If you cannot view this email please click here.
Management BYOD Infrastructure Traffic Storage Security Helpdesk


Frictionless security

Adam Boone at Certes Networks outlines three principles for protecting applications in the modern enterprise

main headline

Out of the shadows

Dana Wolf at OpenDNS explains how Cloud-based reporting can be used to combat the effects of Shadow IT

Reducing detection time impact

It can take over 229 days to detect a network breach - an unacceptably long time, says Cohesive Network’s Patrick Kerpan

main headline


Tripwire IP360 Vulnerability & Risk Management

Tripwire delivers an easily deployed, on premise or Cloud solution that can scan, identify and assess all network assets.

main headline


Authlogics Desktop Login Agent now available for Windows

The new release for Windows 10 adds 1.5 or 2 factor authentication, strengthening the login process

SolarWinds offers new free tool to monitor server health

Latest free tool provides detailed visibility into multi-vendor server hardware

Full speed into the Cloud?

Jennifer Brenner at iland looks at why Cloud adoption is now outpacing industry expectations


Understanding malware

Cris Thomas at Tenable Network Security gives us a timely reminder of the nature and risk of the malware threat

main headline

Security software

Adam Greenwood Byrne of RealVNC explains why the channel, software companies and customers must collaborate to diminish the threat


SUSECon 2015 - control, optimise and innovate

Providing leadership, guidance and education for those professionally connecting with Linux, Open Source and SUSE

main headline


Network Computing Awards 2015

This year's Network Computing Awards took place on March 19th at the Hotel Russell in London. Here we profile some of the 2015 winners:

Network Project of the Year - Public Sector

Winner: Sutton and East Surrey Water / ForeScout Technologies

main headline

Network Project of the Year - Private Sector

Winner: iomart Group / Cisco /Corning / Kinetic IT

main headline

The Return on Investment Award

Winner: ExaGrid - EX32000E

main headline

Welcome to the October 2015 Newsletter.

A slightly belated welcome to this month's newsletter! We're rapidly running out of days in the month, largely due to the fact that we've been moonlighting somewhat on our sister publication, Computing Security - or more specifically the Computing Security Awards, which were held on October 8th. For full details of the 2015 winners and runners-up click the banner above!

We've continued with the security theme for this month's newsletter too, with five articles and a review (and some news!) dedicated to analysing and combating the latest threats. They include advice on how to shed light on Shadow IT via cloud-based reporting tools, an opinion piece on reducing the detection time of a breach through application-centric network security, and a timely reminder for increased vigilance when dealing with the ever-present malware threat.

In fact with TalkTalk’s share price dropping even as Scotland Yard’s cyber crime unit and BAE’s Applied Intelligence division investigate the extent of the latest cyber attack on the company, it’s all too clear that security issues won’t be straying far from the headlines anytime soon

Follow us :

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.



To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622