Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message

APPLICATIONS

Topic Zone

Latest News

Latest Features

  • 7 tips for protecting your AWS cloud

    This week disappointing news came from service provider Code Spaces, a company that provided support for devops application management. Code Spaces, which was hosted in Amazon Web Service's cloud, ceased operations. after suffering a distributed denial-of-service attack by a perpetrator who demanded ransom and then began deleting data when company officials logged into their AWS account to stop the attack.

  • OpenStack: Still waiting for the users

    OpenStack has an impressive list of corporate backers. Red Hat, Rackspace, HP, IBM and AT&T are contributing thousands of lines of code to the open source project and helping deliver an updated version of the cloud computing platform twice a year to allow for easier installation and better manageability.

  • Where's my robot butler? Good (high-tech) help is hard to find

    If you're looking for signs of our collective robotic future, it's either terrifyingly near or forever just around the corner.

  • Do we need more technology accelerators?

    The word ?accelerator? has become so ubiquitous in the tech sector over the past year that I was taken aback recently when a friend asked ?what?s one of those??.

  • Six free network vulnerability scanners

    Vulnerability scanners can help you automate security auditing and can play a crucial part in your IT security. They can scan your network and websites for up to thousands of different security risks, producing a prioritised list of those you should patch, describe the vulnerabilities, and give steps on how to remediate them. Some can even automate the patching process.

  • The ABCs of the Internet of Things

    You've heard the term and probably read stories about smart homes where the toaster talks to the smoke detector. But what makes it all connect? When will it become mainstream, and will it work?

  • Security-vendor snake oil: 7 promises that don't deliver

    Beware bold promises from a multibillion-dollar industry that can't prevent your IT systems from being routinely hacked

  • Michael Dell: On SDNs and networking for the masses

    Dell is synonymous with home and business PCs, and data center servers. Yet Dell also has an ambitious software-defined networking activity underway called the Open Networking Initiative, where it partners with SDN software companies like Cumulus Networks and Big Switch Networks to bundle operating systems and applications on Dell switches.

  • 10 Big Data startups to watch

    The Big Data space is heating up ? to the point that many pundits already see it as the over-hyped heir to "cloud." The hype may be a bit much, but Big Data is already living up to its potential, transforming entire business lines, such as marketing, pharmaceutical research, and cyber-security.

  • Who's to blame for 'catastrophic' Heartbleed Bug?

    The Heartbleed Bug, basically a flaw in OpenSSL that would let savvy attackers eavesdrop on Web, e-mail and some VPN communications that use OpenSSL, has sent companies scurrying to patch servers and change digital encryption certificates and users to change their passwords. .





Featured White Papers

Still Using Proxies for URL Filtering? There?s a Better Way

Firewalls enforce network access via a positive control model, where only specific traffic defined in policies is granted access to the network while all other traffic is denied. Access Control Lists (ACLs) initially performed this functionality, often in routers, but their rudimentary approach gave way to dedicated packet filtering and stateful inspection firewall devices that offered deeper levels of access controls. Unfortunately, these traditional firewalls shared a common shortcoming?an inability to see all of the applications traversing the network across all ports and protocols. The use of proxy-based devices began providing more granular visibility into a small set of applications and protocols where traditional firewalls were blind.
Download whitepaper

Cybersecurity imperatives: reinvent your network security

Cybersecurity has become a leading topic both within and beyond the corporate boardroom. What enterprises need to stop the escalation of cyberattacks is a network security approach that is designed from the outset to enable the safe use of the applications and technologies required to support a thriving business.
Download whitepaper

Getting Started With a Zero Trust Approach to Network Security

Zero Trust is an alternative security model that addresses the shortcomings of failing perimeter-centric strategies by removing the assumption of trust. With Zero Trust there is no default trust for any entity?including users, devices, applications, and packets?regardless of what it is and its location on or relative to the corporate network. This paper discusses the need for a Zero Trust approach to network security, how the Palo Alto Networks® next-generation security platform delivers on these requirements, and provides guidance on how to progressively migrate to a Zero Trust architecture.
Download whitepaper

10 Things Your Next Firewall Must Do

For enterprises looking at Next-Generation Firewall?s, the most important consideration is: Will this new technology empower your security teams to securely enable applications to the benefit of the organization? It's not about blocking applications, but safely enabling them.
Download whitepaper

Application, usage and threat report

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.
Download whitepaper


Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map