without the need for expensive hardware components.
Three reasons organizations should consider network segmentation
ForeScout says that network segmentation splits networks into specific zones, which can then enact barriers against infiltrators.
Boil that old cybersecurity problem down to the packet level, say experts
Cybersecurity is such a multifaceted affair that it can be difficult to prioritise focus, spending, and what to explain to the C-suite.
APAC ahead of US and EMEA in AI security adoption - Osterman
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
Trend Micro brings analytics to network security solution
Organisations need a way to simplify and prioritise threat information, accelerating detection and response.
Exclusive: How to intentionally build security into a network
Intent-based networking (IBN) offers an opportunity to design security objectives into the fabric of a complex network, and then enforce them.
Gigamon partners with Endace for improved network visibility
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.
Make the pre-emptive strike against cyberattacks with threat hunting
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Hillstone Networks announces new data centre firewall solution
With its 12 slots, Hillstone X10800 supports 100GE high-density interfaces and intelligent security services.
Cyberbit update promises improved visibility into OT networks with SCADAShield 6.0
The latest version of SCADAShield provides OT managers with advanced asset tracking and profiling.
Maximise threat prevention and network uptime with inline bypass
Network performance is getting higher and the number of security tools needed are overlapping and overcomplicating the task.
Step up your network security with SD-WAN
Not just any SD-WAN solution can offer the right levels of network security.
Exclusive: Five steps to a data-centric security strategy
Digital Guardian EMEA VP and GM discusses the modern network and how IT teams can deal with data no longer being confined to four walls.
ExtraHop Reveal(x) brings cutting-edge AI to network security analytics
ExtraHop took a different approach to its Reveal(x) solution than what you’d generally find in solutions from other security firms.
Android apps can track network connections - is it time to use a VPN?
“Apps can monitor network activity even without requesting any sensitive permissions."
IoT device security is a business responsibility, too
"It's essential to carefully consider security when implementing IoT devices and to not trust that security will be managed by the vendor."
Why your organisation now needs to worry about IPv6 attacks
Evidence suggests that IPv6 attacks are escalating, here's how to protect your organisation.
Five steps to ensure persistent data security across your network
Gaps are starting to appear in perimeter defences, which can be exploited by hackers or malware to steal information and personal data.
Why mandating strong cybersecurity for your remote workforce matters
Employees who use unprotected public or home internet connections are putting their organisation, networks, assets, and intellectual property at risk.
Why Australian businesses must secure guest access and IoT devices
Everyone, including third parties, must comply with company security policies and practices."
Lack of network firewall visibility causing Australian IT managers to fly blind
Network firewalls may be overrated and underperforming – Australian IT managers can’t identify 41% of their organisation's network traffic.
Whitepaper: An inside look at the benefits of cloud
"Cloud computing is revolutionising business, enabling organisations to move faster, spend less and deliver greater value."
The six golden keys to successful identity assurance
When someone tries to access your internal systems, how can you be sure a user is who they claim to be?
E-Book: Building applications just got simpler
When it comes to end user's expectations for applications, there seems to be no limits. Now, you live up to them without having to be a coding mastermind.