Email security retrospection

Posted by Rob Bamforth on May 9, 2017 10:51:27 AM

Keeping anything safe and secure involves multiple considerations. Avoid putting yourself in danger, put up a protective ‘shield’, detect when that is compromised, take mitigating action.

Read More

Topics: email, security

How identity addresses the challenges of modern IT evolution

Posted by Prince Kapoor on May 9, 2017 10:22:52 AM

The online world is going through massive changes, are you coping up with it? Read on the article to understand how identity is playing an important role in modern IT evolution.

The way organizations are providing services to customers across multiple channels is going through massive change. Mobile adoption, cloud computing, big data services, are the indications that providing security is no more simple. But identity is one of the ways both the new as well as traditional systems can be cured to ensure security. Read on the article to find out how identity can help with creating a robust secure parameter that can address the challenges of modern IT evolution.

Read More

Topics: security, IT, Identity and Access Management, mobility and device management

Load Balancing For Security?

Posted by Clive Longbottom on Feb 20, 2017 4:30:22 PM

Load Balancing (LB), is now popping up on the corporate security agenda! LB is no longer just about managing traffic flows across enterprise routers and servers. In the age of the cloud and software defined networking (SDN), the LB off-loading function has serious possibilities for deflecting DDOS attacks by shifting attack traffic from the corporate server to a public cloud provider. Next generation software load balancers with advanced dashboard capabilities can also provide deep analytics down to the individual application. This is exemplified in the next-generation SDN load balancing just announced by AVI Networks.

Read More

Topics: cloud, security, Software Defined Networking, Load Balancing, DDOS

Context awareness is important for your business!

Posted by Sascha Goeckel on Nov 7, 2016 2:31:27 PM

Let’s make one thing clear; context awareness is one of the most important topics in the IT landscape today. Without context awareness, IT departments cannot fulfill the requirements of their customers (means users) and the security and compliance requirements of their business. Not considering this fact may result in a disadvantage over the competition and in worst case it costs the business money.

Read More

Topics: VDI, RDS, XenDesktop, XenApp, BYOD, VMware, security, EUC

The shape of things to come – advanced networking security for the IoT

Posted by Bob Tarzey on Oct 24, 2016 10:39:40 AM

There is all sort of potential for IoT-related (Internet of Things) applications to streamline business processes and provide new ways of interacting with customers. This was recognised by a cross section of industry sectors surveyed in a new Quocirca report that covered the UK and German speaking region (European Perceptions, Preparedness and Strategies for IoT Security, Oct 2016). 68% said the IoT was already having an impact or would do soon.

Read More

Topics: IoT, security

Securing FSLogix Profile and Office 365 Containers

Posted by Aaron Parker on Oct 6, 2016 12:18:03 PM

Read More

Topics: profile containers, Office 365, security, Office 365 Containers

IoT design, security and PKI

Posted by Bob Tarzey on Jun 30, 2016 1:39:47 PM

In a 2015 blog post – Securing the Internet of Things – time for another look at PKI? – Quocirca outlined why Public Key Infrastructure (PKI) is likely to see a new lease of life from the increasing deployment of applications that fit the general heading Internet of Things (IoT). As the first blog pointed out, IoT applications will only be a success if underlying security is ensured.

Read More

Topics: IoT, security, PKI

What can be done with that old data centre?

Posted by Clive Longbottom on May 18, 2016 9:33:03 AM

Data centres used to be built with the knowledge that they could, with a degree of reworking, be used for 25 years or more.  Now, it is a brave person who would hazard a guess as to how long a brand new data centre would be fit for purpose without an extensive refit.

Read More

Topics: datacenter, I/PaaS, security

Subscribe to Email Updates

Posts by Topic

see all

Follow Me