Follow Us

We use cookies to provide you with a better experience. If you continue to use this site, we'll assume you're happy with this. Alternatively, click here to find out how to manage these cookies

hide cookie message


Topic Zone

Latest News

Latest Features

  • A clear-eyed guide to Mac OS X's actual security risks

    Apple has improved its security in recent years, but is it enough?

  • Network virtualisation will lead to security control changes

    Gartner analyst Neil MacDonald's specialty is security, and he not only keeps a close eye on what security vendors are doing, but he's an advocate for change as fundamental network technologies evolve. Virtualisation is having an enormous impact, leading to questions about the role of physical security appliances in a virtual world. MacDonald predicts by 2015, 40% of security controls in the enterprise data center will be virtualised, up from 5% in 2010. In a recent interview, MacDonald talked about the future of security in the virtual world.

  • Securing your hybrid cloud

    The debate over public cloud versus private cloud continues to rage within the IT industry. As most organisations take an ad-hoc, evolutionary approach to new technologies, the environment over the next five years is likely to be a mixture of the two.

  • Is your business data safe in the cloud?

    It's scary out there in the cloud. Data thieves, hackers, criminals, they're all out there scouring the Internet around the clock for ways to get into your corporate networks so they can steal data from poorly protected businesses.

  • Intrusion prevention is losing steam in a virtual machine world

    Intrusion-prevention system (IPS) vendors have not found it easy to recast their appliances for use in the virtual-machine (VM) environment. But now McAfee and Sourcefire claim to have overcome some hurdles, at least with VMware's VM.

  • Top 10 Cisco rivals

    Competition is only getting tougher for Cisco as it continues to expand in 30 or so new markets while attempting to maintain growth in its core routing and switching businesses.

  • Is it time to rename routers?

    We all know what a router is and what it is does - don't we? But with the rise of multifunction devices, the definition of router has become more blurred. What does this mean for the specification of devices within a network?

  • Companies rush to launch new 802.11n management tools

    There's a sea-change in IT managers' approaches to planning for wireless networks as the faster 802.11n networks mean that they're increasingly complex to manage. And that's before taking security into account.

  • Cisco makes a bid for practical WLANs

    Cisco's big WLAN announcement isn't about the radio technology. It's about making it easier to get applications running.

  • Microsoft gets NAC act together

    The world of network access control is being drawn, irresistibly, into Microsoft's orbit now that the Redmond giant's full repertoire of Network Access Protection client, server and policy components are out there in the real world.

Featured White Papers

12 things effective intrusion prevention systems (IPS) should do

Download this white paper to discover the top 12 things that your intrusion prevention system (IPS) should be able to do in order to ensure effective security. See if your security solution is up to the task of guarding against today?s stealthy threats by reading on now.
Download whitepaper

Anti-Evasion: Why It?s a Critical Component of Intrusion Prevention Systems

Download this white paper to learn why you should consider a next-level intrusion prevention system (IPS) that offers anti-evasion, a data-normalising technique used to uncover and block encoded threats before they set foot onto your network.
Download whitepaper

11 cool things your firewall should do

Traditional stateful packet inspection firewalls focus on blocking network layer threats by evaluating the ports and protocols used by network layer traffic. The latest Next-Generation Firewalls utilize deep packet inspection to scan the entire packet payload to provide advanced intrusion prevention, antimalware, content filtering and anti-spam.
Download whitepaper

Key elements of security

The arrival of the LAN and the internet bought along with it advanced persistent threats. The PC was initially the target of threats but soon after servers and network devices became targets.
Download whitepaper

CISO guide to next generation threats

Over 95% of businesses unknowingly host compromised endpoints, despite their use of firewalls, intrusion prevention systems (IPS), antivirus and Web gateways. Read this paper and learn how to regain the upper hand against next-generation attacks.
Download whitepaper

Techworld White Papers

Choose – and Choose Wisely – the Right MSP for Your SMB

End users need a technology partner that provides transparency, enables productivity, delivers...

Download Whitepaper

10 Effective Habits of Indispensable IT Departments

It’s no secret that responsibilities are growing while budgets continue to shrink. Download this...

Download Whitepaper

Gartner Magic Quadrant for Enterprise Information Archiving

Enterprise information archiving is contributing to organisational needs for e-discovery and...

Download Whitepaper

Advancing the state of virtualised backups

Dell Software’s vRanger is a veteran of the virtualisation specific backup market. It was the...

Download Whitepaper

Techworld UK - Technology - Business

Innovation, productivity, agility and profit

Watch this on demand webinar which explores IT innovation, managed print services and business agility.

Techworld Mobile Site

Access Techworld's content on the move

Get the latest news, product reviews and downloads on your mobile device with Techworld's mobile site.

Find out more...

From Wow to How : Making mobile and cloud work for you

On demand Biztech Briefing - Learn how to effectively deliver mobile work styles and cloud services together.

Watch now...

Site Map