Cybersecurity and threat news for Europe, the Middle East & Africa
These search results are from across the Techday network of sites
Radiflow’s OT security app now available on Cortex by Palo Alto Networks
The app enables customers to leverage their Palo Alto Networks investment and subscribe to value-added OT-specific risk scoring and threat detection services
How integrating AI into network monitoring drives efficiencies
IT teams all around the world are spending a disproportionate amount diagnosing what are, realistically, straightforward problems.
AVANT partners with SD-WAN vendor
AVANT will gain access to the Open Systems SD-WAN solution and its solutions for networking, security, operations and a monitoring portal.
Gartner names ExtraHop leader in network performance monitoring
ExtraHop provides enterprise cyber analytics that deliver security and performance from the inside out.
Corelight and Exabeam partner to improve network monitoring
The combination of lateral movement and siloed usage of point security products leaves many security teams vulnerable to compromise.
Interview: SevOne's Jim Melvin talks digital transformation
“For a lot of our customers, they have to become a software company. The infrastructure that these applications run on has to become more dynamic."
Paessler protects world’s most precious computing artefacts
Without air conditioning, The National Museum of Computing must keep a close eye on environmental factors like temperature, humidity, and UV light levels.
Fujitsu Labs takes network control approach IoT security
Fujitsu Technologies has developed a new kind of network control technology that is able to secure IoT devices installed in the field.
Paessler’s new partnership programme for innovation through collaboration
Paessler says they are trying to foster collaboration with technology partners to provide integrated and combined solutions.
Comprehensive Infrastructure monitoring long overdue in healthcare digitalisation
To ensure the availability of these systems, comprehensive monitoring of both IT and medical devices is required.
What are the pros and cons of on-prem data centres vs cloud?
There is a lot of murkiness around cloud solutions and data centres because the distinctions aren’t always made clear - here it is in black & white.
Paessler to demonstrate network monitoring-as-a-service at upcoming AWS Summits
Paessler will be showcasing PRTG in the cloud at the upcoming AWS Summits in Sydney, Australia, from April 10 to April 12 and Seoul South Korea.
Power and cooling are critical to edge computing - here's why
Regardless of what industry you're in, if your business is storing data, it's very likely you've heard of edge computing.
Connectivity and the city: Monitoring on the world stage
For just this reason, all eyes (and CCTV cameras) are about to be on the city of the Gold Coast in Queensland for the Commonwealth Games.
Why IT teams need to take control of healthcare's physical security tech
An ill patient collapses in a hallway but there’s nobody there to help. Could CCTV have alerted somebody to what happened?
What if IT downtime could impact lives?
Ensuring that each and every one of these devices is running 24/7 is crucial to preventing delays in patient treatment.
Open for opportunity: What's driving security pros to consider another job
Only 15% of employees say they have no plans to switch jobs this year; 14% plan to look for a new role and 70% are open to new opportunities.
A look inside network monitoring for the connected age
Proper preparation prevents poor performance. The five Ps - we’ve all heard them and no doubt committed them to memory, but how many of us use them?
HPE and Paessler announce new partnership to benefit joint customers
"Designing the PRTG Network Monitor with HPE solutions showcases the innovation and collaborative approach HPE provides with channel partners."
Digital transformation has far-reaching implications for CIOs
Is it time to invest in a tool that is not bound to a specific technology vendor?
Cyber criminals too smart for firewalls & virus scanners - here's what you need
Two thirds of internet users have been victims of cybercrime, with more that 1.5 million new victims every day.
The surprising secrets of firewalls - can yours do these tricks?
If your CEO complains that the business news videos are choppy, it could be that you have a bandwidth-management policy for all streaming video.
Digging a little deeper - the role of network monitoring in mining
Recently mining has been going through a technological shake up.
Threat intelligence gateways minimise work of preventing attacks
“Pre-filtering known bad IP addresses and traffic from untrusted sources is a powerful tool in the war against malware."