Industry insider news for New Zealand's technology resellers
These search results are from across the Techday network of sites
Trend Micro and NTT DOCOMO partner on 5G security
This solution is built upon the recently announced Trend Micro Virtual Network Function Suite (VNFS) on NTT DOCOMO's "docomo 5G open cloud."
Eight reasons to use a VPN
By keeping your actions, your identity and your geographical location a secret, you can browse the web in the knowledge that you’re not being watched.
Bitdefender expands offerings with RedSocks acquisition
RedSocks provides non-intrusive, real-time breach detection solutions and incident response services.
Frost & Sullivan: Pulse Secure among best NACs for SMB to large enterprise
The recent Frost and Sullivan 2018 Network Access Control (NAC) Market, Global, Forecast to 2022 report states that network visibility is critical.
How network visibility tools are changing the security game
Without visibility into the behaviours occurring within a network, it’s almost impossible to detect if what’s happening is out of the ordinary.
Gartner names Sophos leader in Unified Threat Management
“We develop our cybersecurity products to work together as a system, enabling our defences to be as coordinated as cyber attacks.”
WatchGuard launches multi-factor authentication solution aimed at SMBs
WatchGuard’s AuthPoint solution is a cloud service that can be deployed and managed from any location without the need for expensive hardware components.
Three reasons organizations should consider network segmentation
ForeScout says that network segmentation splits networks into specific zones, which can then enact barriers against infiltrators.
Boil that old cybersecurity problem down to the packet level, say experts
Cybersecurity is such a multifaceted affair that it can be difficult to prioritise focus, spending, and what to explain to the C-suite.
APAC ahead of US and EMEA in AI security adoption - Osterman
Companies realise they need to improve the way they manage security and policy, and they also realise that automating workflows and processes is key.
Trend Micro brings analytics to network security solution
Organisations need a way to simplify and prioritise threat information, accelerating detection and response.
Exclusive: How to intentionally build security into a network
Intent-based networking (IBN) offers an opportunity to design security objectives into the fabric of a complex network, and then enforce them.
Gigamon partners with Endace for improved network visibility
Analysts often struggle to uncover the evidence they need to quickly determine the root cause of cyber threats.
Make the pre-emptive strike against cyberattacks with threat hunting
Threat hunting starts with the assumption that bad actors have already breached perimeter defences and are operating inside the environment.
Hillstone Networks announces new data centre firewall solution
With its 12 slots, Hillstone X10800 supports 100GE high-density interfaces and intelligent security services.
Cyberbit update promises improved visibility into OT networks with SCADAShield 6.0
The latest version of SCADAShield provides OT managers with advanced asset tracking and profiling.
Maximise threat prevention and network uptime with inline bypass
Network performance is getting higher and the number of security tools needed are overlapping and overcomplicating the task.
Step up your network security with SD-WAN
Not just any SD-WAN solution can offer the right levels of network security.
Exclusive: Five steps to a data-centric security strategy
Digital Guardian EMEA VP and GM discusses the modern network and how IT teams can deal with data no longer being confined to four walls.
ExtraHop Reveal(x) brings cutting-edge AI to network security analytics
ExtraHop took a different approach to its Reveal(x) solution than what you’d generally find in solutions from other security firms.
Android apps can track network connections - is it time to use a VPN?
“Apps can monitor network activity even without requesting any sensitive permissions."
IoT device security is a business responsibility, too
"It's essential to carefully consider security when implementing IoT devices and to not trust that security will be managed by the vendor."
Why your organisation now needs to worry about IPv6 attacks
Evidence suggests that IPv6 attacks are escalating, here's how to protect your organisation.
Five steps to ensure persistent data security across your network
Gaps are starting to appear in perimeter defences, which can be exploited by hackers or malware to steal information and personal data.