Network visibility stories - Page 2
Industry 4.0 — today’s cyber war front
The anticipation around what Industry 4.0 may bring to the table has placed ASEAN—a region of relatively lower labor productivity—firmly under the spotlight.
IoT security brings new possibilities for channel partners
New Zealand & Australian channel partners have the opportunity to transform security, particularly as Internet of Things (IoT) devices become common.
The IoT arena is exploding: Why network visibility is key to keeping cyber threats at bay
Businesses must know what type of device is accessing the network, who owns it, where & how it’s connecting, and what security measures are in place.
Why real-time visibility into big data is important for cybersecurity
Real-time visibility into big data could be the answer to keeping networks and endpoints secure without allocating human resources to the problem.
Tufin shares 5 common network security pitfalls among organisations
There are several common pitfalls that businesses can fall foul of when implementing their security policies - here's five of the most prominent.
Lack of network firewall visibility causing Australian IT managers to fly blind
Network firewalls may be overrated and underperforming – Australian IT managers can’t identify 41% of their organisation's network traffic.
Cloud security alert - why log files are not the answer
Anyone responsible for IT security needs a strategy for monitoring what is happening in their company’s cloud.
Businesses face 'cyber black holes' without complete visibility
High-profile breaches tend to have a similar storyline: old, unpatched vulnerabilities, advanced persistent threats, and a lack of visibility.
Interview: Why 'the ExtraHop moment' is creating revelations in network visibility
ExtraHop's Carl Gough drives tech growth in A-NZ, offering unmatched cybersecurity analytics & visibility.
Survey reveals cloud IT asset visibility crucial to cut costs
The general consensus is that IT executives remain extremely concerned about the visibility of applications deployed in the cloud.
CASE STUDY: Achieving full network visibility with SIEM
Taking a look at how a rapidly growing business solved their network security woes with a LogRhythm SIEM solution.
Interview: RSA on hoping for the best — and preparing for the worst
RSA’s Rui Ataide and Chris Thomas on the importance of breach preparation and a collaborative cybersecurity ecosystem.
Ixia extends CloudLens, now supports all major cloud platforms
It has now been extended to support for Microsoft Azure, Google Cloud Platform, IBM Bluemix, and Alibaba Cloud.
Four tips for better visibility & security in public cloud
Underused cloud? Ixia reveals only 37% monitor their virtual as closely as physical networks, sparking security concerns.
Cisco's AppDynamics launches standalone partner program
Cisco’s AppDynamics business has launched a standalone partner program, as it seeks to build skills to better capitalise on DX and drive revenue.
Corvil integrates with Cisco Tetration Analytics to ramp up data center visibility
Corvil partners with Cisco to enhance service assurance & security for business infrastructures, addressing challenges of data center visibility.
The nightmare of network downtime: How to find the best monitoring solution for you
Why is it so important for businesses to monitor their systems? It’s simple – if the systems don’t work, bad things happen to the business.
Webroot's new products harness machine learning for network & web traffic security
Webroot is promising deep network and web traffic visibility in its latest platform expansion, as it brings machine learning on board.
Expert opinion: What you can’t see could kill your network
CIOs & network admins often view the network as an inhibitor to achieving the business agility they recognize as vital to digital transformation.
Aerohive unveils mobile management solution…
Aerohive Networks launches cloud-enabled mobility management solution to simplify complexity of mobile devices.
We need to talk about the network
Is your network able to cope with the massive amounts of data being transmitted?.
The age of consequence
IT administrators can greatly benefit from network-wide visibility into malware related incidents and policy breaches.