Magazine Button

Data Centres

A10 Networks brings advanced ZAP capabilities to DDoS defence

A10 Networks has added Zero-day Automated Protection (ZAP) capabilities to its leading Thunder Threat Protection System (TPS) family of Distributed Denial of Service (DDoS) defence solutions. The ZAP capabilities automatically recognise the characteristics of DDoS attacks and apply mitigation filters without advanced configuration or manual intervention. This speeds the response to the increasingly sophisticated multi-vector […]


Alibaba Cloud extends integration with the Fortinet Security Fabric

Alibaba Cloud, the data intelligence backbone of Alibaba Group, and Fortinet,a global leader in broad, integrated and automated cybersecurity solutions, have announced the expansion of the Fortinet Security Fabric offerings and new automation capabilities for Alibaba Cloud to provide streamlined and consistent security for organisations with hybrid cloud infrastructures. The combination of Alibaba Cloud and […]


Gurucul behaviour-based network traffic analysis detects unknown threats

Gurucul, a leader in behaviour based security and fraud analytics technology for on-premises and the cloud, has announced the Gurucul Network Behaviour Analytics (NBA) solution, the industry’s most advanced Network Traffic Analysis product. It leverages Gurucul’s advanced Machine Learning analytics to provide identification of advanced and unknown cyberthreats. The Gurucul Network Behaviour Analytics solution delivers […]


Industry experts discuss how best to ensure the data centre is secure

Ensuring the data centre is secure should be a top priority for CISOs as the consequences of a breach are catastrophic. Industry experts from Vectra and Red Seal outline some of the biggest cyber-risks to data centres and offer their advice on how to ensure this critical infrastructure is protected. What are some of the […]


Why security has yet to move from beyond the ‘castle walls’ – and how to do it

Craig Talbot, VP EMIEA, iboss, looks at what is needed to properly move security to the cloud so that firms can fully gain the benefits of it, with employees protected wherever they may be and whatever service they are using . Most organisations have either shifted core elements of their IT or will do so […]


Acronis partners with FC INTERNAZIONALE MILANO to provide cybersecurity

Acronis, a global leader in cyber protection and top provider for international sports teams, has announced that it has been selected by FC INTERNAZIONALE MILANO, or Inter, for complete protection for all its data, applications and systems – hundreds of petabytes generated by the club and millions of its fans around the world. The official […]


Eaton updates UPS network cybersecurity card range

Eaton, a global leader in power management, has announced new capabilities to its existing Gigabit Network Card. The card is the industry’s first Uninterruptible Power Supply (UPS) connectivity device to meet the UL 2900-2-2 cybersecurity standard and enables cybersecurity protection of network-connected UPSs. Until now, the Gigabit Network Card had supported single-phase UPSs only and […]


Creating a data-driven AI future for customers

NVIDIA and NetApp have partnered to deliver the ONTAP AI solution to benefit data-driven companies in transportation, healthcare, finance and telecommunications.


Telesoft Technologies announces FlowProbe 4x100GbE

Telesoft Technologies – a provider of carrier-grade technologies for high-density cyber environments, including network, government and enterprise organisations – has announced the latest phase of its compact 1U FlowProbe appliance, which now runs at 4 x 100GbE (up from 2 x 100GbE). FlowProbe 4 x 100GbE monitors networks in real-time at an ultra-high performance level […]


Don’t wait for disaster to strike – get your recovery plan ready now

Rod Harrison, CTO of StorCentric, parent company of Nexsan, shares some key tips to make sure your disaster recovery plan is watertight. Today’s businesses are more at risk of cyberattacks and data loss than ever before, with the amount of data being produced constantly on the rise and the abilities of cybercriminals becoming more refined […]


Browse our latest issue

Intelligent CISO

View Magazine Archive