If you cannot view this email please click here.
Management BYOD Infrastructure Traffic Storage Security Helpdesk


Visibility: software defined

Making the case for a single view of network traffic in the context of improved security

main headline

Refreshingly smart

How Out-of-Band remote console management technologies can improve the network refresh process and network availability

main headline

It’s the data, stupid!

Why the most effective way to keep information secure must centre on protecting the data, not the endpoints using it

main headline


The NE-ONE network emulator and profiler from iTrinegy

Multi-port, point-to-point network emulation and profiling in a highly affordable appliance

main headline


Are we letting phishing messages off the hook?

New phish’d by MWR survey carried out at InfoSecurity Europe suggests we might be!

Arbit & OPSWAT provide safe and secure data flow for networks

Partnership to deliver threat-free communication between low and high security networks

Silver Peak expands SD-WAN ecosystem

Forms alliance with Infoblox, Nutanix, and Zscaler for enterprise broadband WAN solutions


The role of disaster recovery in virus recovery

Making the case for deploying a tried and tested DR strategy to recover rapidly from a successful virus exploit

main headline

Endpoint backup

A good endpoint defence is the best offence according to Andy Hardy at Code42

main headline

Healthcare in the cloud

From big data to wearable devices, what are the key drivers – and top tips - for cloud adoption in the health sector?


Network Computing Awards 2015

This year’s Network Computing Awards took place on March 19th at the Hotel Russell in London. Here we profile some of the 2015 winners:

Software Product of the Year

Winner: Varonis - Metadata Framework

main headline

Service Provider of the Year

Winner: The PC Support Group

main headline

Distributor of the Year

Winner: Wick Hill

main headline

Welcome to the August 2015 Newsletter.

We’ve gone somewhat on the defensive this month with several articles looking at the best way to protect our network resources. Where should we draw the line when it comes to security? Does it begin with the network endpoints themselves, or should we really be concentrating on securing the data they are using?

According to Salo Fajer, CTO at Digital Guardian, “…Rather than trying to keep up with every new endpoint vulnerability and security leak, it is better to focus on protecting what the criminals want,” namely our data. Fajer advocates applying security policies directly to the data itself and not the endpoint. For Andy Hardy, EMEA MD at Code42, “Security must be continuous, not an occasional audit. Automated, consistent backup is crucial to protect data on both the endpoint device and in the cloud. Businesses also need to be in full control of this data, especially in light of the recent data sovereignty debate in Europe.”

A large part of achieving this will rely on training, and it seems we could all do with some help there judging by the results of a new phish’d by MWR survey carried out at InfoSecurity Europe. The survey found that, while 80 percent of people questioned had a policy in place for reporting phishing emails to the IT security department of their organisation, only 25 percent actually did so. As the survey illustrates, even the most sophisticated security policies won’t protect us if users fail to implement them correctly due to a lack of training or guidance.

Follow us :

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.



To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622