Cloud Computing

Juniper Networks Expands Unite Architecture with New EX Series Switches to Simplify Network Operations
New EX2300 and EX3400 Access Switches Combined with Junos Fusion Enterprise Support Streamlined Management Across…

Wedge Networks Highlights Security Service Orchestration as Key Enabler of Cyber Security Innovation
Orchestration from the Cloud that Mitigates Risk for Service Providers and Enterprises Proves to be…

Five ways the cloud is helping retailers meet customer demands
Retailers can be more innovative, and satisfy the growing customer demand for real-time information and…

Keeping your information secure in the cloud
Effective communication skills are probably the most As the industry shifts to procuring IT services…

Research reveals organisations fail to prioritise security
Security is one of the most important technology investments businesses can make. However, recent research…

Dell Releases Advanced Threat Prevention for the Next Generation of Growing Businesses with Dell Data Protection
Dell Data Protection | Threat Defense proactively prevents the latest advanced persistent threats and malware…

Ixia announces CloudLens platform to deliver visibility across private, public, and hybrid clouds
Ixia has announced CloudLens, a platform consisting of existing Ixia solutions and planned products that will…

As traditional perimeters are redefined, privileged access security is key to securing the hybrid enterprise
Centrify has released findings from a commissioned study conducted by Forrester Consulting, on behalf of Centrify,…

IBM Watson to Tackle Cybercrime
Eight Leading Universities to Help Train Watson for Cyber Security IBM Security has announced Watson for Cyber…

Red Hat opens Canberra office to bring open hybrid cloud solutions to broader market in ANZ growth
Red Hat has announced the opening of its Canberra office. The office was opened in response…
Zscaler Launches Zscaler Private Access – Remote Access Without The Security Risk of VPNs
Zscaler, the leading cloud security provider, today announced the introduction of Zscaler Private Access, a…

Four steps to implementing a big data program in the cloud
Big data projects don’t exist in a vacuum. Your big data infrastructure elements should have…

The Benefits of Network Monitoring
By Keith Bromley, Senior Solutions Marketing Manager, Ixia Network monitoring is rapidly becoming a hot…

The Internet of Things and Security: Is Your Enterprise Protected?
Understanding the opportunities and risks unleashed by the ecosystem of ecosystems Roger Lawrence, Chief Technologist…