Powered by People. Enabled by Technology

Three unique companies leverage their individual strengths in a partnership to offer an affordable, reliable and effective Managed Vulnerability Scanning Service to the UK market. The need to identify …
view article
  • Share

Six Steps to Data Security: SecureData Briefs the Financial Times

Etienne Greeff, CEO at SecureData recently briefed the Financial Times on cybersecurity with regards to how companies can ensure they are protecting important data and assets in the right way. “The …
view article
  • Share

Comprehensive Heartbleed Scan Available from SensePost

SensePost has developed a comprehensive scan to accurately determine customers’ exposure beyond the visibility of recently released online checkers. On the 7th April, a critical vulnerability affect …
view article
  • Share

Good Business = An Agile Perimeter

In the era of mobility, cloud and Web 2.0 applications, the old approach of building a defensive wall around your company simply won’t cut it. We must end the traditional mind-set of “locking and …
view article
  • Share

What to Expect from Our Managed Next Generation Firewalls Service

We understand that out-tasking your next generation firewall can be a big decision. It’s important to select the right partner and ensure you receive the quality of service your business demands. Th …
view article
  • Share

The Software Defined Data Centre; Securing Overlay, Underlay, Control and Egress

Welcome back – this is the second of two posts on the requirements for securing the components of the Software Defined Data Centre. If you remember, there are four key aspects of the SDDC – overla …
view article
  • Share

Free Security Checkup Reveals Real-Time Risks in Your Network

So you think your network is secure? But do you know where your data is right now? And what are each of your users up to? If you can’t answer these questions, you could do with more firepower in you …
view article
  • Share

Operation Waking Shark II: An Exam, A Lesson, or Just Revision?

As the results for Operation Waking Shark II were published, IT personnel in banks, law firms and other organisation in the financial services sector could be forgiven for pondering; what exactly hav …
view article
  • Share

The Software Defined Data Centre; Securing Overlay, Underlay, Control and Egress

In my previous post, Security Strategies for SDX I analysed some of the issues that face the enterprise when designing security into a software defined data centre (SDDC). However, as the name impli …
view article
  • Share

Security Stretegies for SDX

2014 is the year when software defined networking (SDN) will emerge from the test lab and the megascale data centre and appear in enterprise networks. Major vendors such as Juniper Networks, Cisco Sys …
view article
  • Share